AXEL Network Products:

AXEL GO - share and store files securely.

LetMeSee - photo sharing app.

  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer

AXEL.org

  • Network
  • Technology
  • Applications
  • Blog
  • About
    • Team
    • Press
    • Careers
    • Patents
  • Contact Us
  • Login
    • AXEL Go
    • AXEL Cloud

Blog

October 1, 2021

Devastating Data Breaches – Part 1: The Hard Fall of Yahoo

Data breaches can affect any business. It’s an unfortunate fact, but in today’s digital world, there are so many technologically savvy criminals who seek to make money and wreak havoc upon millions. Cyberattacks can affect anyone, from the smallest neighborhood shop to the largest multinational corporations. However, while small businesses are affected constantly, the data breaches that affect large corporations are the ones that receive the most news coverage. And while the number of cyberattacks has risen in recent years, no incident comes close to the number of victims as the back-to-back data breaches Yahoo faced in 2013 and 2014.

In honor of Cybersecurity Awareness Month, AXEL is writing about some of the worst leaks, data breaches, and ransomware attacks in history. Follow along all October long to learn about what went wrong, what could’ve been done, and how companies responded to devastating data breaches. 

The History of Yahoo

From the late 1990s until the late 2000s, Yahoo was among the giants of Silicon Valley. Although the company never dabbled in hardware, it focused on one utility: Web services. And in the early years of the Internet, no one did web services better than Yahoo. Following in the footsteps of AOL, Yahoo’s first business model was organizing new web pages into categories in the early 1990s. When this proved successful, Yahoo quickly expanded into other web services, including email, instant messaging, news, and games [1]. With these services, Yahoo truly hit the mainstream. Throughout the 2000s, Yahoo remained popular, but began to lag behind tech newcomers like Google, Facebook, and their suites of web services. Following years of underperformance, Yahoo was struggling in the early 2010s. Unfortunately, Yahoo’s problems were only just beginning.

The Breach(es)

In August 2013, an unknown third party gained access to Yahoo data, making away with names, birth dates, phone numbers, and poorly encrypted passwords [2]. For three years following the breach, Yahoo was unaware of this unauthorized digital theft. However, in August 2016, Yahoo accounts were seen for sale on the dark web. Later, three separate buyers bought this stolen data for USD $300,000. To this day, Yahoo and federal investigators do not know the culprit of the 2013 hack [2].

In addition to the 2013 breach, Yahoo faced another cybersecurity crisis just a year later. In December 2014, Yahoo fell victim to another data breach, losing usernames, phone numbers, passwords, and security question answers to at least 500 million Yahoo accounts [3]. It was later revealed that the hack was the responsibility of four men hired by Russia, who sought the personal information of American intelligence officers [3]. 

In contrast to the 2013 breach, however, Yahoo executives were made aware of the hack soon after it occurred. Even when Yahoo was set to be acquired by Verizon in 2016, the company stated that it was aware of only four minor breaches [4]. Even in June 2016, Yahoo’s security team was aware that hundreds of millions of accounts were compromised, yet the company failed to inform Verizon or the public until September 2016.

The Fallout

Finally, in September 2016, Yahoo announced to Verizon and the public its knowledge of the 2014 breach. At the time, Yahoo estimated that 500 million accounts were compromised in the attack. In December 2016, Yahoo became aware of the 2013 attack and announced that an estimated one billion accounts were affected by the incident. While an estimated 1.5 billion compromised accounts is a nightmare for any business, the hacks and fallout occurred during a time of turmoil and transition for Yahoo. In fact, after the announcement of the 2014 hack, Yahoo lowered its purchase price to Verizon by $350 million [4]. Unfortunately, the news soon got worse for Yahoo. The company’s initial estimate of affected accounts was far from the true scale of the breaches.

In October 2017, Yahoo announced that all of its accounts were compromised in the two hacks. Over 3 billion accounts were ultimately affected by the breaches. Following the public reveal of the 2013 hack, Yahoo forced all of its users to change their passwords [5]. While this was a smart, necessary step, much of the damage had already been done. Usernames, phone numbers and birthdates were, unfortunately, already vulnerable.

Following the revelations of the breaches, Yahoo faced serious scrutiny from consumers and investigators alike. Following investigations, Yahoo was fined USD $35 million by the Securities and Exchange Commission (SEC) not for the breaches themselves, but for failing to disclose its knowledge of the 2014 breach until two years later [4]. In fact, this was the first time the SEC ever fined a public company for failure to disclose knowledge of data breaches. Additionally, Yahoo settled a class-action lawsuit for USD $80 million. Ultimately, Yahoo was punished for the cover-up, rather than the actual breaches. Unfortunately, the steep punishment simply did not outweigh the damage done to Yahoo and its customers.

Protecting Your Data

Although October is designated as Cybersecurity Awareness Month, true protection from data breaches and cyberattacks requires a year-long commitment. That’s where AXEL Go comes in. AXEL Go is a secure file-sharing and storage software that prioritizes data protection. Offering military-grade encryption and decentralized blockchain technology, AXEL Go is the best way to protect yourself or your business from cybercriminals. Put simply, your vital information deserves the best protection. If you’re ready to try the best protection, get two free weeks of AXEL Go here. 

[1] Greenberg, Julia. “Once Upon a Time, Yahoo Was the Most Important Internet Company. Now It’s Struggling.” Wired. November 23, 2015. https://www.wired.com/2015/11/once-upon-a-time-yahoo-was-the-most-important-internet-company/.

[2] Perlroth, Nicole. “All 3 Billion Yahoo Accounts Were Affected by 2013 Attack.” The New York Times. October 03, 2017. https://www.nytimes.com/2017/10/03/technology/yahoo-hack-3-billion-users.html.

[3] Goel, Vindu, and Eric Lichtblau. “Russian Agents Were Behind Yahoo Hack, U.S. Says.” The New York Times. March 15, 2017. https://www.nytimes.com/2017/03/15/technology/yahoo-hack-indictment.html?_r=0.

[4] “The Hacked & the Hacker-for-Hire: Lessons from the Yahoo Data Breaches (So Far).” The National Law Review. May 11, 2018. https://www.natlawreview.com/article/hacked-hacker-hire-lessons-yahoo-data-breaches-so-far.


[5] Goel, Vindu, and Nicole Perlroth. “Yahoo Says 1 Billion User Accounts Were Hacked.” The New York Times. December 14, 2016. https://www.nytimes.com/2016/12/14/technology/yahoo-hack.html.

Filed Under: Business, Cybersecurity Tagged With: big tech, cybersecurity, data breach, hackers, russia

September 24, 2021

Everywhere is the New Office: The Rise of Digital Nomads

At the beginning of the COVID-19 pandemic, the transition to at-home work was swift. Never before had so many workers been forced to work from a new location, with new software to learn, in such a short period of time. But after a few months of at-home work, a weird thing happened: Workers began to adore remote work compared to the traditional office. Although it took getting used to, now, 77% of workers prefer working remotely versus working in an office [1]. But now, with the pandemic under (some) control, workers are still figuring out ways to continue working from anywhere. This desire has led to an increase of “digital nomads” across the country, and the world.

Digital nomads are location-independent workers who travel often, while still getting work done due to consistent Internet availability. While digital nomads are nothing new, the popularity of the practice exploded during the pandemic. In fact, in 2020, the number of digital nomads in the United States reached 10.9 million, up 50% from 2019 [2]. With more businesses offering indefinite remote work, the practice will likely spread further as well. Because of its ever-growing popularity, it’s fair to ask: Is this the future of work? 

Why do Digital Nomads Love Their Jobs?

First and foremost, digital nomads (and at-home workers in general) like their work method because it allows a better work-life balance [3]. This includes taking more breaks, feeling less pressure and no more commutes. All of these perks are quite beneficial for remote workers, including digital nomads. It allows workers to continue earning an income, while also saying goodbye to some of the more stressful facets of traditional office jobs. For many of these digital nomads, remote work is a no-brainer. After all, if offices allow for remote work, why not enjoy these perks? The problem, however, is that not all offices want remote work to become permanent.

Numerous prominent business leaders have voiced their opposition to permanent remote work. Netflix co-CEO Reed Hastings stated that he sees “no positives” regarding remote work, and Goldman Sachs CEO David Solomon said that remote work was “an aberration we’re going to correct as soon as possible [4].” So while remote work offers a multitude of benefits to digital nomads, it isn’t guaranteed their lifestyle will last forever. While some business leaders, such as Mark Zuckerberg [4], have sung the praises of remote work, the practice is far from universally admired.

However, it won’t be easy to rope digital nomads back into the office. After all, remote workers have the leverage right now. In 2020, efficiency actually increased, even though workers had to navigate the newfound difficulties of remote work [5]. With this information in mind, workers know that they are valuable, efficient employees. More importantly, business leaders know they are valuable and efficient as well. So while anti-remote work CEOs may want a return to the traditional office, making it a requirement risks losing employees to businesses more open to remote work.

The Digital Nomad Economy

Even some businesses have begun to market themselves to digital nomads. For example, Airbnb has shifted its focus from short-term vacation rentals to longer-term “workcations.” In fact, the number of long-term Airbnb stays nearly doubled in 2020 compared to 2019 [2]. And with more businesses becoming open to permanent remote work, this sector of the economy will continue to grow, adding even more benefits to remote work.

Put simply, remote work offers significantly more freedom for workers compared to office work. And for digital nomads, it’s about more than just freedom of location. Working remotely allows employees to get their tasks done on their time. With no supervisors looking over your shoulder or gossipy coworkers to worry about, employees can focus more on their work. With this increase of personal freedom for workers, it’s no wonder why efficiency jumped in 2020.

The Drawbacks of Remote Work

However, with this freedom comes responsibility as well. Without a boss or coworkers to surround you during work hours, temptations can arise. After all, what’s stopping workers from taking a two-hour break in the middle of the day? Additionally, remote work can actually cause worse work-life balance as well, as the lines between home-life and work-life can be blurred. Finally, security could be compromised by remote work as well. In fact, that’s partially why Apple CEO Tim Cook has been so enthusiastic about a return to offices [6].

Remote work offers a myriad of benefits for workers, with just a few drawbacks. Thankfully, there are ways to mitigate those drawbacks, particularly regarding security. Even better, most of these techniques are simple for remote workers, no matter where they are. First, ensuring that your software is up-to-date is the best (and easiest) way to protect yourself and your business. Bad actors typically attack through older versions of software, so keeping it up-to-date will minimize the risk of you becoming a target. Next, avoiding public wi-fi networks is another key tip. Public networks are prone to malware and can infect your computer, harming you and your business.

Protect Yourself with AXEL

Finally, using a secure file-sharing system is key to protecting your most vital files from data breaches and ransomware attacks. That’s where AXEL Go comes in. Offering industry-leading encryption and decentralized blockchain technology, AXEL Go is the best way to protect yourself and your business from unauthorized cybercriminals. In a world where remote work is becoming the norm, secure file-sharing is a necessity for any business. If you’re ready to try the best protection, get two free weeks of AXEL Go here. 

[1] Ballard, Jamie. “Most Remote Employees Don’t Want to Return to the Workplace after the Pandemic.” YouGov. January 19, 2021.  https://today.yougov.com/topics/economy/articles-reports/2021/01/19/remote-employees-work-from-home-poll.

[2] Lufkin, Bryan. “Is the Great Digital-nomad Workforce Actually Coming?” BBC Worklife. June 15, 2021. https://www.bbc.com/worklife/article/20210615-is-the-great-digital-nomad-workforce-actually-coming.

[3] Courtney, Emily. “The Benefits of Working From Home Beyond the Pandemic: FlexJobs.” FlexJobs Job Search Tips and Blog. September 03, 2021. https://www.flexjobs.com/blog/post/benefits-of-remote-work/.

[4] Kelly, Jack. “How CEOs And Workers Feel About Working Remotely Or Returning To The Office.” Forbes. March 19, 2021. https://www.forbes.com/sites/jackkelly/2021/03/19/how-ceos-and-workers-feel-about-working-remotely-or-returning-to-the-office/.

[5] Curran, Enda. “Work From Home to Lift Productivity by 5% in Post-Pandemic U.S.” Bloomberg.com. April 22, 2021. https://www.bloomberg.com/news/articles/2021-04-22/yes-working-from-home-makes-you-more-productive-study-finds.

[6] Ryan, Kevin J. “Why Apple Employees Are Objecting to the Company’s Remote Work Rules.” Inc.com. July 20, 2021. https://www.inc.com/kevin-j-ryan/apple-employees-letter-return-to-office.html.

Filed Under: Business, Lifestyle Tagged With: business, digital privacy, hybrid office, remote work, Travel

September 17, 2021

Convenient or Monopolistic? Epic’s Challenge to Apple’s “Walled Garden”

On August 13, 2020, Epic Games, the developer and publisher of the massively popular online game Fortnite, tried something that most companies would be too scared to do. They picked a fight with Apple. On that day, Epic announced a 20% discount on “V-Bucks,” Fortnite’s in-game currency, but only if they purchase it directly from Epic, rather than through Apple’s App Store.

This was an intentional violation of Apple’s terms of service, as Apple takes a 30% commission of all in-app purchases, and Epic wanted that extra money for itself. Within hours, Apple took Fortnite off the App Store for violating its terms of service, with a lawsuit by Epic quickly following [1].

On September 10, 2021, that lawsuit received a ruling. The judge sided with Apple on nine of ten counts, but ordered Apple to loosen restrictions on alternative payment options [2]. However, Apple CEO Tim Cook still stated that, even if an app uses a non-Apple payment option, Apple would still invoice the 30% commission [3]. So, what’s next? Epic appealed the ruling, but for now, Apple still maintains tight control over the apps on its App Store. Ultimately, this case highlights the uniqueness of Apple’s software philosophy, and how its relationships with third-party developers frequently draw ire.

A Walled Garden

For years, Apple’s software philosophy has been described as a “walled garden.” This means that Apple’s software is simple, secure, and easy to use for the consumer. However, Apple also strongly dissuades or even forbids users and developers from leaving their walled garden. Apple states that this approach is necessary to protect its users, and also to differentiate itself from Android, a competitor with a more open ecosystem [4]. Ultimately, this leads to increased simplicity for the user, along with increased dependence on Apple software. So while this approach does protect users from dubious third parties, it also entraps users into Apple’s ecosystem as well.

While Apple claims that its walled garden approach is to offer increased security and simplicity for its users, there are other reasons why Apple uses this philosophy. Because Apple has full control of its ecosystem, it can enforce practically any rule it wants. This includes a 30% commission on in-app purchases. Unfortunately, for third-party developers, this means putting up with Apple’s demands or risk getting kicked out of the garden. And that’s exactly what happened with Epic Games.

The Legal Argument

The main conflict of Epic Games vs. Apple focused on whether Apple’s walled garden approach violates antitrust law. Specifically, Apple’s requirement to force users to only purchase in-game items through the App Store, rather than through another party, was used as evidence of monopolistic behavior [2]. On the other hand, Apple argued that they are free to do business (or not do business) with any other company, and that their restriction of third-party payment services was within their rights as a business. Simply put, this case pitted first-party hardware and third-party software developers against one another.

Ultimately, the court ruled with Apple on nine of ten counts, with Epic stating their intention to appeal their decision [2]. In the one ruling against Apple, Judge Yvonne Gonzalez Rogers stated that “Apple created a new and innovative platform which was also a black box. It enforced silence to control information and actively impede users from obtaining the knowledge to obtain digital goods on other platforms. Apple has used this lack of knowledge to exploit its position [2].” However, because the judge ruled in favor of Apple in the other nine counts, few changes are likely to occur.

While there was potential for a landmark ruling that would shake Apple to its core, the actual ruling that was handed down will likely not have a massive effect on either company. The only change Apple must make is to allow developers to use third-party payment services. However, nothing is stopping Apple from collecting the 30% commission from those third-party developers. Ultimately, while this court ruling had the potential for massive change, the judge’s ruling ensured that Apple’s walled garden philosophy will continue.

Security and Your Rights

While Apple argued that its App Store policies were there to protect users, we know that isn’t the main reason for those restrictive rules. Simply put, the purpose of Apple’s walled garden approach is to keep users locked into the Apple ecosystem. While some users do prefer this method, and it can protect users from unsavory third-party developers, it still infringes upon the rights of consumers.

Unfortunately, this philosophy is all too common with Big Tech companies. Sacrificing privacy is a big win for Big Tech, but a huge loss for privacy rights. Corporations continue to collect hoards of personal data to sell to advertisers, while your privacy is violated. With Amazon, Google, and others offering endless new ways to collect your data, it’s fair to ask: Are you the customer, or the product?  

Thankfully, there are businesses that prioritize security and personal rights. That’s where AXEL comes in. AXEL believes that privacy is a human right. With this in mind, we created AXEL Go, a secure file-sharing and storage software. Offering industry-leading encryption and decentralized blockchain technology, AXEL Go is the best way to protect yourself or your business from unauthorized cybercriminals. With AXEL Go, there’s no compromise between security and privacy rights. After all, our business is protecting your data, not collecting it. If you’re ready to try the most secure file-sharing and storage software, get two free weeks of AXEL Go here. 

[1] Statt, Nick. “Apple Just Kicked Fortnite off the App Store.” The Verge. August 13, 2020. https://www.theverge.com/2020/8/13/21366438/apple-fortnite-ios-app-store-violations-epic-payments.

[2] Newman, Daniel. “Does The Epic Ruling Open The Door For Apple’s Competition?” Forbes. September 16, 2021. https://www.forbes.com/sites/danielnewman/2021/09/16/does-the-epic-ruling-open-the-door-for-apples-competition/.

[3] Adorno, José. “Apple Can Still Charge Its App Store 30% Fee Even after Epic Ruling, Analysts Say.” 9to5Mac. September 14, 2021. https://9to5mac.com/2021/09/14/apple-can-still-charge-its-app-store-30-fee-even-after-epic-ruling-analysts-say/.


[4] Beres, Damon. “All the New Ways Apple Is Trying to Take Over Your Life.” Slate Magazine. June 08, 2021. https://slate.com/technology/2021/06/apple-wwdc-ios15-new-features-walled-garden.html.

Filed Under: Business, Legal Tagged With: apple, big tech, law, lawyer, privacy law

September 10, 2021

The State of Privacy Laws in the United States

In recent decades, privacy has become one of the most important issues on the minds of lawmakers. With the rise of digital devices that can track our every move, the desire for privacy is growing in an increasingly public society. And while many Americans have a general desire for “privacy,” the amount you receive is heavily dependent on where you live. While there are some federal privacy laws, most consumer privacy comes from state-level bills. And while some states have thorough, fair privacy laws on the books, the vast majority simply do not.

America’s focus on state-led privacy laws is in contrast to Europe’s lawmaking; the European Union’s main privacy law is the General Data Protection Regulation. Because of this, privacy in the E.U. is governed by this one law, and 92% of companies believe they can comply with every aspect of the law [1]. Because Europe has one overarching privacy law, it is much simpler to understand your privacy rights, whether as an individual or a business. Unfortunately, in the United States though, it is quite the opposite. Privacy laws in the country are currently a mishmash of federal and state laws that confuse and harm individuals simply trying to protect themselves.

A Barrage of State Bills

Simply put, U.S. privacy laws are so unorganized because there are so many of them. Even at the federal level, there isn’t an all-encompassing privacy law, but a collection of specialized laws. For example, the Health Insurance Portability and Accountability Act (HIPAA) protects medical privacy, and the Family Educational Rights and Privacy Act (FERPA) protects students, educators, and schools. When it comes to privacy rights, at least at the federal level, it really depends on your specific situation. Although laws such as HIPAA and FERPA do an adequate job of protecting privacy, they are far too specific to offer comprehensive privacy rights that extend to every facet of life.

While federal-level laws are specific to industries, some state-level laws provide all-encompassing privacy protections. Unfortunately, those state laws are few and far between. Only California, Colorado and Virginia have comprehensive data privacy laws [2]. These laws give consumers notice and choice regarding their data. For example, under these laws, a company must tell consumers if it is selling their data, and must allow consumers to access, move, or entirely delete that data. However, while these laws are certainly a good starting point for true consumer privacy, even these three bills are quite limited in effect.

Why are Privacy Protections so Poor?

While those three states have “all-encompassing” privacy laws, they still have glaring holes in protection. In every state except California, privacy laws specifically exclude a “private right of action,” or the ability to sue a business for privacy violations as an individual. Additionally, Virginia’s law has no civil rights protections and allows businesses to continue the status quo of collecting and selling consumer data [2]. It’s no wonder that Amazon lobbyists wrote the first draft of Virginia’s privacy bill [3].

For other states, the situation is even grimmer. States like Florida, Georgia, and others don’t allow consumers to opt out of data sharing. These two states also don’t even require government entities to ever dispose of your data [4]. Ultimately, most states have few genuine protections for consumers. For the most part, businesses can do whatever they please once they have your data. 

And due to strong lobbying by tech companies, it will likely remain this way in many states [2]. Big Tech companies pay millions each year to lobby lawmakers to write and support laws favorable to them. For example, Facebook spent nearly USD $20 million in lobbying in 2020, while Amazon spent USD $18 million [5]. And while this lobbying doesn’t come cheap, it’s a lot cheaper than allowing consumers to opt out of data sales. Ultimately, the reason why so many states don’t offer comprehensive privacy laws is because Big Tech doesn’t want them. Put simply, Big Tech is willing to pay big money to keep strong privacy laws off the books. 

So, What Can We Do?

In most states, it’s now up to individual businesses and firms to protect consumer data. And while Big Tech is unlikely to change any time soon, other businesses can still fight for consumer privacy. Taking simple steps like encrypting documents and backing up your data offline can substantially better protect your clients’ data. After all, Americans want privacy. By taking steps to protect customers and their data, businesses and firms can offer what Big Tech can’t: True privacy protections for their customers.

At an individual level, supporting businesses and firms that prioritize privacy is the best way to show support for strong privacy laws. Additionally, simply supporting federal or state laws that give genuine privacy rights to consumers is another great way to stand up for privacy rights. Since Big Tech wants to continue the status quo of endless data collection and sales, it’s up to individuals to support businesses and firms that offer what Big Tech can’t.

AXEL Supports Your Privacy

At AXEL, we believe privacy is a right. And unlike the Big Tech companies, we’ll never sell your data to third parties, ensuring your data is only yours. Our file-sharing and storage application, AXEL Go, uses blockchain technology and AES 256-bit encryption to provide the most secure file-sharing system in the industry. Whether for business or personal use, AXEL Go helps protect your (and your clients’) most important files.

Sign up here to receive a free 14-day trial of AXEL Go Premium. After the trial period, you can choose to continue your Premium account for just $9.99/month or use our Basic service free of charge. After all, our business is protecting your data, not collecting it. Together, we can help prioritize privacy rights across the country.

[1] Gooch, Peter. “A New Era for Privacy GDPR Six Months on.” Deloitte. 2018. https://www2.deloitte.com/content/dam/Deloitte/uk/Documents/risk/deloitte-uk-risk-gdpr-six-months-on.pdf.

[2] Klosowski, Thorin. “The State of Consumer Data Privacy Laws in the US (And Why It Matters).” The New York Times. September 06, 2021. https://www.nytimes.com/wirecutter/blog/state-of-privacy-laws-in-us/.

[3] Birnbaum, Emily. “From Washington to Florida, Here Are Big Tech’s Biggest Threats from States.” Protocol. February 19, 2021. https://www.protocol.com/policy/virginia-maryland-washington-big-tech.

[4] McNabb, Joanne, and Paul Bischoff. “Internet Privacy Laws by US State: Does Yours Protect Online Privacy?” Comparitech. July 29, 2021.  https://www.comparitech.com/blog/vpn-privacy/which-us-states-best-protect-online-privacy/.

[5] Tracy, Ryan, Chad Day, and Anthony DeBarros. “Facebook and Amazon Boosted Lobbying Spending in 2020.” The Wall Street Journal. January 24, 2021. https://www.wsj.com/articles/facebook-and-amazon-boosted-lobbying-spending-in-2020-11611500400.

Filed Under: Legal, Privacy Tagged With: big tech, government, legislation, Privacy, privacy law

September 3, 2021

Big Tech’s Big Secret: Why Google and Apple Want Your Data

Two of the biggest tech companies in Silicon Valley have long been rivals. Whether it be iPhone vs. Android or Chrome vs. Safari, Apple and Google have never been on the friendliest of terms. Except for one, massive partnership. This year, Google is expected to pay Apple USD $15 billion to have Google be the default search engine on Safari [1]. At first, this deal seems like a head-scratcher. After all, why would Google pay its biggest rival billions when most already prefer Google as their search engine of choice? Put simply, Google outbids others to ensure other corporations (namely, Microsoft) can’t have their search engines become the default.

In addition to the two companies’ rivalry, there is another reason why Apple and Google’s lucrative partnership is so puzzling. Specifically, the two corporations’ stance on data privacy. In recent years, Apple has highlighted its privacy features extensively, with entire marketing campaigns dedicated to showcasing Apple’s (seemingly) hard-line stance on user privacy. On the other hand, Google’s revenue depends on advertising, and thus, user data. Over 80% of Google’s revenue comes from targeted advertising [2]. Overall, Apple and Google’s partnership shows how Big Tech companies that claim to prioritize your privacy may sacrifice that right for a big payday.

Apple’s Stance on Privacy

Just a few months ago, Apple launched a marketing campaign with the tagline “Privacy. That’s iPhone [3].” Clearly, Apple knows that privacy is something that the public wants, particularly in today’s Digital Age. In fact, Apple even states that “Privacy is a fundamental human right” on its website. On Apple’s site that details its privacy features, the company touts that Maps “doesn’t associate your data with your Apple ID” and that “your Apple ID isn’t connected to Siri.” Finally, Apple states that Safari “helps stop advertisers that follow you from site to site [4].” Clearly, Apple wants its users to believe their data is protected with them. Put simply, Apple wants to market itself as the Big Tech company that actually cares about your privacy. But is that the case?

Well, not really. While Apple is certainly better with privacy than most other Silicon Valley giants, that’s not a particularly high bar to clear. Apple still collects data in aggregate and keeps your exact maps locations for 24 hours [5]. While Apple may say that the benefits of this data collection vastly outweigh the harms, they’re still collecting the data. But worst of all, Apple still allows apps that don’t care about privacy at all. All of Apple’s privacy features are only on its own software. If you use more popular apps, such as Google Maps, Gmail, Facebook, YouTube, and others, you’re not protecting your data, even if you’re using the apps on an iPhone.

So while Apple talks a big game, and has certainly made positive steps toward a more private future, it’s still misleading to say Apple truly cares about your privacy. By still allowing data-hungry apps on its App Store, your data is still exposed on Apple’s hardware. Of course, Apple is a business, and simply not allowing these popular apps would be a massive change. However, the implication that all of your data is protected on Apple devices is simply misleading.

Google and User Privacy

While Apple has taken some steps to protect user data, Google’s entire business model depends upon the collection and sale of data. Google collects, among other things, website histories, Gmail data (including email drafts), and specific location data, even when the Google Maps app isn’t open [6]. Google then takes that personal data and sells it, allowing companies to target their ads to specific audiences. With this hyper-specific information, Google can line its pockets with revenue, while your data is exposed to advertisers.

In fact, Google’s entire business model is the sale of user data. That’s why nearly all of Google’s products are completely free. From Google Maps to YouTube, Gmail to Drive, Google offers all of these services for free. And many have wondered how Google can offer such complicated software for no cost. The answer? Google’s software isn’t their main product. You are their main product.

For Big Tech, It’s All About Ads

Unfortunately, Google is just one of many corporations whose main product isn’t software or programs. It’s you and your data. Similar to Google, Facebook makes the vast majority of its revenue through ads. Facebook learns as much as possible about you, then uses that data to deluge your timeline with hyper-specific ads [7]. Additionally, the goal of Amazon’s expansion into smart speakers and grocery stores isn’t just to offer a wider suite of products. It’s about gathering even more information about its customers and sharing that with advertisers [8]. 

While Facebook and Amazon both carefully state that they don’t “sell” your data to third parties, they do “share” your data with third parties. In practice, this still means advertisers can pay for access to your data. And, unfortunately, that is how most Big Tech companies operate. While these mega-corporations may offer a variety of free software and products to customers, those aren’t their main business. If they aren’t selling products or services, they’re selling you.

AXEL is Different

At AXEL, we also believe that privacy is a human right. Unlike other companies though, we don’t hide behind our slogans. AXEL takes steps to ensure your data is protected from cybercriminals and advertisers alike. From military-grade encryption to blockchain technology, AXEL offers the most stringent security for your most important data.

Additionally, with AXEL, you’re not the product. That’s why we never sell your data to any third party. We don’t offer any “too good to be true” deals while selling your data on the side. AXEL Go is a secure file-sharing and storage software that puts you in control of your data. If you’re ready to take back control of your data, try two weeks of AXEL Go for free here. After the free trial, AXEL Go is just $9.99 per month. After all, our business model is offering the best, most secure file-sharing service to all; not offering your private data to the highest bidder.

[1] Ion, Florence. “Google Continues to Pay Apple Billions to Keep You From Using… Bing?” Gizmodo. August 26, 2021. https://gizmodo.com/google-will-continue-to-pay-apple-billions-to-keep-you-1847564608.

[2] Graham, Megan, and Jennifer Elias. “How Google’s $150 Billion Advertising Business Works.” CNBC. May 21, 2021. https://www.cnbc.com/2021/05/18/how-does-google-make-money-advertising-business-breakdown-.html.

[3] Apple. YouTube. May 20, 2021.

https://www.youtube.com/watch?v=8w4qPUSG17Y.

[4] “Privacy.” Apple. 

https://www.apple.com/privacy/.

[5] “Apple Delivers a New Redesigned Maps for All Users in the United States.” Apple Newsroom. August 06, 2021. https://www.apple.com/newsroom/2020/01/apple-delivers-a-new-redesigned-maps-for-all-users-in-the-united-states/.

[6] Haselton, Todd. “How to Find out What Google Knows about You and Limit the Data It Collects.” CNBC. December 06, 2017. https://www.cnbc.com/2017/11/20/what-does-google-know-about-me.html.

[7] Gilbert, Ben. “How Facebook Makes Money from Your Data, in Mark Zuckerberg’s Words.” Business Insider. April 11, 2018. https://www.businessinsider.com/how-facebook-makes-money-according-to-mark-zuckerberg-2018-4.
[8] M, Laura. “Does Amazon Sell Your Personal Information?” DeleteMe. August 21, 2020. https://joindeleteme.com/blog/does-amazon-sell-your-personal-information/.

Filed Under: Business, Tech Tagged With: apple, business, cybersecurity, data privacy, google

August 30, 2021

Data Privacy and Security Increase Profitability in the Cannabis Industry

Experts estimate that the cannabis industry is currently worth $60 billion, and that number is predicted to grow to $100 billion by 2030. As this industry grows and the customer base gets larger, so too does the need for modern data custody technologies. It might not be obvious at first glance, but data custody and security are critical components of running a successful cannabis business. Here are four reasons why.

The Importance of Data Security in the Cannabis Industry

First, medical dispensaries could be considered “healthcare providers” under the Health Insurance Portability and Accountability Act (HIPAA). Under HIPAA, healthcare providers must implement safeguards to prevent the incidental disclosure of any patient’s “protected health information.” Disclosures could result in a fine of up to $50,000 per disclosure. 

Second, each cannabis company has numerous trade secrets to protect. These could include growing processes, distribution plans, recipes for edibles, extraction techniques, soil mixtures, etc. The theft of any of these trade secrets could be disastrous to a company.

Third, cannabis companies must comply with (sometimes conflicting) state laws. For example, in California, the Medicinal and Adult-Use Cannabis Regulation and Safety Act (MAUCRSA) requires cannabis delivery companies to maintain records of every person who receives a delivery. At the same time, the California Consumer Privacy Act (CCPA) gives customers the right to demand that companies delete any records pertaining to them.

Fourth, data breaches result in damage to a company’s reputation. Dispensaries often sell T-shirts and other merchandise stamped with the company logo to foster customer loyalty, but a newsworthy data breach could shake that loyalty. Further, data breaches could damage the industry’s image as a whole and become a roadblock to legalization efforts at the federal level.

Room for Improvement

Last year, a group of ethical “white hat” hackers located a breach in the THSuite point-of-sale system, which is used by many dispensaries. Through the breach in THSuite, the hackers were able to access roughly 85,000 unencrypted files containing the personally identifying information of 30,000 people, including names, phone numbers, addresses, emails, birthdays, images of state-issued IDs, signatures, quantities of cannabis purchased, and medical ID numbers. 

This breach, and all the reasons discussed above, highlight the need for modern technological solutions. The International Cannabis Bar Association (INCBA) and AXEL are working together to bring these solutions to Bar members. INCBA members will now receive a 20% discount when they sign up for Premium or Business Plan subscriptions of AXEL Go. AXEL Go is the safest way to collect, store and share files during in-office, hybrid and remote work situations.

AXEL’s patented blockchain technology and AES-256 encryption help attorneys collect, store, and share client files in a user-friendly manner that is impervious to hackers, unauthorized access, and ransomware attacks. The decentralized nature of the network ensures that there is no single point of failure. Further, files uploaded to the AXEL network are heavily encrypted, sharded, and scattered between 400+ different global servers, providing a high level of security without sacrificing speed. Sensitive files and shifting regulatory frameworks in the cannabis industry call for an abundance of caution permitted by AXEL Go. INCBA members can sign up for a 14-day trial of AXEL Go and redeem discounts here.

Filed Under: Cybersecurity, Legal Tagged With: cybersecurity, data privacy, law, lawyer

  • « Go to Previous Page
  • Page 1
  • Interim pages omitted …
  • Page 8
  • Page 9
  • Page 10
  • Page 11
  • Page 12
  • Interim pages omitted …
  • Page 27
  • Go to Next Page »

Primary Sidebar

Recent Posts

  • AXEL News Update
  • AXEL Events
  • Biggest Hacks of 2022 (Part 2)
  • Biggest Hacks of 2022 (Part 1)
  • The State of Government Cybersecurity 2022
  • Privacy for the Future
  • File Sharing 101: How to Easily Share Large Files
  • Web3 Beyond Crypto
  • Your Privacy and The Internet of Things
  • Personal Vehicle Telematics and Privacy Oversights
  • Why IPFS is the Future of Internet Storage Systems
  • Protecting the workplace from Day 1 Exploits
  • How User Experience Impacts Cyber Security
  • Protecting your Privacy With End-to-End Encryption
  • Devastating Hospital Hacks
  • The Dangers of Leftover Attachments
  • How Secure Are Your Apps, really?
  • ABA GPsolo Roundtable Roundup
  • Our Continued Loss of Privacy
  • Casting a Shadow of Protection
  • Why Digital Sharding is the Future of File Storage
  • The Practical Applications of Web3
  • Archival With the Future in Mind
  • IPFS: Securing Our Privacy Future
  • What Do We Do About Social Engineering?
  • Five Simple Security Tricks
  • IPFS: The InterPlanetary Solution to Small Business Problems 
  • Schools: Our Cybersecurity Blindspot

Recent Comments

  • Anonymous on Five Simple Security Tricks

Footer

Sitemap
© Copyright 2024 Axel ®. All Rights Reserved.
Terms & Policies
  • Telegram
  • Facebook
  • Twitter
  • YouTube
  • Reddit
  • LinkedIn
  • Instagram
  • Discord
  • GitHub