AXEL Network Products:

AXEL GO - share and store files securely.

LetMeSee - photo sharing app.

  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer

AXEL.org

  • Network
  • Technology
  • Applications
  • Blog
  • About
    • Team
    • Press
    • Careers
    • Patents
  • Contact Us
  • Login
    • AXEL Go
    • AXEL Cloud

online privacy

June 11, 2021

The 2021 Guide to Online Privacy

According to a 2019 survey, nearly three-quarters of Americans are “more alarmed than ever” about their online privacy[1]. This concern is well deserved, as it seems every day there’s another story about shady corporate data collection policies or a major data breach.

So, how can you protect yourself? Luckily, you don’t have to live off the grid without electricity while hoarding military surplus MREs from the Cold War to prevent total surveillance. While most of the Big Tech offerings don’t make user privacy a top priority, some alternatives do. Here, we’ll look into the common ways you can stay private online.

Web Browsers

The most popular web browser, by far, is Google Chrome[2]. Unfortunately, it’s also the worst for privacy. In fact, you may notice a running theme throughout this guide; stop using Google! Google is one of the top privacy offenders, and its suite of software and services is absolutely massive, so you probably use them frequently. Safer ways to surf the web include the following solutions.

Firefox. Developed by the non-profit Mozilla corporation, Firefox provides a wealth of privacy settings. However, many of these options are not on by default, so you will want to dig into them a bit to set things up how you want.

Safari. This is the standard web browser for iOS and macOS. As far as Big Tech companies go, Apple stands out as being better about privacy than the others, which holds true for its browser. Again, you will need to optimize the settings for privacy, but the interface is clear and intuitive. Apple makes its money from high-priced hardware, so it has less incentive to collect and sell as much data as possible.

Brave. Brave is a newcomer to the browser game, and it has made its name on protecting privacy. It blocks ads, trackers, scripts, and more. It offers high-performance compared to its competition too! However, there are two caveats; It serves you ads by default (although you get paid for viewing them and you can disable them), and it’s built off of the Chromium browser, which uses the same code base as the nefarious Chrome. On the plus side, this does make it compatible with popular Chrome extensions, so it really boils down to your risk-reward calculations.

Search Engines

Stop using Google! Just don’t. Now, for some searches, Google will likely return better results. But for the vast majority of occasions, one of the following alternatives will get the job done without tracking your every move.

DuckDuckGo. This is easily the most usable privacy search engine. It has most of the same features (Videos/Images/News/etc.) as Google, and they never track your behavior. It doesn’t employ invasive algorithms either; it parses search results via a simple traffic calculation, so you also don’t get the censorship prevalent on Google.

For most users, DuckDuckGo is going to be the way to go. Other privacy search engines are significantly more niche, but we’ll still cover a few of the more interesting ones.

Ecosia. This is a front-end for the Bing search engine, but it ditches the trackers associated with Microsoft’s product. So, you get the power of Bing without the drawbacks. One of the more novel aspects of this solution is that the Ecosia organization plants trees when you use it. Of course, to fund this, you have to deal with ads, but at least you’re not being surveilled.

Peekier. Peekier says it’s “The most privacy-oriented search engine,” and its official privacy policy is impressive. It uses its own algorithm and generates results with thumbnail images of the sites themselves. So, it’s aesthetically pleasing, albeit a bit more bandwidth-hungry (just something to be aware of if you’re dealing with low data caps from your internet service provider.)

SearX. This is a very interesting option that’s completely decentralized. In fact, you can set up your own instance of the search engine to help out with the project! It has helpful advanced search capabilities that can assist with finding particular files. Unfortunately, it’s also the least user-friendly (you have to click on an instance before searching) and can be buggy. Still, it’s definitely one to keep an eye out for if the team can iron out the kinks.

Virtual Private Networks (VPNs)

One of the easiest ways to hide your location and identifying information when online is to invest in a VPN. They’re starting to become mainstream, as you’ve probably heard advertisements for them on your favorite podcast or YouTube channel.

With a VPN, you’re using a service that masks your network’s IP address. So, trackers online think the computer is in a completely different part of the world. Another benefit is the data sent between your computer and websites is encrypted and unreadable to would-be snoops. We recommend everyone use a VPN if they want to remain private on the internet. Many VPN providers are available, and we encourage you to do your own research about which is suitable for you. A quick DuckDuckGo search should put you on the correct path (see what we did there?)

Android vs. iOS

As we previously detailed, Apple is generally better with privacy. Android, a Google product, is pretty hopeless out of the box, but if you’re a tech whiz, it can be improved. If you need to get an Android phone for compatibility or price reasons, we recommend getting one you can install custom ROMs on and download a third-party privacy-based operating system. This isn’t for the everyday user and only works on specific phone models. The most popular privacy ROMs are LineageOS, CalyxOS, and GrapheneOS.

The first two attempt to replicate the functionality of Android while maintaining a semblance of privacy. GrapheneOS, on the other hand, goes much further and is recommended by people such as Edward Snowden. Be warned, while this will provide the most privacy possible, many people will be put off by the learning curve and lack of features/common applications.

There aren’t many non-Android or iOS alternatives. You could try out the Linux-based PINEPHONE, which offers a pared-down Linux experience and physical switches that can turn off the cellular radios, microphones, and more. It’s an inexpensive way to get robust privacy, but again, you will experience tradeoffs in usability.

One more privacy tip regarding your cellphones; don’t go with the major carriers. They will undoubtedly run credit checks and require all of your personal information when you sign up. Avoid these invasions by going with prepaid services. With these, you typically don’t have to give up any personal data if you don’t want to, and you can buy refills with cash at a variety of retail stores. They also tend to be significantly less expensive overall, and you’re also not locked into a burdensome contract. Furthermore, they all use the same networks that the big names do. It’s a no-brainer!

Alternative methods of payment

One of the worst feelings is seeing unaccounted-for charges on your credit card statements. It’s a hassle to reverse, and you may be without the stolen funds for days or weeks before it gets sorted out. It’s a situation that seems all too common in modern times, and most people accept it as a necessary hazard when putting your credit card information online. This doesn’t have to be the case!

You can protect your banking information by using payment services that provide users with masked credit card numbers. Companies like Abine Blur let you load up prepaid virtual cards that can be used anywhere (even for booking hotels). For privacy-conscious people, it allows the peace of mind that’s so sought after when making online purchases.

Social Media

Social media is tough to replace. The first recommendation we have is not to use Facebook. For businesses and those wanting to keep in touch with friends, this is a tricky proposition. If you don’t absolutely need it, however, do not use it. If you must, only put the bare minimum amount of personal information on it. There have been multiple scandals and instances of Zuckerberg’s company selling user data and behavior analysis to third parties without consent. This goes for its popular acquisitions, too, such as Instagram and WhatsApp.

As far as other platforms go, we recommend:

Invidious. This is a YouTube front-end that doesn’t track your behavior. It has other great features, such as the ability to download videos in various formats/qualities. Invidious also blocks all advertisements, and you can listen to the audio when the screen is turned off, making it fantastic for podcasts.

Like SearX for search engines, you have to use a specific instance, and we recommend www.yewtu.be, which doesn’t have much downtime. With this instance, you can even create an account not linked to your identity where you can maintain subscriptions to your favorite content creators. It’s the best way to enjoy YouTube.

Mastodon. Mastodon is a Twitter replacement that’s fully decentralized. It’s an open-source project that is entirely un-monetized. So, you’ll never see advertisements or promoted posts, and there’s no incentive to collect data since it won’t be sold. Of course, the community isn’t as large as Twitter’s, but it is growing steadily and is engaging enough to try out.

Messaging

Messing apps are an important way to talk to friends and family without using insecure SMS text messages. However, if you’re using Big Tech solutions like Facebook Messenger, GChat, or even the end-to-end encrypted WhatsApp (owned by Facebook), your communications aren’t necessarily private. If you want a more secure messaging app, use open-source, encrypted options like Telegram and Signal.

File sharing

Sending and storing files via the cloud is a convenient way to have all your documents at your fingertips. However, if you use common programs like Google Drive, Dropbox, and OneDrive, your content is also at the greedy fingertips of Big Tech. Prevent corporate surveillance and data mining by using the decentralized, distributed AXEL Go.

AXEL Go combines secure blockchain technology, the InterPlanetary File System, and hardened military-grade encryption to provide the best privacy platform for sharing and storing your data. Sign up today and receive a free 14-day trial of our Premium service with all features unlocked.

The privacy revolution

As you can see, protecting your digital privacy isn’t impossible. You may have to make concessions or change your daily workflow a bit, but with the growing community around privacy-based software and services, you can stay out of the watchful gaze of Big Tech while still enjoying the utility of the internet.  We hope you give some of our suggestions a shot and see that the current reality of corporate surveillance and censorship doesn’t have to carry on into the future.

With your help, we can usher in a new era of the internet that delivers on its initial promise of expanding human interaction and knowledge without privacy issues. Join the privacy revolution. Change the world.


[1] Statista, “Share of internet users who are more alarmed than ever about their online privacy vs. their willingness to accept certain risks to their online privacy to make their life more convenient as of December 2019, by country”, Statista.com, Dec. 2019, https://www.statista.com/statistics/1023952/global-opinion-concern-internet-privacy-risk-convenience/

[2] Statista, “Market share held by leading desktop internet browsers in the United States from January 2015 to March 2021”, Statista.com, March 2021, https://www.statista.com/statistics/272697/market-share-desktop-internet-browser-usa/

Filed Under: Privacy, Tech Tagged With: 2021 online privacy, digital privacy, online privacy, Privacy, privacy guide

August 21, 2019

Why Data Breaches are so Damaging and how the Law has Failed Consumers

Very few times in history have a group of people sat down with the purpose of writing a set of new laws to improve society. Instead, what usually happens is that laws are written to solve specific problems. This leads to a litany of laws piling up over the decades. While it could always be debated how effective a particular law might be at accomplishing its goal, the rapid pace of technological advancement over the past 20 years – especially as compared to the pace of the lawmaking process – has introduced new challenges as laws become quickly outdated, sometimes even by the time they take effect.

The results of this are acutely apparent in the cross-section between the fields of cybersecurity and consumer protection, namely data breaches.

The magnanimity of consumer protection laws in the United States were written for a society concerned with immediate product safety and compensation for resulting injuries, not for the nebulous and incalculable injuries that may be sustained by potential millions when private records are exposed.

Why are data breaches so damaging?

The unique problem of data breaches stems from the fact that the breach of privacy carries in of itself no specific harm. Instead, it is the later misuse of information that has been breached that may lead to ensuing harm. However, with data breaches occurring on a near-daily basis, the causality of specific financial or reputational damage is nigh impossible to link to a single breach causally; with our laws written around the concept of calculable damages being the source of justified remuneration, we are left constantly and increasingly victimized but unable to seek just compensation.

Some would argue that even more problematic is the irreparable nature of many of the most severe data breaches. Once a name and social security number are leaked, that identity is permanently and irreversibly at risk for being used fraudulently. While one could always apply for a new social security number, the Social Security Administration is extremely reluctant to issue new identities, and while that is a debate for another time, it goes to show just how difficult it can be to recover from a breach. Victims are permanently marred and at increased risk for future injuries resulting from a single breach, no matter how much time has passed.

Because of the damage resulting from a data breach being so far removed temporally and causally from the actual breach itself, adequate compensation is rarely won, if it is even sought. Was it the Equifax breach, the MoviePass breach, or one of the innumerable other breaches this year that resulted in your identity being stolen and used to take out fraudulent loans a decade from now?

Moreover, even if you should find that it was MoviePass’ negligence that leads to your identity being stolen, what compensation can you seek from a company that has been defunct for years? Our laws were not written to address these issues adequately. Our legal system often does not ponder questions of uncertainty and possibility, and that’s the perfect summary of what victims face in the aftermath of a breach; uncertainty and possibilities.

For all the uncertainty victims face, the solutions going forward as a country are equally opaque.

It would be easy to write some draconian law to punish companies for exposing private data, but as is often the case, that could have unintended consequences, such as pushing data overseas where even looser security and weaker privacy laws may exacerbate the problem. Instead, it’s going to take a significant shift in our collective-consciousness over how data is handled.

Laws written for managing telecommunications and transmissions in that era are being used to handle complex cybersecurity and data privacy cases.

This can’t come just from one party though; companies need to seriously consider what data they need to collect, and what information needs to be retained on a long-term basis. Consumers have to take ownership of their data and demand a higher quality of service from corporations and governments over how their data is collected and used.

As a whole, we must recognize the value of data, and the dangers we expose ourselves to by collecting it (and why it might even be best to not collect data at all in many circumstances).

Just like holding valuables such as gold and art entails a security risk, so too does data. If people started treating data like the digital gold it really is, maybe then we could all come together to work out a solution.

But until then, I’ll be keeping my data to myself.

Filed Under: Culture, Cybersecurity, Legal Tagged With: data, data breach, data breaches, data collecting, data collection, data custody, data mining, data privacy, data protection, data security, law, lawyer, legal, legal tech, online privacy, Privacy, private

August 19, 2019

Projects We Love: PrivacyWall

This is part of our series highlighting startups who share our mission of trying to bring data privacy back to users.

You’ve had a rough week, maybe it’s a relationship or health problem, but either way, you’re feeling down. Fortunately, your family is there for you, and reach out to console you through a few private messages on social media.

Mom: “I know it’s expensive, I’m sorry your health care doesn’t cover it, we’ll do what we can to help you pay.”

Dad: “Don’t worry sport, she’s just going through a phase, I’m sure you guys will work through it.”

Friend: “Hey man, let’s meet up for a drink this weekend, cheer up!”

After reading your messages, you lay down in bed to rest and start scrolling through social media to pass the time until you fall asleep, and you’re astounded by what you find.

Ads.

But not just the usual ads for food, or some new tech gadget.

“Lower your healthcare costs now! Save 20% off market rate plans!”

“Relationship trouble? Local family counseling is available!”

“Cheapest beer in town, and half-price shots on Fridays!”

Maybe it’s just coincidence, or maybe every single thing you say or do online is being tracked and sold to advertisers… That “free” social media website has to make money somehow.

And that’s where PrivacyWall comes in- a startup that is returning data privacy and security to users. By blocking unwanted data collection by everyone from Facebook to Google, PrivacyWall puts you back in the driver’s seat.

Why PrivacyWall?

Every website you visit, every search you type in, every message you send and photo you post, it’s all tracked, recorded, and monitored. PrivacyWall is the “off” switch we’ve been waiting for.

By blocking over 3,000+ trackers from many of the largest tech companies in the world you can once again browse the internet without fear of being tracked like the target of a CIA investigation. We expect privacy in our homes, and we should get the same treatment on the internet.

PrivacyWall even blocks Facebook Connect from building a shadow profile of your online activity when you are not on Facebook. If you didn’t know, that convenient “log-in with Facebook” turns that account you just signed up for into another data collection point for Facebook to build a profile on you.

If you didn’t know that, you aren’t alone. And that’s exactly why PrivacyWall blocks threats you don’t even know about yet. Because you shouldn’t have to become a security expert and worry about your private information being leaked just because you used Facebook to sign-up for a food delivery app, or a dating site, or anything.

You deserve privacy, and PrivacyWall is a step towards a more private world.

Filed Under: Startups, Tech Tagged With: data breach, data collecting, data harvesting, data mining, data privacy, data protection, facebook, google, online privacy, Privacy, private, startup, startups, technology

August 23, 2018

Read This Before Downloading That New App

Last year, the total number of mobile app downloads worldwide was calculated to be 178.1 billion.

And that number is only expected to go up this year, as more and more apps continue to show up on the market and draw our attention.

In fact, with over 5.8 million apps available to download today, you’ve probably had a lot of conversations about that amazing thing you can do on your phone because of a new app.

But have you discussed the safety of those apps you’ve been downloading, and whether or not the data on your phone is still secure?

“Using Apps Safely” might sound like a boring topic—I mean, come on, who cares about that when they’re busy taking a quiz to find out which Disney princess they are—but it’s extremely important for every user to be aware of and informed about the potential dangers of some of the apps on today’s market.

Every new app should pass certain criteria before being downloaded. And there is a huge reason why.

Read This Before Downloading That New App

Apps Cultivate Data

App safety isn’t exactly a new discussion topic, but it’s one that isn’t always taken seriously. Today’s apps are new and exciting and full of promises. You can do practically anything with one—from important things like locking your front door…

…to really important things like proving you’re a true Game of Thrones fan with a Hodor keyboard (really).

But with every app you use, it cultivates more data.

What’s more, mobile marketing is making a bigger appearance because businesses are fully aware of the monetary potential that apps now carry. And this means that the data we cultivate while using our various apps is becoming more and more desirable.

How much data do we cultivate while using apps?

Think about it: We live with our phones connected to our hands; we communicate with friends and coworkers, we answer emails, we track our health, we calculate our caloric input, we shop for clothes, we keep tabs on our bank accounts… we even let our devices memorize our faces.

Just last year, Statista calculated that app users spent 77% of their valuable time on their three most-frequented apps.

Read This Before Downloading That New App

That’s a lot of time spent on apps, and a lot of data created while using them. For marketers, it means a gold mine of monetary potential.

Read This Before Downloading That New App

Using Apps = Making Money

As we open our various apps, make in-app purchases, and tap on one link after another, some companies are tracking our behavior because it gives them a better picture of who we are and what motivates us to click “buy.”

This is why we have to pay attention to the integrity of every app we download. Some companies are sneaky about the data they collect and how they handle the data that they collect. It’s valuable stuff, and there’s a lot of it, so they’ve figured out an easy way to get what they want without you catching on—which is through their apps.

And that, of course, means our data privacy concerns need to extend into the world of apps.

So if we know the potential danger of downloading an untrustworthy app, then why are so many everyday users careless about which ones they download?

I mean, you wouldn’t let just anybody into your house to rifle through your closet, read your mail, browse through your personal journals, and then use that information to make money, right? So why would you allow an app to essentially do the same thing to the data on your phone?

The answer to that is this: the ease and excitement of downloading a new app far outweigh any potential threats that the app might pose.

Because of this, many of us tap the download button without giving a second thought to the app’s safety and then suffer the consequences of having downloaded a “Trojan” app—one that hides a brutal invasion.

Suddenly, we go from operating our phone to holding a data-laden device in our hands that’s being operated by hackers.

But here’s the good news: you can learn to spot a potentially malicious app before it harms you.

And you can feel more confident about the safety of your apps by checking certain things before tapping that download button. It’s easy to enjoy the benefits of some of those amazing apps out there if we just learn how to perceive whether an app is safe or not.

So, before you download anything new, make sure to run that app past a few safety checkpoints to ensure that it upholds data safety practices.

It’s easy to enjoy the benefits of some of those amazing apps out there if we just learn how to perceive whether an app is safe or not.

Read This Before Downloading That New App

4 Checkpoints An App Should Pass Before Downloading

Imagine it’s a Sunday afternoon, it’s raining, everyone you know is too busy for you, and even your dog doesn’t want to look at you. You’re bored—and you want to download that cool new app and figure out all the incredible stuff it does.

If you’re bored out of your mind, you might be tempted to throw caution to the wind and hit “download” without a second thought.

But before you do that, remember that you like your data better when it’s not being exploited—so take a few minutes and double-check to see if that new app can pass these 4 safety checkpoints.

Checkpoint One: The Integrity of the App’s Marketplace

Where is that app coming from? The best route to take when downloading an app is to start from a reputable market source. Read through their privacy policies and whether or not they hold their developers accountable to their strict policies (for example, here are Apple’s developer guidelines and Google’s policy for developers). Reputable marketplaces will have strict privacy policies and guidelines and have a history of expelling violators.

Checkpoint Two: The Reviews

Read the reviews. Are the ratings high, or at least reasonable? Did any reviewers mention that they downloaded the app and were invaded by malware? Or, does every single review seem positive and fake? Some app developers will hire people to leave fake reviews in order to boost their ratings. Take some time to read through a good mix of the app’s reviews and evaluate whether it seems safe or not.

Checkpoint Three:  The Company

Does the company that created the app seem safe and reputable, or does it seem questionable? Go to the company’s website and read about their history, maybe find out about their team, and see if they are a legitimate company and not some clueless app tinkerer trying to throw bad apps into the mix. Trustworthy companies aren’t going to risk their business by putting out a nasty app.

Checkpoint Four: The Privacy Policy

Before ever allowing an app to take up space on your device, take the time (I know it doesn’t sound fun, but trust me, it’s worth it) to read the company’s privacy policy in order to learn exactly WHAT information they plan on acquiring and HOW they plan to use that information.

A lot of untrustworthy apps have questionable policies that fly under the radar because most people don’t want to bother with taking the time to read through its technical lingo. Don’t let this tactic get you—read through the policy and find out whether that app will be accessing data and selling it to third parties or using it in other ways for monetary gain.

Essentially, any new app you’re checking out should come packaged with a privacy policy that you can trust your data with and that is clear and honest about its intentions.

(In fact, if you want to see an example of a solid policy right now, check out the AXEL privacy policy. We’re kind of proud of it.)

Read This Before Downloading That New App

Happy App-ing

There are plenty of bad apps out there that you will want to avoid, but there are also plenty of really awesome apps out there that might actually transform the way you do things in the best possible way.

It’s up to you to be aware of the benefits and dangers of today’s apps and to assess whether the one you’re about to download will protect your private data or put it at risk.

And remember: although there are some app developers out there who want to hack your data with their invasive app, there are also a large number of trustworthy developers out there who know how to combine innovative tools with strong privacy protection.

So don’t worry—you can have fun and do amazing things on your phone while also protecting your data.

Filed Under: Cybersecurity Tagged With: app, apps, cybersecurity, data privacy, information security, online privacy, online security, Privacy, safety, Security

August 14, 2018

6 textbook examples of how NOT to respond to a Data Breach (Seriously guys?)

Yahoo: Do nothing and pray it goes away

Why are we surprised at this?! When Yahoo suffered a breach in 2013, it decided to just keep quiet about the 3 billion accounts that were compromised. Surely this would prove to be an effective strategy?

LOL.

The news broke a whole FOUR years later, in 2017, that 3 billion accounts had been hacked, which is more than the company claimed in 2016, which is the first time anyone heard anything about a data breach. We shouldn’t really be surprised, as “do nothing and pray it goes away” has been Yahoo’s MO for quite some time now.

FriendFinder Networks: Take days to respond and then downplay the incident in a vague press release

FriendFinder Networks is a company that you’d reeeally want to keep your data secure. It operates AdultFriendFinder, a “sex and swinger community,” and when it suffered a breach in 2016, the response was slow and the press release was tepid. The company affirmed that it “encourages users to change their passwords,” and appeared to put most of the onus on the users, commenting that it would contact users “to provide them with information and guidance on how they can protect themselves.” Seriously?

This press release came after days of speculation, which is actually forever if you are a user of an adult website waiting to find out if your data has been made public.

Equifax: Fail to patch software, take forever to disclose breach, let execs sell their shares

Equifax has one of the shadiest timelines of this group, and competition was stiff here!! After failing to patch a known vulnerability in March 2017 in widely used open source software Apache Struts, the data of 143 million US customers was potentially exposed in May 2017. Then on July 29th, days after the breach was discovered, executives sold off nearly $1.8M worth of Equifax shares. Hmm….this looks bad, but maybe there’s something we don’t know here. (Read: there’s not. It’s bad.)

Ticketmaster: Pretend it’s not happening

Ticketmaster was alerted to a possible breach in April of 2018, but decided to do its best impression of an ostrich and just pretend it wasn’t happening until it received apparently irrefutable (or un-buryable) evidence on June 23rd. Online bank Monzo released a statement shortly afterward saying it spotted the breach in April, but Ticketmaster said nah after an internal investigation revealed no evidence of any such breach.

I’m confused. Are we just letting companies investigate themselves now? This is not how any of this should work. Anywho….

Facebook: Deny deny deny

Facebook didn’t suffer a breach. Instead, it voluntarily gave away a treasure trove of user data and then informed us that we had all agreed to it in the terms and conditions. Whoops – we should have read those, but they’re just so boring, and no one can recall seeing a line item that said “we will give away all your data, suckers, and there’s nothing you can do about it LOL.” I think I would have remembered that…..

To its credit, Facebook did admit that its data had been “improperly shared,” but didn’t go so far as to call it a breach. They didn’t go so far as to call us suckers either, but that doesn’t mean it isn’t true.

Exactis: Leave us all in suspense as if our data’s safety was a plot point in a Mission Impossible movie

None of this is entertaining, you guys. Apparently there is a “database with pretty much every US citizen in it” floating around the internet, according to security experts. That seems pretty bad.

But even worse, the company associated with the breach has stayed silent for days, which is deeply bumming out 230 million of us who would kindly like to know if our personal information is available online.

The bottom line

Data breaches are inevitable. Attackers are targeting companies on a daily basis. But ignoring the fact that a data breach has occurred, failing to patch a known vulnerability, putting the onus of dealing with a breach on users, and – most obviously of all – selling off your stock when you have insider information of a breach doesn’t help anyone. Companies need to be honest when they think a breach has occurred, or they risk losing their customers’ trust. And as our data multiplied exponentially, trust is becoming scarce.

Filed Under: Cybersecurity Tagged With: Breach, cybersecurity, data breach, equifax, facebook, online privacy, Privacy, Security, ticketmaster

July 26, 2018

Why Your Camera Isn’t As Safe As You Think

You’ve joked about it before. How some lonely CIA agent is secretly watching (and perhaps salivating at) your every move via your webcam. So, after you get out of the shower you open your laptop, strike a pose, and chuckle to yourself because you know the very idea is both hilarious and preposterous…until you realize it isn’t.

Webcam spying is very real.

Sure, you’ve seen articles and news segments about people who’ve fallen victim to spying via their webcams. But that’s because they’re either incredibly careless or doing some illegal stuff they know they shouldn’t. Right? Not exactly.

It’s well within the realm of possibility that you’ll wake up tomorrow morning to see pictures and/or videos of yourself in some sort of “compromising position” online. Yes, I said pictures of you. Plain old, beer-drinking, hangover-having you. But of course, you probably won’t see those pics until they’ve been liked, retweeted, and shared with a million other people first.

So in case you missed it my friend, welcome to the 21st century.

Devices That May Be Hacked

In most cases, spying is done through the cameras of desktop or laptop computers. So if you’re thinking of taking that extra five bucks out of your dad’s wallet, don’t assume you’re all alone. A hacked camera can cause severe emotional or psychological damage. One 20-year-old Glasgow student was left traumatized after she found out webcam hackers watched her while she was in the bath.

Although computer webcams are the devices that are most commonly hacked, you can also be tracked and watched via your smartphone camera. Even surveillance systems may be hacked and used to track people in real time. This means unscrupulous individuals may be able to watch you at home or at work from multiple angles, all day, every day.

Even more frightening is the idea that your children may be targeted. Imagine the horror of a mother in Houston who found out that footage of her daughters’ bedroom was being live-streamed. And if you thought things couldn’t get any weirder than that, consider the fact that even baby monitors are being used for spying and the data of more than 2.5 million kids was stolen using their favorite smart toy.

How It’s Done

The most common way hackers access your cameras is by using malware. Seemingly innocent links or attachments embedded in emails and online ads may be riddled with Trojan horses. Be sure to avoid the sweet Russian girls; a simple click or download could leave your device infected—effectively handing over control on a silver platter. Oftentimes, the malicious code is packaged with legitimate programs or software so you don’t even notice it. Hackers with remote access can turn your cameras on and off with no indication from the camera light.

Another way people may gain unpermitted access is by borrowing your device and manually downloading applications that allow them to access your files, camera, and microphone. These applications can be hidden so you don’t even know they are at work.

And if you thought that was all, my friend, you’d be wrong. Ever thought about app permissions? I’m sure you’re familiar with apps asking for permission to use your camera. What you may not be familiar with is the fact that these apps can capture you on camera at any time when they’re in the foreground (yes, that means even when you’re not using the camera). What’s worse is that no one knows what these apps may be able to access when they’re in the background and out of sight.

Unmasking The Creeps Who Spy On You

The main perpetrators in the spying pandemic are hackers. They use Trojans to claim control of your cameras and watch your every move. They may put your photos and videos on the internet for others to view online. In more disturbing cases, nude and intimate moments may be live-streamed on voyeuristic websites.

As I mentioned before, apps can also gain unpermitted access to both your front and rear cameras. Who knows what WhatsApp, Instagram, Snapchat and the like are capturing when your cameras are off and what they’re doing with it? Are they selling footage of you? Maybe. To whom or for what purpose I don’t know, but Snapchat may need the money.

Now, we’ll discuss the attackers you already know about: the government. Did you know that built-in backdoors in your smartphone may allow the government to access your files, read your messages, listen to or record your calls, capture images, and stream video? Just in case you ever thought the government was on your side!

In 2013, Edward Snowden revealed that GCHQ—a British surveillance agency—collected and stored images from the video chats of millions of Yahoo users under the Optic Nerve program. Yes, tons of raunchy pics were collected and stored as well for…uh…security reasons.

But the blatant disregard for your online privacy doesn’t stop there. In fact, your school and the people you know best may be the biggest culprits.

Between 2009 and 2010, a number of Pennsylvania schools were caught remotely accessing the cameras of laptops issued to their students. And as for your “friends,” they can simply install spy software on your device without you having the slightest clue. Just ask pageant girl Cassidy Wolf. She learned the hard way when she was blackmailed with nude photographs her former classmate had taken via her webcam.

Why Cyber Spying Is Wrong

This one is obvious. We all have the right to data privacy. What’s that, you ask? It’s the ability for an individual (or organization) to determine if and how personal data will be shared with third parties. This includes access to the cameras on your laptop, smartphone, and surveillance system. Your data, your choice.

But is it even your data?

That’s a pretty important question. The terms and conditions you’re so quick to agree to (but never really read) may disagree. Are you unknowingly giving apps permission to access your cameras even when you aren’t using them? Maybe. Is this approach grossly unethical and utterly misleading? Yes. Is it illegal? Perhaps not.

What You Can Do About It

If you’re fine with people spying on you, you might as well stop reading right now. If you’d like a few tips on how to deal with the issue, consider those listed here:

  1. Cover your webcam with tape. If you have an external webcam, be sure to unplug it when you’re not using it.
  2. Install anti-virus software on your PC and your smartphone. It will readily spot and block malware. Be sure to keep your firewall enabled as well.
  3. Use protection. No, not that type of protection. Place a secure lock on your phone. Use a fingerprint lock or password to keep nosy “friends” away.
  4. Use your devices on secure networks. Stay away from public networks.
  5. Think carefully before giving an app permission to access your camera.
  6. Update the password for your surveillance system regularly.
  7. Be cautious about the emails that you open and the links or attachments inside them.
  8. Be wary of online advertisements and dodgy chat rooms.

And because I love you, here are some other ways you can be safe online.

The Bottom Line

People are definitely being spied on with their own cameras. You may be one of them. The government, hackers, schools, apps, and people you know may not be as innocent as they seem. While organizations like ours try to bring light to this gross disregard for your right to data privacy, remember to do what you can to keep yourself protected. And for Pete’s sake, never, EVER, trust that shady middle-aged guy who always sits behind you in the coffee shop!

Filed Under: Cybersecurity Tagged With: camera, cybersecurity, data privacy, online privacy, Privacy, Security, spying, webcam

Primary Sidebar

Recent Posts

  • AXEL News Update
  • AXEL Events
  • Biggest Hacks of 2022 (Part 2)
  • Biggest Hacks of 2022 (Part 1)
  • The State of Government Cybersecurity 2022

Recent Comments

  • Anonymous on Five Simple Security Tricks

Footer

Sitemap
© Copyright 2024 Axel ®. All Rights Reserved.
Terms & Policies
  • Telegram
  • Facebook
  • Twitter
  • YouTube
  • Reddit
  • LinkedIn
  • Instagram
  • Discord
  • GitHub