Fitbit Charge 4 Tracker
The Fitbit Charge 4 tracks your exercise by monitoring GPS, heart rate, stairs climbed, and calories burned. The device also pairs with your phone so you can access all of your data through a secure Bluetooth connection.
Has there ever been a breach or data leak?
No known hacks or data breaches!
Is any kind of biometric data collected (health, heart, voice, etc.)?
Are you able to delete your data / the data collected about you?
Does it have parental controls?
Does it use encryption to protect your data both in-transit and at-rest?
Does it get regular software and / or firmware updates?
Does it require you to create a strong password?
Is there a system in place for managing security vulnerabilities?
How Can It Snoop?
Does it have a camera or request / require access to a camera?
Does it have a microphone or request / require access to a microphone?
Does it track your location or request / require access to location data?
Does it require an email address to use?
Does it require a phone number to use?
Does it require an address (home or office) to use?
Are you able to use a credit card as a payment option?
Are you able to use a cryptocurrency as a payment option?
Are you able to use PayPal as a payment option?
Are you able to use cash or gift cards as a payment option?
What Could Go Wrong?
Fitbit anonymizes all data so it cannot be personally identifiable. However, it has been found to be relatively simple to de-anonymize this data and track an individual's patterns, especially with location data. Be aware that by purchasing this device, you will have a device constantly monitoring your location, heart rate, sleep patterns, and more.
How Does It Share Your Data?
Fitbit asks permission to share your information, which you do not have to give them. However, if you do, Fitbit claims to transfer information to corporate affiliates, service providers, and other partners.
- Built-in GPS.
- Various sleep tools.
- Spotify support.
- Major privacy concerns.
- Very basic interface.
Fitbit only shares de-identified user data with third parties. However, it has been found to be relatively easy to recover personally identifiable information from this data. This means a hacker could gain access to your location, heart rate, sleep patterns, and more. Your information could be seriously at risk by using this product.