<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0"><channel><title><![CDATA[Privacy Alerts]]></title><description><![CDATA[Stay ahead of online threats and take control of your personal data with Privacy Alerts! Our newsletter provides the latest expert advice, tips, and tricks to safeguard your privacy in the digital world. Subscribe now to stay informed and empowered!]]></description><link>https://newsletter.yourdigitalrights.org</link><image><url>https://substackcdn.com/image/fetch/$s_!oqVg!,w_256,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F5863274e-4461-42e5-8763-01397b9b1a07_1200x1200.png</url><title>Privacy Alerts</title><link>https://newsletter.yourdigitalrights.org</link></image><generator>Substack</generator><lastBuildDate>Mon, 06 Apr 2026 04:54:04 GMT</lastBuildDate><atom:link href="https://newsletter.yourdigitalrights.org/feed" rel="self" type="application/rss+xml"/><copyright><![CDATA[Conscious Digital]]></copyright><language><![CDATA[en]]></language><webMaster><![CDATA[info@yourdigitalrights.org]]></webMaster><itunes:owner><itunes:email><![CDATA[info@yourdigitalrights.org]]></itunes:email><itunes:name><![CDATA[Yoav Aviram]]></itunes:name></itunes:owner><itunes:author><![CDATA[Yoav Aviram]]></itunes:author><googleplay:owner><![CDATA[info@yourdigitalrights.org]]></googleplay:owner><googleplay:email><![CDATA[info@yourdigitalrights.org]]></googleplay:email><googleplay:author><![CDATA[Yoav Aviram]]></googleplay:author><itunes:block><![CDATA[Yes]]></itunes:block><item><title><![CDATA[Privacy Alerts: Discord, Prosper, Qantas]]></title><description><![CDATA[October 2025]]></description><link>https://newsletter.yourdigitalrights.org/p/privacy-alerts-discord-prosper-qantas</link><guid isPermaLink="false">https://newsletter.yourdigitalrights.org/p/privacy-alerts-discord-prosper-qantas</guid><dc:creator><![CDATA[Yoav Aviram]]></dc:creator><pubDate>Mon, 20 Oct 2025 15:28:12 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/bb0c3ab4-f7af-44c5-a8aa-e6322b23009f_1536x1024.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>Hi there,</p><p>Here are the three consumer-privacy stories from the past month we think are worth your time, with clear next steps.</p><h2>Discord age-verification images leaked</h2><p><strong>What happened</strong><br>A third-party support/verification vendor working with Discord was compromised. Images people uploaded for age checks, such as driver&#8217;s licenses, passports, and face selfies, were copied. The core issue isn&#8217;t just the breach; it&#8217;s the practice of collecting and storing high-risk documents in the first place, often via vendors users never see.</p><p><strong>What was exposed</strong><br>Scans/photos of government IDs and matching selfies, plus typical metadata (full name, birth date, document number, issuing country, sometimes address). Even if Discord deletes uploads promptly, a vendor may retain copies in tickets, logs, or backups.</p><p><strong>Who&#8217;s affected</strong><br>Anyone who submitted ID for Discord age verification in the relevant period&#8212;including people who interacted with support and didn&#8217;t realize a separate vendor was involved.</p><p><strong>Why age-verification laws can harm consumers</strong></p><ul><li><p><strong>They force mass collection of sensitive IDs.</strong> When the law pushes platforms to &#8220;prove&#8221; age, many default to <strong>document uploads</strong>. That creates huge databases of passports and driver&#8217;s licenses&#8212;prime targets for theft.</p></li><li><p><strong>Vendors multiply the risk.</strong> Platforms typically outsource verification. Each extra party adds storage, backups, employee access, and potential misconfigurations. Users rarely know who these vendors are or how long they keep data.</p></li><li><p><strong>&#8220;Delete after check&#8221; isn&#8217;t guaranteed.</strong> In practice, copies live on in support tickets, QA screenshots, caches, and backups. Once leaked, you can&#8217;t rotate a date of birth or ID number.</p></li><li><p><strong>Function creep.</strong> Photos and IDs collected &#8220;just for age&#8221; can be reused later&#8212;for marketing, fraud scoring, or law-enforcement fishing&#8212;unless tightly banned and audited.</p></li><li><p><strong>Anonymity suffers.</strong> Mandatory ID checks chill speech and participation, especially in sensitive communities (health, LGBTQ+, political dissent).</p></li></ul><p><strong>Better approaches</strong> (what we advocate)</p><ul><li><p><strong>Privacy-preserving age assurance</strong> (on-device estimation, cryptographic &#8220;proof of age&#8221; tokens from trusted IDs without revealing identity or storing documents).</p></li><li><p><strong>Strict data-minimization and retention caps</strong> (no vendor retention beyond a brief verification window; independent audits).</p></li><li><p><strong>Real alternatives</strong> for users who can&#8217;t or shouldn&#8217;t upload IDs (supervised accounts, feature gating without identity, prepaid age-verified tokens).</p></li><li><p><strong>Clear vendor transparency</strong> (who handles your data, where it&#8217;s stored, how/when it&#8217;s deleted).</p></li></ul><p><strong>What you can do</strong></p><ol><li><p><strong>Close your Discord account and Delete your data</strong> &#8594; <a href="https://yourdigitalrights.org/d/discord.com">https://yourdigitalrights.org/d/discord.com</a></p></li><li><p>Turn on 2FA for the email accounts tied to Discord; change your Discord password if reused anywhere else.</p></li><li><p>Watch for targeted phishing that references your real details (&#8220;re-verify your age&#8221;). Open Discord directly&#8212;don&#8217;t use links in messages.</p></li><li><p>Going forward, avoid ID uploads where possible; if unavoidable, ask for written retention limits and deletion confirmation.</p></li></ol><div><hr></div><h1>Prosper breach exposed highly sensitive personal data</h1><p><strong>What happened</strong><br>Prosper (peer-to-peer lending) disclosed a large breach discovered in late September/early October. Data was accessed from systems holding consumer and borrower information.</p><p><strong>What was exposed</strong><br>Contact details (name, email, phone, address), government-ID details (e.g., SSN/ID numbers, DOB), and in some cases income/employment information used for underwriting. Payment credentials are not the main concern here&#8212;the exposure is the dense identity profile.</p><p><strong>Who&#8217;s affected</strong><br>Current and past applicants/borrowers, as well as some individuals who were invited or pre-qualified. Even if you didn&#8217;t complete a loan, application data may still be in scope.</p><p><strong>Why it matters</strong></p><ul><li><p>This is precisely the mix that enables <strong>new-account fraud</strong> (credit cards/loans opened in your name).</p></li><li><p>Expect targeted phishing that references your real employer/income or application status.</p></li><li><p>Because SSNs/ID numbers don&#8217;t change easily, the risk persists for years, not weeks.</p></li></ul><p><strong>What you can do</strong></p><ol><li><p><strong>Delete your data</strong> &#8594; <a href="https://yourdigitalrights.org/d/prosper.com">https://yourdigitalrights.org/d/prosper.com</a></p></li><li><p>Place a <strong>credit freeze</strong> (free in many jurisdictions). It prevents new credit from being opened without your explicit lift.</p></li><li><p>Set fraud alerts with major bureaus; check your credit report over the next 12&#8211;24 months for unfamiliar inquiries or accounts.</p></li><li><p>Treat &#8220;we need to verify your identity/application&#8221; calls/texts as hostile by default. Hang up and call the institution via the official number in their app or on their card.</p></li></ol><div><hr></div><h1>Qantas customer data posted after a third-party compromise</h1><p><strong>What happened</strong><br>A vendor servicing multiple brands was breached; data sets for Qantas customers were among those posted. This is a classic supply-chain incident: you trusted the airline; the weak link was a contractor.</p><p><strong>What was exposed</strong><br>Personal profile fields such as name, email, phone, date of birth, and frequent-flyer details (membership numbers, sometimes status or points context). Payment card data was not the focus, but profile data is more than enough for convincing scams.</p><p><strong>Who&#8217;s affected</strong><br>Qantas customers whose profiles were synced or processed by the impacted vendor during the relevant window&#8212;this can include inactive accounts if data wasn&#8217;t purged.</p><p><strong>Why it matters</strong></p><ul><li><p>Phishing is easier when attackers know your airline and loyalty details (&#8220;your flight has changed&#8221;, &#8220;points expiring: confirm now&#8221;).</p></li><li><p>If they can take your <strong>email</strong> account, they can reset everything else; travel accounts are attractive because of stored identities and rewards.</p></li></ul><p><strong>What you can do</strong></p><ol><li><p><strong>Delete your data</strong> &#8594; <a href="https://yourdigitalrights.org/d/qantas.com">https://yourdigitalrights.org/d/qantas.com</a></p></li><li><p>Don&#8217;t follow flight/account links from email/SMS. Open the airline app or type qantas.com yourself.</p></li><li><p>Enable 2FA on your <strong>email</strong> and your airline account; review security questions and recovery addresses/phones.</p></li><li><p>Check your frequent-flyer history for unfamiliar redemptions or name/phone changes.</p></li><li><p>If you shared passport details with any airline, consider renewing sooner if you encounter misuse (varies by country).</p></li></ol><div><hr></div><h1>Product news &#8212; YourDigitalRights.org</h1><p><strong>New regulation support (October)</strong></p><ul><li><p><strong>Maryland (MD)</strong> &#8212; Maryland Online Data Privacy Act</p></li><li><p><strong>Indiana (IN)</strong> &#8212; Indiana Consumer Data Protection Act</p></li><li><p><strong>Kentucky (KY)</strong> &#8212; Kentucky Consumer Data Protection Act</p></li><li><p><strong>Rhode Island (RI)</strong> &#8212; Rhode Island Data Transparency and Privacy Protection Act</p></li></ul><p><strong>New regulation support (May)</strong></p><ul><li><p><strong>China (CN)</strong> &#8212; Personal Information Protection Law</p></li><li><p><strong>South Africa (ZA)</strong> &#8212; Protection of Personal Information Act</p></li><li><p><strong>Tennessee (TN)</strong> &#8212; Tennessee Information Protection Act</p></li><li><p><strong>Minnesota (MN)</strong> &#8212; Minnesota Consumer Data Privacy Act</p></li><li><p><strong>Australia (AU)</strong> &#8212; Australian Privacy Principles</p></li><li><p><strong>Jordan (JO)</strong> &#8212; Personal Data Protection Law</p></li><li><p><strong>Thailand (TH)</strong> &#8212; Personal Data Protection Act</p></li></ul><p><strong>Localization</strong><br>YourDigitalRights.org now supports <strong>30 languages</strong> so more people can use their rights in the language they&#8217;re most comfortable with.</p><div><hr></div><h2>Quick actions</h2><ul><li><p><strong>Delete your data from Discord</strong> &#8594; <a href="https://yourdigitalrights.org/d/discord.com">https://yourdigitalrights.org/d/discord.com</a></p></li><li><p><strong>Delete your data from Prosper</strong> &#8594; <a href="https://yourdigitalrights.org/d/prosper.com">https://yourdigitalrights.org/d/prosper.com</a></p></li><li><p><strong>Delete your data from Qantas</strong> &#8594; <a href="https://yourdigitalrights.org/d/qantas.com">https://yourdigitalrights.org/d/qantas.com</a></p></li><li><p>Turn on <strong>2FA</strong> (email first), use a <strong>password manager</strong>, and don&#8217;t reuse passwords.</p></li><li><p>Clean up old accounts you no longer use; fewer accounts = smaller attack surface.</p></li></ul><p></p><p>Please consider donating to Coscious Digital. By donating, or becoming a supporting member you can help ensure our long-term financial stability and independence.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://opencollective.com/consciousdigital&quot;,&quot;text&quot;:&quot;Donate&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://opencollective.com/consciousdigital"><span>Donate</span></a></p><p></p><p></p>]]></content:encoded></item><item><title><![CDATA[Privacy at the Border: The Ultimate Technical Guide to Securing Your Data and Devices at Border Crossings]]></title><description><![CDATA[Privacy Alerts April 2025]]></description><link>https://newsletter.yourdigitalrights.org/p/privacy-at-the-border-the-ultimate</link><guid isPermaLink="false">https://newsletter.yourdigitalrights.org/p/privacy-at-the-border-the-ultimate</guid><dc:creator><![CDATA[Yoav Aviram]]></dc:creator><pubDate>Tue, 08 Apr 2025 11:52:31 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/e7dcf348-d344-483a-a4f7-d057eff2a48a_1536x1024.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>Imagine arriving at an airport and being denied entry because of what&#8217;s on your phone. This isn&#8217;t a dystopian fantasy &#8211; it&#8217;s a reality for some travelers today. Under broad legal powers and minimal oversight, U.S. Customs and Border Protection (CBP) agents can search laptops, phones, and other devices at the border with few constraints. In one recent case, a French scientist traveling to a conference in Houston was <a href="https://newrepublic.com/post/192946/french-scientist-denied-us-entry-trump-criticism#:~:text=A%20French%20scientist%20on%20his,criticized%20President%20Trump%E2%80%99s%20science%20cuts">turned away</a> after CBP officers found private messages critical of President Trump on his phone, which agents absurdly claimed: &#8220;<em>conveyed hatred of Trump &amp; could be qualified as terrorism</em>&#8221;. In another, a Brown University doctor named Rasha Alawieh was <a href="https://reason.com/?p=8324347#:~:text=Border%20phone%20searches%20are%20in,Hezbollah%20images%20on%20her%20phone">refused entry</a> when agents discovered &#8220;pro-Hezbollah&#8221; images in her phone&#8217;s photo album. These incidents show a disturbing trend: border officials increasingly comb through personal data and have even used it to justify deportations or visa denials. CBP&#8217;s device searches <a href="https://themunicheye.com/cautions-for-travelers-us-entry-mobile-device-advice-14789#:~:text=Recent%20cases%20have%20highlighted%20the,evolve%20in%20the%20current%20year">have spiked</a> in frequency under recent policies, yet the practice faces little outside oversight.</p><p>Unfortunately, in the current geopolitical client, this situation is not unique to U.S. borders, as many other countries are following in the footsteps of the U.S. to enact stronger immigration laws and more prevalent inspections.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://newsletter.yourdigitalrights.org/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Privacy Alerts is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p>In the U.S., CBP agents operate under a special legal loophole known as the <a href="https://en.wikipedia.org/wiki/Border_search_exception">border search exception</a> to the Fourth Amendment, which means they don&#8217;t need a warrant or probable cause to search travelers&#8217; belongings at entry points. In fact, courts have <em>not yet settled</em> how this applies to our digital devices, so for now, CBP largely sets its own rules. Those rules give officers wide latitude: they can conduct a basic manual search of your phone at their discretion, and with any &#8220;reasonable suspicion&#8221; (or vaguely defined &#8220;national security&#8221; concern), they can perform an &#8220;advanced search&#8221; using forensic tools like <a href="https://en.wikipedia.org/wiki/Cellebrite">Cellebrite</a> to hack into your device and copy data.</p><p>Officers are <em>supposed</em> to only inspect data stored on the device, but in practice, an agency&#8217;s internal promises are scant comfort when you&#8217;re at the border. &#8220;The super-conservative perspective is to assume they [CSB] are completely unhinged and that even the most benign reasons for travel are going to subject non-citizens to these device searches,&#8221; said <a href="https://www.theguardian.com/technology/2025/mar/26/phone-search-privacy-us-border-immigration#:~:text=critical%20of%20Trump%20on%20his,phone">Sophia Cope</a>, a senior staff attorney at the Electronic Frontier Foundation (EFF). Even U.S. citizens &#8211; who by law cannot be refused entry &#8211; aren&#8217;t immune from hassle: agents can detain you for hours and confiscate your device if you decline to unlock it. For visa holders and foreign visitors, the stakes are higher: CBP can decide on the spot that you&#8217;re &#8220;not eligible&#8221; to enter if you refuse a search or if they dislike what they find. Legal permanent residents (green card holders) historically had rights close to citizens, but recent crackdowns show that even they can be targeted under broad &#8220;national security&#8221; pretexts (e.g., the <a href="https://reason.com/?p=8324347#:~:text=Legal%20permanent%20residents%20are%20in,Mahmoud%20Khalil%20and%20Yunseo%20Chung">attempted deportation</a> of Columbia University graduate Mahmoud Khalil in apparent retaliation for his campus activism). In short, anyone crossing into the U.S. and a number of other countries should be prepared for the possibility of intrusive digital searches &#8211; especially journalists, activists, or others carrying sensitive information.</p><h2>What Are Border Agents Looking For on Your Devices?</h2><p>CBP agents claim that searching phones and laptops is a &#8220;routine part&#8221; of verifying a visitor&#8217;s admissibility. In many cases, they&#8217;re hunting for evidence of anything that might violate immigration rules or national security:</p><ul><li><p><strong>Political or religious content:</strong> Private communications or social media that express certain political opinions have raised flags. The <a href="https://newrepublic.com/post/192946/french-scientist-denied-us-entry-trump-criticism#:~:text=A%20French%20scientist%20on%20his,criticized%20President%20Trump%E2%80%99s%20science%20cuts">French researcher&#8217;s</a> text messages criticizing U.S. policies were viewed as &#8220;anti-American&#8221; and even conflated with terrorism. In the past, travelers have been questioned about their political beliefs or associations at the border. Content supporting controversial groups (for example, the images on <a href="https://www.reuters.com/world/us/doctor-deported-lebanon-had-photos-sympathetic-hezbollah-phone-us-says-2025-03-17/">Rasha Alawieh&#8217;s phone</a> that were deemed supportive of Hezbollah) can be treated as links to extremism. Even completely lawful activism or speech may draw scrutiny if an agent deems it &#8220;inflammatory.&#8221; This creates a climate where legitimate dissent or religious expression could be misinterpreted as a security threat.</p></li><li><p><strong>Contact lists and communications:</strong> Agents often scroll through contacts, call logs, emails, messaging apps, and social media. They may look for names of people of interest, evidence of plans to overstay a visa or work without authorization, or any associations they consider suspicious. In <a href="https://themunicheye.com/cautions-for-travelers-us-entry-mobile-device-advice-14789#:~:text=device%2C%20rather%20than%20accessing%20information,how%20they%20present%20themselves%20online">one reported case</a>, officers demanded a traveler&#8217;s social media handles and scoured their online posts. Notably, U.S. visa applications now ask for social media IDs, so border agents can already view any content you&#8217;ve made public. While the policy says agents shouldn&#8217;t demand your private social media passwords, anything you&#8217;re already logged into on your device at the moment you hand it over to an agent could be accessed. Essentially, your digital footprint &#8211; from WhatsApp chats to Twitter feed &#8211; is under the microscope. Even the list of previously used WiFi hotspots can be used to determine where you have been.</p></li><li><p><strong>Photos, videos, and files:</strong> Your camera roll and files can also be browsed for incriminating material. Agents have searched photo galleries for violent or explicit content, symbols, or contacts. Dr. Alawieh&#8217;s case is a cautionary tale: the &#8220;incriminating&#8221; photos agents cited were not even in her main gallery but in the phone&#8217;s &#8220;Recently Deleted&#8221; folder (iPhones retain deleted photos for 30 days unless you manually purge them). This means that even files you think you deleted might still be found during a forensic search. Simply clearing the trash bin isn&#8217;t foolproof &#8211; often, deletion just hides data without truly erasing it from storage. Agents with specialized tools might recover emails, browser history, or documents you attempted to remove.</p></li><li><p><strong>Anything they can use against you: </strong>The unfortunate reality is that at the border, the presumption of innocence is flipped. Officers have wide discretion to interpret what they find. Harmless content can be taken out of context &#8211; jokes in a group chat, memes saved on your phone, or an old text about looking for work could all raise questions. If agents find something they don&#8217;t like, they can use it as a basis to refuse entry, cancel your visa, or, in rare cases, confiscate your device for further investigation. And if you refuse to cooperate or provide passwords, that alone might be viewed as suspicious. In other words, border agents are fishing for anything &#8211; from serious to trivial &#8211; that they can use to question your purpose or character.</p></li></ul><p>It&#8217;s hard to predict exactly what will trigger scrutiny, which is why we suggest taking a &#8220;better safe than sorry&#8221; approach. Sophia Cope <a href="https://www.theguardian.com/technology/2025/mar/26/phone-search-privacy-us-border-immigration#:~:text=Privacy%20experts%20say%20everyone%20should,before%20heading%20to%20the%20airport">advises</a> doing a personal risk assessment: consider your immigration status, travel history, and what data you carry that could be misinterpreted. Then, take steps to minimize what&#8217;s on your device during travel.</p><h2>Travel Clean: Consider Leaving Personal Devices at Home</h2><p>The simplest way to protect your digital privacy at the border is not to carry sensitive data across in the first place. Border authorities can only search what you have on your devices at the border.&#8221; If you don&#8217;t bring it, they can&#8217;t search it. For this reason, we recommend using &#8220;clean&#8221; devices for travel and leaving your everyday phone or laptop at home.</p><p><strong>Burner Phones &amp; Temporary Laptops</strong>: One strategy is to use a basic &#8220;burner&#8221; phone (a cheap phone with a fresh SIM or no SIM) while traveling. Your regular phone can stay safely at home, and you carry a phone that has no sensitive data on it &#8211; just the bare essentials for communication. Similarly, you might travel with a loaner or new laptop that contains no personal files. A Chromebook is a good travel laptop since it&#8217;s inexpensive and designed to store data primarily in the cloud. With a clean device, if an agent confiscates or searches it, there&#8217;s little for them to find. It is advisable to hand over the device when it is turned off, as this ensures no recently used apps are running and that the running memory is clean. It is, therefore, important to remember to turn off your devices well before you reach the border crossing. <strong>Note</strong>: A completely clean device may be seen as suspicious and used as a pretext for further search. <em>&#8220;People are damned if they do and damned if they don&#8217;t, If you cross the border with no data on your device, that itself can be seen as suspicious.,&#8221;</em> <a href="https://www.theguardian.com/technology/2025/mar/26/phone-search-privacy-us-border-immigration#:~:text=said%20that%20could%20actually%20raise,suspicions">warns</a> EFF&#8217;s Sophia Cope. Border agents might wonder if you wiped something incriminating. We, therefore, recommend using your clean devices before traveling to make sure they look authentic.</p><p><strong>Cloud Storage is Your Friend</strong>: Using cloud services can help ensure you&#8217;re not carrying data locally. Files, photos, and messages that you store in the cloud &#8211; <strong>and log out of</strong> &#8211; won&#8217;t be accessible if your device is searched offline. Current <a href="https://www.theguardian.com/technology/2025/mar/26/phone-search-privacy-us-border-immigration#:~:text=During%20law%20enforcement%20searches%20inside,airplane%20mode%20before%20searching%20it">CBP policy</a> instructs officers to only inspect data residing on the device, not to probe their online accounts. So, consider uploading important documents to a secure cloud drive and delete the local copies from your phone or computer before you travel. You can download them later once you&#8217;re safely past the border. <strong>Note:</strong> You must fully log out of cloud apps (Drive, Dropbox, iCloud, email, etc.) on your device; if you stay logged in, an officer can open those apps and view synced data. But if the data lives only online and your device is offline and logged out, it&#8217;s effectively out of reach. This way, you travel &#8220;light&#8221; digitally &#8211; your device becomes a shell that grants access to your cloud data <em>after</em> you&#8217;re through customs.</p><p><strong>Wipe Data Before the Next Destination</strong>: If you do use a device during your trip (even a &#8220;clean&#8221; one can accumulate messages or photos), you might consider deleting personal data before crossing into your next destination. For example, if you&#8217;re concerned about searches when you return home or enter another country, back up any data you need and delete it prior to travel. This ensures that any new sensitive info you picked up on your trip isn&#8217;t carried over borders. However, remember that showing up with a completely clean device, such as the case following a factory reset, may look suspicious.</p><p>In an ideal world, you would travel with zero private data and have nothing to worry about. In reality, completely disconnecting may not be practical for everyone. If you must bring your regular phone or laptop or need to keep some data with you, the next section covers steps you can take to mitigate the risks.</p><h2>What if You Decide to Bring Your Personal Devices Along?</h2><p>If you choose to travel with your personal device (or can&#8217;t use a burner), you should harden it and minimize its contents before you reach the border. Here are some precautions to help protect your privacy:</p><ul><li><p><strong>Power Off Before Crossing &amp; Use Strong Passwords</strong>: Shut down your devices completely before you approach customs. Turning off a phone or laptop resets its security state and re-enables full disk encryption, making it much harder for anyone to bypass your lock screen. Upon reboot, a password will be required to decrypt the storage. This is critical: if your phone is just in sleep mode, advanced forensics tools might be able to exploit it. So power down, and when you turn it on for an officer, unlock it yourself if required to &#8211; don&#8217;t reveal your passcode. Also, ensure you have a strong device passphrase, not something easily guessable. Modern iPhones and many Androids are encrypted by default (as long as you set a PIN/password), but that encryption is only as strong as your code. We recommend a password at least 9-12 characters long (or a random 4-5 word phrase) for robust security. A long, unique passcode can thwart casual guessing by agents and significantly slow down forensic cracking attempts.</p></li><li><p><strong>Disable Fingerprints and Face Unlock:</strong> Biometric locks (fingerprints, Face ID, etc.) should be turned off before travel. Why? Because agents <em>can</em> physically compel or trick you into unlocking with your biometrics &#8211; for example, by holding your phone up to your face &#8211; even if they can&#8217;t legally force you to divulge a PIN. Unlike a memorized password, which you can refuse to provide, your biometric features aren&#8217;t protected in the same way. To avoid this, switch to password-only unlock at least for the duration of your trip. On iPhones, if you hold the side button and a volume button for a few seconds, it will disable Face ID until the next passcode entry. Similarly, you can turn off Touch ID/Face ID in settings before you travel. This ensures that only your password can unlock the device, which is under your control. It might feel less convenient day-to-day, but it&#8217;s a smart trade-off when crossing borders.</p></li><li><p><strong>Encrypt and Back Up Everything</strong>: Full-device encryption is a must if you travel with electronics. Encryption scrambles your data so that even if an agent confiscates your device and connects it to forensic software, they&#8217;ll struggle to access your files without your key. Most up-to-date smartphones have encryption on by default &#8211; just double-check in your security settings. For laptops, enable disk encryption (FileVault on Mac, BitLocker on Windows, or VeraCrypt for other systems). Back up your data before traveling, then remove what you don&#8217;t need from the device. The idea is to carry as little sensitive information as possible and have an encrypted backup at home or in the cloud to restore later. That way, even if something happens to your device or you choose to wipe it, you haven&#8217;t lost anything important.</p></li><li><p><strong>Use &#8220;Travel Mode&#8221; and a Security PIN for Sensitive Apps:</strong> Some apps recognize the unique security risks of travel. For example, the password manager 1Password offers a Travel Mode that temporarily removes designated vaults from your device entirely. Before you cross a border, you can flip the app into travel mode to hide sensitive passwords or documents, leaving only a minimal set of data accessible. Once you&#8217;re safely through, you log into 1Password&#8217;s website to restore your vaults. Consider using this if you have a password manager &#8211; it&#8217;s an excellent way to avoid carrying a trove of account credentials that could be compromised. Likewise, log out of email and social media apps or even uninstall them for the trip if you won&#8217;t need them. You can always reinstall later. Some travelers go as far as to create a separate &#8220;travel&#8221; account (email, social, etc.) that they use on the road, which contains no sensitive info, while their real accounts stay logged out. This kind of alternate persona can be useful for high-risk individuals: your travel accounts present a clean, innocuous profile if inspected, while your true data remains in the cloud, protected by strong passwords you haven&#8217;t stored on the device. Finally, some apps such as two-factor authenticator (2FA), dropbox, and crypto-wallets allow you to specify a lock PIN that you have to enter before using the app. This provides another layer of security.</p></li><li><p><strong>Protect Your Contacts and Messages</strong>: Think carefully about the contacts, call logs, and messages on your device. These can reveal your associations (friends, colleagues, organizations) and personal life. If you have contacts that might raise questions (e.g. journalists, activists, or just someone with a certain surname), you might remove or alias them for the trip. For messaging apps, consider clearing chat histories or using apps with disappearing messages for any particularly sensitive conversations before you travel. It may also help to turn off message previews on your lock screen &#8211; so if your device receives a text during the inspection, it doesn&#8217;t display potentially private content to prying eyes. Overall, carry only what communication data you truly need; archive or delete the rest.</p></li><li><p><strong>Plan for the Worst (and Hope for the Best)</strong>: Finally, mentally prepare a plan for what you will do if an agent demands access to your device. Know your bottom line: Are you willing to refuse and risk longer detention or denial of entry? Or will you comply but try to minimize what&#8217;s exposed? It&#8217;s a personal decision. Remember, U.S. citizens cannot be denied entry for refusing a device search (though you might be delayed). Visitors, unfortunately, don&#8217;t have that protection &#8211; refusing could mean you&#8217;re sent back home. Some travelers have a &#8220;dummy&#8221; screen ready &#8211; e.g., a secondary phone that you surrender &#8211; while keeping their primary data elsewhere. If you&#8217;re extremely concerned, you might coordinate with a lawyer in advance or have a device confiscation contingency (for instance, some journalists travel with loaner devices that can be safely abandoned if seized). These scenarios are rare, but thinking them through ahead of time will leave you much more confident if you do hear those dreaded words: &#8220;Please step aside for secondary inspection.&#8221;</p></li></ul><h2>Conclusion</h2><p>Crossing the border with digital devices now carries real privacy risks. In an age of cloud-connected lives, our phones and laptops hold intimate details about who we are &#8211; information that border agents can exploit under lax rules. The stories of travelers being deported or detained over innocent texts and photos are a wake-up call. The good news is you <em>can</em> take control of your data footprint. The best solution is to travel with devices that reveal little or nothing &#8211; and thanks to cloud services and affordable gadgets, that&#8217;s easier than ever. If you do bring your primary devices, a bit of preparation (encrypting, logging out, using strong passwords, and pruning sensitive data) can go a long way to shield your privacy during border crossings.</p><p>Digital rights advocates at Conscious Digital and beyond want you to know that you don&#8217;t have to roll over when faced with an invasive device search. By following the steps above and staying informed of your rights, you can significantly reduce the risk of a privacy violation at the border. Safe travels &#8211; and stay safe online, too!</p><p><strong>Sources:</strong> This guide draws on expertise from the Electronic Frontier Foundation&#8217;s <a href="https://www.eff.org/wp/digital-privacy-us-border-2017">Digital Privacy at the U.S. Border</a> handbook and recent cases reported by The Guardian, Reason, Bruce Schneier, and others.</p><p><strong>On a personal note,</strong> I hesitated before publishing this post because it could place me in the same risk category as people who have been detained at the border due to a digital footprint that CBP agents deemed unacceptable. If a CBP agent is reading this in the future while I await the outcome of an inspection, please know I am simply doing my job: informing the public of their digital rights and choices. Any criticism implied here is aimed broadly&#8212;at previous administrations and other countries&#8212;not at any single individual. It&#8217;s not personal.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://newsletter.yourdigitalrights.org/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Privacy Alerts is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item><item><title><![CDATA[23andMe Customers? This May Be Your Last Chance to Protect Your Data ]]></title><description><![CDATA[Stay ahead of online threats and take control of your personal data with Privacy Alerts! Our newsletter provides the latest expert advice, tips, and tricks to safeguard your privacy in the digital world. Subscribe now to stay informed and empowered!]]></description><link>https://newsletter.yourdigitalrights.org/p/23andme-customers-this-may-be-your</link><guid isPermaLink="false">https://newsletter.yourdigitalrights.org/p/23andme-customers-this-may-be-your</guid><dc:creator><![CDATA[Yoav Aviram]]></dc:creator><pubDate>Fri, 28 Mar 2025 17:11:44 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/0fcfff9b-4039-4b71-8724-c4efb9439f67_1536x1024.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<h2><strong>Immediate Recommendation</strong></h2><p>All customers of <a href="https://www.23andme.com/">23andMe</a> and similar genetic testing companies, as well as individuals who have family members who are customers of these services, should:</p><ol><li><p><strong>Download your genetic data immediately</strong>.</p></li><li><p><strong>Delete your data directly via the company's website</strong>.</p></li><li><p><strong>Send a legally binding data deletion request.</strong></p></li></ol><p>Please continue reading to understand why this action is critical and how to proceed with data deletion. The potential for significant data misuse means we may not have yet witnessed the worst-case scenario.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://newsletter.yourdigitalrights.org/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Privacy Alerts is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><h2><strong>Unforeseen Privacy Risks</strong></h2><p>23andMe, once a leading pioneer of direct-to-consumer genetic testing, recently shocked the industry by <a href="https://customercare.23andme.com/hc/en-us/articles/30805135934615-Questions-related-to-23andMe-s-Chapter-11-Filing">filing for bankruptcy</a>. Founded in the mid-2000s, 23andMe soared in popularity, selling saliva-based DNA tests that unveiled customers&#8217; ancestry breakdowns and potential health risks. Over 15 million people worldwide used 23andMe, drawn by the promise of connecting with relatives and discovering hidden parts of their family history.</p><p>Yet this trove of genetic data also posed serious privacy risks. Customers entrusted 23andMe with not only their DNA but also their names, birthdates, geographic details, and often health survey data. Because genetic information is essentially impossible to change, a breach of this data can have lifelong consequences. Worse, 23andMe&#8217;s policies aren&#8217;t governed by strict health privacy laws like HIPAA in the United States; instead, the company&#8217;s privacy pledges rest mainly in its user agreements, which can change over time.</p><p>Another largely unrecognized privacy threat concerns relatives who never consented to testing. Genetic data is shared among family members, so by submitting their saliva, your relatives also reveal parts of your and your children&#8217;s genetic profile. Researchers have shown it takes only a relatively small database to identify the majority of individuals of European descent by cross-referencing DNA markers. That means even non-customers are indirectly exposed.</p><h2><strong>A History of Negligence</strong></h2><p>The company&#8217;s history of data breaches highlights how vulnerable this information can be. In late 2023, a credential-stuffing attack <a href="https://en.wikipedia.org/wiki/23andMe_data_leak">compromised</a> about 6.9 million customers&#8217; data, including partial ancestry details, personal demographics, and family connections. Raw DNA files weren&#8217;t publicly released, but the breach exposed extremely sensitive information. Attackers listed entire swaths of profiles for sale on the dark web&#8212;some grouped by ethnicity&#8212;raising concerns about discrimination, financial scams, or even identity theft. Most alarmingly, many people&#8217;s data was harvested simply because they appeared in someone else&#8217;s DNA Relatives match list.</p><p>Public confidence in 23andMe plummeted after this breach, and the company struggled to recover. With growth stagnating in the DNA test kit market&#8212;largely a one-time purchase&#8212;23andMe&#8217;s revenue began to stall. Its stock price, which had soared during an earlier IPO, tanked. Despite layoffs and an aborted attempt to pivot to drug development, 23andMe ultimately filed for Chapter 11 bankruptcy in March 2025. The company listed over 15 million genetic profiles in its database in its court filings&#8212;potentially one of its most valuable assets.</p><p>Now, 23andMe&#8217;s financial woes place user data at even greater risk. In bankruptcy sales, user data is viewed as an asset that can be transferred to new owners who might see commercial value in monetizing that information in various ways. The company&#8217;s terms of service explicitly state that genetic data may be transferred if 23andMe is sold or restructured&#8212;an unsettling reality for anyone who assumed their DNA would never leave the original custodians&#8217; hands.</p><h2><strong>Take Action</strong></h2><p>The Attorney General of California has issued an urgent <a href="https://oag.ca.gov/news/press-releases/attorney-general-bonta-urgently-issues-consumer-alert-23andme-customers">alert</a> instructing 23andMe customers to delete their data and have their genetic samples destroyed. The alert contains step-by-step instructions on how to do this via the 23andMe website. You should follow these instructions now, even if you are not a California resident. In addition to the steps in the alert, we recommend sending 23andMe a legally binding data deletion request. Sending such a request will give you additional legal recourse if the company does not fully comply with your request. You can send 23andMe a data deletion request via the following link:</p><ul><li><p><a href="https://yourdigitalrights.org/d/23andme.com">https://yourdigitalrights.org/d/23andme.com</a></p></li></ul><h2><strong>Broader Implications</strong></h2><p>These events underscore a broader warning about consumer genomics. Similar companies such as AncestryDNA, MyHeritage, FamilyTreeDNA, and Living DNA also gather large volumes of deeply personal data from millions of users. Each business sets its own rules for data usage, retention, and sharing. If you share your genetic profile&#8212;on purpose or via a relative&#8212;truly securing that data can be complex. Law enforcement agencies have already leveraged some databases to identify crime suspects through distant relatives, stirring debate over genetic privacy rights. If you are a customer of any one of the companies listed above, please consider deleting your data as well. Here are the links:</p><ul><li><p><a href="https://yourdigitalrights.org/d/ancestry.com">https://yourdigitalrights.org/d/ancestry.com</a></p></li><li><p><a href="https://yourdigitalrights.org/d/myheritage.com">https://yourdigitalrights.org/d/myheritage.com</a></p></li><li><p><a href="https://yourdigitalrights.org/d/familytreedna.com">https://yourdigitalrights.org/d/familytreedna.com</a></p></li><li><p><a href="https://yourdigitalrights.org/d/livingdna.com">https://yourdigitalrights.org/d/livingdna.com</a></p></li></ul><p>In hindsight, 23andMe&#8217;s bankruptcy is a cautionary tale: It reminds us that genetic data is profoundly sensitive, and handing it over to a private company is a significant act of trust. If that company falters financially or is sold to a third party, your personal information might end up in unfamiliar hands. Above all, it is a reminder that we can never know up front where our personal information, once shared, will end up, what other data it will be joined with, nor all the ways by which it can be used against our interests.</p><p><strong>Do not delay&#8212;protect yourself by deleting your genetic data immediately via the company's website and sending a formal data deletion request.</strong></p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://newsletter.yourdigitalrights.org/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Privacy Alerts is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item><item><title><![CDATA[New ChatGPT Vulnerability Steals User Data]]></title><description><![CDATA[Privacy Alerts - September 26th 2024]]></description><link>https://newsletter.yourdigitalrights.org/p/new-chatgpt-vulnerability-steals</link><guid isPermaLink="false">https://newsletter.yourdigitalrights.org/p/new-chatgpt-vulnerability-steals</guid><dc:creator><![CDATA[Yoav Aviram]]></dc:creator><pubDate>Thu, 26 Sep 2024 09:30:52 GMT</pubDate><enclosure url="https://substackcdn.com/image/youtube/w_728,c_limit/zb0q5AW5ns8" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>Researcher Johann Rehberger discovered a vulnerability in OpenAI's ChatGPT that exploits its long-term conversation memory feature through indirect prompt injection. By embedding malicious instructions in untrusted content like emails or websites, attackers could trick the AI into storing false instructions in its persistent memory, influencing all future interactions. Rehberger demonstrated that these false memories could be implanted via methods like storing files on cloud services or browsing compromised websites, effectively allowing attackers to manipulate the AI's behavior without the user's knowledge.</p><p>After initially reporting the issue to OpenAI without resolution, Rehberger provided a proof-of-concept showing how the ChatGPT macOS app could be manipulated to send all user inputs and outputs to an attacker's server using a malicious image link. The most remarkable aspect of this exploit is that it is persistent across new conversations due to ChatGPT&#8217;s long-term memory feature:</p><div id="youtube2-zb0q5AW5ns8" class="youtube-wrap" data-attrs="{&quot;videoId&quot;:&quot;zb0q5AW5ns8&quot;,&quot;startTime&quot;:null,&quot;endTime&quot;:null}" data-component-name="Youtube2ToDOM"><div class="youtube-inner"><iframe src="https://www.youtube-nocookie.com/embed/zb0q5AW5ns8?rel=0&amp;autoplay=0&amp;showinfo=0&amp;enablejsapi=0" frameborder="0" loading="lazy" gesture="media" allow="autoplay; fullscreen" allowautoplay="true" allowfullscreen="true" width="728" height="409"></iframe></div></div><p>While OpenAI has implemented a fix to prevent memory abuse for data exfiltration, the risk of prompt injections planting false memories persists. OpenAI provided <a href="https://openai.com/index/memory-and-new-controls-for-chatgpt/">some guidance</a> on how to better control the memory feature.</p><p>This is a good opportunity to re-iterate our advice not to share personal data with ChatGPT and similar commercial systems. This is in part due to exploits such as this one, but mostly because OpenAI uses the content of your chats to train its algorithm. Only Team and Enterprise customers of the platform get to have their data excluded from training data: </p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!ex6W!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F94add5aa-be2a-4a71-a42d-736c47ad9762_1076x1060.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!ex6W!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F94add5aa-be2a-4a71-a42d-736c47ad9762_1076x1060.png 424w, https://substackcdn.com/image/fetch/$s_!ex6W!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F94add5aa-be2a-4a71-a42d-736c47ad9762_1076x1060.png 848w, https://substackcdn.com/image/fetch/$s_!ex6W!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F94add5aa-be2a-4a71-a42d-736c47ad9762_1076x1060.png 1272w, https://substackcdn.com/image/fetch/$s_!ex6W!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F94add5aa-be2a-4a71-a42d-736c47ad9762_1076x1060.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!ex6W!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F94add5aa-be2a-4a71-a42d-736c47ad9762_1076x1060.png" width="1076" height="1060" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/94add5aa-be2a-4a71-a42d-736c47ad9762_1076x1060.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1060,&quot;width&quot;:1076,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:124388,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!ex6W!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F94add5aa-be2a-4a71-a42d-736c47ad9762_1076x1060.png 424w, https://substackcdn.com/image/fetch/$s_!ex6W!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F94add5aa-be2a-4a71-a42d-736c47ad9762_1076x1060.png 848w, https://substackcdn.com/image/fetch/$s_!ex6W!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F94add5aa-be2a-4a71-a42d-736c47ad9762_1076x1060.png 1272w, https://substackcdn.com/image/fetch/$s_!ex6W!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F94add5aa-be2a-4a71-a42d-736c47ad9762_1076x1060.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>This behavior illustrates two alarming trends concerning online privacy. The first is privacy as a premium paid feature. The second is that even when paying for a service, in this case, ChatGPT Pro subscription, you can still end up as the product.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://newsletter.yourdigitalrights.org/p/new-chatgpt-vulnerability-steals?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://newsletter.yourdigitalrights.org/p/new-chatgpt-vulnerability-steals?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://newsletter.yourdigitalrights.org/p/new-chatgpt-vulnerability-steals/comments&quot;,&quot;text&quot;:&quot;Leave a comment&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://newsletter.yourdigitalrights.org/p/new-chatgpt-vulnerability-steals/comments"><span>Leave a comment</span></a></p><p></p>]]></content:encoded></item><item><title><![CDATA[Privacy Alerts, September 2024]]></title><description><![CDATA[Deceptive Design Patterns Guide]]></description><link>https://newsletter.yourdigitalrights.org/p/privacy-alerts-september-2024</link><guid isPermaLink="false">https://newsletter.yourdigitalrights.org/p/privacy-alerts-september-2024</guid><dc:creator><![CDATA[Yoav Aviram]]></dc:creator><pubDate>Fri, 13 Sep 2024 10:23:28 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!oqVg!,w_256,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F5863274e-4461-42e5-8763-01397b9b1a07_1200x1200.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>Welcome to the September 2024 edition of Privacy Alerts! We're excited to announce the re-launch of the Privacy Alerts newsletter. Originally launched in November 2022, Privacy Alerts began as an experimental effort to support our work at <a href="https://consciousdigital.org/">Conscious Digital</a>, the nonprofit behind <a href="https://yourdigitalrights.org/">YourDigitalRights.org</a>, while helping individuals improve their online privacy over time.</p><p>Initially, the focus was on specific companies with poor privacy practices that we recommended opting out of. However, we soon realized this approach was too narrow, and there is much more we&#8217;d like to share with you.</p><p>Moving forward, Privacy Alerts will guide you on actions to take to stay ahead of online threats and better control your personal data. We&#8217;ll offer expert advice, tips, and strategies to protect your digital privacy. This may still include recommendations to opt out of certain companies, but will also cover broader advice such as new privacy-preserving technologies, tools, and services, or important privacy-related settings in commonly used software.</p><p>We're also re-launching the paid version of the newsletter, which will focus on urgent issues that require immediate action to protect your privacy. While the free version will provide occasional updates, the paid version will cover critical events like major data breaches or instances where companies pose an immediate and significant threat to your privacy.</p><p>If you value your privacy in an ever-changing digital world you can subscribe to the paid version here:</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://newsletter.yourdigitalrights.org/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://newsletter.yourdigitalrights.org/subscribe?"><span>Subscribe now</span></a></p><p>If you prefer to stay subscribed to the free version, please consider donating to ensure our long-term financial stability and independence:</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://opencollective.com/consciousdigital&quot;,&quot;text&quot;:&quot;Donate&quot;,&quot;action&quot;:null,&quot;class&quot;:&quot;button-wrapper&quot;}" data-component-name="ButtonCreateButton"><a class="button primary button-wrapper" href="https://opencollective.com/consciousdigital"><span>Donate</span></a></p><h3>Free Guide </h3><p>Today we&#8217;d like to share a guide we recently published titled <em><a href="https://consciousdigital.org/wp-content/uploads/2023/04/deceptive-patterns.pdf">How Deceptive Design is Used to Compromise Your Privacy and How to Fight Back</a></em>. The guide covers 10 deceptive design patterns that threaten data protection, along with strategies to counter them. It focuses on tactics companies use to undermine data protection requests, such as those for data deletion or access.</p><p>Deceptive design, also known as "dark patterns," manipulates individuals into taking actions they wouldn't normally choose&#8212;like signing up for more expensive services, only to downgrade later. These manipulative techniques are often used by companies to sidestep data protection requests, which are legal rights that allow individuals to control their personal data.</p><p>You can <a href="https://consciousdigital.org/deceptive-design-patterns/">learn more</a> about this research further on our website. We hope you find the <a href="https://consciousdigital.org/wp-content/uploads/2023/04/deceptive-patterns.pdf">guide</a> helpful!</p><h3><strong>Product Update</strong></h3><p>We have been working hard on adding additional countries and regulations to <a href="http://yourdigitalrights.org">YourDigitslRights.org</a>. These include <a href="https://consciousdigital.org/welcoming-texas-and-oregon-to-yourdigitalrights-org/">Texas</a>, <a href="https://consciousdigital.org/welcoming-texas-and-oregon-to-yourdigitalrights-org/">Oregon</a>, <a href="https://consciousdigital.org/welcoming-florida-to-your-digital-rights/">Florida</a>, <a href="https://consciousdigital.org/welcoming-india-to-your-digital-rights/">India</a>, and <a href="https://consciousdigital.org/welcoming-switzerland-to-your-digital-rights/">Switzerland</a>.</p><p>We are also looking for volunteer software engineers with the following skills: Machine Learning, React, and AWS. Please <a href="http://info@yourdigitalrights.org">contact us</a> if you would like to help us improve the platform.</p><p>As always, we appreciate your feedback in any form. If you have any suggestions or requests please <a href="mailto:info@consciousdigital.org">email us</a>, or leave a comment.</p><p>Yoav<br>Founder, <a href="https://consciousdigital.org">Conscious Digital</a> // <a href="https://YourDigitalRights.org">YourDigitalRights.org</a></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://newsletter.yourdigitalrights.org/p/privacy-alerts-september-2024?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;,&quot;action&quot;:null,&quot;class&quot;:&quot;button-wrapper&quot;}" data-component-name="ButtonCreateButton"><a class="button primary button-wrapper" href="https://newsletter.yourdigitalrights.org/p/privacy-alerts-september-2024?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://newsletter.yourdigitalrights.org/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:&quot;button-wrapper&quot;}" data-component-name="ButtonCreateButton"><a class="button primary button-wrapper" href="https://newsletter.yourdigitalrights.org/subscribe?"><span>Subscribe now</span></a></p>]]></content:encoded></item><item><title><![CDATA[Privacy Alerts, February 2023]]></title><description><![CDATA[Welcome to the February edition of Privacy Alerts.]]></description><link>https://newsletter.yourdigitalrights.org/p/privacy-alerts-february-2023</link><guid isPermaLink="false">https://newsletter.yourdigitalrights.org/p/privacy-alerts-february-2023</guid><dc:creator><![CDATA[Yoav Aviram]]></dc:creator><pubDate>Thu, 16 Feb 2023 11:10:07 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!oqVg!,w_256,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F5863274e-4461-42e5-8763-01397b9b1a07_1200x1200.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>Welcome to the February edition of Privacy Alerts. We have great news to share. <strong>Starting today, Privacy Alerts are free for all subscribers!</strong> We started Privacy Alerts in November 2022 as an experiment to see if we could create a revenue stream to support our work at <a href="http://consciousdigital.org">Conscious Digital</a>, the nonprofit behind <a href="http://YourDigitalRights.org">YourDigitalRights.org</a> while providing individuals with a way to improve their online privacy over time.</p><p>The experiment was successful in that we learned a lot. Almost 700 people have subscribed to the free newsletter, and about 20 people subscribed to the paid service. In the end, we decided to prefer a large subscriber base and an active community over the projected revenue from the paid service. We, therefore, decided to make Privacy Alerts free for all. </p><p>We have other ideas for creating revenue streams to support our work while keeping the core services of YourDigitalRights.org free, so please stay tuned. If you would like to support our efforts, please consider making a donation to ensure our long-term financial stability and independence:</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://opencollective.com/consciousdigital&quot;,&quot;text&quot;:&quot;Donate&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://opencollective.com/consciousdigital"><span>Donate</span></a></p><p>And now, without further ado, here are the top three companies that, according to our assessment, pose the most significant risk to your online privacy this month. Please consider sending them all data deletion requests (click on the company's name to do so).</p><h3><a href="https://yourdigitalrights.org/d/kochava.com">Kochava</a></h3><p>Kochava Inc (kochava.com) is a classic data broker, buying and selling personal data. What makes Kochava stand out is that they specialize in aggressively selling location information. Kochava first crossed our radar in August 2022, when the Federal Trade Commission <a href="https://www.ftc.gov/system/files/ftc_gov/pdf/1.%20Complaint.pdf">filed a lawsuit</a> against the company, arguing that after acquiring location data from Mobile carriers, "Kochava then sells customized data feeds to its clients to, among other purposes, assist in advertising and analyzing foot traffic at stores or other locations. Among other categories, Kochava sells timestamped latitude and longitude coordinates showing the location of mobile devices". </p><p>Kochava says it offers "rich geo data spanning billions of devices globally." In the lawsuit, the FTC was particularly concerned with the possibility that Kochava&#8217;s information could be used to identify visits to reproductive health clinics and other sensitive places. More recently, <a href="https://original.newsbreak.com/@mia-carlson-1601455/2926625695744-federal-class-action-lawsuit-filed-against-north-idaho-data-broker-kochava-company-was-sued-by-ftc-last-year">a federal class action lawsuit</a> has been filed against the company in the U.S. District Court of Idaho-Northern Division for alleged violations of Idaho and Washington laws.</p><p>We recommend that you <a href="https://yourdigitalrights.org/d/kochava.com">send Kochava a data deletion request now</a>. </p><h3><a href="https://yourdigitalrights.org/d/t-mobile.com">T-Mobile</a></h3><p>In late January, T-Mobile (t-mobile.com), the second largest US-based mobile carrier, disclosed a data breach affecting millions of customer accounts. </p><p>In <a href="https://www.sec.gov/ix?doc=/Archives/edgar/data/0001283699/000119312523010949/d641142d8k.htm">a filing</a> with the U.S. Securities and Exchange Commission, T-Mobile said hackers hoovered data on roughly 37 million customer accounts. The data stolen included the customer's name, billing address, email, phone number, date of birth, T-Mobile account number, and information on the number of customer lines and plan features.</p><p>We&#8217;ve long held the position that data breaches are a great indicator of the internal cybersecurity culture of a given company. They not only shed light on past events but often also provide an indication of things to be. This is the second major data breach T-Mobile has reported in the past two years, and we believe that this indicates a systemic failure to prioritize the safekeeping of personal information within the company.</p><p>If you&#8217;ve ever held an account with T-Mobile in the past, we recommend that you send them <a href="https://yourdigitalrights.org/d/t-mobile.com">a data deletion request now</a>. If you are a current T-Mobile customer, then now is a good time to consider switching providers. </p><h3><a href="https://yourdigitalrights.org/d/signalhire.com">Signal Hire</a></h3><p>Signal Hire (signalhire.com) is a recruiting, HR analytics, and benchmarking platform that collects data from multiple public sources to provide real-time and historical trends on over 200 million candidates. In other words, the company is a data broker selling the personal information of millions of people. The company offers, amongst other services, a browser extension that will display the individual&#8217;s email address when you visit their LinkedIn , Facebook as well as other social media profiles. </p><p>In January, we noticed a spike in the number of data deletion requests sent via our platform to SignalHire. Such a spike is usually caused by an increased awareness amongst individuals of the risk the company poses to their online privacy. A further search indicated that the company had been linked to cases where <a href="https://www.businessinsider.in/tech/news/scammers-sending-wa-messages-to-top-tier-employees-pretending-to-be-their-ceo-cloudsek-report/articleshow/97637406.cms">CEOs and other high-profile individuals were blackmailed</a>, their personal data obtained via the platform. There are probably additional reasons for the recent spike in requests sent to SignalHire, which we could not correlate. </p><p>We recommend that you <a href="https://yourdigitalrights.org/d/signalhire.com">send SignalHire a data deletion request now</a>. </p><h3><strong>Privacy Update</strong></h3><p>In the last edition of Privacy Alrets, we recommended you send a data deletion request to LastPass (<a href="http://lastpass.com">lastpass.com</a>), a widely used password manager, following a catastrophic data breach the company suffered in August (and reported only in December). During the past month, it was revealed that the company was negligent in many aspects of its product design, weakening its end-to-end encryption scheme to the point of making it ineffective. </p><p>If you have used LastPass at any time in the past, <em>we now strongly recommend that you change the passwords to all the important services which you stored in LastPass and take evasive measures assuming the content of your secure notes is now public</em>, in addition to sending them <a href="https://yourdigitalrights.org/d/lastpass.com">a data deletion request</a>.</p><p>If you would like more information regarding the weaknesses discovered in the design of LastPass, please check out the two episodes on the topic by the podcast <a href="https://www.grc.com/sn/past/2022.htm">Security Now</a>. </p><p>Yoav<br>Founder, <a href="https://consciousdigital.org">Conscious Digital</a> // <a href="https://YourDigitalRights.org">YourDigitalRights.org</a></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://newsletter.yourdigitalrights.org/p/privacy-alerts-february-2023?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://newsletter.yourdigitalrights.org/p/privacy-alerts-february-2023?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://newsletter.yourdigitalrights.org/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://newsletter.yourdigitalrights.org/subscribe?"><span>Subscribe now</span></a></p><p></p>]]></content:encoded></item><item><title><![CDATA[Privacy Alerts are Going Free]]></title><description><![CDATA[We started Privacy Alerts in November 2022 as an experiment to see if we could create a revenue stream to support our work at Conscious Digital, the nonprofit behind YourDigitalRights.org, while providing individuals with a way to improve their online privacy over time.]]></description><link>https://newsletter.yourdigitalrights.org/p/privacy-alerts-are-going-free</link><guid isPermaLink="false">https://newsletter.yourdigitalrights.org/p/privacy-alerts-are-going-free</guid><dc:creator><![CDATA[Yoav Aviram]]></dc:creator><pubDate>Mon, 30 Jan 2023 14:12:37 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!oqVg!,w_256,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F5863274e-4461-42e5-8763-01397b9b1a07_1200x1200.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>We started Privacy Alerts in November 2022 as an experiment to see if we could create a revenue stream to support our work at <a href="http://consciousdigital.org">Conscious Digital</a>, the nonprofit  behind <a href="http://YourDigitalRights.org">YourDigitalRights.org</a>, while providing individuals with a way to improve their online privacy over time. </p><p>The experiment was successful, as we learned a lot. First, we learned that there is&#8230;</p>
      <p>
          <a href="https://newsletter.yourdigitalrights.org/p/privacy-alerts-are-going-free">
              Read more
          </a>
      </p>
   ]]></content:encoded></item><item><title><![CDATA[Privacy Alerts, January 2023]]></title><description><![CDATA[Welcome to the January edition of Privacy Alerts, and happy 2023!]]></description><link>https://newsletter.yourdigitalrights.org/p/privacy-alerts-january-2023</link><guid isPermaLink="false">https://newsletter.yourdigitalrights.org/p/privacy-alerts-january-2023</guid><dc:creator><![CDATA[Yoav Aviram]]></dc:creator><pubDate>Mon, 16 Jan 2023 14:43:37 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!oqVg!,w_256,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F5863274e-4461-42e5-8763-01397b9b1a07_1200x1200.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>Welcome to the January edition of Privacy Alerts, and happy 2023! It&#8217;s been a relatively quiet December and early January as far as privacy matters are concerned, so we are sending this email later than usual. From all the companies crossing our radar this month, the following are the top three that, according to our assessment, pose the most significant risk to your online privacy. Please consider sending them all data deletion requests. Click on the name of the company to do so.</p><h3><a href="https://yourdigitalrights.org/d/voyager-labs.com">Voyager Labs</a></h3><p>Voyager Labs (voyager-labs.com), an Israeli company that relocated its headquarters to New York earlier this year, is in the business of selling AI-Based Investigation Solutions. According to the company&#8217;s website, &#8220;government and law enforcement agencies, as well as private sector customers, use our award-winning, cutting-edge technology, and superior domain expertise to exponentially increase the productivity and outcomes of their investigative teams&#8221;.</p><p>Voyager Labs  was in the news earlier this month after getting sued by Meta, the company behind Facebook and Instagram, for allegedly creating tens of thousands of fake Facebook accounts to scrape user data and provide surveillance services for clients. When a company with a horrendous privacy-related track record, such as Meta, sues another company for privacy violations, it gets our attention. </p><p>In a blog post announcing the <a href="https://about.fb.com/news/2023/01/leading-the-fight-against-scraping-for-hire/">lawsuit</a>, Meta claims that &#8220;Voyager designed its scraping software to use fake accounts to scrape data accessible to a user when logged into Facebook, including users profile information, posts, friends lists, photos, and comments.&#8220; Meta also claims that Voyager collected data from other sites, including Twitter, YouTube, and Telegram.</p><p>Send Voyager Labs a <a href="https://yourdigitalrights.org/d/voyager-labs.com">data deletion request</a> now. </p><h3><a href="https://yourdigitalrights.org/d/meta.com">Meta</a></h3><p>Regarding privacy violations, Meta (<a href="http://meta.com">meta.com</a>), the company behind Facebook and Instagram, is the gift that keeps on giving. Even if you believe that the folks at Meta are genuinely interested in amending their ways and protecting individual privacy, stories such as the one about Voyager Labs should convince you that merely holding on to such a vast amount of personal information is a ticking time bomb. </p><p>This month marks an important milestone in the flight to get regulators to pay attention to this particular time bomb. Our friends at <a href="https://noyb.eu/en">Noyb</a> (short for None of Your Business), an Austrian nonprofit organization, <a href="https://noyb.eu/en/meta-advertising-ban-decision-published">won a strategic lawsuit against Meta</a>, which they filed in 2018, on the day the GDPR came out. </p><p>The lawsuit targets a clever workaround that Facebook&#8217;s lawyers have come up with as a legal basis for their vast collection of personal data. Instead of relying on user consent, which would necessitate the user to agree when each piece of personal information was used for every one of many purposes (meaning thousands of separate content requests), Facebook&#8217;s lawyers have added the collection of Personal Information to its terms of service, claiming it&#8217;s a service Facebook is providing to the user. It then claimed that if it did not perform this collection, it would violate the contract with the user. </p><p>Noyb has managed to get the European Data Protection Board (EDPB) to prohibit Meta from using personal data collected in such a manner for advertisement. It also increased the fine for Meta, previously set by the Irish regulator, from &#8364; 28 million to &#8364; 390 million.</p><p>If you find Meta&#8217;s behavior infuriating, there is something that you can do to help. Please send Meta a <a href="https://yourdigitalrights.org/d/meta.com">data deletion request</a> using our service, and when you do, please turn on the smart follow-up assistant feature. The email will be sent directly to <a href="https://www.linkedin.com/in/stephen-deadman-585715/?originalSubdomain=uk">Stephen Deadman</a>, Facebook&#8217;s Data Protection Office, but don&#8217;t worry, as Stephan will not be writing you back. Instead, you will get a reply saying his email address is not monitored. Over the past four years, we have attempted to email Facebook using many addresses, which all turned out to be not monitored. In fact, Meta does not publish even one corporate email address on any of its many websites. That Ok. I am asking you to wait until you get the automated reply, then escalate your request to the relevant government regulator. Our smart follow-up assistance will send you an email after 30 days with instructions on exactly how to escalate your request. If you are in the EU, we will even generate an email addressed to the proper regulator for you to send. </p><p>With your help, we can persuade government regulators to step up enforcement. </p><h3><a href="https://yourdigitalrights.org/d/lastpass.com">LastPass</a></h3><p>LastPass (<a href="http://lastpass.com">lastpass.com</a>) is a widely used password manager owned by parent company <a href="https://yourdigitalrights.org/d/goto.com">GoTo.com</a> (formerly LogMeIn). In December, LastPass acknowledged that it had suffered  <a href="https://www.wired.com/story/lastpass-breach-vaults-password-managers/">a critical data breach</a>. The breach occurred in August, but in its initial report of the incident, LastPass attempted to downplay the severity. This month it finally admitted that attackers managed a total compromise of company systems.</p><p>The attackers obtained a swath of personal information, including names, end-user names, billing addresses, email addresses, telephone numbers, and IP addresses. This particular breach is concerning because the attackers also managed to gain access to customer vaults. </p><p>People rely on LastPass&#8217;s vaults to store their most valuable passwords and secrets securely. As a measure of last defense, LastPass end-to-end encrypts these vaults, which means the attackers got away with encrypted copies of customer secrets. Just how much this encryption is worth depends on how good are the master passwords chosen by customers. Experts <a href="https://www.schneier.com/blog/archives/2022/12/lastpass-breach.html">expect</a> that, in many cases, it is only a matter of time before some customer vaults are decrypted. </p><p>If you are a LastPass user or have used them in the past we recommend that you take evasive action immediately. Here is a <a href="https://privacysavvy.com/password/guides/security-tips-for-lastpass-users-post-data-breach/">list</a> of recommended actions. After securing your accounts and switching to another password manager, we recommend sending LastPass <a href="https://yourdigitalrights.org/d/lastpass.com">a data deletion request</a>. </p><h3><strong>Privacy Tip</strong></h3><p>IEEE Spectrum has published an incredibly insightful article titled <a href="https://spectrum.ieee.org/capitol-riot">How Police Exploited the Capitol Riot&#8217;s Digital Records</a>, questioning whether powerful forensic technology is worth the privacy trade-off. This is a well-worth read if you are interested in a big-picture view of how investigators are now approaching this and similar situations and the related privacy debate&#8212;highly recommended. </p><p>Yoav<br>Founder, <a href="https://consciousdigital.org">Conscious Digital</a> // <a href="https://YourDigitalRights.org">YourDigitalRights.org</a></p>]]></content:encoded></item><item><title><![CDATA[Privacy Alerts, December 2022]]></title><description><![CDATA[Welcome to the December edition of Privacy Alerts, this has been another busy month for privacy!]]></description><link>https://newsletter.yourdigitalrights.org/p/privacy-alerts-december-2022</link><guid isPermaLink="false">https://newsletter.yourdigitalrights.org/p/privacy-alerts-december-2022</guid><dc:creator><![CDATA[Yoav Aviram]]></dc:creator><pubDate>Tue, 06 Dec 2022 09:29:21 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!oqVg!,w_256,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F5863274e-4461-42e5-8763-01397b9b1a07_1200x1200.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>Welcome to the December edition of Privacy Alerts, this has been another busy month for privacy! Out of the many companies crossing our radar this month these are the top three that according to our assessment pose the greatest risk to your online privacy. You should consider sending these companies a data deletion request right now, just click on the n&#8230;</p>
      <p>
          <a href="https://newsletter.yourdigitalrights.org/p/privacy-alerts-december-2022">
              Read more
          </a>
      </p>
   ]]></content:encoded></item><item><title><![CDATA[Privacy Alerts, November 2022]]></title><description><![CDATA[YourDigitalRights.org]]></description><link>https://newsletter.yourdigitalrights.org/p/privacy-alerts-november-2022</link><guid isPermaLink="false">https://newsletter.yourdigitalrights.org/p/privacy-alerts-november-2022</guid><dc:creator><![CDATA[Yoav Aviram]]></dc:creator><pubDate>Thu, 03 Nov 2022 14:01:07 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!yflV!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F1322e723-843d-4ece-b0f1-d9bc3bd7dfa6_1200x400.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>Welcome to the November edition of Privacy Alerts. It&#8217;s been a busy month for Privacy! Here are the three worst-offending companies this month that you should opt-out of right now:</p><h3><a href="https://yourdigitalrights.org/d/uber.com">Uber</a></h3><p>The company has recently suffered<a href="https://www.nytimes.com/2022/09/15/technology/uber-hacking-breach.html"> a significant data breach</a>, where an 18-year-old hacker had total control over their systems. Coincidently, Uber&#8217;s former Chief Security Officer was<a href="https://news.yahoo.com/jury-finds-former-uber-security-234813488.html?guccounter=1&amp;guce_referrer=aHR0cHM6Ly9kdWNrZHVja2dvLmNvbS8&amp;guce_referrer_sig=AQAAAGiXCZZyBoDJ8GaKPiYGc0Jiw0VpQIKUe7iVVqETPQXtpR5JjeTTM5pSKPbF_nP-JKDoVIaXNvQxBjUhiHWC9mdcUEv0ThfzchgLA6NN9nSAe8cylrWTq28xY_k0VjRFkjZTbLLpCuT3nz2pz9EpiPR49GarqQdIHLv2eJ46nsD1"> found guilty</a> this month for attempting to conceal an earlier data breach that occurred in 2016. The company has also<a href="https://techcrunch.com/2022/10/31/uber-tests-push-notifications-a-feature-literally-no-one-wants/?guccounter=1&amp;guce_referrer=aHR0cHM6Ly9kdWNrZHVja2dvLmNvbS8&amp;guce_referrer_sig=AQAAADDdhTIEVv8JQZJtDsmLB1SF2mes9duGCfjXaZfz-QPNVxAzGq7NM4z_3NZ13cw6UwfBHk-MYHCCW99aI6hH9gc00PLWMJNnzUtwfXbi-XUdflrMU5SvRdLbgTJBkV7fZEcTEddfgLr9dkazsjUAJdcBgO2UNZP0rxaKfNd3HcOt"> started testing</a> targeted ads from other companies sent out as push notifications.</p><p>If all of this is not enough, according to a recent trove of confidential documents<a href="https://www.theguardian.com/news/2022/jul/10/uber-files-leak-reveals-global-lobbying-campaign"> obtained by the Guardian</a>, Uber broke laws, duped police, and secretly lobbied governments.</p><p>We understand that Uber services (ride-sharing and food delivery) are convenient. Still, for all the reasons mentioned above, we think Uber&#8217;s unethical attitude is unlikely to change. We recommend you uninstall these apps, send the company a<a href="https://yourdigitalrights.org/d/uber.com">data deletion request</a>, and use one of the many alternative services available.</p><h3><a href="https://yourdigitalrights.org/d/mimecast.com">Mimecast</a></h3><p>Mimecast brands itself as &#8220;Advanced Email &amp; Collaboration Security&#8221;. Notable companies, including Adobe, Hertz, NASA, and Nationwide Insurance, use Mimecast&#8217;s &#8220;Secure Email Gateway&#8221; product. It is also popular in various industries, such as healthcare, finance, and government.</p><p>We have recently been made aware that many individuals are placed in a type of email purgatory due to how Mimecast&#8217;s service works. It appears that Mimecast&#8217;s clients can mark an email message as spam, which will then classify any messages from that sender as spam <em>for all of the other organizations using Mimecast&#8217;s solution</em>. This ability gives immense power to every customer support person working for one of these companies.</p><p>One individual described his experience when following an email exchange with a telecom provider, which apparently the provider classified as spam, the individual then found themself unable to contact that provider, as well as any other organization on Mimecast&#8217;s client list, which includes many governmental organizations, all without ever being notified or having the right to appeal the decision.</p><p>We recommend that you send Mimecast a data access request to see if they have any of your personal information, and in case they do, follow up with a data deletion request. You can send both types of requests <a href="https://yourdigitalrights.org/d/mimecast.com">here</a>.</p><h3><a href="https://yourdigitalrights.org/d/tiktok.com">TikTok</a></h3><p>TikTok is the world's most downloaded app, owned by the Chinese tech giant ByteDance. To help explain why we have chosen to add TikTok to this month&#8217;s Privacy Alerts, we wanted to share a new documentary called<a href="https://www.pbs.org/independentlens/videos/tiktok-boom-gen-z-influencers-explain-social-media-platform-tiktok-for-you/?modal=1"> </a><em><a href="https://www.pbs.org/independentlens/videos/tiktok-boom-gen-z-influencers-explain-social-media-platform-tiktok-for-you/?modal=1">TikTok, Boom</a>,</em> which is available for free on PBS. The movie examines the power and influence of TikTok from the perspective of Gen-Z natives, journalists, and experts.</p><p>In a nutshell, TikTok is shaping our cultural norms in an unprecedented fashion while completely ignoring privacy and human rights.</p><p>We recommend that you send TikTok a<a href="https://yourdigitalrights.org/d/tiktok.com">data deletion request</a>.</p><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!yflV!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F1322e723-843d-4ece-b0f1-d9bc3bd7dfa6_1200x400.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!yflV!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F1322e723-843d-4ece-b0f1-d9bc3bd7dfa6_1200x400.png 424w, https://substackcdn.com/image/fetch/$s_!yflV!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F1322e723-843d-4ece-b0f1-d9bc3bd7dfa6_1200x400.png 848w, https://substackcdn.com/image/fetch/$s_!yflV!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F1322e723-843d-4ece-b0f1-d9bc3bd7dfa6_1200x400.png 1272w, https://substackcdn.com/image/fetch/$s_!yflV!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F1322e723-843d-4ece-b0f1-d9bc3bd7dfa6_1200x400.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!yflV!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F1322e723-843d-4ece-b0f1-d9bc3bd7dfa6_1200x400.png" width="602" height="200.66666666666666" data-attrs="{&quot;src&quot;:&quot;https://bucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com/public/images/1322e723-843d-4ece-b0f1-d9bc3bd7dfa6_1200x400.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:400,&quot;width&quot;:1200,&quot;resizeWidth&quot;:602,&quot;bytes&quot;:465499,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!yflV!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F1322e723-843d-4ece-b0f1-d9bc3bd7dfa6_1200x400.png 424w, https://substackcdn.com/image/fetch/$s_!yflV!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F1322e723-843d-4ece-b0f1-d9bc3bd7dfa6_1200x400.png 848w, https://substackcdn.com/image/fetch/$s_!yflV!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F1322e723-843d-4ece-b0f1-d9bc3bd7dfa6_1200x400.png 1272w, https://substackcdn.com/image/fetch/$s_!yflV!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F1322e723-843d-4ece-b0f1-d9bc3bd7dfa6_1200x400.png 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a></figure></div><h3><strong>Privacy Tip</strong></h3><p>New privacy tools released this month by tech giants Google and Facebook seem at first glance like a step in the right direction and at a closer look as an attempt to ease regulators and other critics. Still, both tools are worth knowing.</p><p>Google has been<a href="https://blog.google/products/search/a-new-search-tool-to-help-control-your-online-presence/"> pushing out a tool</a> for removing personally identifiable information from its search results. As with almost all Google features and products, you may not immediately have access to Google's new removal process. If you do, you should be able to click the three dots next to a web search result (while signed in) or in a Google mobile app to pull up "About this result." One option you can click at the bottom of a pop-up is "Remove result." However, note that this button is much more intent than immediate action. Google suggests a response time of "a few days."</p><p>Facebook has quietly rolled out a new service that lets people check whether the firm holds their contact information, such as their phone number or email address, and delete and block it. Notably, the tool works even if the individual does not have a Facebook account. According to a<a href="https://www.businessinsider.com/facebook-has-hidden-tool-to-delete-your-phone-number-email-2022-10?r=US&amp;IR=T"> Business Insider</a> article, the tool is well-hidden and apparently only available via<a href="https://www.facebook.com/contacts/removal"> a link that is embedded</a> 780 words into<a href="https://www.facebook.com/help/637205020878504"> a fairly obscure page</a> in Facebook's help section for non-users. The bad news: the scope of the data that his tool covers is a drop in the ocean of what Facebook has on you.</p><p>You can send both Google and Facebook data deletion requests via<a href="https://yourdigitalrights.org"> YourDigitalRights.org</a>.</p><p>All the best,</p><p>Yoav &amp; Rafa <br>Founders, <a href="https://consciousdigital.org">Conscious Digital</a> // <a href="https://YourDigitalRights.org">YourDigitalRights.org</a></p>]]></content:encoded></item></channel></rss>