Showing posts with label privacy. Show all posts
Showing posts with label privacy. Show all posts

Apple Agrees Its CSAM Scanning Initiative For Checking Child Abuse Materials Could Be Misused In A Shock Turn Of Events

 iPhone maker Apple has just made a shocking turn of events by confirming how its approach to tackling explicit and child abuse materials, better known as CSAM scanning, could be abused.


The company highlights how repressive governments might use it for scanning ordeals such as plans related to political protests.

The Cupertino firm rejected any reasoning provided during that period. But one ironic twist did take center stage after a reply was put forward to the government of Australia recently.

Apple mentioned how it had planned to roll out on-device scan plans with the help of techniques used for digital fingerprinting.

Those fingerprints are a means to match certain pictures without any individual getting the chance to view them. They’re designed to be used in a very fuzzy manner to match certain pictures that were cropped or edited while giving rise to a small number of false positives.

To be a little more clear in this regard, Apple confirmed how its recent proposal was an approach designed to respect users’ privacy because scanning could be carried out by certain devices. This way, no one would see any of the images until several matches had been flagged in this regard.

The issue is more linked to repressive governments than anyone else, as confirmed by Apple. This was bound to be an issue in the future as it had great potential of being abused by a long list of such governments.

Meanwhile, digital fingerprints could be produced for any kind of material, not only CSAM. So far, there is no plan in place to prevent authoritarian governments from including more to-the-picture databases featuring all kinds of political-themed content.

Some tools were rolled out that targeted serious suspects that were forced to be adapted to highlight any that showed opposition to the government or any of its policies. In such cases, Apple would be finding itself helping repression or in some worse scenarios, worsening the already chaotic political crisis in which hundreds of activists are involved.

Apple says it would never allow this. But such promises were predicated on the iPhone maker who had the legal freedom to say no and that would not be the case. In places such as China, the Cupertino firm was forced on a legal basis to get rid of VPNs, news, or any other platforms. They would store the information on iCloud belonging to Chinese citizens across servers that were under the ownership of a firm controlled by the government.

When you look at reality, there was just no way that the tech giant could fulfill such promises about it not being in compliance with necessary requirements for processing databases supplied by the government including CSAM pictures.

This included matches for substance under the use of both critics and those protesting against such schemes. Clearly, it’s a serious U-turn of events that not many saw coming for obvious reasons.

Scanning certain content paves the way to carrying out surveillance on a larger scale. It would create the desire to look for other kinds of encrypted systems designed for generating messages through various content types.

Now, we’re seeing Apple enter quietly in the limelight in this regard and speak on the Australian government’s clauses of forcing tech firms to carry out scans for the CSAM so as one can imagine, it’s a slippery slope.

Apple fears surveillance tools like these could be modified to look for other kinds of content including an individual’s political, religious, and even reproductive activity.

Apple's plan for CSAM scanning draws criticism amid fears of government misuse for political surveillance.

FTC Warns Tech Giants Against Silently Changing Privacy Policies

 It’s quite common for firms to make amendments to privacy policies as well as their terms of service agreements without going public about the news.


But the FTC has vowed to take serious action against those who opt to breach the law, adding how such actions will no longer be tolerated for obvious reasons.

Calling the matter deceptive and unfair, they feel the amendments are against the law and that’s especially true as it gives companies access to user data that can be exploited as per the FTC's latest argument.


The FTC added how all those competing in the industry must notify the regulatory body and avoid the practice, to begin with as they risk breaking the law, as revealed in their latest blog post.

The FTC also mentioned how the number of incidents entailing the collection of user data from the web for the sake of training AI algorithms continues to peak as we speak and that’s alarming for obvious reasons.

So many organizations are now resorting to the likes of using data that’s easily accessible through this method, despite knowing very well how it’s unlawful. The data is then used for the training of their AI algorithms.


Such organizations attain most of the data from users located on their own apps but digging and then sharing the data for purposes like AI development is obviously wrong as there are plenty of privacy policies in place that bar such acts to begin with. If the deal is altered, permission must first be attained, it added.

So many firms are often tempted to fix the matter by altering the regulations seen in the policy so that no one is restricted and everyone makes use of client data in the right manner, the commission further explained.

Meanwhile, avoiding matters like backlash from users across the board who continue to be concerned about issues like privacy, a solution can be attained on this front in regards to producing changes that are more public in nature.

The FTC stated how it’s going to be illegal for enterprises to go back and forth on the policies in place for data collection as that’s deceptive and unfair for obvious reasons.

Any business that grabs a hold of user data depending on what privacy commitments are in place can’t go on and make the change without going public with the news and seeking permission as to why a change was being made to begin with.

For now, the FTC confirmed how it’s going to begin a strict crackdown on this front against all those offenders. Such warnings are clear proof of how organizations would be compelled to become more upfront when seeking user permission for AI training purposes.


In August of last year, we saw X roll out such changes to the privacy policy that had to do with how the firm could better attain user data for AI training purposes.

Image: Digital Information World - AIgen

Apple Registers Early Win in Battle Against Pegasus Spyware Maker.

 The story of Apple’s lawsuit against the NSO Group, which is the name of the organization that created the notorious Pegasus spyware, has just seen its first victory in favor of the tech juggernaut. The group had been trying to get the lawsuit brought to Israel, its home country, but in spite of the fact that this is the case, a judge refused to dismiss the lawsuit, which makes it so that the legal proceedings will occur on Apple’s turf with all things having been considered and taken into account.


According to the statement put out by Judge Donato, Apple will end up experiencing similar challenges to the NSO Group if the lawsuit was sent to the Israeli justice system, and the overall burden will be more or less the same. With all of that having been said and now out of the way, it is important to note that witnesses and evidence are going to be equally available regardless of the country in which the case is tried, and NSO wasn’t able to provide any reasonable factors that would make an American trial seem unfair to them.

NSO also tried to say that Apple doesn’t have sufficient grounds for a lawsuit, but Donato pointed to both the Computer Fraud and Abuse Act as well as the Unfair Competition Law in California to show that the case does have merits. As a result, the motion to dismiss was denied outright, and NSO will need to respond to the complaint by February 14th, 2024 at the latest.

This is a win for Apple because of the fact that this is the sort of thing that could potentially end up validating its claims, and Donato’s clear displeasure at NSO’s attempts to escape justice are essential to bear in mind. Apple is continuing to fight against these so-called 21st century mercenary groups through features like Lockdown Mode, along with sending users a notification in the event that state actors try to gain access to their devices. The results of this case will have widespread implications for the industry in general.


Meta’s Instagram Is Full Of Fake Profiles That Are Catfishing Users But The Company Could Care Less

 Seeing scammers and imposters arise on social media is now a norm in the online world.


But you’d expect tech giants like Meta to do more to help safeguard its users online by getting rid of fake profiles. However, the reality seems to be far from that as many noticed the number of fake profiles surging across the Instagram app.

In the past year, we’ve seen the issue go from bad to worse and the app’s parent firm is really falling behind in terms of finding a solution to the matter, despite there being many signs that a certain profile is making use of another’s identity or image.
An investigation was also carried out by tech media outlet Bleeping Computer on this front and they noticed how a large number of reports were filed against such scam accounts featuring fake IDs and they were impersonating internet personalities or other public figures but ended up getting dismissed by the admin. Clearly, it’s a huge issue and no appeal made a difference, not to mention how the profiles continue to function on the app as we speak.

Conceptual image created with AIgen

After seeing all of this, it would not be wrong to mention that Instagram has transformed into a giant safe haven where scammers are working at large. People are interacting with others based on what they appear like on the outside or what their profile says, only to find out later on that it’s all a scam and nothing is real.

their profile says, only to find out later on that it’s all a scam and nothing is real.

Authenticity on social media is rare as it is and now that fake profiles are going unnoticed by Meta’s Instagram we’re seeing a major issue arise here. To pretend like you are someone other than your true identity is concerning and a major sign of catfishing. Anyone can produce two identities for several reasons. One of the main ones is to separate their real or personal endeavors from their professional world. But you need to be honest at least, right?

A growing number of users are speaking about how they keep on generating complaints on this front and seeing Meta dismiss them and leave those fake ID accounts as it is has them wondering what’s going on and if any safeguards were really in place. All they give as a part of the justification is linked to how they are following Community Guidelines and using both human and tech for reviewing purposes. And yes, no appeals work either so what is a person supposed to do, right?

When leading media outlets ask Meta to shed light on what’s going on, they are yet to hear back from any of the company’s reps. And that again is another red flag worth a mention.

Could this be the latest ploy from the tech giant in terms of selling blue ticks?

We don’t think such acts are a mere coincidence. They are becoming far too normal on the platform and something needs to be done before it’s too late.

Plenty of imposters seem to be targeting real profiles of leading public figures, influencers, law enforcement officers, and creators involved in producing adult content. They then start following the followers located on the actual account. And their hope is to attain followers back to ensure they are getting the tag of being authentic. They then block the profile that they are copying and this ensures no contact is made with the real user in question.


Those who are suffering are the real ones who fear their identities are being used for catfishing purposes and they cannot do anything about it because Meta takes on a silent stance. So what could the reason be?

Well, the news is that Meta is forcing users to purchase blue ticks to try and ensure they attain greater protection perhaps they wish to increase their user numbers by not labeling these kinds of content as spam or a fake profile.

Today, the subscription is priced between $12 to $15 and it’s not cheap to get Meta Verified, not to mention an added business for the company with these staggering monthly earnings.

Meta's Facebook and Instagram Are the Most Data Hungry Apps According to This Study

 Surfshark recently did a deep dive into the top 100 most popular apps on the App Store, and they found that 20% of the data they are collecting is for tracking purposes with all things having been considered and taken into account. These apps were ranked based on 32 data points that they are currently in the process of collecting, all of which are defined by Apple’s privacy policy.


Facebook and Instagram were found to be the least privacy conscious apps of all. They collect all 32 data points, all of which are tied to the identity of the user in question, and 7 of which are used specifically for tracking purposes. These include data points such as names, home addresses as well as phone numbers, which seems to suggest that these apps offer far less privacy than users would ideally prefer.
With all of that having been said and now out of the way, it is important to note that X, formerly known as Twitter, was also a major offender in this regard. It collected fewer data points than Facebook and Instagram, or 22 to be precise, but in spite of the fact that this is the case, it used 11 of them to track users.

On the other end of the spectrum, Signal was found to be the most privacy conscious app of all, at least in terms of social media and instant messaging. It collects a single data point, namely the user’s phone number, and it doesn’t link it to the identity of the user nor does it utilize it for any tracking purposes whatsoever on third party platforms.

Interestingly, WhatsApp was also surprisingly privacy conscious despite coming under the Meta umbrella just like Facebook and Instagram. It didn’t use any of its collected data for tracking, making it, Signal and Telegram the only three apps to avoid this practice.
Users need to be educated about which apps are tracking them, otherwise they might not know when their privacy at risk. This study shows that some apps are continuing to find a way to track users despite Apple’s privacy policy.




A

Researchers Suggest Innovative Methods To Enhance Security And Privacy For Apple’s AirTag

 AirTag from Apple is another name for a Bluetooth tracker that is designed to ensure users can keep track of their devices and belongings at all times.


However many questions have been raised in terms of how it manages to balance security and user privacy at the same time.

Some reports have suggested how AirTag can be a balancing act as the last thing you need is for the tool to track your whereabouts and lead others in on the sensitive information. After all, who needs stalking when the world is already so unsafe as it is?
The latest research paper discussing this aspect has led to a world of new possibilities in terms of how security and privacy can be further enhanced, giving users the best of both worlds with no compromise on their safety.

The balance is certainly not easy but the goal can be achieved with a few changes, the experts mentioned.

There are some major differences between calling for privacy when on the move and the need for spotting out rogue AirTags. When you make use of other kinds of tools, stalkers are not following the victim. They get access to them by devising a means to cross paths with them or abandon the tools in some other location that they are certain would be crossed by the victim. But stalking AirTags are tools going with their respective victims.


Researchers settled on systems entailing privacy as well as avoiding the issue of stalkers. The first method dubbed secret sharing is designed to create a secret in the system that is shared similar to how a puzzle works. You can find a solution to the whole puzzle after encountering tracker devices several times so that the secret is out.
When you come across the tracking tool, there just will not be enough information shared for stalkers to have know-how about movements. But when the tool is slipped through your vehicle, it might give out more details that reveal itself. It’s going to be the same no matter how frequently the tool updates the identifier in public.


There are disadvantages linked to this front though. Noise cannot be handled well when algorithms are shared. If for instance, the tool bypasses several AirTags along the way, it might attain pieces arising from various puzzles. And therefore, it cannot figure out which piece belongs where.

Therefore, researchers are now implementing another second stage to fix that. It’s known as the error correction coding that is designed to sort out data specifically and assist with separating all kinds of puzzles so the device can play with data that is not crucial like joggers with AirTags that you may have come across once, ensuring all pieces deemed necessary are kept.

The research really goes to show how so many people have struggled with creating a balance between security and privacy. Bluetooth trackers aren’t something new but they have been present for a very long time now. However, the revolutionary aspects that tech giant Apple brings forward are rarely found elsewhere.

So many companies made big promises in the past but never delivered. It was like watching trackers reach out to devices featuring the app from the manufacturer so the exact location could be determined.

AirTags did not go down that path. They ended up showcasing locations to those with iPhone devices that showed compatibility through Find My Network. And the latter made the biggest difference. All of a sudden, Bluetooth trackers were doing a great job in terms of accuracy. And that led other big names in the tech world to get inspiration and come up with similar offerings.

Photo: Unsplash/Daniel Romero