Search This Blog

Powered by Blogger.

Blog Archive

Labels

Showing posts with label Data tracking. Show all posts

The Extent of Data Surveillance in Modern Smart TVs

 


Several years ago, smart TVs started to become popular choices in households. They are widely available now and provide a wide range of features and applications that make them an excellent choice. To stay competitive, users will be inclined to purchase more internet-connected devices to benefit from the convenience and extensive range of options that they provide. 

Although smart TVs and other smart home devices may seem like a great idea, it's necessary to factor in the risks that could arise from them. Several new studies have found that smart TVs, including those from Samsung and LG, are constantly monitoring the activity of their users on their screens, taking screenshots as often as every 10 milliseconds when they use their TVs. 

Moreover, this technology is called Automatic Content Recognition (ACR) and it is capable of capturing images and audio from users' TV screens to recognize what's on it, and then use that information to display targeted ads based on what's on screen. While smart TVs are incredibly convenient, they do come with one big downside: privacy concerns when it comes to their usage. 

As mentioned before, these devices are capable of collecting and transmitting user data to third parties, including information about viewing habits and the device used. Adaptive Content Recognition technology, commonly found in smart TVs, confirms these concerns by tracking and using the viewing habits of users to show targeted advertising to them. There is a growing concern among companies about the safety of their personal information, due to the recent BoAt data breach, which has raised concerns about how their data can be inappropriately used. 

BoAt has reported to have suffered a breach of Personal Identifiable Information (PII), including the private information of over 7.5 million customers, making the details available for sale on the dark web as a result of this breach. Moreover, this should also come as a warning to users that the resultant leak is not only compromising their sensitive user data but also poses a serious threat to their bank accounts as well as any other confidential information they may possess. This study's results indicate that smart TVs do collect quite a bit of data when they are used. This includes overall data regarding how long people watch linear TV shows, streaming movies and TV shows, how long they play games, and how long certain content is watched. 

As a result of all of this data being gathered, a unique digital fingerprint is created, which is sent back to the manufacturer's servers for storage and analysis, which is then sent to the manufacturers. There is no doubt that this is excellent news for users, and manufacturers, because, based on the viewing behaviour of each smart television, they can draw precise conclusions about our viewing habits. A study published by the MIT Media Lab found that smart TVs don't simply analyze network traffic to determine what users are watching, but they also take screenshots of the display at regular intervals to analyze what users are watching. 

Several privacy concerns have been raised concerning Microsoft’s Windows Recall feature, which has been deeply criticized over security concerns concerning it. Several factors determine the type of data that users' smart TV collect, including its brand, manufacturer, and model. According to Toby Lewis, global head of threat analysis at cybersecurity company Darktrace, most smart TVs can collect audio, video, and television usage data through the collection of GPS and other tracking devices. One of the features of these devices that is capable of generating significant amounts of data is voice activation. 

As the microphones and software add a listen for instructions, they can also capture other sounds within a hearing range, such as conversations and other sounds. A third party may be asked to analyze these recordings and they may be sent to them for analysis. In addition to cross-device tracking, other factors need to be considered as well. Taking the data that users' smart TVs collect and combining it with other smart devices such as mobile phones, laptops, and home automation gear, Fielding believes that the data collected will be more valuable to users' businesses. 

A profile can be built by using various data sources, including geolocation, web browsing activity, and social media information, that allows an individual to be characterized in more detail. Furthermore, some cookies and trackers are placed on users' computers. Smart TVs are now able to track, identify, and track users by using cookie- or pixel-tracking technologies in the same way that websites do. Cookies allow users to be identified for target marketing purposes. 

As Fielding warns, most apps installed on users' smart TVs will be sharing their personal information with a vast array of advertisers and data brokers, so they need to be careful. To stay protected, it is important to stay current on the latest developments in Smart TV security to stay on top of any potential threats. Keep abreast of security threats and fixes by attending webinars, reading articles, and following experts in the field to ensure users are always up-to-date. It is important to educate users about their Smart TVs to keep it safe from hackers and keep themselves one step ahead of the hackers.

An Unusual Tracking Feature Identified on Millions of iPhone Users

 

Millions of iPhone users across the globe discovered an interesting new setting that was automatically switched on in their iPhones. The latest software version included a new setting called "Discoverable by Others''. It can be located under 'Journalling Suggestions' in iPhone's privacy and security settings. Journalling Suggestions was included in the new Journal app, which was launched with iOS 17.2 in December 2023. 

When enabled, the feature accesses past data stored on the user's iPhone. Music, images, workouts, who they've called or texted, and significant locations are all included in the data. It is used to suggest what times to write about in the Journal app.

The feature is enabled by default and stays so even after a user deletes the Journal app. According to Joanna Stern, a senior personal technology correspondent for The Wall Street Journal, Apple has confirmed that customers' phones can use Bluetooth to locate nearby devices associated with their contact list. However, the phone does not save any information about the detected contacts. This feature offers context to enhance Journalling suggestions.

The firm has also denied disclosing users' identities and locations to anyone. To clarify their point, Apple provided an example of holding a dinner party at your home with pals listed in your contacts. According to the tech behemoth, the system may prioritise the event in Journalling Suggestions. This is because it recognises that the number of guests made it more than just another night at home with your family.

As per Apple's support page, if you disable the 'Discoverable by Others' option to avoid yourself from being counted among your contacts, the 'Prefer Suggestions with Others' feature will also be turned off. This implies that the Journalling Suggestions feature will be unable to determine the number of devices and contacts in your vicinity.

Kiosks in Brookline is Tracking Cell Phone Data

 

Data is everywhere. It is at your fingertips. It's all over town, yet your info may be shared around without your knowledge. Brookline put digital signs throughout town, which have gotten people talking since they are collecting individual cell phone data. 

Glen Gay, who was passing by one of the Washington Street kiosks, stated, "I guess everything is tracked in today's world whether you like to or not." "I am just a little curious what they are doing with the data?” 

Brookline.News initially reported on the kiosks, which are created by a local US company called Soofa. They display a wide range of information, including bus arrival times and local activities. The boards contain sensors in the kiosks that detect a unique identity in your phone when WiFi is turned on. The company claims that the data is encrypted before it is delivered to their data site. The information helps the city in tracking how often people cross the boards. 

Town officials said the data will help them determine the size of the audience the board is reaching. The town hopes to use the boards to send out localised messages ahead of the Boston Marathon. The foot traffic data will also help them learn how many people visit the kiosks throughout the marathon, allowing them to better adapt the board content to high-traffic regions next year. Phone users will not see a prompt indicating that the kiosk is keeping track of their data.

"I linger here 10 to 15 minutes a day, so knowing that freaked me out a little bit," stated Jenna Woods, as she sits near a kiosk. "I wish that it was more public knowledge. I mean, I have nothing to hide, so they can collect as much as they want. Will it be interesting? Probably not.” 

Cyber experts claim that, contrary to popular belief, all of this is completely legal. Usually, the data they monitor is broadcast data from a mobile device.

"It says I am here, and a clock that says I am here for a certain period of time. There is no personal identifiable information," notes Peter Tran, Chief Information Security Officer with the IT security firm Infersight. "With cell phones, users have to be aware that you are broadcasting out certain types of information, so the cell towers can authenticate you and know it's your cellphone. What you are normally broadcasting is some basic information about your hardware, your place in the network of AT&T, Verizon, T-Mobile.” 

Tran claims that while these are individual bits of public information, integrating them can be financially beneficial. Soofa claims that no data correlation is performed, nor that any data is sold to a third party. Only your phone's unique identification is collected. To avoid collecting, Tran recommends turning off your WiFi while you are not using it. The same goes for your Bluetooth.

Rise of Bossware: Balancing Workplace Surveillance and Employee Privacy

 

The emergence of 'Bossware' or staff surveillance software in recent years has been a troubling trend in offices all around the world. Bossware refers to a collection of devices and software that give employers the ability to track, keep an eye on, and even automate the administration of their workers. While advocates claim that these tools boost output and expedite processes, others raise severe concerns about privacy invasion and abuse possibilities.
Employee monitoring software, which enables businesses to closely monitor their employees' digital activity throughout the workday, is one such tool that is growing in popularity. These tools can monitor time spent on particular tasks as well as emails and website visits. According to a report by StandOut CV, 75% of UK employees have experienced some type of employee monitoring, which causes understandable discomfort and tension among workers.

Bossware is being used more frequently throughout numerous industries, not just in a few exceptional instances. The use of intrusive worker monitoring technologies is growing, and without sufficient regulation, it might spiral out of control, according to research by the TUC (Trades Union Congress). More than ever, employees feel the pressure of constant scrutiny and worry about the repercussions of every digital action.

Critics argue that such extensive monitoring undermines trust within the workplace and fosters an environment of constant pressure. A joint effort by the Center for Democracy & Technology (CDT) and the Global Financial Integrity (GFI) has raised the alarm, warning the White House of the risks of workplace electronic surveillance. They emphasize that this surveillance can lead to an abuse of power, and individuals may be subjected to disciplinary actions for seemingly innocent online behaviors.

The effects of this phenomenon extend beyond the digital sphere. The productivity of warehouse workers has occasionally been tracked using physical monitoring devices, such as Amazon's Time Off Task system. Workers have expressed concerns about being treated like robots and not receiving even the most basic privacy, as reported by Reuters, and this surveillance has drawn a lot of criticism.

Employers' efforts to boost productivity and safeguard corporate assets are sensible, but it's important to strike a balance between surveillance and employee privacy. Jenny Stevens, a privacy advocate, cautions that "it's important for employers to recognize that employees are not just data points but human beings deserving of respect."

Organizations and policymakers must collaborate to set precise rules and laws regulating the use of Bossware in order to allay these worries. With the correct supervision, these tools can be utilized responsibly without jeopardizing the rights and welfare of the employees.

Apple Accused Over Monitoring Users' Behavior Without Consent


According to a lawsuit, despite the fact that settings on Apple's iPhones and other devices are designed to prevent any tracking or sharing of app data, the corporation nonetheless collects, tracks, and monetizes user details even after users have turned off sharing.

When using the App Store app on iOS 14.6, each click users make is recorded and given to Apple, according to the thread posted last week by the Twitter account Mysk, which is maintained by two developers in Canada and Germany. 

The developers assert that this occurs regardless of users’ preferences and settings. The developers claim that "opting out or switching the personalization options off did not decrease the amount of detailed data that the app was transmitting." Apple provides a number of toggles designed to limit tracking.

In a follow-up report by Gizmodo, the developers discovered that although the privacy toggles, a number of additional apps, including Music, TV, Books, the iTunes Store, and Stocks, all transferred data to Apple. The site claims that the majority of the apps that transmitted analytics data shared constant ID numbers, which would allow Apple to follow user behavior across its services like the Health and Wallet apps.

Elliot Libman, the plaintiff, alleged  Apple's assurances that users have control over the data they provide when using iPhone apps are factually false and in violation of the California Invasion of Privacy Act.

The thread also notes how ironic Apple's alleged surveillance appears given that strong controls were introduced in iOS 14.5 to stop third-party developers from tracking users against their own will. Although the iOS 14.6 operating system has been around for more than a year, the researchers said they observed identical apps sending comparable data packets when using iOS 16.

Google, Facebook tracking porn preferences of users








Researchers at Microsoft, Carnegie Mellon University, and the University of Pennsylvania found out that Google and Facebook are tracking users porn consumption data, even in incognito mode. 

The experts analyzed 22,484 porn sites and 93 percent of them send data to several domains that are owned by third-party companies.

“[E]veryone is at risk when such data is accessible without users’ consent, and thus can potentially be leveraged against them,” write the authors. “These risks are heightened for vulnerable populations whose porn usage might be classified as non-normative or contrary to their public life.” 

According to the study, Google is the No.1 company who receives data from the third parties. The research found that Google or its subsidiaries had trackers on 74% of the pornography sites, while  Facebook had trackers on 10% of the sites. 

“[M]any sites and apps include code from other parties of which users are typically unaware,” the authors say. “Such ‘third-party’ code can allow companies to monitor the actions of users without their knowledge or consent and build detailed profiles of their habits and interests.”

Only 17 percent of all the analyzed sites in the research sample were encrypted. More ever, 49.97 percent of porn site URLs expose or strongly suggest the identities, sexual orientation, and intimate interests of visitors.

“[T]hese porn domains contain words or phrases that would likely be generally understood as an indicator of a particular sexual preference or interest inherent in the site’s content,” the researchers say. [T]hese might also likely be assumed to be tied to the user accessing that content.”

The study found that only 17 percent of porn sites have a privacy policy and encrypted data transfer. 


“The policies were written such that one might need a two-year college education to understand them,” the authors note.