<?xml version="1.0" encoding="UTF-8"?><rss
version="2.0"
xmlns:content="http://purl.org/rss/1.0/modules/content/"
xmlns:wfw="http://wellformedweb.org/CommentAPI/"
xmlns:dc="http://purl.org/dc/elements/1.1/"
xmlns:atom="http://www.w3.org/2005/Atom"
xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
><channel><title>Red Tree Communications |</title> <atom:link href="https://www.redtreecommunications.com/category/data-privacy/feed/" rel="self" type="application/rss+xml" /><link>https://www.redtreecommunications.com</link> <description></description> <lastBuildDate>Mon, 16 May 2022 19:18:52 +0000</lastBuildDate> <language>en-US</language> <sy:updatePeriod> hourly </sy:updatePeriod> <sy:updateFrequency> 1 </sy:updateFrequency> <generator>https://wordpress.org/?v=6.9.1</generator><image> <url>https://www.redtreecommunications.com/wp-content/uploads/2020/12/cropped-redtree-32x32.jpg</url><title>Red Tree Communications |</title><link>https://www.redtreecommunications.com</link> <width>32</width> <height>32</height> </image> <item><title>6 Things You Need to Do to Prevent Getting Hacked</title><link>https://www.redtreecommunications.com/2022/05/10/6-things-you-need-to-do-to-prevent-getting-hacked/</link> <dc:creator><![CDATA[summest]]></dc:creator> <pubDate>Tue, 10 May 2022 16:22:00 +0000</pubDate> <category><![CDATA[Data Privacy]]></category> <category><![CDATA[Virus Protection]]></category> <guid
isPermaLink="false">https://www.redtreecommunications.com/?p=19294</guid><description><![CDATA[THERE ARE TWO&#160;big reasons why people get hacked. Flaws in software and flaws in human behavior. While there’s not much you can do about coding vulnerabilities, you can change&#160;your own behavior and bad habits. Just ask former US president Donald Trump, whose Twitter password was...]]></description> <content:encoded><![CDATA[<div
data-elementor-type="wp-post" data-elementor-id="19294" class="elementor elementor-19294" data-elementor-post-type="post"> <section
class="elementor-section elementor-top-section elementor-element elementor-element-6c89b99 elementor-section-boxed elementor-section-height-default elementor-section-height-default parallax_section_no qode_elementor_container_no" data-id="6c89b99" data-element_type="section"><div
class="elementor-container elementor-column-gap-default"><div
class="elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-3907fa53" data-id="3907fa53" data-element_type="column"><div
class="elementor-widget-wrap elementor-element-populated"><div
class="elementor-element elementor-element-5d24b0ac elementor-widget elementor-widget-text-editor" data-id="5d24b0ac" data-element_type="widget" data-widget_type="text-editor.default"><div
class="elementor-widget-container"><p></p><p>THERE ARE TWO&nbsp;big reasons why people get hacked. Flaws in software and flaws in human behavior. While there’s not much you can do about coding vulnerabilities, you can change&nbsp;<a
href="https://www.wired.com/story/how-to-avoid-worst-online-scams/">your own behavior and bad habits</a>.</p><p></p><p></p><p>Just ask former US president Donald Trump, whose Twitter password was “<a
href="https://www.washingtonpost.com/world/2020/12/17/dutch-trump-twitter-password-hack/" target="_blank" rel="noreferrer noopener">maga2020!</a>” Or Boris Johnson, who revealed details of&nbsp;<a
href="https://metro.co.uk/2020/03/31/boris-johnson-sparks-security-concerns-revealing-zoom-id-cabinet-meeting-12489236/" target="_blank" rel="noreferrer noopener">sensitive Zoom calls</a>&nbsp;at the start of the pandemic in 2020. (These world leaders will have had specific security training from protection agencies too.)</p><p></p><p></p><p>The risks are just as real for the average person—even if the stakes aren’t quite so high. If your accounts aren’t properly protected, your credit card could be compromised or your private messages and photographs stolen and shared for all to see. Working out if your&nbsp;<a
href="https://www.wired.co.uk/article/hacked-accounts-facebook-gmail-netflix">accounts have been hacked</a>&nbsp;is a time-consuming and potentially frustrating process. You’re better off taking some steps to mitigate the risks of getting hacked in the first place. Here’s what you can do to protect yourself.</p><p></p><p></p><p><strong>Use Multi-Factor Authentication</strong></p><p></p><p></p><p>Arguably the most effective thing you can do to protect your online accounts is turning on&nbsp;<a
href="https://www.wired.com/story/protect-accounts-two-factor-authentication/">multi-factor, or two-factor, authentication</a>&nbsp;for as many of your accounts as possible. The method uses a secondary piece of information—often a code generated by an app or sent via SMS—alongside a password.</p><p></p><p></p><p>This secondary piece of information helps to prove it really is you trying to log in, as the codes are often accessed on the phone in your pocket. Even if you do have a password that’s easy to guess (we’ll get to that shortly), an attacker is unlikely to get access to an account with multi-factor authentication turned on unless they have your phone.</p><p></p><p></p><p>There’s a guide to all the accounts that support the method&nbsp;<a
href="https://twofactorauth.org/" target="_blank" rel="noreferrer noopener">here</a>, but in the first instance you should turn it on for all the accounts that hold personal information that could be abused. Like messaging apps such as WhatsApp, social media including Facebook, Instagram, and Twitter, and your email accounts.</p><p></p><p></p><p>Not all forms of multi-factor authentication are equal though. Code-generating apps are considered more secure than&nbsp;<a
href="https://www.wired.com/story/sim-swap-attack-defend-phone/">getting codes via SMS</a>, and beyond that,&nbsp;<a
href="https://www.wired.co.uk/article/best-security-keys">physical security keys</a>&nbsp;provide an even more robust layer of protection.</p><p><strong>Get a Password Manager</strong></p><p></p><p></p><p>Let’s talk about passwords. It’s 2021. You shouldn’t be using “password” or “12345” for any of your passwords—even if it’s a throwaway account.</p><p></p><p></p><p>All the passwords you use for your online accounts should be strong and unique. What this really means is they should be long, include a mixture of different character types, and not be used across multiple websites. Your Twitter password shouldn’t be the same as your online banking one; your home Wi-Fi network shouldn’t use the same credentials as your Amazon account.</p><p></p><p></p><p>The best way to do this is by using a&nbsp;<a
href="https://www.wired.com/story/best-password-managers/">password manager</a>. Password managers create strong passwords for you and store them securely. If the fact that they can stop you getting hacked isn’t enough to make you consider using one, a&nbsp;<a
href="https://www.wired.com/story/coronavirus-quarantine-start-using-password-manager/">password manager</a>&nbsp;also means you never have to struggle to remember a forgotten password again.</p><p></p><p></p><p></p><p></p><p>From our testing of the best password managers out there, we recommend trying out <a
href="https://lastpass.com/" target="_blank" rel="noreferrer noopener">LastPass</a>&nbsp;or&nbsp;<a
href="https://www.keepass.info/" target="_blank" rel="noreferrer noopener">KeePass</a>.Learn How to Spot a Phishing Attack</p><p></p><p></p><p>Quickly clicking can be your worst enemy. When a new email or text message arrives, and it includes something that can be tapped or clicked, our instincts often lead us to do it straight away.&nbsp;<a
href="https://www.wired.com/2017/03/phishing-scams-fool-even-tech-nerds-heres-avoid/">Don’t</a>.</p><p></p><p></p><p>Hackers have used the pandemic as cover to launch wave after wave of&nbsp;<a
href="https://www.wired.com/story/google-state-sponsored-hackers-coronavirus-phishing-malware/">phishing attacks</a>&nbsp;and&nbsp;<a
href="https://www.wired.co.uk/article/google-drive-spam-comments-phishing">dumb Google Drive scams</a>.</p><div
class="GridWrapper-vNBSO jMumET grid grid-margins grid-items-2 ArticlePageChunksGrid-kRgPDq DBpfE grid-layout--adrail narrow wide-adrail"><div
class="GridItem-buSdEM PibmB grid--item grid-layout__content"><div
class="BodyWrapper-ctnerm fJTCQC body body__container article__body" data-journey-hook="client-content" data-testid="BodyWrapper"><div
class="body__inner-container"><p
class="paywall">Anyone can fall for these types of scams. The main thing to do is to think before you click. Scam messages try to trick people into behaving in a way they wouldn’t normally—with, say, pretend instant demands from a boss or messages that say an urgent response is required.</p><p
class="paywall">There’s no foolproof way to identify every type of phishing effort or scam—scammers are constantly upping their game—but being aware of the threat can help reduce its effectiveness.&nbsp;<a
href="https://www.wired.com/story/resist-phishing-attacks/" data-uri="20b19fbeed934d4d949080e2abb4ee0a">Be cautious</a>, think before you click, and download files only from people and sources you know and trust.</p><div
class="paywall heading-h3" role="heading" aria-level="3"><strong>Update Everything</strong></div><div
class="paywall heading-h3" role="heading" aria-level="3"><strong><br></strong></div><p
class="paywall">Every piece of technology you use—from the Facebook app on your phone to the operating system that controls your smart lightbulb—is open to attack. Thankfully, companies are always finding new bugs and fixing them. That’s why it’s crucial you download and update the latest versions of the apps and software you’re using.</p><p
class="paywall">Start with your phone. Navigate to your device settings and find out what operating system you’re using, and update it if you’re not on the latest version (iOS 14 is the latest for iPhones; Android 11 is the latest from Google). For apps and games, Apple’s iOS 13 and above downloads updates automatically, although these settings can be&nbsp;<a
class="external-link" href="https://support.apple.com/en-gb/HT202180" target="_blank" rel="nofollow noopener" data-offer-url="https://support.apple.com/en-gb/HT202180" data-event-click="{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https://support.apple.com/en-gb/HT202180&quot;}" data-uri="92b2f41840ecd7162f34e114c2140eb4">customized</a>. On Android, auto-updates can also be turned on by visiting the&nbsp;<a
class="external-link" href="https://support.google.com/googleplay/answer/113412?hl=en-GB" target="_blank" rel="nofollow noopener" data-offer-url="https://support.google.com/googleplay/answer/113412?hl=en-GB" data-event-click="{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https://support.google.com/googleplay/answer/113412?hl=en-GB&quot;}" data-uri="829155155719255c83c0ee6b4dac282e">settings page in the Google Play Store</a>.</p><p
class="paywall">Once you’ve updated your phone, you need to work out what devices to update next. Generally these should be done in order of potential impact. Any laptops and computers you own should be high up the list, and then work back through other connected devices in your life. Remember: Everything is vulnerable, including your&nbsp;<a
class="external-link" href="https://www.bbc.co.uk/news/technology-54436575" target="_blank" rel="nofollow noopener" data-offer-url="https://www.bbc.co.uk/news/technology-54436575" data-event-click="{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https://www.bbc.co.uk/news/technology-54436575&quot;}" data-uri="859c49306ab7da866c7b219b6bf01eeb">internet-connected chastity belt</a>.</p><div
class="paywall heading-h3" role="heading" aria-level="3"><strong>Encrypt Everything</strong></div><div
class="paywall heading-h3" role="heading" aria-level="3"><strong><br></strong></div><p
class="paywall"><a
href="https://www.wired.com/story/encrypt-all-of-the-things/" data-uri="6fe0c6a19fe87e1ae87cde8cb4aaa542">Protecting your communications</a>&nbsp;has never been easier. Over the last half-decade, companies handling our personal data—including the messages we send and the files we upload to the cloud —have realized that&nbsp;<a
href="https://www.wired.com/story/opinion-encryption-has-never-been-more-essential-or-threatened/" data-uri="7fe9cf277ea6382596ea2768a43095e3">encryption can help them</a>&nbsp;as well as their customers. Using encrypted services means that what you&#8217;re sending is better protected against surveillance and won’t be accessible if your device gets lost or stolen.</p><p
class="paywall">There are two main end-to-end encrypted messaging services,&nbsp;<a
href="https://www.wired.co.uk/article/signal-vs-whatsapp" data-uri="5315e8e6d51470df8d82a956a0bc0801">Signal and WhatsApp</a>. Messages (including photos and videos) plus voice calls and video calls are encrypted by default within both apps. They both also let you use&nbsp;<a
href="https://www.wired.co.uk/article/whatsapp-signal-disappearing-messages" data-uri="7765dd0557a98962eaeab42d41d062ef">disappearing messages</a>, which remove what you’ve sent after a set period of time. The practice can help keep your chats private, even from those that have access to your devices. Our advice is to use Signal where possible, as it collects less metadata than WhatsApp and isn’t owned by Facebook. But if you can’t get your friends to move to Signal, WhatsApp offers a lot more protection than apps that don’t use end-to-end encryption by default.&nbsp;</p></div></div></div><div
class="GridItem-buSdEM gKfJBS grid--item grid-layout__aside"><div
class="StickyBoxWrapper-euhCxU hyXuto sticky-box"><div
class="StickyBoxPrimary-fEgDcn dFVkFO sticky-box__primary"><div
class="RecircMostPopularWrapper-laeRwu btOzvW recirc-most-popular-wrapper viewport-monitor-anchor" data-attr-viewport-monitor="" data-event-boundary="click" data-event-click="{&quot;pattern&quot;:&quot;RecircMostPopular&quot;}" data-include-experiments="true"><div
class="RecircMostPopularContiner-hghWoX czmGGh recirc-most-popular-sparrow-tracking hide-aside-ad" data-most-popular-id="mod-most-popular-2"><div
class="SummaryItemWrapper-gdEuvf jSIQEu summary-item summary-item--has-border summary-item--article summary-item--no-icon summary-item--text-align-left summary-item--layout-placement-side-by-side summary-item--layout-position-image-left summary-item--layout-proportions-33-66 summary-item--side-by-side-align-center summary-item--standard RecircMostPopularSummaryItem-bqCFHs jUGuvc" tabindex="0" role="button" data-event-boundary="click" data-event-click="{&quot;pattern&quot;:&quot;SummaryItem&quot;}" data-in-view="{&quot;pattern&quot;:&quot;SummaryItem&quot;}" data-include-experiments="true"><div
class="SummaryItemContent-gYA-Dbp bHOHql summary-item__content"><div
class="ClampWrapper-bsAiGd gwcaVi clamp SummaryItemHedBase-dZmlME liBqMC summary-item__hed" data-testid="ClampWrapper"><div
class="ClampContent-gtBHJT jblOYM"><div
class="SummaryItemHedTag-fiQrBv fpbMVi" data-testid="SummaryItemHed">&nbsp;</div></div></div></div></div></div></div></div></div></div></div><div
class="GridWrapper-vNBSO jMumET grid grid-margins grid-items-2 ArticlePageChunksGrid-kRgPDq DBpfE grid-layout--adrail narrow wide-adrail"><div
class="GridItem-buSdEM PibmB grid--item grid-layout__content"><div
class="BodyWrapper-ctnerm fJTCQC body body__container article__body" data-journey-hook="client-content" data-testid="BodyWrapper"><div
class="body__inner-container"><p
class="paywall">For your emails, encrypted provider ProtonMail can protect your messages, and there’s also the option to use&nbsp;<a
href="https://www.wired.co.uk/article/gmail-account-alternatives-burner-email" data-uri="2fea414a802fc4d7703f22b11919fcc0">burner email accounts</a>&nbsp;for mailing lists and purchases where you don’t want to hand over your personal data.</p><p
class="paywall">Beyond your messages, encrypting the files on your devices can help reduce the chances of your data being compromised if you’re hacked or lose your devices. Both iPhone and iOS encrypt your hard drive by default. Just make sure you use a strong password or PIN for your devices. A little more effort is needed to encrypt the hard drive on your laptop or computer. Turn on Apple’s&nbsp;<a
class="external-link" href="https://support.apple.com/en-us/HT204837" target="_blank" rel="nofollow noopener" data-offer-url="https://support.apple.com/en-us/HT204837" data-event-click="{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https://support.apple.com/en-us/HT204837&quot;}" data-uri="a84a9ef28288f039d4eac957c9a5a6e6">FileVault</a>&nbsp;to encrypt your startup disk, and on Windows you can turn encryption on through the&nbsp;<a
class="external-link" href="https://support.microsoft.com/en-us/windows/turn-on-device-encryption-0c453637-bc88-5f74-5105-741561aae838" target="_blank" rel="nofollow noopener" data-offer-url="https://support.microsoft.com/en-us/windows/turn-on-device-encryption-0c453637-bc88-5f74-5105-741561aae838" data-event-click="{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https://support.microsoft.com/en-us/windows/turn-on-device-encryption-0c453637-bc88-5f74-5105-741561aae838&quot;}" data-uri="ae86a8cf9e177fdf90a3f512a0997bf0">Settings menus or use BitLocker encryption</a>.&nbsp;</p><div
class="paywall heading-h3" role="heading" aria-level="3"><strong>Wipe Your Digital Footprint</strong></div><div
class="paywall heading-h3" role="heading" aria-level="3"><strong><br></strong></div><p
class="paywall">The past can come back to haunt you. The old online accounts you no longer use and the login details that belong to them can be weaponized against you if you don’t do anything about them. Hackers frequently use details from previous data breaches to access the accounts people currently use.</p><p
class="paywall">Reducing the amount of information that’s available about your online life can help cut your risk of being hacked. A very simple step is to regularly&nbsp;<a
href="https://www.wired.co.uk/article/how-to-delete-google-search-history-tracking" data-uri="bf9e5b1ddce766565e73844e672b2ead">delete your Google search history</a>, but you can also use&nbsp;<a
href="https://www.wired.co.uk/article/google-alternatives" data-uri="0b37404c74bc2ebad3a38fa0fd96cd14">privacy-first Google alternatives</a>.</p><p
class="paywall">Beyond this, there’s a lot more you can do to reduce your digital footprint. Find the&nbsp;<a
href="https://www.wired.co.uk/article/how-to-delete-old-apps-online-accounts" data-uri="d52fa695652f47e59ed864c96a93cae4">old accounts you no longer use</a>&nbsp;and delete them. It’ll reduce the amount of spam you get and reduce the number of ways hackers can target you. Use&nbsp;<a
class="external-link" href="https://haveibeenpwned.com/" target="_blank" rel="nofollow noopener" data-offer-url="https://haveibeenpwned.com/" data-event-click="{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https://haveibeenpwned.com/&quot;}" data-uri="b21f00f8105050b4293a7287d73ecb12">Have I Been Pwned?</a>&nbsp;to find your information in old data breaches, use a&nbsp;<a
href="https://www.wired.co.uk/article/best-vpn" data-uri="38b3b41d0058543c4409674c40364e53">VPN</a>&nbsp;to boost browsing privacy, and&nbsp;<a
href="https://www.wired.co.uk/article/what-is-the-dark-web-how-to-access" data-uri="ca9bf6d123620a00890682151ed3d82f">download Tor</a>&nbsp;if you really want to boost your online anonymity.</p><p
class="paywall"><em>This story originally appeared on</em>&nbsp;<a
href="https://www.wired.co.uk/article/how-to-avoid-hacking" data-uri="74169670d78116487e84d57d48dfbeb1"><em>WIRED UK.</em></a></p></div></div></div></div><p></p></div></div></div></div></div> </section></div> ]]></content:encoded> </item> <item><title>How to avoid ransomware attacks at work</title><link>https://www.redtreecommunications.com/2021/07/14/how-to-avoid-ransomware-attacks-at-work/</link> <dc:creator><![CDATA[summest]]></dc:creator> <pubDate>Wed, 14 Jul 2021 14:53:22 +0000</pubDate> <category><![CDATA[Data Privacy]]></category> <category><![CDATA[Networking]]></category> <category><![CDATA[Virus Protection]]></category> <category><![CDATA[Work and Technology]]></category> <guid
isPermaLink="false">https://www.redtreecommunications.com/?p=19160</guid><description><![CDATA[By Tatum Hunter, Washington Post, July 8, 2021&#124; When a security vulnerability at IT software-maker Kaseya led to a ransomware attack that affected 800 to 1,500 businesses, it wasn’t one employee’s fault. But that’s not always the case. Ransomware, which locks down a target’s computers and data,...]]></description> <content:encoded><![CDATA[<p></p></p><p>By <a
href="https://www.washingtonpost.com/people/tatum-hunter/">Tatum Hunter</a>, Washington Post, July 8, 2021|</p><p>When a security vulnerability at IT software-maker Kaseya led to a ransomware attack that affected <a
style="font-family: var( --e-global-typography-text-font-family ), Sans-serif; font-weight: var( --e-global-typography-text-font-weight );" href="https://www.washingtonpost.com/business/2021/07/06/kaseya-ransomware-attack-victims/?itid=lk_inline_manual_2">800 to 1,500 businesses</a>, it wasn’t one employee’s fault.</p><p><p></p><p></p></p><p>But that’s not always the case.</p><p><p></p><p></p></p><p>Ransomware, which locks down a target’s computers and data, can infect a network a few different ways, including through employee accounts. Click the wrong link, open the wrong attachment or log into the wrong website, and you could put your company in a perilous position.</p><p><p></p><p></p></p><p>Depending on their roles, some employees find their inboxes flooded with hundreds of phishing emails designed to steal the recipient’s credentials, says Ryan Kalember, executive vice president of cybersecurity strategy at security firm Proofpoint. That requires constant attention, especially as ransomware attacks <a
href="https://www.washingtonpost.com/news/the-switch/wp/2017/05/15/how-to-protect-yourself-from-the-global-ransomware-attack/?itid=lk_inline_manual_6">become more frequent</a> and their demands more intense. The average ransomware payment has nearly tripled so far in 2021 compared to last year, with targets doling out about $850,000, according to <a
href="https://unit42.paloaltonetworks.com/darkside-ransomware/" target="_blank" rel="noreferrer noopener">a report</a> by Palo Alto Networks.</p><p><p></p><p></p></p><p>“If you have a word like ‘accounts’ in your title, you will be attacked more,” Kalember says.</p><p><p></p><p></p></p><p>And that doesn’t mean others should let their guards down. Plenty of firms don’t have the resources to invest in frequent training, software upgrades and security systems — so employees become the first line of defense.</p><p><p></p><p></p></p><p>Luckily, conning people is an ancient art, and <a
href="https://www.washingtonpost.com/business/2021/05/12/ransomware-attack/?itid=lk_inline_manual_11" target="_blank" rel="noreferrer noopener">ransomware</a> groups aren’t breaking new ground. Phishing emails aim for an emotional reaction, says Palo Alto Networks Deputy Director of Threat Intelligence Jen Miller-Osborn. These messages pull busy employees in with promises of money, important company secrets and even cute animals pictures.</p><p><p></p><p></p></p><p>Keep an eye out for these phishing red flags to avoid ransomware and cover your behind.</p><p
data-el="text">Here’s how employers can help individuals guard against phishing and ransomware:</p><p
data-el="text"><strong>Train employees to spot phishing attempts</strong></p><p
data-el="text">Employees need frequent training to keep up with the evolving format and content of phishing emails. <a
href="https://www.usenix.org/system/files/soups2020-reinheimer_0.pdf">One study</a> from a few German universities found employees’ ability to identify phishing attempts drops just six months after their initial training, and that video and interactive training courses are most effective.</p>  <p
data-el="text"><b>Authenticate your corporate email domain.</b></p><p
data-el="text">This blocks the delivery of messages from fraudsters pretending to be a member of your organization. Check with your email service provider, like Microsoft Outlook or Google, to get started. You should also attach warnings to emails coming from external senders or containing links or attachments — both Outlook and Gmail offer this feature.</p><p
data-el="text"><b
style="color: var( --e-global-color-text ); font-family: var( --e-global-typography-text-font-family ), Sans-serif;">Clarify what employees should do if they click a suspicious link or attachment.</b></p><p
data-el="text">If people are afraid to report or don’t know how, they probably won’t do it. Make sure reporting procedures are outlined in your company’s security policy. Kalember recommended automated reporting, which lets employees report malicious email with the click of a button.</p><p
data-el="text"><b
style="color: var( --e-global-color-text ); font-family: var( --e-global-typography-text-font-family ), Sans-serif;">Leave room for human error.</b></p><p
data-el="text">Somebody is always going to open the phishing email promising adorable kitten pictures. So consider hedging your bets with anti-phishing technology like remote browsers, in which URLs open not in a traditional browser, but in a special environment in the cloud that disappears as soon as you’re done with it. That way, no matter what the URL contains, it can’t compromise the employee.</p><p
data-el="text"><b
style="color: var( --e-global-color-text ); font-family: var( --e-global-typography-text-font-family ), Sans-serif;">Conduct ongoing security testing.</b></p><p
data-el="text">Attackers use malicious files and compromised business email accounts to install ransomware on company computers and networks, but software vulnerabilities are another way in. Your company’s IT team — or a third party — should be actively looking for threats on your network.</p><p><p></p>]]></content:encoded> </item> <item><title>How Google and Amazon are ‘spying’ on you</title><link>https://www.redtreecommunications.com/2021/03/29/how-google-and-amazon-are-spying-on-you/</link> <dc:creator><![CDATA[summest]]></dc:creator> <pubDate>Mon, 29 Mar 2021 16:03:10 +0000</pubDate> <category><![CDATA[Data Privacy]]></category> <guid
isPermaLink="false">https://www.redtreecommunications.com/?p=19112</guid><description><![CDATA[You would be forgiven for thinking that your private conversations were just that, but two leading voice assistants are listening to everything you say, a new report claims. Patent applications from Amazon and Google revealed how their Alexa and Voice Assistant powered smart speakers are...]]></description> <content:encoded><![CDATA[<div
data-elementor-type="wp-post" data-elementor-id="19112" class="elementor elementor-19112" data-elementor-post-type="post"> <section
class="elementor-section elementor-top-section elementor-element elementor-element-fb546b9 elementor-section-boxed elementor-section-height-default elementor-section-height-default parallax_section_no qode_elementor_container_no" data-id="fb546b9" data-element_type="section"><div
class="elementor-container elementor-column-gap-default"><div
class="elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-1e8aa48d" data-id="1e8aa48d" data-element_type="column"><div
class="elementor-widget-wrap elementor-element-populated"><div
class="elementor-element elementor-element-399b723e elementor-widget elementor-widget-text-editor" data-id="399b723e" data-element_type="widget" data-widget_type="text-editor.default"><div
class="elementor-widget-container"><p>You would be forgiven for thinking that your private conversations were just that, but two leading voice assistants are listening to everything you say, a new report claims.</p><p>Patent applications from Amazon and Google revealed how their Alexa and Voice Assistant powered smart speakers are ‘spying’ on you.</p><p>The study warns of an Orwellian future in which the gadgets eavesdrop on everything from confidential conversations to your toilet flushing habits.</p><p>Future versions of gadgets like the Echo and Home will use this data to try and sell you products, it says.</p><p>The findings were published in a report created by Santa Monica, California based advocacy group Consumer Watchdog.</p><p>It says&nbsp;patents reveal the devices’ possible use as surveillance equipment for massive information collection and intrusive digital advertising.</p><p>The study found that digital assistants can be ‘awake’ even when users think they aren’t listening.</p><p>The digital assistants are supposed to react only when they hear a so-called ‘wakeword.’</p><p>For Amazon’s Echo it’s ‘Alexa’ and for Google Home it’s ‘OK, Google.’&nbsp;</p><p>In fact, the devices listen all the time they are turned on – and Amazon has envisioned Alexa using that information to build profiles on anyone in the room to sell them goods.</p><p>Amazon filed a patent application for an algorithm that would let future versions of the device identify statements of interest, such as ‘I love skiing’, enabling the speaker to be monitored based on their interests and targeted for related advertising.</p><p>A Google patent application describes using a future release of it smart Home system to monitor and control everything from screen time and hygiene habits, to meal and travel schedules and other activities.</p><p>The devices are envisioned as part of a surveillance web in the home to chart a families’ patterns so that they can more easily be marketed to based on their interests.</p><p>John Simpson, Consumer Watchdog’s privacy and technology project director, said: ‘Google and Amazon executives want you to think that Google Home and Amazon Echo are there to help you out at the sound of your voice.</p><p>‘In fact, they’re all about snooping on you and your family in your home and gathering as much information on your activities as possible.&nbsp;</p><p>‘You might find them useful sometimes, but think about what you’re revealing about yourself and your family, and how that information might be used in the future.</p><p>‘Instead of charging you for these surveillance devices, Google and Amazon should be paying you to take one into your home.’&nbsp;</p><p>MailOnline contacted both Amazon and Google for a comment, but had yet to receive a response at the time of publication.</p><p>Google and Amazon appear most interested in using the data they get by snooping on your daily life to target advertising, Consumer Watchdog said.</p><p>However, when that information is compiled others could access it.&nbsp;</p><p>For example, home insurers and utility companies have already made deals with Nest to put smart devices in their customers’ homes.</p><p>Law enforcement is already seeking information from smart devices.&nbsp;</p><p>An Amazon Echo made headlines last year when US police investigating a murder sought to subpoena recordings made by the device.&nbsp;</p><p>Investigators in the same case also managed to obtain data from a smart water meter that suggested that the crime scene had been hosed down before police arrived.&nbsp;</p><p>Hackers and identity thieves are also likely to be able to access the data compiled by Google and Amazons snooping, the report warns.&nbsp;</p><p>This is not the first time that the voice search function has landed Google in hot water in recent months.</p><p>In November, MailOnline received a number of transcripts of conversations that show how Voice Assistant may be recording your conversations without you knowing.</p><p>The feature is designed to allow users to talk to enabled gadgets to search the web, launch apps and use other interactive functions.</p><p>As part of this process, Google keeps copies of clips made each time you activate it, but it has emerged that background chatter could be enough to trigger recording.</p><p>One example from an anonymous user appears to have registered the code to their back door entry system, while chatting with a friend.</p><p>A written transcript of the conversation said: ‘If you ever&nbsp;get booked down to my house for some reason the key safe for the back door is 0783.’</p><p>Another user’s conversation about technology appears to have been captured, without them realising the assistant was recording.</p><p>They said: ‘Mate. We’re living in the future. I’ve just installed a game through the Steam app remotely on my PC in London from my phone.’</p><p>Another clip from the same person appears to have captured them saying ‘F*** off’ to someone.&nbsp;</p><p>Google previously released a My Activity feature that reveals exactly how much information the company has collected about you, through your activities online.</p><p>What some people may be unaware of is that the Voice and Audio section includes recordings of your voice.</p><p>These are made when you trigger the voice assistant, which may happen inadvertently during conversations or by pressing buttons on a Voice Assistant enabled device without realising it.</p><p>A spokesman for the firm said: ‘We only process voice searches after the phone believes the hot word ‘OK Google’ is detected.&nbsp;</p><p>‘Audio snippets are used by Google to improve the quality of speech recognition across Search.’</p><p>They added that ambient recording is never transmitted to the cloud.</p><p>Google’s support site says that the firm records your voice and other audio, plus a few seconds before, when you use audio activation.&nbsp;&nbsp;</p><p>This includes saying commands like ‘OK Google’ or tapping the microphone icon.</p><p>Your audio is saved to your account only when you’re signed in and Voice &amp; Audio Activity is turned on. Audio can be saved even when your device is offline.</p><p>The Mountain View company says it uses your Voice &amp; Audio Activity to learn the sound of your voice and&nbsp;how you say words and phrases.&nbsp;</p><p>It is also used to improve speech recognition across it products.</p><p>To see your saved audio, sign in with your Google account information.</p><p>This will enable you to see all the information Google has stored on the history of your account.&nbsp;</p><p>To delete any, click on the three dots in the top right corner and choose ‘Delete activity by’.</p><p>This will take you to a window where you can pick if you would like to delete any information.</p></div></div></div></div></div> </section></div> ]]></content:encoded> </item> <item><title>How To Protect Your Smartphone From Hacking</title><link>https://www.redtreecommunications.com/2021/02/27/how-to-protect-your-smartphone-from-hacking/</link> <dc:creator><![CDATA[summest]]></dc:creator> <pubDate>Sat, 27 Feb 2021 14:28:35 +0000</pubDate> <category><![CDATA[Data Privacy]]></category> <category><![CDATA[Smart Phones]]></category> <guid
isPermaLink="false">https://www.redtreecommunications.com/?p=18950</guid><description><![CDATA[Whether it’s listening to a podcast on our way to work, doing quick calculations as our mental math skills have almost completely deteriorated, or putting everything from movies to doctor&#8217;s appointments in our calendar, there’s hardly ever a moment when we don’t have our smartphone...]]></description> <content:encoded><![CDATA[<div
data-elementor-type="wp-post" data-elementor-id="18950" class="elementor elementor-18950" data-elementor-post-type="post"> <section
class="elementor-section elementor-top-section elementor-element elementor-element-46900bcc elementor-section-boxed elementor-section-height-default elementor-section-height-default parallax_section_no qode_elementor_container_no" data-id="46900bcc" data-element_type="section"><div
class="elementor-container elementor-column-gap-default"><div
class="elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-60a0764b" data-id="60a0764b" data-element_type="column"><div
class="elementor-widget-wrap elementor-element-populated"><div
class="elementor-element elementor-element-7fa4e168 elementor-widget elementor-widget-text-editor" data-id="7fa4e168" data-element_type="widget" data-widget_type="text-editor.default"><div
class="elementor-widget-container"><p>Whether it’s listening to a podcast on our way to work, doing quick calculations as our mental math skills have almost completely deteriorated, or putting everything from movies to doctor&#8217;s appointments in our calendar, there’s hardly ever a moment when we don’t have our smartphone by our side. So if we were to be hacked, we’d be in deep trouble, risking information about our credit and debit cards, location, social security number, and more.</p><p>But don’t throw away your smartphone just yet! There are a number of ways to prevent hackers from gaining access to your smartphone, and none of them require much time or effort. In just a few minutes, you can go from zero to hero regarding smartphone security. Let’s get started!</p><ul
class="wp-block-list"><li><strong>Don’t Jailbreak:</strong> No, this isn’t a game of Monopoly. Jailbreaking your smartphone means that you have complete control over your smartphone, avoiding the manufacturer’s restrictions. So on an iPhone, for example, that means you’ll be able to use apps from places other than Apple’s official app store, plus make any tweaks to your phone’s iOS. However, we don’t recommend jailbreaking because with freedom comes lack of security. First of all, you shouldn’t be downloading apps that aren’t from the app store, as they haven’t been screened for malware. In fact, when you jailbreak your phone, you’re basically taking down all of the security measures that the manufacturer has built into their smartphones— think of it like bulldozing the fence around your house. While you might appreciate the view, you’re a lot more vulnerable than you were before. Jailbreaking also removes the smartphone’s virus protection, plus, you won’t be able to easily update your software, which could lead to further problems down the line.</li><li><strong>Make Smartphone Lock Sooner: </strong>In the moments where we don’t have our smartphones on hand, you might have noticed that they lock, forcing you to enter in your passcode or biometrics like your fingerprint or face. While it might be annoying to have to sign in every time, ultimately, it’s protecting your device, so we recommend setting your auto-lock to 30 seconds, meaning it will lock with no activity for 30 seconds.  And if you don’t have the lock turned on at all, needless to say, you should probably change that.</li><li><strong>Perform All Software Updates: </strong>Companies like Google and Apple have people working around the clock to improve the smartphone’s security, so if there’s ever an iOS or Android update, do it. Although these updates can be annoying, they’re incredibly necessary for keeping up with the latest and greatest in security software. We recommend doing them at night so you’re never without your smartphone in your waking hours!</li><li><strong>Set up Two-Factor Authentication: </strong>If you’ve been paying attention, then you know that it’s a smart idea to turn on auto-lock so you’ll have to enter a passcode to access your smartphone, but if you want to take that a step further, we’d set up two-factor authentication. That way, if someone guesses your passcode, they still won’t be able to access your phone, as your phone company will send you another code via text or phone call. Again, this will make opening your smartphone a bit more tedious, but it’s a fantastic idea if you’re serious about avoiding hackers.</li><li><strong>Create Long Passcode: </strong>When choosing a passcode, people tend to do something fairly obvious, like their birthday, numbers in chronological order, or a portion of their phone number. Needless to say, this isn’t the safest practice. Rather, the numbers should be truly random, and be sure to use a six-digital passcode, the longest possible. While it will be a bit harder to remember this number, it will also be harder for hackers to guess, which is ultimately a good thing for your phone’s security.</li><li><strong>Turn On Erase Data: </strong>Now, what if your smartphone is lost or stolen and for some reason, your hackers are able to access your account? Of course, this is a worst-case scenario, but in a weird way, thinking about what to do in these situations is kind of our job. Don’t worry: there is a solution, and that is to turn on Erase Data, otherwise known as setting your smartphone to self-destruct. The other option is having the phone automatically “self-destruct” after too many failed passcode attempts. Of course, this is a more extreme measure, but either will ultimately increase your smartphone’s security.</li><li><strong>Avoid Phishing and Pop-Ups: </strong>Phishing has gotten increasingly sophisticated, sending tech-savvy people ostensibly legitimate links and pop-up ads. While phishing is a topic we have a lot more to say about, there are some basics we want to impart to you. Don’t email any sensitive information unless you are sure of the recipient, and don’t click on any links unless you are sure they are legitimate. Scroll down to find out how you can tell if a website is safe or not.</li><li><strong>Turn Auto-Fill Off: </strong>Auto-fill, which fills out forms automatically with your personal and financial information, is both incredibly convenient and incredibly dangerous if your phone gets in the wrong hands. What’s to stop a hacker or thief from using your credit card information to buy themselves a new wardrobe from Supreme? While it might make your life a bit more tedious, it is the safest idea to turn off auto-fill on your smartphone.</li></ul></div></div></div></div></div> </section></div> ]]></content:encoded> </item> <item><title>Why you should care about data privacy even if you have “nothing to hide”</title><link>https://www.redtreecommunications.com/2021/02/21/why-you-should-care-about-data-privacy-even-if-you-have-nothing-to-hide/</link> <dc:creator><![CDATA[summest]]></dc:creator> <pubDate>Sun, 21 Feb 2021 20:40:39 +0000</pubDate> <category><![CDATA[Data Privacy]]></category> <guid
isPermaLink="false">https://www.redtreecommunications.com/?p=18897</guid><description><![CDATA[By&#160;Sara Morrison&#160;&#160;Jan 28, 2021, 1:10pm EST When I tell people I write about data privacy, I usually get something along the lines of these two responses: “Is Facebook listening to me? I got an ad for parrot food, and the only possible explanation is that...]]></description> <content:encoded><![CDATA[<div
data-elementor-type="wp-post" data-elementor-id="18897" class="elementor elementor-18897" data-elementor-post-type="post"> <section
class="elementor-section elementor-top-section elementor-element elementor-element-59428748 elementor-section-boxed elementor-section-height-default elementor-section-height-default parallax_section_no qode_elementor_container_no" data-id="59428748" data-element_type="section"><div
class="elementor-container elementor-column-gap-default"><div
class="elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-50d7e8ad" data-id="50d7e8ad" data-element_type="column"><div
class="elementor-widget-wrap elementor-element-populated"><div
class="elementor-element elementor-element-785afea4 elementor-widget elementor-widget-text-editor" data-id="785afea4" data-element_type="widget" data-widget_type="text-editor.default"><div
class="elementor-widget-container"><p>By <a
href="https://www.vox.com/authors/sara-morrison">Sara Morrison</a>  Jan 28, 2021, 1:10pm EST</p><p></p><p
id="qUU73H">When I tell people I write about data privacy, I usually get something along the lines of these two responses:</p><p
id="xKIJv0">“Is Facebook listening to me? I got an ad for parrot food, and the only possible explanation is that Facebook heard my friend tell me about his new pet parrot, because he mentioned that exact brand, which I never even heard of before.”</p><p
id="4fLxNj">(No,&nbsp;<a
href="https://www.nytimes.com/2019/08/20/opinion/facebook-privacy.html">Facebook isn’t</a>.)</p><p
id="3khEEn">Here’s the other:</p><p
id="71daYv">“I’m sure that’s important to someone, but I don’t have anything to hide. Why should I care about data privacy?”</p><p
id="zHlkUH">A ton of personal and granular data is collected about us every day through our phones, computers, cars, homes, televisions, smart speakers — anything that’s connected to the internet, basically, as well as things that aren’t, like&nbsp;<a
href="https://www.fastcompany.com/90490923/credit-card-companies-are-tracking-shoppers-like-never-before-inside-the-next-phase-of-surveillance-capitalism">credit card purchases</a>&nbsp;and even the information on your&nbsp;<a
href="https://www.vice.com/en/article/evjekz/the-california-dmv-is-making-dollar50m-a-year-selling-drivers-personal-information">driver’s license</a>. We don’t have a lot of control over much of this data collection, and we often don’t realize when or how it’s used. That includes how it may be used to influence us.</p><p
id="wwWwEQ">Maybe that takes the form of an ad to buy parrot food. But it may also take the form of a recommendation to watch a YouTube video about how globalist world leaders and Hollywood stars are running a pedophile ring that only President Trump can stop.</p><p
id="laBt5X">“Internet platforms like YouTube use AI that deliver personalized recommendations based on thousands of data points they collect about us,” Brandi Geurkink, a senior campaigner at Mozilla Foundation who is researching YouTube’s recommendation engine, told Recode.</p><p
id="IxPY0S">Among those data points is your behavior across YouTube parent company Google’s other products, like your Chrome browsing habits. And it’s your behavior on YouTube itself: where you scroll down a page, which videos you click on, what’s in those videos, how much of them you watch. That’s all logged and used to inform increasingly personalized recommendations to you, which may be served up through autoplay (activated by default) before you can click away.</p><p
id="jAnwQm">She added: “This AI is optimized to keep you on the platform so that you keep watching ads and YouTube keeps making money. It’s not designed to optimize for your well-being or ‘satisfaction,’ despite what YouTube claims. As a result, research has demonstrated how this system can give people their own private, addictive experience that can easily become filled with conspiracy theories, health misinformation, and political disinformation.”</p><p
id="OgHeYv">The real-world harm this can cause became pretty clear on January 6, when hundreds of people stormed the Capitol building to try to overturn the certification of an election they were convinced, baselessly, that Trump won. This mass delusion was&nbsp;<a
href="https://www.bbc.com/news/technology-55592752">fed by websites</a>&nbsp;that, research has shown, promote and amplify conspiracy theories and election misinformation.<q>“If personal data is being used to promote division, consumers have a right to know.”</q></p><p
id="VOkk03">“The algorithmic amplification and recommendation systems that platforms employ spread content that’s evocative over what’s true,” Rep. Anna Eshoo (D-CA) said in a&nbsp;<a
href="https://eshoo.house.gov/media/press-releases/following-attack-capitol-reps-eshoo-and-malinowski-lead-dozens-colleagues">recent statement</a>. “The horrific damage to our democracy wrought on January 6th demonstrated how these social media platforms played a role in radicalizing and emboldening terrorists to attack our Capitol. These American companies must fundamentally rethink algorithmic systems that are at odds with democracy.”</p><p
id="4XD447">For years, Facebook, Twitter, YouTube, and other platforms have pushed content on their users that their algorithms tell them those users will want to see, based on the data they have about their users. The&nbsp;<a
href="https://www.youtube.com/howyoutubeworks/product-features/recommendations/#curbing-misinformation">videos you watch</a>, the Facebook posts and people you&nbsp;<a
href="https://www.facebook.com/help/382485908586472">interact with</a>, the&nbsp;<a
href="https://help.twitter.com/en/using-twitter/account-suggestions#:~:text=If%20someone%20has%20uploaded%20their,may%20suggest%20you%20follow%20them.&amp;text=We%20may%20make%20suggestions%20based,view%20or%20otherwise%20interact%20with.">tweets you respond to</a>, your location — these help build a profile of you, which these platforms’ algorithms then use to serve up even more videos, posts, and tweets to interact with, channels to subscribe to, groups to join, and topics to follow. You’re not looking for that content; it’s looking for you.</p><p
id="s3YvZl">This is good for users when it helps them find harmless content they’re already interested in, and for platforms because those users then spend more time on them. It’s not good for users who get radicalized by harmful content, but that’s still good for platforms because those users spend more time on them. It’s their business model, it’s been a very profitable one, and they have no desire to change it — nor are they required to.</p><p
id="PoRLli">“Digital platforms should not be forums to sow chaos and spread misinformation,” Sen. Amy Klobuchar (D-MN), a&nbsp;<a
href="https://www.klobuchar.senate.gov/public/index.cfm/news-releases?ID=FB1FB103-0DAC-4A46-9F6B-A2A4233B5C90">frequent critic</a>&nbsp;of Big Tech, told Recode. “Studies have shown how social media algorithms push users toward polarized content, allowing companies to capitalize on divisiveness. If personal data is being used to promote division, consumers have a right to know.”</p><p
id="bJw1MY">But that right is not a legal one. There is no federal data privacy law, and platforms are notoriously opaque about how their recommendation algorithms work, even as they’ve become increasingly transparent about what user data they collect and have given users some control over it. But these companies have also&nbsp;<a
href="https://www.vox.com/recode/2020/8/26/21402457/apple-facebook-advertising-tracking-ios14">fought attempts</a>&nbsp;to stop tracking when it’s not on their own terms, or&nbsp;<a
href="https://techcrunch.com/2021/01/28/x-mode-location-google-apple-ban/">haven’t acted on</a>&nbsp;their&nbsp;<a
href="https://www.washingtonpost.com/news/the-switch/wp/2018/04/16/thousands-of-android-apps-may-be-illegally-tracking-children-study-finds/">own policies</a>&nbsp;forbidding it.</p><p
id="53qwHZ">Over the years, lawmakers have introduced bills that address recommendation algorithms, none of which have gone anywhere. Rep. Louis Gohmert (R-TX) tried to remove Section 230 protections from social media companies that used algorithms to recommend (or suppress) content with his “<a
href="https://www.congress.gov/bill/116th-congress/house-bill/492/text">Biased Algorithm Deterrence Act</a>.” A bipartisan group of senators came up with the “<a
href="https://www.congress.gov/bill/116th-congress/senate-bill/2763/text">Filter Bubble Transparency Act</a>,” which would force platforms to give users “the option to engage with a platform without being manipulated by algorithms driven by user-specific data.” Meanwhile, Reps. Eshoo and Tom Malinowski (D-NJ)&nbsp;<a
href="https://www.vox.com/recode/22221135/capitol-riot-section-230-twitter-hawley-democrats">plan to reintroduce</a>&nbsp;their “Protecting Americans from Dangerous Algorithms Act,” which would remove Section 230 protections from platforms that amplify hateful or extremist content.</p><p
id="07zkPY">For their part, platforms&nbsp;<a
href="https://twitter.com/TwitterSafety/status/1285726277719199746">have</a>&nbsp;<a
href="https://www.vox.com/recode/2020/8/19/21376166/facebook-qanon-take-down-groups-conspiracy-theory">made</a>&nbsp;<a
href="https://blog.youtube/news-and-events/harmful-conspiracy-theories-youtube">efforts</a>&nbsp;to curb some extremist content and misinformation. But these only came after years of&nbsp;<a
href="https://www.wsj.com/articles/facebook-knows-it-encourages-division-top-executives-nixed-solutions-11590507499#:">allowing it</a>&nbsp;largely unchecked — and profiting from it — and&nbsp;<a
href="https://www.vox.com/recode/21499485/qanon-facebook-twitter-bans-republican-politics">with mixed results</a>. These measures are also reactive and limited; they do nothing to stop or curb any developing conspiracy theories or misinformation campaigns. Algorithms apparently aren’t as good at rooting out harmful content as they are at spreading it. (Facebook and YouTube did not respond to request for comment.)</p><p
id="ZnsMno">It’s pretty much impossible to stop companies from collecting data about you — even if you don’t use their services, they still&nbsp;<a
href="https://www.wired.com/story/ways-facebook-tracks-you-limit-it">have their ways</a>. But you can at least limit how algorithms use it against you.&nbsp;<a
href="https://www.theverge.com/2020/3/6/21167920/twitter-chronological-feed-how-to-ios-android-app-timeline">Twitter</a>&nbsp;and&nbsp;<a
href="https://lifehacker.com/how-to-force-a-chronological-feed-in-facebooks-new-desi-1842426847">Facebook</a>&nbsp;give you reverse chronological options, where tweets and posts from people you follow show up in the order they’re added, rather than giving priority to the content and people they think you’re most interested in. YouTube has an “incognito mode” that it says&nbsp;<a
href="https://support.google.com/youtube/answer/9040743?hl=en">won’t use</a>&nbsp;your search and watch history to recommend videos. There are also&nbsp;<a
href="https://www.vox.com/recode/2020/10/21/21509440/global-privacy-control-browsers">more private browsers</a>&nbsp;to limit data collection and prevent sites from linking you to your past visits or data. Or you can just stop using those services entirely.</p><p
id="nGGGyK">And, even in algorithms, there is agency. Just because a conspiracy theory or misinformation makes its way into your timeline or suggested videos doesn’t mean you have to read or watch, or that you’ll automatically and immediately believe them if you do. The conspiracies might be much easier to find (even when you weren’t looking for them); you still choose whether or not to go down the path they show you. But that path isn’t always obvious. You might think QAnon is stupid, but you will share&nbsp;<a
href="https://www.vox.com/21436671/save-our-children-hashtag-qanon-pizzagate">#SaveTheChildren content</a>. You might not believe in QAnon, but you’ll vote for a Congress member&nbsp;<a
href="https://www.vox.com/2020/8/11/21362725/georgia-runoff-trump-congressional-qanon-caucus-marjorie-taylor-greene">who does</a>. You might not fall down the rabbit hole, but your&nbsp;<a
href="https://www.vox.com/first-person/22232660/trump-capitol-extremism-insurrection-riot-inauguration">friends and family will</a>.</p><p
id="XoTRDj">Or maybe an algorithm will recommend the wrong thing when you’re at your most desperate and susceptible. Will you never, ever be so vulnerable? Facebook and YouTube know the answer to that better than you do, and they’re willing and able to exploit it. You may have more to hide than you think.</p><p
id="KTGa17"><a
href="http://www.vox.com/open-sourced"><em>Open Sourced</em></a><em>&nbsp;is made possible by Omidyar Network. All Open Sourced content is editorially independent and produced by our journalists.</em></p></div></div></div></div></div> </section></div> ]]></content:encoded> </item> </channel> </rss>