Tag

Privacy

Browsing

By Robin Jaffin

Locate X, a powerful location tracking tool developed by data broker Babel Street, has sparked controversy due to its widespread use by government agencies for surveillance without warrants. As reported by Vice, this tool allows users to monitor the precise movements of mobile devices, raising significant concerns about privacy and civil liberties in the digital age.

What is Locate X?

Developed by data broker Babel Street, Locate X is a sophisticated location tracking service that utilizes mobile advertising IDs (MAIDs) to create detailed maps of device movements.

This powerful tool aggregates location data from various sources, including popular mobile apps that request location access, allowing users to monitor specific devices across state lines and even internationally.

Locate X’s capabilities extend beyond real-time tracking, as it can also display historical location data, making it particularly valuable for surveillance purposes.

Government Use of Locate X

Back,View,In,The,System,Control,Center,Operator,Working.,Multiple
Gorodenkoff via Shutterstock

Several U.S. government agencies have been identified as users of Locate X, raising concerns about warrantless surveillance:

These agencies can track device locations anonymously using data harvested from popular apps, without the need for a warrant.

This widespread adoption by federal agencies has intensified the debate surrounding privacy rights and the extent of government surveillance capabilities.

Privacy Concerns and Controversy

Covid-19,Tracking,App,Concept,With,Geolocation,Icons,Pop,Up.,Young
progressman via Shutterstock

The use of Locate X has ignited significant privacy concerns and controversy, particularly due to its ability to bypass traditional legal safeguards. Unlike conventional surveillance methods that require court orders, this tool allows agencies to track individuals without obtaining warrants, potentially infringing on citizens’ Fourth Amendment rights.

This warrantless surveillance capability has drawn criticism from civil liberties advocates and lawmakers, with Senator Ron Wyden proposing legislation called “The Fourth Amendment Is Not For Sale” to ban government agencies from purchasing such data.

  • Vulnerable groups, including abortion-seekers in restrictive states, immigrants, and LGBTQ+ individuals, face heightened risks from this technology.
  • The tool’s existence highlights the largely unregulated nature of the data broker industry and the ease with which personal data can be acquired and weaponized for surveillance purposes.

Future Implications of Surveillance

Smart,Law,,Legal,Advice,Icons,And,Lawyer,Working,Tools,In
Beautrium via Shutterstock

As technology continues to advance, the capabilities of tools like Locate X are likely to expand, raising critical questions about the balance between national security, law enforcement needs, and individual privacy rights. The ongoing debate surrounding these issues will shape the future of digital surveillance and data protection laws. Experts warn that without proper regulation, such tools could lead to a surveillance state where personal privacy becomes increasingly scarce.

To address these concerns, lawmakers and privacy advocates are calling for stronger data protection measures and increased transparency in how location data is collected and used by both government agencies and private companies.

The outcome of this debate will have far-reaching implications for civil liberties and the relationship between citizens and their government in the digital age.

Ethical Debates in the Tech Community Regarding Locate X

Silhouettes,Of,Diverse,Business,Team,Members,Standing,Together.,Cityscape,,Hr
ImageFlow via Shutterstock

The development and use of Locate X has sparked intense ethical debates within the tech community, highlighting the tension between technological innovation and privacy concerns. Many technologists argue that tools like Locate X represent a dangerous overreach of surveillance capabilities, potentially undermining fundamental rights to privacy and freedom of movement.

Critics within the industry emphasize the need for stronger ethical guidelines and oversight in the development of such technologies. They argue that companies like Babel Street should implement more rigorous vetting processes for potential buyers and establish clear boundaries on how their tools can be used.

Some advocate for a “conditional good” approach to technology development, which recognizes the potential benefits of location tracking while also acknowledging and mitigating its risks.

This debate underscores the growing recognition among tech professionals that ethical considerations must be central to the design and deployment of powerful surveillance tools, not an afterthought.

 Abortion Surveillance Risks

Los,Angeles,,California,,Usa,-,May,14,,2022:,Protesters,Rally
Tverdokhlib via Shutterstock

The potential use of location tracking tools like Locate X to monitor women seeking abortions has raised significant privacy concerns in the post-Dobbs era. Digital surveillance poses a serious threat to reproductive health privacy,  as cell phone location data can reveal visits to clinics and track individuals across state lines.

In one alarming instance, privacy advocates used Locate X to track a device traveling from Alabama, where abortion is banned, to a clinic in Florida. Atlas Privacy, a company specializing in data removal, demonstrated how they were able to access the tracking tool Locate X and use it to monitor the movements of a specific device. The device’s journey included crossing state lines from Alabama, where abortion is fully prohibited, to a reproductive health clinic in Florida, which restricts abortion after six weeks. Originally intended for law enforcement, the tool was obtained by Atlas Privacy after they claimed it would eventually be used in collaboration with law enforcement agencies. This case underscores significant concerns about the potential misuse of such powerful surveillance tools.

Law enforcement in states with abortion restrictions could potentially use such tools to identify and prosecute abortion-seekers. Some states have even introduced “bounty hunter” laws allowing private citizens to sue those aiding abortions, further incentivizing surveillance.

To protect privacy, experts recommend disabling location services, using VPNs, and being cautious about sharing information online.

Lawmakers are also being urged to enact stronger data protection measures to prevent the misuse of location data in criminalizing abortion care.

Balancing Security and Privacy

Military,Control,Room,,Computer,And,Soldier,At,Desk,,Typing,Code
PeopleImages.com – Yuri A via Shutterstock

The use of tools like Locate X highlights the ongoing challenge of balancing national security interests with individual privacy rights. While proponents argue that such technologies are essential for law enforcement and counterterrorism efforts, critics warn of the potential for abuse and erosion of civil liberties.

.To address these concerns, experts advocate for:

Ultimately, finding an appropriate balance requires ongoing dialogue between government agencies, technology companies, civil society organizations, and the public to ensure that security measures do not come at the expense of fundamental rights and democratic values.

Impact of Locate X on Civil Liberties

Close,Up,Photo,Of,The,Words,Fourth,Amendment
frank333 via Shutterstock

Locate X’s widespread use by government agencies without warrants has raised significant concerns about its impact on civil liberties. The tool’s ability to track individuals’ movements with precision threatens fundamental rights protected by the Constitution, particularly the Fourth Amendment’s safeguards against unreasonable searches and seizures.

  • The ACLU warns that such surveillance practices may chill free speech and religious expression, as people become less likely to engage in these activities when they know they’re being monitored.
  • Privacy advocates argue that the aggregation of location data creates an “intimate window” into a person’s life, revealing sensitive information about their associations and activities.
  • The tool’s use in immigration enforcement has sparked particular alarm, potentially endangering vulnerable populations and undermining trust in public institutions.

By circumventing traditional warrant requirements, Locate X represents a significant erosion of privacy protections in the digital age, potentially reshaping the relationship between citizens and the state in ways that threaten the foundations of democratic society.

International Perspectives on Surveillance Tools

Conceptual,Image,Of,Global,Positioning,System,Gps,On,Smart,Phone
nmedia via Shutterstock

The global proliferation of AI-powered surveillance tools has sparked diverse international responses, with countries adopting varying approaches to their development and use. According to the AI Global Surveillance Index, 56 out of 176 countries now employ AI for surveillance purposes, highlighting the widespread adoption of these technologies.

While some nations view these tools as essential for maintaining public safety and national security, others express concerns about their potential for abuse and human rights violations.

  • China has emerged as a leading developer and exporter of AI surveillance technologies, with its systems being adopted by countries across Africa, Asia, and Latin America.
  • The European Union has taken a more cautious approach, emphasizing the need for ethical AI development and strong data protection regulations.
  • In response to growing concerns, the United Nations has called for a moratorium on the sale and use of surveillance tools until adequate human rights safeguards are in place.
  • Civil society organizations worldwide are pushing for greater transparency and accountability in the deployment of these technologies, advocating for legal frameworks that protect privacy rights while allowing for legitimate security needs.

Evading Location Tracking

Information,Of,Shaare,Date,And,The,Other,Privacy,Personal,Info
wisely via Shutterstock

To protect yourself from being tracked, individuals can employ several effective strategies:

  • Disable location services on devices and apps when not needed
  • Use a virtual private network (VPN) to encrypt internet traffic and mask IP addresses
  • Opt for private browsers like DuckDuckGo that don’t collect user data
  • Regularly scan for and remove spyware or unfamiliar apps
  • Enable airplane mode when not actively using the device
  • Avoid using public Wi-Fi networks that aren’t password-protected
  • Disable location tracking on social media platforms
  • Use end-to-end encrypted messaging services for communications
  • Be cautious about sharing personal information online and on social media

Additionally, individuals should regularly update privacy settings on their accounts and devices, and consider using tools to detect unauthorized GPS trackers.

While no method is fool proof, combining these strategies can significantly reduce the risk of unwanted tracking and protect personal privacy.

Privacy Versus Surveillance

Global,Network,Concept.,World,Map.,Business,Strategy.,Gui,(graphical,User
metamorworks via Shutterstock

The emergence of tools like Locate X represents a critical juncture in the ongoing struggle between privacy rights and surveillance capabilities. As technology continues to advance, the potential for invasive tracking and monitoring of individuals’ movements has reached unprecedented levels, raising profound questions about civil liberties in the digital age.

While proponents argue that such tools are essential for law enforcement and national security, the lack of oversight and potential for abuse pose significant risks to fundamental rights. The ease with which private entities can access and exploit location data highlights the urgent need for comprehensive data protection legislation and stricter regulation of the data broker industry.

As society grapples with these challenges, it is crucial for citizens to remain vigilant, advocate for their privacy rights, and demand transparency and accountability from both government agencies and private companies in the use of surveillance technologies.

Feature Image Credit: BritCats Studio via Shutterstock

By Robin Jaffin

Sourced from QZ The Queen Zone

 

 

By Zack Whittaker

If you’ve heard that a VPN provider can help protect your privacy and security online, don’t believe the hype. The truth is that most people don’t actually need a VPN.

By funnelling all of your internet traffic through their own servers, VPN providers expose their customers to the very privacy risks they claim to help defend against, including having their internet browsing records stolen by cybercriminals or obtained by legal order.

That’s why if you think you need a VPN, we’ll show you how to set up your own private and encrypted VPN server.

If you’re in the majority who don’t need to use a VPN, there are still easy and effective ways to reduce the trail of data that you leave behind as you browse the web. Some of these ways include the use of simple tools in your browser that can automatically prevent online trackers from collecting information about you to begin with, and encrypting your web browsing traffic that makes it more difficult for anyone to snoop on the sites and services you access.

There are no one-size-fits-all solutions or a panacea for absolute privacy. Instead, all of these simple steps can provide additional and meaningful privacy as you use the web, and we’ll explain how.

Install and use an ad-blocker

Love them or hate them, ad blockers are an important security and privacy defence for any online user. Even the FBI suggests using an ad blocker, given the rise of malicious ads used for scams, fraud, and the delivery of malware and spyware.

Ad blockers are web browser extensions that automatically prevent ads from loading on websites and in search results. The obvious upside is that your visual browsing experience will improve, but ad blockers also stop your browser loading the underlying tracking code that ads rely on to collect information about you. By blocking the code, ad companies can’t track the websites you visit as you browse the web, which makes it more difficult for the ad and tech companies to infer your tastes and interests and otherwise monetize your browsing data. (Of course, you can always temporarily switch off your ad blocker on any website.)

Using an ad blocker is one of the most effective ways of preventing the majority of online tracking by making it much more difficult for advertising and tech giants to know which websites you visit as you browse the web.

a screenshot showing AdBlock browser extension in a web browser, active, and blocking ads on a search page.
An ad blocker prevents ads — and their privacy-invading tracking code — from loading on websites and in search results. Image Credits:TechCrunch (screenshot)

One of the best low-memory ad blockers for web browsers is uBlock Origin, which works in most modern browsers, and its code is open source (allowing anyone to look at the source code to make sure it’s safe to use). AdGuard also has an open source ad blocker for a variety of devices and platforms. Remember to always download from trusted and verified sources, like their official pages, before installing.

Once you’re set up with an ad blocker, the online rights group Electronic Frontier Foundation has a tool called Cover Your Tracks that lets you stress-test your browser’s anti-tracking defences and tells you what you can do to help improve them. This other online open source tool is an easy way to quickly test your ad blocker on any device.

Use an encrypted DNS provider

Almost every website on the internet today can be delivered to your browser over an encrypted connection (known as HTTPS), which prevents anybody else on the internet from seeing what loads on your screen or tampering with it before it gets there.

But because of the way that the internet inherently functions and routes your information around the world (through a public and global system called DNS), you can still leave behind a record of the specific website you visited because DNS traffic has historically largely been unencrypted.

For most, your unencrypted DNS traffic — which can reveal which websites you’re visiting and the apps you’re using — typically routes through your internet provider, which, like advertisers and tech giants, can monetize and sell that data or make your information available to requesting legal authorities.

Switching to an encrypted DNS service is fairly quick and simple, and it can have immediate effect.

Some browsers (like Chrome and Firefox) began encrypting DNS traffic by default back in 2020, and have long included options to use an encrypted DNS provider, such as Cloudflare and NextDNS, to handle DNS traffic instead of your local internet provider.

You should be aware of how long the provider retains your information; some of the large DNS providers provide reasonable security and privacy assurances. Also, if your DNS provider briefly goes down, your internet activity will suffer until the problem resolves or you switch your DNS provider. This is also why picking a reputable DNS provider can be helpful.

You can go beyond just your browser’s settings by changing your DNS in the settings for your device, so that all of the DNS traffic on your device gets encrypted. If you want all the devices on your home network to take advantage of encrypted DNS, you can opt to change the DNS settings on your network router, too.

A multi-hop service, like Apple Private Relay, can have privacy benefits

A core problem with VPNs is that you have to trust a single provider that it won’t sell or snoop on your data, or provide it to someone who will. Since 2021, Apple has allowed its paying customers to stay more private online through its “multi-hop” service called iCloud Private Relay, which sends a user’s encrypted internet traffic through two separate internet relays (or “hops”), including one that isn’t run by Apple.

Because iCloud Private Relay uses two separate internet relays to route a user’s traffic, this prevents either of the internet relays, including Apple, from being able to see or analyse your internet traffic. That also means that requesting law enforcement authorities cannot get your information from a single internet relay; they instead have to demand the data from both relays. Apple’s partners, like Cloudflare, help to provide the multi-hop relay service.

a screenshot showing the settings menu for iCloud Private Relay, which reads in part: "Private Relay hides your IP address and browsing activity in Safari and protects your unencrypted internet traffic so that no one-including Apple-can see both who you are and what sites you're visiting."
iCloud Private Relay hides your browsing activity in Safari and other apps to prevent snooping on your web traffic. Image Credits:TechCrunch (screenshot)

iCloud Private Relay helps to protect both web and app traffic on your Apple device, and is available for Apple customers who pay for Apple’s premium iCloud+ service. iCloud Private Relay isn’t available in all regions, such as countries like China and Russia, where internet freedoms are considerably limited.

While services like iCloud Private Relay offer some privacy benefits, beware of non-reputable providers that purport to offer multi-hop services or make other claims that cannot be independently verified.

Tor is the gold standard for online anonymity

Wherever you are in the world, using Tor is one of the universally best tools for allowing users to browse the web freely while bypassing censorship and avoiding surveillance.

For some people, Tor is synonymous with the “dark web,” which some automatically (and wrongly) conflate with criminality. In reality, Tor is a privacy tool used every day by journalists, researchers, activists, and anyone else who wants to browse the web with a high degree of privacy and anonymity.

You might want to browse the web anonymously for any reason, but this can include searching the web without wanting the search engine (or anyone else) connecting you to those search results, or simply accessing a news website or resource that might be banned by a government or regional authority.

a screenshot of the BBC News website loading in the Tor Browser from its .onion domain, which is accessible only using Tor
The BBC News website, which is accessible through the Tor Browser. The dark web doesn’t have to seem scary.Image Credits:TechCrunch (screenshot)

Instead of relaying your data through a single virtual tunnel (like a VPN) or through two separate relays (like a multi-hop service), Tor works by encrypting and routing its users’ internet traffic multiple times through thousands of servers set up around the world. This way, the user’s internet traffic is shielded from everyone else on the network as well as the regular internet. As such, using Tor is often slower than the regular internet and is not designed to be used for accessing high-bandwidth services, like music or video streaming.

Most people use Tor by downloading and running the Tor Browser, a custom-made version of Firefox, in which anything that happens in that browser window privately routes over the Tor network. Other implementations of Tor are available, including mobile apps.

Feature Image Credit: Bryce Durbin / TechCrunch

By Zack Whittaker

Sourced from TechCrunch

By

In today’s digital age, privacy is a top concern for many smartphone users.

With the increasing number of apps available on our devices, it’s crucial to understand how they interact with our data and ensure that our personal information remains secure. One of the most pressing issues is the suspicion that some apps might be actively listening to our conversations without our knowledge or consent. The video below from iDeviceHelp gives us details on how to check if any apps or anything on your iPhone are listening to you.

 

Privacy concerns have been raised by numerous iPhone users who have reported seeing targeted ads related to topics they had recently discussed. This phenomenon has led many to believe that certain apps are using active listening software to gather data from their conversations. While this may seem like a far-fetched idea, it’s not entirely unfounded. Some marketing firms have been known to employ such tactics to collect information for advertising purposes.

Recent reports have shed light on the use of active listening software by certain apps. This software allows the apps to capture audio data from the user’s environment, which is then analysed and used to tailor advertisements. As a result, users may experience a sense of their phone “eavesdropping” on their conversations, as the ads they see seem to uncannily reflect the topics they’ve discussed.

To address these privacy concerns, Apple has introduced the App Privacy Report. This feature, available on iPhones, provides users with a detailed overview of how their data is being accessed and used by the apps installed on their devices. By regularly checking the App Privacy Report, users can stay informed about which apps have accessed their data and sensors, such as location, microphone, camera, and more.

How to Stop Your iPhone From Listening to Your Conversations

  • Location data can reveal your whereabouts and daily routines
  • Microphone access can potentially allow apps to listen to your conversations
  • Camera access can enable apps to capture images or videos without your knowledge

To protect your privacy, it’s essential to regularly review and adjust app permissions. This can be done by navigating to your iPhone’s settings, selecting the app in question, and modifying its permissions for various data and sensor access. By taking control of these permissions, you can limit the amount of information that apps can gather about you.

For example, if you use Instagram on your iPhone, you can easily modify its permissions by following these steps:

  1. Go to your iPhone’s Settings
  2. Scroll down and select Instagram
  3. Tap on Permissions
  4. Here, you can control what data Instagram can access, such as your microphone and camera

By being proactive and adjusting these permissions, you can ensure that Instagram, or any other app, does not have unnecessary access to your data or the ability to listen to your conversations.

Maintaining your privacy on your iPhone requires ongoing vigilance and a proactive approach to managing app permissions. Always be cautious when granting apps access to your data, and make sure to provide explicit permission only when necessary. Regularly review your App Privacy Report to stay informed about how your data is being used, and don’t hesitate to adjust permissions as needed.

By following these steps and staying informed about your iPhone’s privacy settings, you can significantly reduce the risk of apps listening to your conversations without your knowledge or consent. Remember, your privacy is in your hands, and taking control of your app permissions is a crucial step in protecting your personal information in the digital age.

Source & Feature Image Credit: iDeviceHelp

By

Sourced from Geeky Gadgets

Sourced from WIRED 

LinkedIn shares your activity on the platform by default. Change this setting and you can snoop on other people’s profiles without them knowing.

LINKEDIN MAY OR may not be the perfect Twitter replacement, but one thing is for sure: It’s a profoundly weird place. Staying active on the platform is basically required for today’s knowledge workers to find employment, which is odd. Also, it’s a place where a lot of people spend time pretending recruiters and hiring managers are fun, interesting people by reacting and replying to their posts. Then there are the LinkedIn influencers, all of whom sounded like ChatGPT long before ChatGPT was a thing.

But perhaps the oddest thing about LinkedIn is how transparent it is about its surveillance features. Where other social networks try to obfuscate how much they are tracking your activity, LinkedIn, at every step, invites you to participate in the gathering of users’ behaviour data. This is a social network that sends you regular notifications regarding who looked at your profile.

By default, every time you look at someone’s LinkedIn profile while you’re logged in, they get notified that you looked at it. I can understand why a job seeker might want this information—you might want to follow up if a potential employer is sizing you up—but I can also understand why it would drive job seekers absolutely insane to know. What are you supposed to do, email someone and say, “I noticed you looked at my LinkedIn profile. Did you like what you saw?” (The mere thought of doing this literally just killed me. You are reading the words of an actual ghost.)

Think about how weird it would be if, every time you scrolled through someone’s Instagram grid looking at their old photos, they got a notification telling them you’d done it. On LinkedIn, the people who pay for a subscription get more complete access to data on who’s peeking; most people can only see a couple of their recent viewers, but paid users get a full list of everyone who has looked at their profile in the past year.

I find this level of radical transparency a little disturbing. The good news is you can turn this notification feature off—it’s just a little bit hidden. Here’s how to find it.

Change Your LinkedIn Viewing Options

Head to LinkedIn. Click on your profile picture in the top-right corner of the browser window and then click Settings and Privacy. (In the LinkedIn mobile app, your profile photo appears in the upper left; click on it to access Settings and follow these same instructions below.)

In the left sidebar click Visibility and then click Profile viewing options.

From here you can select from three options: “Your name and headline,” “Private profile characteristics,” and “Private mode.”

The default choice, “Your name and identity,” informs everyone whose profile page you visit that you’ve done so, showing them your photo and job description with a link to your profile page. They will then click the link, sending you a notification that they did so, a pattern that will repeat until the sun expands and engulfs the earth. You can stop this from happening by changing the setting.

The second option, “Private profile characteristics,” just shows other users a summary—your profession and where you live—when you view their profile. This will make you sound mysterious but will mostly just annoy everyone because of its lack of specificity. The third, much better option is “Private mode,” which allows you to look at anyone’s profile page in relative secrecy.

Note that this choice to withhold sharing permissions goes both ways: Selecting anything other than the default choice of sharing your identity will stop you from seeing when other people look at your profile. To me, this is a win because it means I get fewer LinkedIn notifications. But if you find it useful to know who is looking at your profile, you might want to keep this in mind.

Feature Image Credit: DPA PICTURE ALLIANCE/ALAMY

Sourced from WIRED 

Need for precision marketing amidst the cookie apocalypse

For years, B2B marketers have used the data and technology at their fingertips and leveraged cookies to target the right people at the right time. Yet, the reliance on third-party cookies and the consequent data privacy concerns have spotlighted the fragile balance between personalization and privacy. A growing number of people are concerned about how much of their online activity is tracked—72% feel almost everything they do online is monitored by advertisers or technology firms, while 81% believe the risks associated with data collection outweigh the benefits. The message is clear — the future of B2B marketing lies in respecting and protecting user privacy.

Google‘s 2020 announcement to block third-party cookies by 2024 sent shockwaves through the industry, compelling B2B marketers to rethink their approach to user tracking and targeted advertising. And while Google has once again delayed the phase-out timeline, it serves as a stark reminder that the end of third-party cookies is near, and organizations must use this extra time to adapt to a privacy-focused landscape. The cookie deprecation delay offers a critical opportunity to explore sustainable marketing practices while underlining the need for a strategic pivot.

Allie Kelly, Chief Marketing Officer at Intensify.

A privacy-first approach

While the end of cookies may seem daunting, many emerging technologies and strategies can help maintain effective and ethical audience targeting while meeting evolving privacy standards. With a clear understanding of the changing data privacy landscape and a focus on compliance, here’s how marketers can prepare for the imminent phase-out of third-party cookies, often referred to as the “Cookie Apocalypse,” ensuring marketing programs remain effective:

Prioritize first-party data

The deprecation of third-party cookies elevates the importance of first-party data — data collected directly from interactions with customers and prospects. This includes everything from contact information and purchase history to user behavior on an organization’s website. Leveraging zero-party data, information that customers willingly share, will also become increasingly crucial. By offering value in exchange for data through ebooks, webinars, and free trials, businesses can build a rich, consent-based data repository.

Implementing a robust Customer Relationship Management (CRM) system can further help organize and analyse this data, fostering personalized marketing initiatives and enriched customer experiences.

Expand intent signal coverage

Some intent data vendors are adjusting to the cookie-less world by using alternative identifiers to monitor buyer research activities and behaviours. This broader spectrum of buying signals allows B2B marketers to capture a more comprehensive view of intent, facilitating targeted lead generation and digital advertising. Building comprehensive identity graphs that integrate multi-source intent signals can significantly enhance the quality of intent intelligence at our disposal.

Stay informed and compliant

The landscape of data privacy regulations is continually evolving. Staying abreast of regulations like the General Data Protection Regulation (GDPR) and the California Consumer Privacy Act (CCPA) is imperative for compliance and maintaining consumer trust. Regular training sessions on privacy practices for your team can go a long way in avoiding pitfalls and demonstrating your commitment to user privacy.

The future is intent-driven

As the digital marketing landscape shifts towards a cookie-less world, intent data emerges as a crucial asset for targeted marketing. With the delay in Google’s cookie deprecation timeline, it’s clear that marketing leaders must proactively adapt to the evolving environment. Traditional targeting methods, like IP-based strategies, are becoming less reliable, with 80% of marketers expressing doubts about their ability to reach the right audiences programmatically, and one in three citing wasted ad spending as a significant concern.

To navigate this change, B2B marketers are turning to AI-powered solutions that merge multiple sources of intent data to pinpoint in-market accounts with remarkable accuracy. This precision allows for more effective targeting and ultimately leads to improved conversion rates and accelerated sales pipelines. Intent data helps determine an account’s research stage and key topics of interest, enabling marketers to deliver personalized, relevant ads to specific personas within prioritized accounts. This shift towards AI-enabled, intent-based targeting not only offers a higher return on investment but also aligns with growing demands for privacy and compliance. By focusing on first-party data, expanding intent signal coverage, and embracing AI-driven identity graphs, marketers can create more resilient and sustainable marketing strategies in a world that’s rapidly moving beyond third-party cookies.

Building a future-resistant marketing strategy

The “Cookie Apocalypse,” demands a strategic and proactive approach to future-proof marketing strategies. Organizations must first undertake a comprehensive assessment of their current systems and data collection practices to identify their reliance on third-party cookies. This evaluation helps gauge the potential impact of digital and privacy regulation changes and guides the development of a flexible strategy that addresses both immediate and long-term challenges.

Collaboration with existing vendors is a crucial step in understanding their preparedness and exploring alternative solutions that comply with upcoming privacy norms. This process requires an innovative mindset, encouraging businesses to tap into new tools and technologies that align with the evolving privacy-focused digital landscape. By fostering a culture of collaboration, organizations can leverage external expertise while exploring adaptive strategies to ensure compliance and operational continuity.

Ultimately, the goal is to build a resilient marketing framework that not only survives but thrives in a post-cookie world. Staying informed about industry trends, engaging stakeholders, and maintaining flexibility are key to ensuring business success in this new environment. By embracing the shift towards a cookie-less future, businesses can position themselves for sustainable growth and a more privacy-conscious marketing approach. This strategic evolution will not only help organizations navigate the transition but will also set them on a path toward a more innovative and adaptable future in digital marketing.

We’ve featured the best business intelligence platform.

This article was produced as part of TechRadarPro’s Expert Insights channel where we feature the best and brightest minds in the technology industry today. The views expressed here are those of the author and are not necessarily those of TechRadarPro or Future plc. If you are interested in contributing find out more here: https://www.techradar.com/news/submit-your-story-to-techradar-pro

Feature Image credit: Photo by Anastasia Shuraeva from Pexels

Allie Kelly is a Chief Marketing Officer with over 20 years of experience in both B2B and B2C companies. Currently, she holds the CMO position at Intensify.

Sourced from techradar.pro

 

By Mike Froggatt

According to Gartner research, just over a quarter of all marketing budgets go toward paid media, with 56% of that spent on digital channels. Proving return on ad spend is already difficult for digital marketing leaders, and changes to cookies and walled gardens strengthening their own walls will make it even more challenging.

Third-party cookie data fuelled two decades of digital media and data-driven performance advertising. It’s no wonder cookie deprecation and restrictions on third-party data are transforming the way marketers target, buy and measure digital media.

In addition to the immediate impacts of cookie loss, the increased regulatory pressures on walled gardens is creating an environment of more black box algorithms and fewer data points with which to measure and independently verify results. Of the three privacy scenarios proposed by my colleague Andrew Frank, we are quickly moving to a walled garden world. And the biggest among them, Google, is at the front of the pack.

Aside from the (continually delayed) deprecation of the cookie, Google has another fast-approaching deadline that will impact almost every marketer with a website: the sunsetting of Universal Analytics.

As my colleague Lizzy Foo Kune shared with The Drum last year, the migration to Google Analytics 4 (GA4) entails an urgent overhaul to long-standing marketing data collection, measurement baselines and operational approaches — and deeper ties to Google’s ad ecosystem. GA4 highlights the data usage and consent gaps between acquisition-oriented advertising and retention-and-growth marketing but provides bridging mechanisms such as lookalike modelling, retargeting, pathing and attribution.

Digital advertising is vital for the success of modern brands, for driving both top-of-funnel awareness and bottom-of-funnel consideration and sales. Key to their success is access to data about their prospects’ and customers’ online behaviour, which helps marketers target and personalize their campaign efforts. Regulations on the collection and sharing of consumer data is prompting major data providers and adtech alike to change how their platforms collect, store and share this data with advertisers.

To maintain their digital media effectiveness, marketers need to build resilience and evaluate existing digital partners for cookie and walled garden alternatives.

Build a cookieless and walled garden risk profile

Purchasing display ads indirectly indicates a high reliance on third-party cookies. Brands with campaigns that rely heavily on indirect impressions could be highly susceptible to disruption from additional privacy changes from walled gardens and limits on third-party tracking from regulatory bodies.

Brands should ensure that their website and digital media campaigns – and the data collected and used to target ads – are both privacy compliant and effective in the face of those challenges by:

  • Owning, assigning someone on the team or finding a trusted partner to keep up with the latest news on privacy changes, cookies and third-party data regulation and their impact on the brand’s business.
  • Building first-party data assets by homing in on core customers and building direct-buying relationships with strategically important media partners.
  • Working across the organization to ensure compliance across user data collection and digital media activation.
  • Partnering with media companies, as well as established and emerging technology firms, to test novel targeting strategies (e.g., Google’s Topics, contextual targeting, data clean rooms) that reduce the eventual impact of the loss of cookies on existing media strategies.

Once an organization understands how its digital media is purchased, either with an internal analysis or a report from its agency partners, determine the risk exposure to the company’s marketing programs. Privacy changes and cookie deprecation’s impact on advertising depend on two factors: sales strategy (direct or third-party sales) and media strategy (brand versus performance marketing).

Risk assessment chart from Gartner

Source: Gartner (May 2023)

Sales strategy and the proximity to the final sale are indicative of the relationship with the customer, including the receiving consent to use their data for retargeting and other conversion-oriented digital advertising tactics. Media strategy indicates the number of existing relationships brands have with their target audiences to deploy in a privacy-safe way and their reliance on advertising partners.

Limit exposure to changes in the long run

After determining the organization’s cookie risk profile and building overall resilience to disruption, follow some of these next steps, tailored for each profile, to limit exposure to changes:

  • Conversion-seeking brands should focus on the core value of their products to consumers and continue to build upon that niche in addition to investing in performance media partners. Work on increasing the loyalty of existing customers and growing through the network effects of word-of-mouth on social media and outside of digital.
  • Legacy wholesale brands should maintain mind share through their broad brand advertising strategies while leveraging emerging channels like retail media networks. These channels can help fill any potential gaps in performance advertising left by changes to walled gardens and third-party data.
  • Direct-to-consumer and mono-brand retail brands should leverage their consent-based first-party data and close relationships with customers to focus their ad spend across trusted sites and apps. With Universal Analytics’ sunset imminent, it is imperative for digital marketing leaders to start collecting data with both UA and GA4 now in order to test for data compatibility and source appropriate alternatives for signal loss.
  • Platform and multichannel retail brands must continue to innovate on their existing sites, apps and product suite to stay at the forefront of customer needs. If the brand is a Google Analytics site, it’s important to prepare for fewer granular data points on site visitors in exchange for more targeting options within the Google media properties. In addition, work with marketing technology providers to expand revenue opportunities by leveraging audience and conversion data for brands in high-risk, legacy and direct profiles.

Mike Froggatt is senior director, analyst in Gartner’s marketing practice. To read more from The Drum’s latest Deep Dive, where we’ll be demystifying data & privacy for marketers in 2023, head over to our special hub.

Feature Image Credit: Myriam Jessier

By Mike Froggatt

Mike Froggatt is senior director, analyst in Gartner’s marketing practice. To read more from The Drum’s latest Deep Dive, where we’ll be demystifying data & privacy for marketers in 2023, head over to our special hub.

Sourced from The Drum

By D. Cooper

Is this the end for the consent pop-up?

An Irish civil rights group believes that it has successfully exposed the so-called legal fictions that underpin the online advertising industry. The Irish Council for Civil Liberties (ICCL), says that Europe’s data protection regulators will soon declare the current regime illegal. At the heart of this complaint is both how the industry asks for permission, and then how it serves adverts to users online. Describing the situation as the “world’s biggest data breach,” the consequences of the ruling could have staggering ramifications for everything that we do online.

“The world’s biggest data breach”

Real-Time Bidding (RTB) is the mechanism by which most online ads are served to you today, and lies at the heart of the issue. Visit a website and, these days, you will notice a split-second delay between the content loading, and the adverts that surround it. You may be reading a line in an article, only for the text to suddenly leap halfway down the page, as a new advert takes its place in front of your eyes. This delay, however small, accommodates a labyrinthine process in which countless companies bid to put their advert in front of your eyes. Omri Kedem, from digital marketing agency Croud, explained that the whole process takes less than 100 milliseconds from start to finish.

Advertising is the lifeblood of the internet, providing social media platforms and news organisations with a way to make money. Advertisers feel more confident paying for ads, however, if they can be reasonably certain that the person on the other end is inside the target market. But, in order to make sure that this works, the platform hosting the ad needs to know everything it can about you, the user.

This is how, say, a sneaker store is able to market its wares to the local sneakerheads or a vegan restaurant looks for vegans and vegetarians in its local area. Companies like Facebook have made huge profits on their ability to laser-focus ad campaigns on behalf of advertisers. But this process has a dark side, and this micro-targeting can, for instance, be used to enable hateful conduct. The most notable example is from 2017, when ProPublica found that you could target a cohort of users deemed anti-semitic with the tag “Jew Hater.”

Every time you visit a website, a number of facts about you are broadcast to the site’s owner including your IP address. But that data can also include your exact longitude and latitude (if you have built-in GPS), your carrier and device type. Visit a news website every day and it’s likely that both the publisher and ad-tech intermediary will track which sections you spend more time reading.

This information can be combined with material you’ve willingly submitted to a publisher when asked. Subscribe to a publication like the Financial Times or Forbes, for instance, and you’ll be asked about your job title and industry. From there, publishers can make clear assumptions about your annual income, social class and political interests. Combine this information — known in the industry as deterministic data — with the inferences made based on your browsing history — known as probabilistic data — and you can build a fairly extensive profile of a user.

“The more bidders you have on something you’re trying to sell, in theory, the better,” says Dr. Johnny Ryan. Ryan is a Senior Fellow at the ICCL with a specialism in Information Rights and has been leading the charge against Real-Time Bidding for years. In order to make tracking-based advertising work, the publisher and ad intermediary will compress your life into a series of codes: Bidstream Data. Ryan says that this is a list of “identification codes [which] are highly unique to you,” and is passed on to a number of auction sites.

“The most obvious identification is the app that you’re using, which can be very compromising indeed, or the specific URL that you’re visiting,” says Ryan. He added that the URL of the site, which can be included in this information, can be “excruciatingly embarrassing” if seen by a third party. If you’re looking up information about a health condition or material related to your sexuality and sexual preferences, this can also be added to the data. And there’s no easy and clean way to edit or redact this data as it is broadcast to countless ad exchanges.

In order to harmonize this data, the Interactive Advertising Bureau, the online ad industry’s trade body, produces a standard taxonomy. (The IAB, as it is known, has a standalone body operating in Europe, while the taxonomy itself is produced by a New York-based Tech Lab.) The IAB Audience Taxonomy (subsequently revised to version 1.1) will codify you, for instance, as being into Arts and Crafts (Code 1472) or Birdwatching (435). Alternatively, it can tag you as having an interest in Islam (602), Substance Abuse (568) or if you have a child with special educational needs (357).

But not every bidder in those auctions is looking to place an ad, and some are much more interested in the data that is being shared. A Motherboard story from earlier this year revealed that the United States Intelligence Community mandates the use of ad-blockers to prevent RTB agencies from identifying serving personnel, data which could wind up in the hands of rival nations. Earlier versions of IAB’s Content Taxonomy even included tags identifying a user as potentially working for the US military.

It’s this specificity in the data, coupled with the fact that it can be shared widely and so regularly, that has prompted Ryan to call this the “world’s biggest data breach.” He cited an example of a French firm, Vectuary, which was investigated in 2018 by France’s data protection regulator, CNIL. What officials found was data listings for almost 68 million people, much of which had been gathered using captured RTB data. At the time, TechCrunch reported that the Vectaury case could have ramifications for the advertising market and its use of consent banners.

The issue of consent

In 2002, the European Union produced the ePrivacy Directive, a charter for how companies needed to get consent for the use of cookies for advertising purposes. The rules, and how they are defined, have subsequently evolved, most recently with the General Data Protection Regulations (GDPR). One of the consequences of this drive is that users within the EU are presented with a pop-up banner asking them to consent to tracking. As most cookie policies will explain, this tracking is used for both internal analytics and to enable tracking-based advertising.

To standardize and harmonize this process, IAB Europe created the Transparency and Consent Framework (TCF). This, essentially, lets publishers copy the framework laid down by the body on the assumption that they have established a legal basis to process that data. When someone does not give consent to be tracked, a record of that decision is logged in a piece of information known as a TC String. And it’s here that the ICCL has (seemingly) claimed a victory after lodging a complaint with the Belgian Data Protection Authority, the APD, saying that this record constitutes personal data.

A draft of the ruling was shared with IAB Europe and the ICCL, and reportedly said that the APD found that a TC String did constitute personal data. On November 5th, IAB Europe published a statement saying that the regulator is likely to “identify infringements of the GDPR by IAB Europe,” but added that those “infringements should be capable of being remedied within six months following the issuing of the final ruling.” Essentially, because IAB Europe was not treating these strings with the same level of care as personal data, it needs to start doing so now and / or face potential penalties.

At the same time, Dr. Ryan at the ICCL declared that the campaign had “won” and that IAB Europe’s whole “consent system” will be “found to be illegal.” He added that IAB Europe created a fake consent system that spammed everyone, every day, and served no purpose other than to give a thin legal cover to the massive data breach in at the heart of online advertising.” Ryan ended his statement by saying that he hopes that the final decision, when it is released, “will finally force the online advertising industry to reform.”

This reform will potentially hinge on the thorny question of if a user can reasonably be relied upon to consent to tracking. Is it enough for a user to click “I Accept” and therefore write the ad-tech intermediary involved a blank check? It’s a question that ad-tech expert and lawyer Sacha Wilson, a partner at Harbottle and Lewis, is interested in. He explained that, in the law, “consent has to be separate, specific, informed [and] unambiguous,” which “given the complexity of ad tech, is very difficult to achieve in a real-time environment.”

Wilson also pointed out that something that is often overstated is the quality of the data being collected by these brokers. “Data quality is a massive issue,” he said, “a significant proportion of the profile data that exists is actually inaccurate — and that has compliance issues in and of itself, the inaccuracy of the data.” (This is a reference to Article 5 of the GDPR, where people who process data should ensure that the data is accurate.) In 2018, an Engadget analysis of data held by prominent data company Acxiom showed that the information held on an individual can be often wildly inaccurate or contradictory.

One key plank of European privacy law is that it has to be easy enough to withdraw consent if you so choose. But it doesn’t appear as if this is as easy as it could be if you have to approach every vendor individually. Visit ESPN, for instance, and you’ll be presented with a list of vendors (listed by the OneTrust platform) that numbers into the several hundreds. MailOnline’s vendor list, meanwhile, runs to 1,476 entries. (Engadget’s, for what it’s worth, includes 323 “Advertising Technologies” partners.) It is not necessarily the case that all of those vendors will be engaged at all times, but it does suggest that users cannot simply withdraw consent at every individual broker without a lot of time and effort.

Transparency and consent

Townsend Feehan is the CEO of IAB Europe, the body currently awaiting a decision from the APD concerning its data protection practices. She says that the thing that the industry’s critics are missing is that “none of this [tracking] happens if the user says no.” She added that “at the point where they open the page, users have control. [They can] either withhold consent, or they can use the right to object, if the asserted legal basis is legitimate interest, then none of the processing can happen.” She added that users do, or do not, consent to the discrete use of their data to a list of “disclosed data controllers,” saying that “those data controllers have no entitlement to share your data with anyone else,” since doing so would be illegal.

[Legitimate Interest is a framework within the GDPR enabling companies to collect data without consent. This can include where doing so is in the legitimate interests of an organization or third party, the processing does not cause undue harm or detriment to the person involved.]

While the type of sharing described by the ICCL and Dr. Ryan isn’t impossible, from a technical standpoint, Feehan made it clear that to do so is illegal under European law. “If that happens, it is a breach of the law,” she said, “and that law needs to be enforced.” Feehan added that at the point when data is first collected, all of the data controllers who may have access to that information are named.

Feehan also said that IAB Europe had practices and procedures put in place to deal with members found to be in breach of its obligations. That can include suspension of up to 14 days if a violation is found, with further suspensions liable if breaches aren’t fixed. IAB Europe can also permanently remove a company that has failed to address its policies, which it signs up to when it joins the TCF. She added that the body is currently working to further automate its audit processes in order to ensure it can proactively monitor for breaches and that users who are concerned about a potential breach can contact the body to share their suspicions.

It is hard to speculate on what the ruling would mean for IAB Europe and the current ad-tech regime more broadly. Feehan said that only when the final ruling was released would we know what changes the ad industry will have to institute. She asserted that IAB Europe was little more than a standards-setter rather than a data controller in real terms. “We don’t have access to any personal data, we don’t process any data, we’re just a trade association.” However, should the body be found to be in breach of the GDPR, it will need to offer up a clear action plan in order to resolve the issue.

It’s not just consent fatigue

The issue of Real-Time Bidding data being collected is not simply an issue of companies being greedy or lax with our information. The RTB process means that there is always a risk that data will be passed to companies with less regard for their legal obligations. And if a data broker is able to make some cash from your personal information, it may do so without much care for your individual rights, or privacy.

The Wall Street Journal recently reported that Mobilewalla, an Atlanta-based ad-tech company, had enabled warrantless surveillance through the sale of its RTB data. Mobilewalla’s vast trove of information, some of which was collected from RTB, was sold to a company called Gravy Analytics. Gravy, in turn, passed the information to its wholly-owned subsidiary, Venntel, which then sold the information to a number of federal agencies and related partners.

i
This content is not available due to your privacy preferences. Update your settings here, then reload the page to see it.

This trove of information may not have had real names attached, but the Journal says that it’s easy enough to tie an address to where a person’s phone is placed most evenings. And this information was, at the very least, passed on to and used by the Department of Homeland Security, Internal Revenue Service and US Military. All three reportedly tracked individuals both in the US and abroad without a warrant enabling them to do so.

In July 2020, Mobilewalla came under fire after reportedly revealing that it had tagged and tracked the identity of Black Lives Matter protesters. At the time, The Wall Street Journal report added that the company’s CEO, in 2017, boasted that the company could track users while they visit their places of worship to enable advertisers to sell directly to religious groups.

This sort of snooping and micro-targeting is not, however, limited to the US, with the ICCL finding a report made by data broker OnAudience.com. The study, a copy of which it hosts on its website, discusses the use of databases to create a cohort of around 1.4 million users. These people were targeted based on a belief that they were “interested in LGBTQ+,” identified because they had searched for relevant topics in the prior 14 days. Given both the unpleasant historical precedent of listing people by their sexuality and the ongoing assault on LGBT rights in the country, the ease at which this took place may concern some.

Looking to the future

On November 25th, the APD announced that it had sent its draft decision to its counterparts in other parts of Europe. If the procedure doesn’t hit any roadblocks, then the ruling will be made public around four weeks later, which means at some point in late December. Given the holidays, we may not see the likely fallout — if any — until January. But it’s possible that either this doesn’t make much of a change in the ad landscape, or it could be dramatic. What’s likely, however, is that the issues around how much a user can consent to having their data used in this manner won’t go away overnight.

Feature Image Credit: #Urban-Photographer via Getty Images

By D. Cooper

Sourced from engadget

By

In the US, an estimated 40% of adults block online ads on PCs or phones.

While Facebook and Apple tussle over the harms and benefits of online advertising, more and more of us are sidestepping the issue by blocking ads completely. Use of ad blocking software like web browsers is surging, especially on smartphones, a study published Monday concludes.

The number of people using ad blockers has remained mostly level on personal computers, with 257 million people using them monthly by the end of 2020. But it’s on mobile devices where ad blocking is really increasing, doubling over the last five years, from 282 million to 586 million at the end of 2020, according to the 2021 PageFair Adblock Report from ad tech firm Blockthrough. That’s a 10% increase over the 2020 PageFair report on ad blocking.

Blockthrough makes money by helping advertisers try to cope with ad blocking. It offers a system to try to persuade website users to opt into delivery of the less intrusive system called Acceptable Ads. Though the ads might not be as distracting, they still face criticism that they they enable tracking, the central issue in the dispute between Apple and Facebook.

Advertising has funded countless online sites besides the dominant beneficiaries, Facebook and Google. Indeed, it propelled much of the foundation of internet businesses. But Apple’s privacy-first stance and the increasing use of ad blockers show major pushback to the approach.

Use of ad blocking software is increasing on mobile devices, a study by Blockthrough found.
Use of ad blocking software is increasing on mobile devices, a study by Blockthrough found. Blockthrough

Blockthrough also funded a survey of 5,423 Americans to gauge their opinions on online ads. One conclusion: About 40% of US adults use an ad blocker, more than twice what publishers often report based on ad-blocking detection software, Blockthrough said.

The top reason for blocking ads was to avoid interruption and annoyance, with 81% of survey respondents selecting that as a motivation. The second-place reason was protection against malware, at 62%. Third place, at 58%, was privacy.

To estimate ad blocker use globally, Blockthrough based its PC figures on downloads of the ad-blocking address list from Eyeo, maker of the Adblock Plus browser plugin. Its mobile ad blocking use was chiefly from download figures and app developer disclosures about usage. The top ad-blocking browser remains UC Browser, still with an estimated 310 million users despite bans in India and more recently China.

Feature Image Credit: Ad blocking is surging on smartphones with the use of browsers like UC Browser and Brave. Eyeo; Illustration by Stephen Shankland/CNET

By

Sourced from C/Net

‘Google is trying to hide its true intentions behind a pretext of privacy,’ say prosecutors

State antitrust watchdogs are targeting Google’s plans to phase out third-party tracking cookies, building on a major lawsuit filed last year. The group of 15 attorneys general, led by Texas, updated its complaint about Google yesterday to include a more detailed case against the search giant, including new claims about Google’s strategic use of the Chrome browser. In particular, the new complaint takes aim at recent privacy updates to Chrome, which could better protect users’ personal data while also entrenching Google’s market position.

Filed in December, the Texas complaint is one of three ongoing antitrust cases against Google. That same month, the Colorado attorney general led a group alleging that the company stifled competition by manipulating search results. A separate case from the Department of Justice is focused on Google’s dominance of the web search marketplace and associated ad business.

Privacy vs. antitrust

Like the original Texas complaint, Tuesday’s updated filing primarily focuses on Google’s technology for targeting ads across the web. The attorneys general argue that Google used its power in search, streaming video, and other markets to stamp out independent advertising platforms, forcing small businesses and media outlets to use its system.

But in the updated complaint, the states apply this argument to Google’s “Privacy Sandbox” — a tool that’s supposed to replace invasive third-party tracking cookies with a more limited system devised by Google.

“Google’s new scheme is, in essence, to wall off the entire portion of the internet that consumers access through Google’s Chrome browser,” the complaint reads. Blocking cookies might broadly be a good thing — other browsers like Firefox and Safari have already done it. But Chrome dominates the browser market, and it’s part of a much larger Google product suite. The suit argues that Google’s plans would require advertisers to use it as a middleman and would make Google’s own advertising system far more attractive.

For years, Google has been gradually scaling back its use of tracking cookies, announcing earlier this month that it will not establish an alternate system for tracking users on the web. But critics of the company — including the Electronic Frontier Foundation — have criticized those efforts as self-serving. Now, state regulators seem to be adopting those criticisms and putting new legal pressure on Google’s efforts to block tracking in Chrome.

“Google is trying to hide its true intentions behind a pretext of privacy,” the suit continues. With Privacy Sandbox, “Google does not actually put a stop to user profiling or targeted advertising — it puts Google’s Chrome browser at the centre of tracking and targeting.”

Reached for comment, Google said the new allegations rested on a misunderstanding of Chrome’s privacy features. “Attorney General Paxton’s latest claims mischaracterize many aspects of our business, including the steps we are taking with the Privacy Sandbox initiative to protect people’s privacy as they browse the web,” a Google representative said. “These efforts have been welcomed by privacy advocates, advertisers and our own rivals as a step forward in preserving user privacy and protecting free content. We will strongly defend ourselves from AG Paxton’s baseless claims in court.”

Update 1:50PM ET: Added statement from Google.

Feature Image Credit: Illustration by Alex Castro / The Verge

Sourced from The Verge

By Jack Morse

Your iPhone has trouble keeping secrets. Thankfully, there’s something you can do about it.

What you do on the internet, what apps you download, and, often, where you go are all data points that can be linked to an iPhone’s so-called advertising identifier (Android phones have a similar Advertising ID). Combined with commercially available databases, this unique alphanumeric string can be enough for third parties to tie an iPhone’s actions back to the real name of its owner.

We were reminded of the real-world consequences of this Friday, when the New York Times published an article exposing the movements of individuals involved in the Jan. 6 riot at the U.S. Capitol. The newspaper obtained a data set that linked phone location data to advertising identifiers, which, combined with other available databases, allowed the paper to link that location data to real people.

Assuming they’re playing by Apple’s rules, app developers get access to a phone’s advertising identifier by simply requesting it from the phone. Think of an ad identifier like the more familiar web cookie which follows you around the internet, remembering what you do and exchanging information with websites along the way. Your phone has something like a cookie, too — that’s the ad identifier.

While you may not have much sympathy for those described in the Times article — who, after all, may have taken part in the attack on the Capitol — the point remains. Your phone’s advertising identifier is yet another digital breadcrumb leading straight back to you.

If you want privacy when, say, going to the doctor, church, an AA meeting, this should concern you. Many of the apps on your phone that have access to your ad identifier are tracking your location. While the apps may promise to store this data anonymously — linked only to your ad identifier — the Times article provides an example of just how easy to it to tie those identifiers (and all the data associated with them) back to real names.

“Several companies offer tools to allow anyone with data to match the IDs with other databases,” the paper explains. And those databases might contain your real name and address.

But there’s a way to fight back.

Apple offers users the option, albeit buried deep in an iPhone’s settings, to deny apps access to your advertising identifier. Turning off apps’ access to location data is also an important step, but there are other ways for apps to estimate your phone’s location — like connections to WiFi networks. You should also not give apps access to your location data unless they absolutely need it to function, like, for example, a map app.

To deny apps access to your phone’s advertising identifier:

  1. Go to “Settings”
  2. Tap “Privacy”
  3. Select “Tracking”
  4. Disable the option that says “Allow Apps to Request to Track”
Limit how you can be tracked on your iPhone.
Limit how you can be tracked on your iPhone.

Image: screenshot: iphone

That’s it.

Interestingly, the menu page doesn’t make it immediately clear that this action will have the intended effect. But it does. Clicking “Learn More” takes the curious to a long page of text which explains what’s going on behind the scenes.

SEE ALSO: How to blur your house on Google Street View (and why you should)

“When you decline to give permission for the app to track you, the app is prevented from accessing your device’s advertising identifier (previously controlled through the Limit Ad Tracking setting on your device).”

There, wasn’t that easy?

By Jack Morse

Sourced from Mashable India