INTRODUCTION
Increasingly, brands are coming out with more and more AI-integrated technologies. Ray-Ban, the eyewear company, has also followed this trend with the release of their Ray-Ban Meta Wayfarer glasses.
This information is provided for general awareness and defense purposes only. This information also is not intended to be a complete description of the functionality or risks of the identified tools. Also to note, this device has legitimate functionality as a consumer device.
WHAT ARE THE RAY-BAN META WAYFARERS?
These glasses from Ray-Ban integrate with Meta AI, allowing the wearer to simply say “Hey Meta” and have full access to Meta’s AI assistant technology. Additionally, these glasses have embedded cameras just to the sides of the lenses as well as audio recording capabilities. The glasses connect to a user’s smartphone in order to be able to access the audio and video data recorded by the glasses.
HOW DOES IT WORK?
While the glasses require a Wi-Fi connection to work, they also have Bluetooth connectivity capabilities. They connect to the user’s smartphone, functioning with both Android and Apple devices as long as they are operating on newer operating systems. Via this connection, a user is able to import the audio and video information captured by the glasses directly to their smartphone. For more technical specifications of the glasses, see the Ray-Ban site.
CTO Dr. Brett Walkenhorst motivates the wireless security problem in this clip from our Wi-Fi Vulnerabilities Part 1 webinar
HOW CAN I UNCOVER A PAIR OF RAY-BAN META WAYFARERS?
Upon first inspection, these may look like any other pair of glasses. This may make it difficult for physical security systems to catch these devices as they enter your space. This is where wireless monitoring comes in. A system like Bastille will be able to identify and localize the Wayfarers via their Wi-Fi and Bluetooth capabilities.
WHAT CAN I DO TO DEFEND AGAINST THIS THREAT?
Bastille recommends a few security best practices for this type of threat:
Implement Wireless Monitoring in Your Space: Gaining visibility into the wireless activity within your space is key when trying to identify relatively innocuous devices such as these commercial tagging devices.
Update and Enforce Your Security Policy: Establish and educate upon a corporate policy for all employees regarding these types of devices to help keep your space secure.
Stay Up to Date: The landscape of wireless security is constantly evolving. In order to defend against these threats, you need to know what’s out there. Check out our recent webinar on Wireless Threat Intelligence in which CTO Dr. Brett Walkenhorst dives into the wireless threat intelligence, monitoring, and real-world use cases of wireless monitoring identifying unauthorized devices, like the Ray-Ban Meta Wayfarers.