{"title": "Kohler Encounters Privacy Backlash Regarding Fecal-Scanning Toilet Device", "body": ["Concerns about user privacy have surfaced surrounding Kohler Health's latest innovation, the Dekota toilet attachment, which uses imaging technology to evaluate stool samples and offer insights into digestive well-being."], ["A cybersecurity expert has challenged Kohler Health's assertion that the information captured by the Dekota, encompassing images of waste material, undergoes full end-to-end encryption. The company, however, stands firm, insisting that the data transmission remains securely encrypted from start to finish."], ["In his online publication, as covered by TechCrunch, expert Simon Fondrie-Teitler describes end-to-end encryption as a safeguard where only the originator and designated receiver can access the content. When properly executed, this approach blocks intermediaries, even the software creator, from viewing the safeguarded information."], ["During his investigation, Fondrie-Teitler discovered that Kohler Health can indeed retrieve data from the Dekota, a $599 accessory that attaches to the toilet's edge and directs an optical scanner toward the bowl's base to assess excretions, then shares analysis results via the Kohler Health mobile application."], ["Fondrie-Teitler contends that although the Dekota's data pathway might be secured through encryption, it fails to qualify as true end-to-end protection, unlike the robust links in WhatsApp conversations or the client-side measures in Apple's iCloud, which shield user files even from the provider's view."], ["Fondrie-Teitler points out that the encryption Kohler describes is merely standard HTTPS for app-to-server communication—a routine security measure for years—combined with storage encryption. He also highlights that Kohler Health's data handling guidelines permit employing Dekota information to develop artificial intelligence systems."], ["Fondrie-Teitler observes that numerous journalists, including the author, initially relayed Kohler Health's encryption statements about the Dekota imaging system, prompting direct inquiries to the firm for clarification."], ["Kohler Health responded by noting that end-to-end encryption typically applies to user-to-user interactions in communication tools, unlike their platform. Here, the phrase denotes protection for information flowing from customers to Kohler Health itself.", "Data is secured during transmission between devices and company infrastructure, where it gets decoded and analyzed to enhance services. Additionally, confidential user details are protected when stored on phones, the attachment, and servers.", "With user approval—which remains voluntary—Kohler Health could anonymize the information and apply it to refine the AI powering the device. This permission appears as an unchecked option within the app.", "User confidentiality and data protection form the core of Kohler Health's approach, recognizing the sensitive nature of health information. The company appreciates input and aims to confirm that all product features prioritize these principles."], ["By Kohler Health's reasoning, the firm serves as the reliable endpoint for the device's secure data channel, given its non-messaging function, thereby justifying the end-to-end encryption label."], ["Critics counter that, despite not being a communication service, Kohler Health manages highly personal information as a custodian, and invoking end-to-end encryption suggests handling akin to Apple's iCloud model, where the provider cannot view contents."], ["Yet, based on Fondrie-Teitler's findings, Kohler Health retains the ability to access user data, with provisions to strip anonymity from consented contributions for AI enhancement. The author raised this issue in further communication with Kohler representatives and expects a response."], ["Speaking to 404 Media, Fondrie-Teitler warns that Kohler Health's usage dilutes the essence of end-to-end encryption, defined by Cloudflare as a communication method that conceals content from all outsiders, including the service operator.", "“I want to prevent ‘end-to-end encryption’ from being reduced to just ‘employs HTTPS,’” Fondrie-Teitler stated in the 404 Media report. “Privacy is a fundamental right, and achieving it requires clear knowledge of data management.”"]}