Apple's illusion of privacy, the social media impact on the Afghanistan turmoil, and other news

Privacy


Last week there were two big stories about privacy – the ongoing controversy about Apple’s photo scanning feature, and the impact of social media on the turmoil in Afghanistan.


As the discussion continues, Apple’s Illusion of Privacy Is Getting Harder to Sell. Their photo-scanning plan faces global backlash from 90 rights groups who request Apple abandon plans to scan devices for child abuse imagery. As the underlying technology is being disputed Apple Defends Its Anti-Child Abuse Imagery Tech After Claims of ‘Hash Collisions’ and promises to tune CSAM system to keep one-in-a-trillion false positive deactivation threshold. And then we hear that Researchers say they built a CSAM detection system like Apple's and discovered flaws leading them to abandon their system.


As the events in Afghanistan evolve, Social platforms wrestle with what to do about the Taliban as the Taliban Turned Social Media Into a Tool for Control In an attempt to protect their users, Clubhouse removed personal info from Afghan users' accounts as a safety measure. In addition, Facebook hides friends lists on accounts in Afghanistan as a safety measure and also launches tool to help people in Afghanistan lock down their accounts. More broadly, Taliban websites operating in five languages go dark


The fact that The Taliban Have Seized U.S. Military Biometrics Devices illustrates the privacy risk as these technologies and the associated databases fall into the wrong hands.


In the US, Senators challenge TikTok’s ‘alarming’ plan to collect users’ voice and face biometrics. At the same time, though, Justice Department says facial recognition helped end an almost 15-year manhunt. Beyond biometrics, Google says geofence warrants make up one-quarter of all US demands.


In a push to collect more data on its drivers, Amazon is using a custom logging device to track the trucks moving its freight


With all the recent discussions about privacy, it’s hard to keep track of what laws and regulations apply where. Here’s a helpful summary: Data privacy laws by state



Security


A Third of Global Companies Have Experienced Ransomware Attack, Survey Finds, here are some high profile recent ones

For those hit, Ransomware recovery can be costly, and not just because of the ransom


While This amateur attack shows how clueless criminals are trying to get in on the action, the attack technologies are evolving:

Trying to stem the tide, Microsoft takes a stake in Rubrik to combat ransomware


With one of the most notable recent attacks, T-Mobile: Hackers Accessed Data on More Than 53 Million People where T-Mobile Confirms Customer Social Security Numbers Were Hacked. Now, T-Mobile Faces Class Action Lawsuit Over Massive Data Breach


In other security news

A series of cybersecurity disasters has us finally paying proper attention. Hmmm, have we heard this before? When is enough enough?



Regulation


FTC files amended antitrust complaint against Facebook, stating that Facebook has been a monopoly ‘since at least 2011’ in amended antitrust complaint, and that Facebook was bad at business, so it “illegally bought or buried” competition


Looking to prevent competition, Google gave phone makers extra money to ditch third-party app stores


While Amazon Is Telling Sellers That Antitrust Bills Will 'Significantly' Harm Them, an Expert suggests current antitrust approach to reining in big tech is simply not working. Room for improvement on all sides!


The Government Is Finally Catching Up With Tesla's Wild Autopilot Claims with the NHTSA examining them. In addition, Two senators urge the FTC to investigate Tesla over ‘Full Self-Driving’ statements


Starting out, the great promise of Crypto was that it was beyond regulation. Now we hear that Regulating crypto is essential to ensuring its global legitimacy


China pushes through data protection law that applies cross-border , just like the EU GDPR. However, it is not surprise that there is a Big, Government-Sized Loophole .

7 views0 comments