Tag

Security

Browsing

By Deanna Ritchie

That tape over your webcam might not be enough — the hackers are watching; it might be the right time to install another privacy shutter.

In a report just published in Science Advances, researchers at the Massachusetts Institute of Technology (MIT) emphasized the risks to imaging privacy that ambient light sensors can offer. Users of devices worried about security may find solace in software permissions that limit webcam use and hardware solutions like shutters. Nonetheless, studies have demonstrated that one of the typical ambient light sensors used in a variety of devices can be used to collect visual data. These tiny sensors are normally permission-free on a device level and aren’t closed or deactivated by users.

MIT researchers utilized the Samsung Galaxy View 2 in their investigations. The ambient light sensor on this relatively dated and huge (17.3-inch) consumer tablet is located close to the front-facing (selfie) camera — which is still a pretty popular arrangement.

Manufacturers of devices classify ambient light sensors as low-risk since software (or malware) may frequently access them directly without requiring any authorization or privileges. However, prior research has demonstrated that in roughly 80% of cases — even a basic sensor can yield sufficient information to deduce keystrokes from a keyboard and steal a device’s authorizations and passwords. The latest study demonstrates the potential of an ambient light sensor in conjunction with the device’s screen, which serves as an active light source.

Some devices are more susceptible to these ambient light sensor espionage techniques.

Some devices will be more susceptible to this ambient light sensor espionage technique than others because every device has a different light sensor speed and measurement bit depth, screen brightness, and light sensor precision (see image above). As you can see from the source article numbers, some of the tablet device’s image captures took several minutes. However, ambient light sensor imaging spy technology is verifiably accurate and has room for improvement.

The MIT researchers pointed out that the light sensors are “quite useful,” and we need and want them. The MIT researchers said to adjust the following to stop your peeping-cyber-toms.

  • Rethink ambient light sensor device permissions.
  • Reduce sensor speed.
  • Reposition the sensor so it doesn’t face the user.

Hopefully, when manufacturers become better aware of the ambient light sensor issues, they will implement a few changes to prevent the “snooping tech” from finding more victims.

Featured Image Credit:  Jan from Pixabay

By Deanna Ritchie

Deanna is an editor at ReadWrite. Previously she worked as the Editor in Chief for Startup Grind, Editor in Chief for Calendar, editor at Entrepreneur media, and has over 20+ years of experience in content management and content development.

Sourced from readwrite

Security is vital online, so a VPN is a useful tool. If you’re not sure how to set one up, here are the four best browsers with one built-in.

When you’re browsing the internet, you may encounter geo-locked content. If you need to access it, you have no choice but to fire up a VPN and spoof your location to where the content is allowed.

However, you don’t have to use a third-party VPN just to see the content. Several browsers out there have built-in VPN services, allowing you to visit websites without downloading another app. Browser VPNs also improve your privacy and protection, especially if you’re accessing a page with questionable security.

So, here’s our list of the four best browsers with a built-in VPN.

1. Opera Browser

This browser is the oldest option in this list, established in 1994 and made publicly available in 1996. It first received the built-in VPN feature in 2016, included in Opera 38.

Although the VPN is turned off by default, you can easily activate it via the Quick Settings Menu. Once you’ve activated it, you’ll see the VPN icon on the address bar. If it’s turned off, you’ll see VPN outlined by a box, but if it’s switched on, you should see a blue box with VPN written on it.

You can turn on the VPN by default for instant secure browsing. You can even instruct Opera to bypass the VPN when using default search engines or accessing intranet sites. It allows you to assign additional VPN bypass rules, so you don’t have to turn it off when you want to access trusted pages that won’t work with the VPN turned on.

You also don’t need to create an account to use the VPN, thus improving your privacy. Beyond that, it has other nifty features, including a built-in ad blocker and a tracker blocker. But best of all, Opera’s service is free and unlimited.

Opera Browser has one significant disadvantage, though: you can’t set a specific country for the VPN. You can only pick between three general areas—Americas, Asia, or Europe.

Download: Opera Browser (Free)

2. epic privacy browser

epic is a Chromium-based browser made by Hidden Reflex that uses the same DNA as Google’s browser. This makes it an excellent Chrome alternative, allowing you to switch browsers easily while keeping the same feel and functionality.

Although its source code isn’t open-source, despite being based on the open-source chromium platform, Hidden Reflex claims that anyone can request for and audit it.

In the past, epic always had its built-in VPN and ad blocker turned on. However, because they need to sustain their operations, these features are now pre-installed as extensions, and users must activate them manually. Nevertheless, they’re easy to switch on once and for good.

One other characteristic of this browser is its default Yahoo! search engine. While some consider this a drawback, others think this is a feature. epic explains the situation when you open a new tab in the browser for the first time:

When you use the default Yahoo-powered search in Epic, you’ll get better search results and support our mission including more frequent releases and hundreds more servers for our encrypted proxy/VPN. All searches sent to Yahoo are encrypted for your privacy and security. According to their requirements, Yahoo search does bypass both our proxy and adblock. Upon ad click in Yahoo search, the proxy and adblock remain disabled for several seconds. Their goal is to insure the integrity of their search ad marketplace. Due to their policies, a few other Yahoo sites including Techcrunch, Engadget, Autoblog, HuffPo and AOL bypass our adblock. No other sites bypass our adblock or proxy so Epic works almost entirely as it always has except in respect to the Yahoo sites.

We believe it is impossible at present to offer honest, free private search. We’ve received many requests to support so-called private search engines such as Startpage, DuckDuckGo and others. To our knowledge there are no exceptions to Google/Bing mandates to share a user’s IP address and or location both to retrieve search ads and upon search ad click. It is misleading to claim to be private if you’re sharing your users’ data with Google/Bing. Despite multiple requests for years, they refuse to explain to us how they work. We can’t legally or ethically work with them without transparency.

epic lets you choose eight countries to connect your VPN: US, Canada, UK, Germany, France, Netherlands, India, and Singapore. If a page you want to load doesn’t work correctly with encrypted VPNs, you can disable the encrypted VPN for that site and add it to your safe list.

If you want the ultimate privacy, you can opt for paid private search via epicsearch.in. You have to pay $2.50 monthly for the service, but epic assures you that your queries will remain private. That’s because they only forward your search to their third-party provider, nothing else.

Download: epic privacy browser (Free)

3. Tor Project

Tor, which stands for The Onion Router, aims to provide anonymous communication via a free global volunteer overlay network. This setup allows users robust privacy, as their data is routed at least thrice to over seven thousand available relays. To use this network, you need to install the Tor Browser.

This browser is one of the most robust options regarding privacy. This is because it uses multilayer encryption to protect its users’ data. Furthermore, it uses random routing, ensuring it’s almost impossible to track data movement within the Tor network.

When you open the Tor browser, you must manually connect to the Tor relay. If you’re in a place where Tor is inaccessible, you can also use Bridges, which allows you to connect to unlisted relays. You can also use your VPN over Tor, although it will require some setup.

The Tor browser is popular with activists, journalists, whistle-blowers, and anyone with serious privacy risks. If you can’t access the Tor Project homepage, you can also find mirrors to other download sites on GitHub.

Download: Tor Browser (Free)

4. Avast Secure Browser PRO

Avast, a popular antivirus provider, launched this Chromium-based browser in 2018. It feels similar to other Chromium-based browsers but adds on several premium features. Avast claims that it can unblock any site and block all ads. You also get unlimited bandwidth, have more than 30 locations to choose from, use the browser on up to 5 devices, and have direct support.

You must download the Avast Secure Basic browser and sign up for the Pro version on the Avast website after installation. Although the VPN service isn’t free, this browser offers the most options in terms of location. It’s also more affordable than getting a standalone VPN service from Avast.

Download: Avast Secure Browser (Free, 30-Day Free Trial for Pro Features)

Enhance Your Access and Privacy With Browser VPNs

VPNs are great tools for privacy and access. And while it’s ideal if you install a dedicated VPN service on your computer, it’s not always practical and may even cost you. So, if you only need a VPN for a short while, consider any of these built-in alternatives instead.

By Jowi Morales

Sourced from MUO

By Chris Odogwu

Having an email security policy can protect you and your company from malicious threats.

When was the last time you sent an email? It was probably today. Just like you, many people around the world send emails daily.Emails have been a part of our lives for the longest time. Since it’s almost impossible to do without them, you must secure yourself with an effective email security policy.

You don’t want your emails to get into the wrong hands, do you? Implementing an email security policy helps to keep them safer.

What Is Email Security Policy?

Email Newsletter

An email security policy is a series of procedures governing the use of emails within a network or an establishment. It details how a category of users interacts with messages that are sent and received via email.

Keeping your emails organized and secure boosts your productivity. The goal of an email security policy is to secure messages from unauthorized access.

Who may be trying to access the emails without permission, one might ask? Cybercriminals—they are very much interested in the confidential messages that you send within and outside your organization. And that’s because they know that such information is valuable. If they get hold of it, they can use it for a series of malicious activities to enrich themselves.

How Does Email Security Policy Work?

Gmail on Computer Screen

The default security strength of email isn’t so strong. Messages sent via email are in the public space. Hence, they can be easily accessed by anyone with average hacking skills. Creating an email security policy is one of the basic things that you can do to ward off attackers.

Believing that you or your organization can’t fall victim to an email breach is a false premise. As long as you make use of emails, you can be targeted.

Your reluctance to implement an email security policy can only hold water if the emails you send are meaningless. But that’s hardly the case if you run a decent business.

For an email security policy to be effective, it must include the following items:

  1. The scope and purpose of the policy.
  2. Information about the ownership of content contained in the emails.
  3. Privacy concerns and expectations of parties using the email.
  4. The responsibilities of the email users.
  5. Guidelines for using the organization’s email accounts.
  6. Tips to detect and avoid email security threats.
  7. Specific actions to take in the event of a suspected email security breach.

Accessibility is key in the successful implementation of the policy. Team members can only be abreast with the information in the policy if they can access the document.

Instead of storing the document on a physical device, it’s advisable to use a workflow tool with cloud storage and remote access. That way, authorized team members can access the policy from anywhere and at any time.

Training is another essential element to successfully implement an email security policy. Some users may be reluctant to abide by the policy, especially if they haven’t used something similar in the past. It’s up to you to make provision for proper training to make them understand how using the policy is in everyone’s best interest.

How to Build an Effective Email Security Policy

Woman Working on Computer in Office

An email security policy isn’t one-size-fits-all because no two organizations are the same. But the cyber threats that endanger the use of emails have similar effects on organizations regardless of their offerings and sizes. They are common attributes that should be considered in building a standard policy.

Here are some practical tips for building an email security policy that works.

1. Adopt a Template

Creating an email security policy from scratch isn’t a bad idea, but you could save yourself some time by adopting an existing template. This is necessary, especially if you aren’t familiar with the content of the policy.

Instead of creating irrelevant information, you have vital information for creating a policy that works.

2. Modify the Template

Adopting an existing template doesn’t mean you should use it the way it is. The template is to give you an idea of what the policy looks like.

Instead of taking everything contained in the template hook line and sinker, adjust it to suit the unique needs of your business.

In the end, you’ll have an original document that’s tailormade for your organization.

3. Identify User Engagement Terms

Users of your email may engage in indiscriminate activities if they aren’t aware that such activities are prohibited. It’s your responsibility to expressly state how they should use your email.

Identify unhealthy email practices that may expose your network to cyberattacks and warn against involving in such activities.

4. Implement a Tool

Your email security policy is incomplete without implementing a tool that enhances the security of your emails.

Manually protecting your email against cyber threats is insufficient, especially as cybercriminals use advanced technologies for their attacks. Match their energy with tools such as sandboxes, spam filters, and malware prevention software. An effective spam filter prevents you from viewing malicious emails.

5. Enforce User Policy Acknowledgement

The successful implementation of your policy begins with your users’ willingness to abide by it. Change comes with some resistance. Team members who aren’t familiar with an email security policy may decide to overlook it.

Get users to commit to using the policy by appending their signatures as a form of acknowledgment. That way, you have proof of their agreement to use it in case they fail to.

6. Train Users

Users of your email may not understand some information in the policy. Leaving them in a state of confusion is risky as they may take inappropriate actions that will endanger your network.

Ensure that everyone understands the policy by conducting training. Create room for them to ask questions on grey areas so that everyone is up to speed on what to do and what not to do.

7. Develop an Incident Response Plan

Even with all the training on how to implement an email security policy effectively, things might still go wrong.

Develop an incident response plan in the event of a security breach. Your policy should contain what users should do once they suspect malicious activity or attack. Taking the right actions can mitigate the effects of a cyberattack.

Cultivate Healthy Cyberculture With Email Security Policy

Instant messaging may be trendy in communicating with friends and family. But when it comes to work and business, good old email is still relevant. It helps organizations to maintain a sense of order and formality.

You may not be able to stop attackers from targeting your emails, but you can nullify their attacks with an effective email security policy.

When everyone using your email understands how to keep the information safe, cybercriminals will have no opportunity to strike. It’s only a matter of time before they give up trying to penetrate your network and move on to the next one.

By Chris Odogwu

Sourced from MUO

 

By D. Cooper

Is this the end for the consent pop-up?

An Irish civil rights group believes that it has successfully exposed the so-called legal fictions that underpin the online advertising industry. The Irish Council for Civil Liberties (ICCL), says that Europe’s data protection regulators will soon declare the current regime illegal. At the heart of this complaint is both how the industry asks for permission, and then how it serves adverts to users online. Describing the situation as the “world’s biggest data breach,” the consequences of the ruling could have staggering ramifications for everything that we do online.

“The world’s biggest data breach”

Real-Time Bidding (RTB) is the mechanism by which most online ads are served to you today, and lies at the heart of the issue. Visit a website and, these days, you will notice a split-second delay between the content loading, and the adverts that surround it. You may be reading a line in an article, only for the text to suddenly leap halfway down the page, as a new advert takes its place in front of your eyes. This delay, however small, accommodates a labyrinthine process in which countless companies bid to put their advert in front of your eyes. Omri Kedem, from digital marketing agency Croud, explained that the whole process takes less than 100 milliseconds from start to finish.

Advertising is the lifeblood of the internet, providing social media platforms and news organisations with a way to make money. Advertisers feel more confident paying for ads, however, if they can be reasonably certain that the person on the other end is inside the target market. But, in order to make sure that this works, the platform hosting the ad needs to know everything it can about you, the user.

This is how, say, a sneaker store is able to market its wares to the local sneakerheads or a vegan restaurant looks for vegans and vegetarians in its local area. Companies like Facebook have made huge profits on their ability to laser-focus ad campaigns on behalf of advertisers. But this process has a dark side, and this micro-targeting can, for instance, be used to enable hateful conduct. The most notable example is from 2017, when ProPublica found that you could target a cohort of users deemed anti-semitic with the tag “Jew Hater.”

Every time you visit a website, a number of facts about you are broadcast to the site’s owner including your IP address. But that data can also include your exact longitude and latitude (if you have built-in GPS), your carrier and device type. Visit a news website every day and it’s likely that both the publisher and ad-tech intermediary will track which sections you spend more time reading.

This information can be combined with material you’ve willingly submitted to a publisher when asked. Subscribe to a publication like the Financial Times or Forbes, for instance, and you’ll be asked about your job title and industry. From there, publishers can make clear assumptions about your annual income, social class and political interests. Combine this information — known in the industry as deterministic data — with the inferences made based on your browsing history — known as probabilistic data — and you can build a fairly extensive profile of a user.

“The more bidders you have on something you’re trying to sell, in theory, the better,” says Dr. Johnny Ryan. Ryan is a Senior Fellow at the ICCL with a specialism in Information Rights and has been leading the charge against Real-Time Bidding for years. In order to make tracking-based advertising work, the publisher and ad intermediary will compress your life into a series of codes: Bidstream Data. Ryan says that this is a list of “identification codes [which] are highly unique to you,” and is passed on to a number of auction sites.

“The most obvious identification is the app that you’re using, which can be very compromising indeed, or the specific URL that you’re visiting,” says Ryan. He added that the URL of the site, which can be included in this information, can be “excruciatingly embarrassing” if seen by a third party. If you’re looking up information about a health condition or material related to your sexuality and sexual preferences, this can also be added to the data. And there’s no easy and clean way to edit or redact this data as it is broadcast to countless ad exchanges.

In order to harmonize this data, the Interactive Advertising Bureau, the online ad industry’s trade body, produces a standard taxonomy. (The IAB, as it is known, has a standalone body operating in Europe, while the taxonomy itself is produced by a New York-based Tech Lab.) The IAB Audience Taxonomy (subsequently revised to version 1.1) will codify you, for instance, as being into Arts and Crafts (Code 1472) or Birdwatching (435). Alternatively, it can tag you as having an interest in Islam (602), Substance Abuse (568) or if you have a child with special educational needs (357).

But not every bidder in those auctions is looking to place an ad, and some are much more interested in the data that is being shared. A Motherboard story from earlier this year revealed that the United States Intelligence Community mandates the use of ad-blockers to prevent RTB agencies from identifying serving personnel, data which could wind up in the hands of rival nations. Earlier versions of IAB’s Content Taxonomy even included tags identifying a user as potentially working for the US military.

It’s this specificity in the data, coupled with the fact that it can be shared widely and so regularly, that has prompted Ryan to call this the “world’s biggest data breach.” He cited an example of a French firm, Vectuary, which was investigated in 2018 by France’s data protection regulator, CNIL. What officials found was data listings for almost 68 million people, much of which had been gathered using captured RTB data. At the time, TechCrunch reported that the Vectaury case could have ramifications for the advertising market and its use of consent banners.

The issue of consent

In 2002, the European Union produced the ePrivacy Directive, a charter for how companies needed to get consent for the use of cookies for advertising purposes. The rules, and how they are defined, have subsequently evolved, most recently with the General Data Protection Regulations (GDPR). One of the consequences of this drive is that users within the EU are presented with a pop-up banner asking them to consent to tracking. As most cookie policies will explain, this tracking is used for both internal analytics and to enable tracking-based advertising.

To standardize and harmonize this process, IAB Europe created the Transparency and Consent Framework (TCF). This, essentially, lets publishers copy the framework laid down by the body on the assumption that they have established a legal basis to process that data. When someone does not give consent to be tracked, a record of that decision is logged in a piece of information known as a TC String. And it’s here that the ICCL has (seemingly) claimed a victory after lodging a complaint with the Belgian Data Protection Authority, the APD, saying that this record constitutes personal data.

A draft of the ruling was shared with IAB Europe and the ICCL, and reportedly said that the APD found that a TC String did constitute personal data. On November 5th, IAB Europe published a statement saying that the regulator is likely to “identify infringements of the GDPR by IAB Europe,” but added that those “infringements should be capable of being remedied within six months following the issuing of the final ruling.” Essentially, because IAB Europe was not treating these strings with the same level of care as personal data, it needs to start doing so now and / or face potential penalties.

At the same time, Dr. Ryan at the ICCL declared that the campaign had “won” and that IAB Europe’s whole “consent system” will be “found to be illegal.” He added that IAB Europe created a fake consent system that spammed everyone, every day, and served no purpose other than to give a thin legal cover to the massive data breach in at the heart of online advertising.” Ryan ended his statement by saying that he hopes that the final decision, when it is released, “will finally force the online advertising industry to reform.”

This reform will potentially hinge on the thorny question of if a user can reasonably be relied upon to consent to tracking. Is it enough for a user to click “I Accept” and therefore write the ad-tech intermediary involved a blank check? It’s a question that ad-tech expert and lawyer Sacha Wilson, a partner at Harbottle and Lewis, is interested in. He explained that, in the law, “consent has to be separate, specific, informed [and] unambiguous,” which “given the complexity of ad tech, is very difficult to achieve in a real-time environment.”

Wilson also pointed out that something that is often overstated is the quality of the data being collected by these brokers. “Data quality is a massive issue,” he said, “a significant proportion of the profile data that exists is actually inaccurate — and that has compliance issues in and of itself, the inaccuracy of the data.” (This is a reference to Article 5 of the GDPR, where people who process data should ensure that the data is accurate.) In 2018, an Engadget analysis of data held by prominent data company Acxiom showed that the information held on an individual can be often wildly inaccurate or contradictory.

One key plank of European privacy law is that it has to be easy enough to withdraw consent if you so choose. But it doesn’t appear as if this is as easy as it could be if you have to approach every vendor individually. Visit ESPN, for instance, and you’ll be presented with a list of vendors (listed by the OneTrust platform) that numbers into the several hundreds. MailOnline’s vendor list, meanwhile, runs to 1,476 entries. (Engadget’s, for what it’s worth, includes 323 “Advertising Technologies” partners.) It is not necessarily the case that all of those vendors will be engaged at all times, but it does suggest that users cannot simply withdraw consent at every individual broker without a lot of time and effort.

Transparency and consent

Townsend Feehan is the CEO of IAB Europe, the body currently awaiting a decision from the APD concerning its data protection practices. She says that the thing that the industry’s critics are missing is that “none of this [tracking] happens if the user says no.” She added that “at the point where they open the page, users have control. [They can] either withhold consent, or they can use the right to object, if the asserted legal basis is legitimate interest, then none of the processing can happen.” She added that users do, or do not, consent to the discrete use of their data to a list of “disclosed data controllers,” saying that “those data controllers have no entitlement to share your data with anyone else,” since doing so would be illegal.

[Legitimate Interest is a framework within the GDPR enabling companies to collect data without consent. This can include where doing so is in the legitimate interests of an organization or third party, the processing does not cause undue harm or detriment to the person involved.]

While the type of sharing described by the ICCL and Dr. Ryan isn’t impossible, from a technical standpoint, Feehan made it clear that to do so is illegal under European law. “If that happens, it is a breach of the law,” she said, “and that law needs to be enforced.” Feehan added that at the point when data is first collected, all of the data controllers who may have access to that information are named.

Feehan also said that IAB Europe had practices and procedures put in place to deal with members found to be in breach of its obligations. That can include suspension of up to 14 days if a violation is found, with further suspensions liable if breaches aren’t fixed. IAB Europe can also permanently remove a company that has failed to address its policies, which it signs up to when it joins the TCF. She added that the body is currently working to further automate its audit processes in order to ensure it can proactively monitor for breaches and that users who are concerned about a potential breach can contact the body to share their suspicions.

It is hard to speculate on what the ruling would mean for IAB Europe and the current ad-tech regime more broadly. Feehan said that only when the final ruling was released would we know what changes the ad industry will have to institute. She asserted that IAB Europe was little more than a standards-setter rather than a data controller in real terms. “We don’t have access to any personal data, we don’t process any data, we’re just a trade association.” However, should the body be found to be in breach of the GDPR, it will need to offer up a clear action plan in order to resolve the issue.

It’s not just consent fatigue

The issue of Real-Time Bidding data being collected is not simply an issue of companies being greedy or lax with our information. The RTB process means that there is always a risk that data will be passed to companies with less regard for their legal obligations. And if a data broker is able to make some cash from your personal information, it may do so without much care for your individual rights, or privacy.

The Wall Street Journal recently reported that Mobilewalla, an Atlanta-based ad-tech company, had enabled warrantless surveillance through the sale of its RTB data. Mobilewalla’s vast trove of information, some of which was collected from RTB, was sold to a company called Gravy Analytics. Gravy, in turn, passed the information to its wholly-owned subsidiary, Venntel, which then sold the information to a number of federal agencies and related partners.

i
This content is not available due to your privacy preferences. Update your settings here, then reload the page to see it.

This trove of information may not have had real names attached, but the Journal says that it’s easy enough to tie an address to where a person’s phone is placed most evenings. And this information was, at the very least, passed on to and used by the Department of Homeland Security, Internal Revenue Service and US Military. All three reportedly tracked individuals both in the US and abroad without a warrant enabling them to do so.

In July 2020, Mobilewalla came under fire after reportedly revealing that it had tagged and tracked the identity of Black Lives Matter protesters. At the time, The Wall Street Journal report added that the company’s CEO, in 2017, boasted that the company could track users while they visit their places of worship to enable advertisers to sell directly to religious groups.

This sort of snooping and micro-targeting is not, however, limited to the US, with the ICCL finding a report made by data broker OnAudience.com. The study, a copy of which it hosts on its website, discusses the use of databases to create a cohort of around 1.4 million users. These people were targeted based on a belief that they were “interested in LGBTQ+,” identified because they had searched for relevant topics in the prior 14 days. Given both the unpleasant historical precedent of listing people by their sexuality and the ongoing assault on LGBT rights in the country, the ease at which this took place may concern some.

Looking to the future

On November 25th, the APD announced that it had sent its draft decision to its counterparts in other parts of Europe. If the procedure doesn’t hit any roadblocks, then the ruling will be made public around four weeks later, which means at some point in late December. Given the holidays, we may not see the likely fallout — if any — until January. But it’s possible that either this doesn’t make much of a change in the ad landscape, or it could be dramatic. What’s likely, however, is that the issues around how much a user can consent to having their data used in this manner won’t go away overnight.

Feature Image Credit: #Urban-Photographer via Getty Images

By D. Cooper

Sourced from engadget

By Keyede Erinfolami

Your online presence is permanent, right? Is it even possible to delete yourself from the internet?

One of the major tradeoffs for access to the digital world is privacy.

Unfortunately, you can never completely delete yourself from the internet, simply because you’d have to find every photo, video, tweet, mention, comment, shopping order, to name a few, and delete them. However, there are ways to minimize your online footprint, reducing the likelihood of your data being exposed.

In this article, we have outlined a basic roadmap on how to get control of what information about you is available online. If you want delete your online presence, read on.

How To Remove Yourself From the Internet

There are several reasons anyone would want to remove all traces of themselves from the internet permanently. Reasons may likely include:

  • To safeguard your identity and prevent identity theft.
  • Increase your general privacy.
  • You are being bullied or stalked online.
  • Clean your online image as you are up for a political post.
  • Put an end to all those targeted advertisements. Although unlikely, if this is a major reason for deleting yourself from the internet, you’ll be glad to know that there are ways to reduce targeted ads on social media.
  • You are about to do something nefarious.

The list goes on, but before we proceed to the steps, deleting yourself from the internet comes with some drawbacks, like:

  • You will lose access to certain platforms and services, as emails and some personal information are required for access.
  • An absence of a digital presence may be seen as a red flag against you, especially during job interviews.
  • You will become more isolated as non-physical interactions with friends, family, or colleagues will become more difficult.

If these are your intentions in the first place or you are comfortable with these drawbacks, then let’s proceed.

The only way to regain control over your privacy is to control what details about yourself are available online.

Remove Your Personal Details From Search Engines and Data Collection Sites

The first place anyone looking for information about you would likely try is a search engine, especially Google. So you should search for your name in not only Google, but also Bing, Yahoo, and any other search engine available in your region.

Remove Outdated Search Results

Assume you want to remove a webpage that contains personal information about you. Like your former employer’s staff page, even months after you’ve left. You contact them to request that they update the page. They do, but when you Google your name, the page still appears in the search results despite your name being nowhere to be found when you click the link. This means that the previous version of the page is still cached on Google’s servers.

What to do? Submit the URL to Google in the hope that it will update its servers, deleting the cached search result and disassociating you from the page. Of course, there’s no guarantee Google will remove the cached information for whatever reason, but it’s worth a shot to remove as much of your presence from the internet as possible.

Delete Your Social Media Accounts

disappear-from-social-networks

Without a doubt, your social media accounts contain a large cache of very personal details. Any stranger can look at your photos, videos, birthdays, and family links just by scrolling through your social page. Delete and deactivate all your social media accounts, and we mean all. Your Facebook, Twitter, Instagram, LinkedIn, Reddit, and everything else all have to go. Again, this is a big deal, so make sure you consider the long-term implications of deleting your social media accounts before you do so.

To delete these accounts, navigate to your account settings and look for the option to deactivate, remove, or close your account. Depending on the account, it could be under Security, Privacy, or something similar.

If you’re having trouble with a specific account, try searching “How to delete,” followed by the name of the social media account you want to delete online. You will find guidance on how to delete that specific account. If deleting the account is impossible, change the account information to randomize it completely and switch it to private.

Clear Your Online Shopping and Browser History

Photo of delete button on a computer

Every time you shop online, you leave your financial information on the site and a mailing address, too. These sites, if breached, might reveal a host of personal and sensitive details about its shoppers.

So, just like you did with your social media accounts, all your shopping accounts must either be deleted or deactivated. Your browser history, including passwords, cache, cookies, bookmarks, and payment methods, must be cleared.

Delete Email Accounts and Blog Activity

To truly stay deleted yourself, your email account has to go. This is an important step, as your email contains a lot of personal, financial, and trivial information about you.

Also, blogs, posts, and comments contain personal thoughts and opinions which you might not want out in the open. So all those email accounts, online blogs, and forums you have subscribed to, whether active or not, must be deleted. Run your details through several search engines to find any old accounts you have in case you missed any.

Some of these forums make it difficult to delete past comments, so the best alternative is to go back and trace all and edit each.

By Keyede Erinfolami

Sourced from MUO

 

 

By

In the US, an estimated 40% of adults block online ads on PCs or phones.

While Facebook and Apple tussle over the harms and benefits of online advertising, more and more of us are sidestepping the issue by blocking ads completely. Use of ad blocking software like web browsers is surging, especially on smartphones, a study published Monday concludes.

The number of people using ad blockers has remained mostly level on personal computers, with 257 million people using them monthly by the end of 2020. But it’s on mobile devices where ad blocking is really increasing, doubling over the last five years, from 282 million to 586 million at the end of 2020, according to the 2021 PageFair Adblock Report from ad tech firm Blockthrough. That’s a 10% increase over the 2020 PageFair report on ad blocking.

Blockthrough makes money by helping advertisers try to cope with ad blocking. It offers a system to try to persuade website users to opt into delivery of the less intrusive system called Acceptable Ads. Though the ads might not be as distracting, they still face criticism that they they enable tracking, the central issue in the dispute between Apple and Facebook.

Advertising has funded countless online sites besides the dominant beneficiaries, Facebook and Google. Indeed, it propelled much of the foundation of internet businesses. But Apple’s privacy-first stance and the increasing use of ad blockers show major pushback to the approach.

Use of ad blocking software is increasing on mobile devices, a study by Blockthrough found.
Use of ad blocking software is increasing on mobile devices, a study by Blockthrough found. Blockthrough

Blockthrough also funded a survey of 5,423 Americans to gauge their opinions on online ads. One conclusion: About 40% of US adults use an ad blocker, more than twice what publishers often report based on ad-blocking detection software, Blockthrough said.

The top reason for blocking ads was to avoid interruption and annoyance, with 81% of survey respondents selecting that as a motivation. The second-place reason was protection against malware, at 62%. Third place, at 58%, was privacy.

To estimate ad blocker use globally, Blockthrough based its PC figures on downloads of the ad-blocking address list from Eyeo, maker of the Adblock Plus browser plugin. Its mobile ad blocking use was chiefly from download figures and app developer disclosures about usage. The top ad-blocking browser remains UC Browser, still with an estimated 310 million users despite bans in India and more recently China.

Feature Image Credit: Ad blocking is surging on smartphones with the use of browsers like UC Browser and Brave. Eyeo; Illustration by Stephen Shankland/CNET

By

Sourced from C/Net

Channel 4 and Virgin Media are adopting Sky’s AdSmart advertising system. Sky says it can put viewers into groups of 5,000 or more based on age, location, lifestyle, and “even if they have a cat”

Personalised advertising already stalks us across the web, and it’s coming to our TVs, with Channel 4 the latest broadcaster signing up to use Sky’s AdSmart to target commercials. While such a system isn’t quite as invasively personalised as the behavioural advertising clogging up the internet in order to show us shoes we’ve already bought, it could have a big impact on television – and risks being rather creepy.

AdSmart is Sky’s system for targeted, addressable ads, which are commercials that can be swapped out and personalised based on location or other personal data – even in live-broadcast, linear TV. Sky has used the platform on its own channels since 2014, and has this year signed up Virgin Media and Channel 4 to do the same.

For viewers, the benefit is not being shown irrelevant ads – Sky won’t show you ads for its broadband if you’re already a customer, for example – and Sky points to research that suggests there’s a 48 per cent drop in channel switching when such targeted ads are shown. For businesses, small companies can target a specific, hyperlocal catchment area rather than throw away money on nationally shown commercials, opening up TV advertising to smaller companies.

And for broadcasters, the benefit is they can charge more, perhaps as much as ten times more, for what they say are more effective ads – helping to claw in more cash as advertising revenues stall. “Better targeting can be beneficial for both advertisers and viewers: it can not only increase ad return on investment for advertisers, but also deliver more relevant information to viewers,” says Yiting Deng, assistant professor of marketing at UCL. Richard Broughton, researcher director at Ampere Analysis, suggests by a rough estimate it could bump revenue at Sky by as much as 10 per cent and across the wider industry by 2 per cent – it’s positive for broadcasters, but its financial impact is limited.

No wonder then that targeted television ads are already in use with on-demand services; Channel 4 earlier this year rolled out a tool letting brands use their own data to match ads to audiences. But swapping out ads is a bit more difficult with live television. “The key technology is combining what is called addressable advertising, which is personalised, with programmatic systems, which is enabling the purchasing of ads automatically,” says James Blake, director of the Centre for Media and Culture at Edinburgh Napier University.

According to Sky, AdSmart turns your set-top box into a local ad server, downloading and storing commercials deemed relevant based on the data the company holds on you. When watching an AdSmart-enabled channel, those ads will be swapped into the commercial break spot; if there are no AdSmart ads available – or you’ve opted out – a generic commercial is shown instead.

To do this, AdSmart and broadcasters that use it require data about viewers. That could be limited, as a local small business could target a handful of postcodes, with a different ad shown to everyone else, with no personal information required. Sky says that location is a key attribute, though there are thousands more, noting that Huddersfield Town Football Club advertises season tickets locally; there’s not much point in showing that commercial to football fans in Scotland, after all. Location can also be used to target ads more carefully using demographic information; if a neighbourhood is more likely to have family homes, showing ads targeting parents makes more sense.

But targeting those ads more precisely – such as showing pet food ads only to those with cats and dogs – requires more data, which broadcasters purchase from third-party data brokers. Sky, for example, says it can select viewers in groups of 5,000 or more based on age, location, lifestyle, and “even if they have a cat”, using Sky’s own customer data, information provided by the company wishing to advertise, and data bought in from third-party brokers such as Experian, Dunnhumby, CACI, 20ci, Mastercard, Emma’s Diary, and Game. Companies such as those have already been targeted with GDPR complaints for exploiting our personal data and selling it on to marketing companies. If you want to know what data Sky et al have gathered on your family, you can file a subject access request.

Technically, it’s possible to make addressable ads more tightly personalised than those groups of 5,000 used by AdSmart, but there’s a danger that could put viewers off, notes Blake. “I think TV companies and broadcasters need to be careful how they use personalised advertising,” he says. “There’s a risk these adverts can be creepy.” Blake points to an experiment in 2017 when viewers on the Channel 4 app were shown adverts with their own names, which some people found “a little bit creepy”, he says.

There’s another reason TV commercials aren’t likely to get quite as personal as online ads: they cost more to make. “You’ve got additional costs for producing high quality TV adverts – the creative process in itself is quite expensive,” Broughton says. “So this is about refining your spend, as opposed to micro targeting a specific segment.”

While there’s merit in avoiding ads for products you’d never buy, such targeted ads could also be used for political marketing – and that raises concerns for democracy when we’re not all seeing the same message, though Blake notes that broadcast television advertising in the UK is heavily regulated. “That’s one of the big reasons why TV is trusted in the way it is,” he says. “But we need to be aware of the risks because TV adverts can be hugely powerful and we don’t want political campaigns and parties to misuse that. There is a danger that you end up in a bubble of like-minded people with like-minded messages, and don’t get exposed to sentiments on the other side.” However, in the UK, such commercials are banned, with unpaid allocated spots given to the parties instead.

And that’s another reason TV ads aren’t likely to be as invasive as online counterparts: they’re heavily regulated. Broadcasters face tighter regulation than online advertisers, and GDPR should limit how personal data is repurposed for marketing. “Addressable advertising in TV took a hit when GDPR came on board,” says Blake. “Before GDPR, there was a lot of discussion about how cookie data [from web browsing] could feed into adverts. And I think GDPR made that process take quite a big hit.”

Both Sky and Channel 4 say they follow GDPR’s rules, and both allow viewers to opt-out of AdSmart, with Sky adding that any “special category data”, such as information about your health, needs consent to be processed by AdSmart.

If such ads do come off as creepy, you can opt out – and not only of AdSmart, but the broadcasters themselves, something they’ll be wary of. As Broughton notes, angering customers doesn’t have much value to broadcasters such as Sky that can cost up to £70 a month. “It’s not worth jeopardising that to get a few extra pence out of an advertiser,” he says, predicting that “they’ll err on the side of caution.”

Feature Image Credit: Getty Images / WIRED

Sourced from WIRED