In the early hours of this morning a hacker from America tried to get into my Microsoft account. I am pleased to say he / she was unsuccessful. I have decided to close the account (I am a Mac user). It’s important to check “recent activity” on your account. You’ll be surprised to see a string of (hopefully) unsuccessful sign-ins, and from which countries.
Nita’s WhatsApp Hack
My what’s app has just been hacked and wondering if there is anyone here that can help me as I have no idea how I can get all my groups n messages back
I have not backed up on iCloud so that is not an option
I have not linked onto my laptop either so cannot access on laptop
What else can anyone suggest to get my account and messages pls
I replied …
You have few options left I’m afraid. Your messages are stored on your phone, that is the primary message store, so if you haven’t backed up your message store, there is little you can do – as I understand it – to recover your account.
This is what Claude told me, using the text you typed above …
I’m sorry to hear your WhatsApp account has been compromised. This can be stressful, but there are steps you can take to recover your account and possibly your messages.
Here’s what you can do:
1. First, try to regain control of your WhatsApp account by verifying your phone number again. Open WhatsApp and follow the verification process.
2. If you’re locked out completely, contact WhatsApp support through their official website or app.
3. Unfortunately, without a backup (either on iCloud or Google Drive), recovering past messages is very challenging. WhatsApp doesn’t store your messages on their servers once delivered.
4. For your groups: once you regain access to your account, you may still see your groups listed, though you might not have the message history.
5. Ask friends or family members who are in the same groups if they can add you back to any groups you’ve been removed from.
6. For future protection, I’d recommend enabling two-step verification in WhatsApp settings once you regain access.
7. You should also consider changing passwords for any accounts that might share similar passwords to your compromised account.
Would you like more specific information about any of these steps? Have you been able to verify your phone number again in the app?
… and Perplexity …
If your WhatsApp account has been hacked and you don’t have backups on iCloud or a linked laptop, follow these steps:
Log Out All Linked Devices: Open WhatsApp, go to “Settings” > “Linked Devices,” and log out of all unknown devices.
Re-register Your Account: Uninstall and reinstall WhatsApp. Enter your phone number to receive a verification code via SMS. This will log out the hacker as WhatsApp allows only one active device per account.
Two-Step Verification: If a PIN is requested and you didn’t set it up, the hacker may have enabled two-step verification. You can reset the PIN via the “Forgot PIN” option if an email is linked to your account.
Contact WhatsApp Support: Email support@whatsapp.com detailing the situation with “Lost/Stolen” in the subject line for further assistance.
Recover Messages Locally: If using Android, check local storage under Internal Storage/WhatsApp/Databases for backups (e.g., msgstore.db.crypt14) and restore them during reinstallation.
Inform your contacts about the hack to prevent further misuse of your account.
Nita replied …
The email account is compromised as cannot change my password
I think I am back up having reinstalled the what’s app
Just need to check other social media accounts if compromised
AI and cataracts. Hi, I’m finding all sorts of ways to use Chat GPT. Yesterday I asked it to find me some private clinics that offered cataract surgery near Cardiff and to give me some idea of the prices, and it did just that. In seconds. I could have found the same information trawling through websites but this is so much quicker.
Do you need a paid subscription to open an Apple account and be able to Sign in with Apple?
No, you don’t need a paid subscription to open an Apple account or use Sign in with Apple. Creating an Apple ID (Apple account) is completely free and allows you to: • Sign in with Apple on third-party websites and apps • Access basic Apple services like the App Store • Use iCloud’s free tier (with 5GB of storage) • Make purchases in Apple’s digital stores Paid subscriptions like Apple One or individual services (Apple Music, iCloud+ storage, etc.) are optional add-ons to your free Apple ID account. To create an Apple ID, you just need an email address, a password, and some basic personal information. You can sign up directly on an Apple device or through the Apple website.
What about Hide my Email address?
You’re asking about a good feature! Hide My Email is part of Apple’s privacy features, but it has different availability: Free version: • You can use Hide My Email when signing up for services with “Sign in with Apple” – this gives you a randomly generated email address that forwards to your real one • This basic functionality is available to anyone with a free Apple ID Paid version (requires iCloud+ subscription): • The full-featured Hide My Email service that lets you create and manage multiple private email addresses anytime (not just when signing up for services) • Create unlimited email addresses • Manage all your private email addresses in Settings • Use custom domain names with iCloud Mail iCloud+ subscriptions start at $0.99/month for the 50GB plan, which includes the expanded Hide My Email functionality. The subscription also includes other privacy features like Private Relay and expanded HomeKit Secure Video support.
What a question! Total of course might be the first answer, but is it actually the right one. It’s an entirely personal choice, and you have to weigh up how much you want to share of yourself online, how much personal information you need to share online, and how to secure that which you have to provide online to obtain services. Yes – it’s not an easy question to answer! But first some highlights …
So where should we start. Well … I thought I’d just ask Perplexity and Claude to help me …
Perplexity advise me thus …
The amount of privacy you need or want depends on your personal values, lifestyle, and circumstances. Here are some considerations:
Factors Influencing Privacy Needs
1. Personal Boundaries: Privacy allows you to maintain control over sensitive information about yourself, such as financial, medical, or personal details.
2. Life Stage: Adolescents often need privacy to explore their identity and independence, while adults may seek it to protect personal data or maintain emotional boundaries.
3. Cultural and Social Context: In some environments, privacy can be a matter of safety (e.g., journalists in authoritarian regimes), while in others, it may be less critical.
Balancing Privacy and Openness • Online Privacy: Use tools like password managers, VPNs, and privacy-conscious apps to protect your data. • Relationships: Healthy relationships respect privacy but avoid secrecy that harms trust. • Public Interactions: Avoid oversharing in public spaces or online forums to maintain control over your personal information.
Practical Steps • Define what information you’re comfortable sharing. • Use privacy tools to secure digital data. • Communicate clearly about boundaries with others. Ultimately, the right level of privacy is subjective and should align with your comfort level and values.
… whilst Claude “goes the extra mile” and provides me with a Comprehensive Personal Privacy Guide …
# Digital Privacy Mastery: Protecting Your Online Presence
## Digital Privacy Landscape
### Understanding Digital Privacy Digital privacy is about controlling your personal information in the online world, protecting yourself from: - Data collection and tracking - Unauthorized access to personal information - Potential misuse of your digital footprint - Cybersecurity threats - Online surveillance and profiling
### Digital Privacy Threat Landscape
#### Primary Digital Privacy Risks 1. **Data Harvesting** - Corporate data collection - Targeted advertising - Behavioral tracking - Comprehensive digital profiling
2. **Cybersecurity Vulnerabilities** - Personal data breaches - Identity theft - Financial fraud - Unauthorized account access
3. **Online Tracking Mechanisms** - Cookies and tracking technologies - Social media data mining - Search engine tracking - Cross-platform data sharing
### Digital Privacy Assessment Levels
#### Basic Digital Privacy (Beginner Level) - Limited awareness of online tracking - Minimal privacy settings - Using default browser and app configurations - Sharing personal information freely online
#### Intermediate Digital Privacy (Aware Level) - Understanding basic tracking mechanisms - Selective social media sharing - Using some privacy tools - Aware of potential online risks - Implementing basic security measures
#### Advanced Digital Privacy (Expert Level) - Comprehensive online protection strategy - Minimal digital footprint - Advanced encryption and anonymity tools - Proactive threat monitoring - Strategic online information management
### Comprehensive Digital Privacy Toolkit
#### 1. Personal Information Management - Audit existing online accounts - Minimize personal data sharing - Use alternative/temporary contact information - Create dedicated email addresses for different purposes
#### 2. Authentication and Access Control 1. **Password Management** - Use complex, unique passwords - Implement password manager - Enable two-factor authentication - Regularly update passwords
2. **Account Security** - Review app and service permissions - Disconnect unused accounts - Use privacy-focused authentication methods - Implement login alerts
2. **Tracking Prevention** - Block third-party cookies - Use anti-tracking browser extensions - Disable location tracking - Limit browser fingerprinting
#### 4. Social Media and Online Presence 1. **Platform Privacy Settings** - Minimize public profile information - Restrict personal data visibility - Control tagging and sharing permissions - Regularly audit connected applications
2. **Content Strategy** - Be selective about online sharing - Use pseudonyms when appropriate - Understand platform data policies - Implement content self-censorship
#### Digital Privacy Mindset - Treat personal data as valuable asset - Develop critical thinking about online sharing - Stay informed about privacy technologies - Cultivate a proactive privacy approach
#### Continuous Privacy Improvement 1. Regular privacy audits 2. Stay updated on emerging threats 3. Adapt privacy strategies 4. Learn from privacy best practices 5. Invest in privacy education
### Legal and Ethical Dimensions - Understand data protection regulations - Know your digital rights - Recognize ethical data use - Support privacy-focused initiatives
### Conclusion: Your Digital Privacy Journey Digital privacy is an ongoing process of: - Awareness - Strategic management - Continuous learning - Technological adaptation
**Key Takeaway**: Your digital privacy is a personal responsibility and a fundamental right in the digital age.
### Action Plan 1. Conduct immediate privacy audit 2. Implement basic protection tools 3. Develop privacy-conscious habits 4. Continuously educate yourself 5. Regularly reassess your digital privacy strategy
… so with that, I might as well stop and let AI take over!!!! Here’s Claude’s presentation …
# Securing Your Digital Privacy
## Table of Contents 1. Understanding Digital Privacy 2. Risks in the Digital Landscape 3. Protective Strategies 4. Essential Tools and Techniques 5. Best Practices for Everyday Protection
---
## 1. Understanding Digital Privacy
### What is Digital Privacy? Digital privacy is the protection of personal information in the online world, encompassing: - Personal data protection - Control over personal information sharing - Prevention of unauthorized access to digital identities - Maintaining anonymity and security in digital interactions
### Why Does Digital Privacy Matter? - Prevent identity theft - Protect personal and financial information - Maintain personal autonomy - Avoid targeted manipulation - Safeguard professional and personal reputation
---
## 2. Risks in the Digital Landscape
### Common Digital Privacy Threats - Data breaches - Phishing attacks - Social engineering - Tracking and profiling - Unauthorized data collection - Malware and ransomware
### Potential Consequences - Financial fraud - Personal information exposure - Reputation damage - Stalking and harassment - Professional and personal discrimination
---
## 3. Protective Strategies
### Personal Information Management - Minimize personal data sharing - Use privacy settings on social media - Be cautious about online forms and surveys - Regularly audit online accounts and permissions
### Digital Footprint Reduction - Use pseudonyms when possible - Limit personal information in public profiles - Be mindful of location sharing - Regularly delete unnecessary online accounts
### Practical Privacy Tips - Use two-factor authentication - Regularly update software and devices - Be skeptical of unsolicited communications - Use unique passwords for each account - Enable encryption on devices - Avoid public Wi-Fi without VPN protection
### Online Behavior - Think before posting - Limit personal information sharing - Be aware of app permissions - Regularly review privacy settings - Use privacy-focused search engines
---
## Additional Resources
### Recommended Websites - [Electronic Frontier Foundation (EFF)](https://www.eff.org/) - [Privacy Tools](https://privacytools.io/) - [Have I Been Pwned](https://haveibeenpwned.com/)
### Learning More - Take online privacy courses - Follow cybersecurity blogs - Stay informed about latest privacy technologies
---
## Conclusion
### Your Digital Privacy is Your Right - Be proactive - Stay informed - Continuously educate yourself - Protect your digital identity
*Remember: Digital privacy is an ongoing process, not a one-time solution!*
… that’s just too much to take-in isn’t it, so I think I still have a place, and I’ll simplify things down to just a few points – but please take note of both of these AI contributions as a checklist to visit and re-visit on a regular basis.
So my plan is to cover the following:
Safeguarding
Cookies – Deny usually works (but you may need to temporarily switch off adblockers if the site is of particular value/importance to you – but remember to switch it back on afterwards. Alternatively – look for a different site that doesn’t impose that requirement. It’s nearly always imposed to get marketing information from you – what you’re doing, what you’re looking at, where you are, what you’re buying etc etc.
Adblockers – these protect you from yourself to some extent, as you won’t see adverts that you might be tempted to click on; but they also remove invasive ads from appearing on your screen and interrupting your reading. They should also prevent pop-ups (in small windows) appearing – but be aware that some websites have this facility hard-wired into their code, so the best solution is to avoid such websites as you can’t switch-off the pop-ups. Claude gives advice on the best ad blockers available …
Choosing the best ad blocker depends on your specific needs, such as browser compatibility, customization options, and additional features like privacy protection. Here are some of the top ad blockers for different scenarios:
## Top Ad Blockers for 2025
### 1. **AdGuard** - **Best For:** System-wide ad blocking and broad compatibility across multiple browsers and devices. - **Features:** Offers robust app coverage, parental controls, browsing security, and a VPN. It has a user-friendly interface and provides detailed statistics on blocked ads. - **Compatibility:** Browsers, Windows, macOS, Android, and iOS. - **MV3 Compliance:** Yes, with a compliant beta extension for Chrome. - **Cost:** Starts at $29.88, with plans covering up to nine devices[1][2].
### 2. **uBlock Origin** - **Best For:** Customization and Firefox users. - **Features:** Highly customizable with the ability to add custom filters and scripts. It is free and open-source. - **Compatibility:** Primarily for browsers. - **MV3 Compliance:** No. - **Cost:** Free[1][3].
### 3. **Total Adblock** - **Best For:** Ease of use and YouTube/Facebook ad blocking. - **Features:** Blocks third-party trackers, improves page load times, and offers a premium plan with antivirus software. - **Compatibility:** Browsers. - **MV3 Compliance:** Currently unaffected but lacks a clear transition plan. - **Cost:** Free version available, with premium starting at $1.59/mo[2].
### 4. **Surfshark CleanWeb** - **Best For:** Unlimited devices and VPN integration. - **Features:** Blocks ads across multiple devices, including smart TVs, and offers VPN benefits like data encryption and phishing protection. - **Compatibility:** Unlimited devices, including smart TVs. - **MV3 Compliance:** Unaffected. - **Cost:** Bundled with Surfshark VPN[2].
### 5. **Ghostery** - **Best For:** Privacy-focused users. - **Features:** Offers anti-tracking features and detailed ad-blocking statistics. - **Compatibility:** Chromium-based browsers, Android, and iOS. - **MV3 Compliance:** Yes. - **Cost:** Free, with premium options available[1][3].
### 6. **Adblock Plus** - **Best For:** General ad blocking with acceptable ads feature. - **Features:** Allows acceptable ads to support websites, with a user-friendly interface. - **Compatibility:** Chrome and other browsers. - **MV3 Compliance:** Not specified. - **Cost:** Free[8].
### Comparison Table
| Ad Blocker | Best For | Compatibility | MV3 Compliance | Cost | |------------|---------|---------------|----------------|------| | AdGuard | System-wide blocking | Browsers, Windows, macOS, Android, iOS | Yes | $29.88+ | | uBlock Origin | Customization, Firefox | Browsers | No | Free | | Total Adblock | Ease of use, YouTube/Facebook | Browsers | Unaffected | $1.59/mo+ | | Surfshark CleanWeb | Unlimited devices, VPN | Unlimited devices | Unaffected | Bundled with VPN | | Ghostery | Privacy features | Chromium-based browsers, Android, iOS | Yes | Free+ | | Adblock Plus | General ad blocking | Chrome and other browsers | Not specified | Free |
Each of these ad blockers offers unique benefits depending on your priorities, whether it's customization, privacy, or ease of use.
Sources [1] Best Ad Blockers of 2025 - Cookies https://www.aboutcookies.org.uk/ad-blockers [2] Best Ad Blockers That Still Work in Chrome March 2025 https://allaboutcookies.org/best-ad-blockers-for-chrome [3] The Best Ad Blockers for 2025 - PCMag https://www.pcmag.com/picks/best-ad-blockers [4] What is the best AdBlocker for Chrome? (browser opinions aside) https://www.reddit.com/r/Adblock/comments/1ex5hyq/what_is_the_best_adblocker_for_chrome_browser/ [5] Best ad blockers of 2025 - TechRadar https://www.techradar.com/pro/best-ad-blockers [6] AdBlock — block ads across the web - Chrome Web Store https://chromewebstore.google.com/detail/adblock-%E2%80%94-block-ads-acros/gighmmpiobklfepjocnamgkkbiglidom [7] Best Ad Blocker 2025 | My top choices that REALLY work! - YouTube https://www.youtube.com/watch?v=92ITOpOxRcQ [8] Adblock Plus | The world's #1 free ad blocker https://adblockplus.org
… add to this Magic Lasoo if you use Apple kit with the added benefit that it blocks ads on YouTube if you view through Safari [otherwise you’ll need to consider purchasing YouTube Premium at £12.99pm, which might be worth it if you’re a big YouTube watcher].
Password managers
A subject we’ve looked at before; recommended password managers would be one from this article, 1Password has my son’s recommendation; but as you know I rely on the less feature-rich but very effective – within a 100% Apple environment – Password app (using iCloud Keychain)
Two factor authentication (2FA)
You might care to look at this page from the BBC on 2FA as well – I would recommend using Authy, if you go down the third-party authenticator route
[A Postscript from Signal – 28/03/2025]
I don’t think I mentioned it yesterday but with an increasing number of apps, the two above included, you don’t need to provide login credentials, you can “Login with Apple” or Google, and I think Microsoft for some. This means the app account is tied to your Apple account (or whatever) and an anonymous userId is created which provides privacy as well as not needing to create a password as well.
Don’t proceed with Free option, or 7-day trial if ads appear immediately you take your first step (eg I followed after research a link to the best recommended software for a particular purpose, but after I downloaded it – no problems, I was immediately bombarded by ads when I started the app up with the plea to pay for an ad-free version), and don’t take the 10% off next purchase offer – this is a particularly insidious “trick” often linked to travel websites, where you are offered 15% off your next purchase, only to find that by clicking on the link you have to provide information, or permission, to send personal information to other businesses.
Be mindful of links on purchase sites – similar to the above, but just be aware that the re-direction takes you away from the original website where you might have felt relatively safe. On that not, always use a Credit Card for online purchases (or Apple or Google Pay, or Paypal) as you’re provided with some protection against fraud.
Beware of location tracking – switch-off all that don’t need your location to work. In your apps just be aware that not all apps need to know where you are – maps … yes; weather – maybe; asda – not really!
Privacy settings in apps – Facebook, Google
Facebook (from Perplexity) …
To enhance your privacy on Facebook, here are key settings to adjust:
1. Control Who Sees Your Posts Go to Settings & Privacy > Settings > Privacy. Adjust the audience for your posts: choose "Friends," "Only Me," or customize it further. Avoid "Public" for maximum privacy.
2. Manage Profile Visibility Edit your "About" section to limit shared details like work, education, and contact info. Set visibility to "Friends" or "Only Me". Turn off search engine linking to your profile under Settings & Privacy > How People Find and Contact You.
3. Secure Your Account Enable two-factor authentication and use a strong password. Regularly review apps connected to your account and remove unnecessary ones.
4. Limit Old Posts Use the "Limit Past Posts" option in Privacy Checkup to restrict visibility of older posts.
5. Control Tags and Posts on Your Profile Under Profile and Tagging, decide who can post on your profile and who can see tagged posts. Set to "Friends" or stricter options.
6. Ad Preferences Turn off personalized ads by reviewing ad preferences in Settings & Privacy > Ad Preferences.
Review these settings periodically for better privacy control!
… and remember my advice to logout from Facebook and Instagram after use. A belts and braces protection of your privacy.
Google offers several privacy settings to help users control their data and online experience. Here are key privacy settings you should consider adjusting:
Web & App Activity Turn off this master privacy control to limit Google's collection of your search history, location data, and app usage. To do this: Go to any Google website Click on your profile picture Select "Google Account" Navigate to "Data & Privacy" Find "Web & App Activity" and turn it off
Location History Disable location tracking by turning off both Web & App Activity and Timeline (formerly Location History). This prevents Google from storing detailed information about your movements.
Auto-Delete Options If you prefer to keep some features enabled, set up auto-delete for your data: Go to "Privacy & Personalization" Select "Web & App Activity" or "Timeline" Choose "Auto-delete" and set your preferred time period
Ad Personalization Limit targeted advertising by adjusting these settings: Go to "Privacy & Personalization" Find "Ad Personalization" Turn off personalized ads
Chrome Privacy Settings For Chrome users, consider these adjustments: Disable automatic sign-in: Settings > Sync and Google Services > Turn off "Allow Chrome Sign-In" Sign out of Chrome: Click your profile picture > Sign out Manage sync settings: Settings > Sync and Google Services > Manage What You Sync
Additional Controls Review and limit data sharing with third-party apps and services Use Google's Privacy Checkup tool to review and adjust your settings Explore the "Data & Privacy" section in your Google Account for more options
Remember, while these settings can enhance your privacy, they may also affect some Google services' functionality. Regularly review and update your privacy settings to maintain your desired level of data protection.
Options you might consider …
Subscription rather than free – a hobby horse of mine! If it’s worth using, it’s worth paying for – especially if it prevents your information being sold on to other sites, or marketing organisations.
Privacy focussed solutions as a choice – Proton vs Google;
Open source as a consideration – always investigate whether there is a FreeWare or DonationWare option, and then consider offering a subscription is requested – Wikipedia, Signal, Libre, etc etc
Wise choices when downloading – be sure of the website before you download software
Here are some of the best sites for downloading safe freeware:
1. **FileHippo** - **Features**: Offers a wide range of current apps, categorized for easy navigation. Provides older versions of software, which can be useful if newer versions cause issues. - **Benefits**: Properly labels any additional software offers, making it easy to avoid unwanted downloads[2].
2. **Softpedia** - **Features**: Over 1 million software titles, regularly updated and checked for malware. Offers mirrors for previous versions of programs. - **Benefits**: Detailed descriptions, user reviews, and editor ratings help ensure safe downloads[1][2].
3. **MajorGeeks** - **Features**: Long-standing reputation for reliability, with a curated list of top freeware picks. - **Benefits**: Known for its trustworthiness, despite a somewhat outdated interface[2].
4. **SnapFiles** - **Features**: Highlights a "Freeware Pick" and a "Random Pick" to discover new apps. Includes user reviews and warnings about bundled software. - **Benefits**: Offers a section for portable programs, ideal for running apps without installation[2].
5. **Ninite** - **Features**: Allows downloading multiple apps at once, automatically rejecting toolbars and unwanted software. - **Benefits**: Ideal for setting up new PCs or reinstalling software securely, with background updates[2].
6. **Tucows** - **Features**: Established reputation with a wide range of software available. - **Benefits**: Known for reliability and safety, though less frequently updated[1].
7. **Portable Freeware** - **Features**: Curated directory focusing on portable freeware with comprehensive descriptions and user comments. - **Benefits**: Ensures software runs without installation and leaves no traces on the host machine[3].
8. **Chip.de/Chip.eu** - **Features**: Offers a variety of software with hints about potential toolbars or adware within the software itself. - **Benefits**: Known for avoiding adware wrappers in downloads[1].
9. **Nonags** - **Features**: Specializes in non-adware freeware, ensuring safe downloads. - **Benefits**: Ideal for those seeking software without bundled unwanted programs[1].
10. **GitHub** - **Features**: A platform primarily for open-source software development, offering a wide range of free and safe software. - **Benefits**: Software is often reviewed and audited by the community, ensuring safety and quality[3].
Sources [1] what's your trusted site for freeware? (sourceforge ect.) : r/software https://www.reddit.com/r/software/comments/1xwokn/whats_your_trusted_site_for_freeware_sourceforge/ [2] Safest Websites to Download Windows Software - Bug Zero https://blog.bugzero.io/safest-websites-to-download-windows-software-ffff6b2e152b [3] Best Website for downloading Freeware Software? - Bogleheads.org https://www.bogleheads.org/forum/viewtopic.php?t=404839 [4] The best free software that's completely safe (we've checked) https://www.which.co.uk/news/article/the-best-free-safe-software-ajW7U4V3dBVU [5] CNET Download: Free Software Downloads and Reviews for ... https://download.cnet.com [6] The 10 Safest Free Software Download Sites for Windows in 2023 https://www.youtube.com/watch?v=KCaTww_6YcY [7] Top 10 Sites to Download Free PC Games Completely Safe and Legit https://www.movavi.com/learning-portal/sites-to-download-free-pc-games.html
A VPN offers a degree of protection (even with a cell connection)
Using a VPN while connected to a cellular internet connection is not strictly necessary but is highly recommended for several reasons:
### **Why Use a VPN on Cellular Data?** 1. **Enhanced Privacy**: - Cellular providers can track and log your online activity. A VPN encrypts your data, preventing your Internet Service Provider (ISP) from monitoring or selling your browsing habits[2][3][4].
2. **Increased Security**: - While cellular networks are generally more secure than public Wi-Fi, they are not immune to threats like phishing or malicious attacks. A VPN adds an extra layer of encryption to protect sensitive information[1][2][3].
3. **Bypass Geo-Restrictions and Throttling**: - A VPN allows you to spoof your IP address, enabling access to region-specific content or bypassing ISP throttling during high-bandwidth activities like streaming or gaming[2][3].
4. **Protection Against ISP Tampering**: - Some ISPs compress or modify website content for mobile browsing. A VPN ensures you access unaltered content[1].
### **When You Might Not Need a VPN** - If your primary concern is casual browsing or using apps like WhatsApp or Facebook, and you trust your cellular provider, a VPN might not feel essential[5]. - Using a VPN increases data usage (by 5–15%) and can drain your battery faster, so it may not be ideal if you're on a limited data plan or low battery[1][2][4].
### **Conclusion** While cellular networks are safer than public Wi-Fi, using a VPN enhances privacy and security. It is particularly valuable if you frequently handle sensitive data, want to avoid ISP tracking, or access geo-restricted content. However, consider the trade-offs in terms of data usage and battery life.
Sources [1] Does a VPN work on mobile data? - Surfshark https://surfshark.com/blog/does-vpn-work-on-cellular-data [2] Should you use a VPN when connected to cellular data? | Tom's Guide https://www.tomsguide.com/computing/vpns/should-you-use-a-vpn-when-connected-to-cellular-data [3] Does VPN work on mobile data? - Cybernews https://cybernews.com/what-is-vpn/does-a-vpn-work-on-mobile-data/ [4] Does a VPN work without Wi-Fi? - NordVPN https://nordvpn.com/blog/does-vpn-work-without-wifi/ [5] Who here uses VPN when on mobile data? - Reddit https://www.reddit.com/r/VPN/comments/n8x2kv/who_here_uses_vpn_when_on_mobile_data/ [6] Do you need a VPN on your phone? Here's the truth. - Mashable https://mashable.com/article/do-you-need-a-vpn-on-your-phone [7] Why You Need a VPN on Your Smartphone | McAfee Blog https://www.mcafee.com/blogs/mobile-security/privacy-please-why-a-vpn-on-your-smartphone-may-be-a-smart-move-for-you/ [8] Do I Really Need a VPN at Home? - PCMag https://www.pcmag.com/how-to/do-i-need-a-vpn-at-home
So it’s up-to-you – how much privacy do you actually want; how much privacy do you need!
A single issue post to just alert folk to the murky world of credit reference agencies and their dual-role as data brokers – which I was (I’m ashamed to say) totally unaware of.
This came to my attention when I received an email from Experian – who I had an account with due to a data breach with my Pension provider which resulted in them giving members free 12-month access to their services – which advised that I had 19 “experienced” Soft Searches on my account with them. Now I’d not been seeking any credit recently, so this immediately sparked my interest and so I clicked on the link in the email (see above) and logged in to see what was happening. At which point I was greeted by this screen and the rather alarming sidebar, you can see here …
Screenshot
… just ponder this for a moment. I had always assumed that Experian was a credit reference agency which provided a service to organisations wishing to extend credit to consumers and businesses to give an assessment of credit worthiness. Indeed when I had an account with them, I could see my score, and you were able to challenge that if you didn’t think it looked right. But that’s all immaterial to what I was seeing on the screen. I was being asked to accept that it was perfectly OK for Experian to share personal information with their partners which included Facebook and Google. What!!!!!!!!!
This got me going, so I clicked on Settings …
Screenshot
Performance and analytics – OK, but the other two … no way! How could this be? I had to do some searching to find out that Experian (and a couple of other “credit reference agencies”) were also DATA BROKERS, and that they’d been hauled up about NOT declaring this part of their role in 2018. This appears to have been resolved now – because we are past the nine months they were given to clean-up their practices, but their other business purpose – sharing information with others would continue if you clicked on the Accept all button.
A real lesson learnt, with a secondary one being to engage brain before clicking on Accept all – the minimum requirement GDPR had imposed upon them and many others.
And what was the outcome of this. How had it come about, what is a “soft search”? The latter is explained on this page. How it had come about is more difficult to work out so this is just conjecture – our house insurance was about to come up for renewal and all 19 of the organisations who’d made an enquiry of our credit worthiness – or had been sent details of the upcoming renewal by Experian – were like these 9 …
Luckily, there’s plenty of advice and guidance available – often slanted particularly towards our demographic (ie oldies) …
Those two sites are particularly easy to follow and understand, but others are equally informative and targeted.
Your bank probably has guidance which it publishes online and which is accessible to everyone, not just their customers …
I’ll return to further information, guidance and references at the end of this post, but first we need to look at a few issues, discuss some terminology that’s widely used and try and tease out what’s really important, and what’s just an inconvenience and then it’s up to you to judge where you find yourself on the scale of …
First let’s distinguish the difference between online security and online privacy. These are two different issues which are however linked. Sometimes you have to relinquish some privacy to receive a service – unless you choose to pay for it (and I’ve long been an advocate of paying for services if they do a job that is necessary); exactly how much privacy are you prepared to relinquish?
Security on the other hand is an absolute – you should not be prepared to accept less than your very best efforts . We’ll deal with that in the third part of the post.
How do you relinquish your privacy, and how much of a loss of privacy is acceptable?
Some services could not be offered without income from adverts, or paid-for advertising – eg Facebook, Twitter and Instagram; and some eg Google and Amazon track and provide information to resellers if you don’t block them from doing so. As an example of how much value Google sees in getting knowledge of what you’re doing and where you’re doing it, they pay Apple up to $20bn annually to remain as the default search engine for any browser that’s running on an Apple device!
Sometimes you may click on a link and have been asked whether you wanted to accept cookies – what exactly are they, and what do they do. This article from Norton explains what they do quite well …
Essentially, they record what you do on a website so that when you return to it some of the settings are remembered and applied. Cookies do however also have a downside in that some can also act to track your activity once you’ve left the site. For that reason, you should disable in your browser the ability of third-parties to glean information from a cookie, and also to prevent them tracking your activity once you’ve left the site. You can at anytime, clear the cookies from your browser, and indeed on some internet browsers set them up to delete cookies when you leave (close the window) the site. If you use Firefox as your browser it will alert you the first time you go to a site that it is using a Fingerprinting cookie itself. For instance from the Norton site above …
… this is a nice feature, and should not be confused with the rather more annoying GDPR pop-ups which almost force you to accept because you can’t be bothered to check the detail that some sites force you to go to in selecting which cookies you want to store. I often just stop using that site rather than read through the options, or alternatively just click “Accept” and hope for the best!! Not exactly the privacy control that was envisaged when the legislation was enacted!
Another thing you should consider is whether you want adverts to be shown, or not. You might get a request to enable adverts when you visit a site, the answer you supply will be held in a cookie in the browser – that’s how cookies work. Firefox, Brave and Microsoft Edge, by default, block most, if not all, adverts. These are often annoying and having a browser that blocks adverts, or if you use Chrome – using an ad-blocker like AdBlock Plus often makes for a more “pleasurable browsing experience” by limiting the intrusion you might feel upon your privacy.
Which brings us to browsers and search engines
Search engines are not created equal! Whilst Google is often thought to be the same as the internet and is often mistaken to be an internet browser itself, it is in fact just one of a range of possible search engines that you can use to look for information on the internet. It uses a platform called Chromium to display the results of its searches to you through a browser called Chrome. However, other browsers – Microsoft’s Edge, Brave and Opera all use the same underlying Chromium technology – the difference being they don’t track what you’re doing “to present the content that most meets your needs” (Google’s philosophy) and in some cases (eg Brave) they can actually prevent tracking of your browsing history. I use Safari – which on Apple is my default browser choice, but otherwise I would use either Brave or Firefox as my internet browser.
So what safe and private search engine could you use as an alternative to Google. I use DuckDuckGo …
… but others I could have used might have been Ecosia, Bing, Yahoo or another one you might choose from this article or the list of other articles at the end of it …
There are many specialist search engines (as explained in the above article) that can give you much better, and more targeted results than a broad-spectrum Google search with the priority of results returned by relevance, not payment received by Google.
Finally, no discussion of Privacy can ignore Social Media and Facebook in particular. These applications, if left to their own default settings, are effectively personal information mining engines. They grab what information they can from you, and sell it on to whoever is willing to pay for it; or are indeed the platform for data mining, vis the Cambridge Analytica affair.
Recent enforcement of data privacy legislation by the EU on Meta has resulted in them being hit with massive fines for breaches of GDPR law by Facebook, Instagram and WhatsApp.
Online retailers are not exempt from this and Amazon for instance has a wonderful record of your browsing history! Are you sure you know what it’s doing with that information? So look at this table taken from a recent Which? supplement – Staying Secure in a Digital World – and just check whether you need to change your settings if you use any Social Media apps …
So that’s Privacy dealt with.
Should you be frightened?
The take away message I want you to have is Frightened – no; cautious – yes!
Online banking is very secure – a recent survey in Which? produced the following scores …
… plus you are protected and most of the banks are increasingly opting to adopt an online and mobile guarantee to refund you where you’ve been the innocent victim of a fraud. Here for instance is Barclay’s “Online and Mobile Banking Guarantee.”
They really don’t want to shell out money, so they are trying to educate us to be wise to scams. So let’s take a scam test …
Banks are also often supplying software free (or at reduced cost) for you to install to protect your machine, to protect you from fraud – and of course themselves from having to pay out! I was recently offered a piece of software called Malwarebytes by the NatWest and although I have an Apple Mac computer which are well known to be relatively secure from Viruses, Spyware, Trojans and other malware, I installed it. I was pleased to note that I didn’t have any malware on the machine.
Surprisingly you might think … it’s safer to use the mobile app on your phone, or tablet to do online banking and retail purchases than a web browser. This is because the app on the mobile device has to be verified by Google for Android (Google Play Store) or Apple for iOS/iPadOS (Apple Store). Whereas a browser could be infected, or compromised with malware. [That’s something I’ve learnt whilst preparing this post!!!]
When you’re out and about and NEED to do an online transaction from your mobile – use cellular rather than WiFi. The latter can be really open to “sniffers”. [I must admit I try to avoid doing online transactions when away from a domestic network.]
Alternatively consider buying and installing Virtual Private Network (VPN) software, such as NordNet so that you can use the free public WiFi in a public area.
You can find out a whole lot about the range of scams at the NatWest’s Security Centre.
However the most scary scam I’ve been made aware of is one that befell a member of my family when they were distracted sufficiently to become the victim of SIM swapping.
I’ve discussed this with you before and you can read the updated post here.
I also covered this issue in another post which involved stealing a phone, to obtain access to your identity and commit fraud, and we covered the even more disturbing theft of a credit card with the complicity of the US Postal service to obtain a SIM in a recent meeting as well.
What should you do to protect yourself?
Some of these pieces of advice are really quite straightforward, but some require some intervention by yourselves.
Keep your operating software up to date. This is particularly true if you’re a Windows user, and even more true if you are still running an older version of Windows than Windows 10. If you’re using Windows XP, Windows Vista or even Windows 7 you should seriously consider disconnecting your machine from the internet because even if you’ve got anti-malware software running this is probably not protecting you against the latest threats.
Install anti-malware, or anti-virus software, particularly if you’re a Windows user. Don’t pay more than you need to. Windows Defender from Microsoft is Free and for our demographic relatively undemanding and unsophisticated users, more than sufficient. Keep it up-to-date as well! [As I said previously, your bank might be offering free software as well.]
Keep the software you use regularly up to date as well. Consider removing any software from your machine that you don’t use – this is because software vulnerabilities are discovered sometimes quite a while after the software was first released. It will also save you disc space!
Be cautious over installing extensions into your browser. These are often extremely useful and valuable tools, ie password managers, Dropbox, note taking, Google Back up and Sync, but if you don’t get them from the official sources then you might be importing vulnerabilities, eg spyware and trojans to your system.
Very seriously consider logging-out from social media and other retail sites when you’ve finished using them, especially Facebook, you just don’t know what tracking and logging of what you do, even where you are, if you leave yourself logged in on a mobile device.
Free software is both a boon and a curse. Only download open source software from a reputable site such as Softpedia, and never try and get proprietary software for free. Read this article about Free download sites if you want to know more.
Remember the golden rule 1 – if it seems too good to be true, it probably is, so steer clear!
Remember the golden rule 2 – don’t speak to strangers (an oldie but goldie that one); in other words if you don’t know where an email has come from – ignore it; if the website address looks a little strange – do an internet search on the company or organisation to check if the address you’re looking at is a spoof of the proper one.
Have more than one email address. Use one as your personal address, then use other ones that you can “throw away”when you need to register to a website, but you’re unlikely ever to go back to it again. Or have an email address (UserID) specifically for online purchases. Splitting things like this reduces the risk of you being the victim of fraud.
Seriously consider using an email service that is NOT connected to your Internet Service Provider (ISP). If you decide to change your ISP, and you should review them periodically, then you will have real problems if your email address is linked to their service!
You’ve got Spam filters running? Of course you have – but you better check! Probably your ISP, or email provider (eg Gmail, Yahoo, Microsoft Outlook or Hotmail) is filtering out what it thinks is spam, but occasionally some gets through. If that’s the case then you can always look at the real sender of your message. Take a look at the examples below …
You can also apply filters to divert incoming email into different folders in your email system. That reduces the amount of Junk that you need to review. [I’ve also advocated using the “native” email application for your device rather than rely on the web-based service the email provider has. Thus on a Windows device – use Windows Mail (or Outlook); on a Mac use Mail. You can then easily synchronise your email between devices from multiple email accounts. Tidy!]
So we come to Passwords …
… this is the point at which you need to consider intervention and changing your behaviour! You might also need to do a fair bit of work, but it’s worth it if you want to have a secure internet experience.
Let’s just see what using an insecure Password can lay yourself open to. Type in the word Password, or ABC123 from the link above – frightening eh!?
The most common password I use – and I know I shouldn’t reuse the same password, but I am human – has not been discovered on any pwned site. Phew!
What about the combination of your email address with your password – has that been “pwned” (ie stolen through a data breach)? Try typing your email address into the link above.
Oh no! I’ve been pwned … but it was a long time ago and I’ve changed my password many times since then!Ah! That’s better – my “throwaway” email and passwords are “safe”!
And if you want to see a list of which websites have been breached, it’s alarmingly long!
So … use a unique password for everywhere you sign on. There’s lots of tricks to achieve this; some of which I wrote about in a post quite a long time ago …
… but the real change of behaviour is to use a Password Manager – again I wrote about this a little while ago and linked it to using Two Factor Authentication, which is also covered in the same post …
Password managers
I still use LastPass, but as a back-up and archive of my old passwords. I now use Keychain as I only have Apple devices (as do most of my family, and so it makes sense to use a system that is linked to the hardware I use. Other common password managers are Dashlane and 1Password. Please make up your own minds after reading some Reviews and seriously consider using one.
An authoritative article on using Password Managers is provided by the National Cyber Security Research Centre. They also give an opinion on whether you should use the browser offered option to save your passwords.
However … the future is Passkeys
The major tech companies – Microsoft, Google and Apple amongst them, have been working in alliance on a project called FIDO that will mean the combination of UserID and Password can be consigned to the waste basket. This article explains what they are, and what it means for us really well. Although Apple stole a lead, announcing their implementation a year ago, Google has now launched it’s implementation, and this article describes how to set them up on your Google account. Microsoft also allow a password-less way forward, but I’m not clear on how to set it up – not being a M$ user.
On Apple – here’s how you set up Passkeys on your iPhone, iPad and Mac. Another reason why I chose to move from LastPass to Keychain.
Whilst if you’re a 1Password user, you can combine your legacy use of a Password Manager with Passkeys, and these will also work much better together on your iPhone. Watch out for an announcement shortly!
[NB It is possible to move between password managers, ie from LastPass to 1Password.]
And that’s about it for this year. We can look forward to much more about Passkeys in the coming 12 months; much more about GDPR and how the UK government’s online security legislation is reviewed (and hopefully revised) before implementation; much more about “big tech” and corporations re-acting to whether they are responsible for content, or are just a platform providing a service, rather than a publisher. Interesting times!
These may not be available in your Public Library, hopefully that isn’t the case.
… but these are available … Which? webpages – Scams & older people
I seriously do recommend signing up for the Which? Scam Alert Service – sign up for an email alert – and I seriously recommend you NOT broadcasting other people’s warnings to you about scams; they could be old, they could be inaccurate, they could be scams in themselves.
Look on the Age UK webpages – Staying safe in your digital world and specifically How to stay safe online
Your bank will undoubtedly have Internet Security webpages. Mine has a Security Centre web presence and particularly they provide a number of Fraud Guides
I could give a million references to changing your privacy settings on Social Media, but here are a couple relating to Facebook, perhaps the most challenging service of the lot.
First – what Facebook unchallenged will want to get from you. You are able to disable (prevent) all or some of these … Sign up for Facebook – this is not sign-up site, it’s just one to educate you on the privacy you might give up without realising before you sign up (but of course you can run the checklist at any time); then How to change settings on Facebook and finally Securing Facebook: Keep your data safe with these privacy settings.
All looking very serious – and I wasn’t disinterested … honest!
In addition to the serious looking faces above, Barbara joined us for a short while until Geoff switched-off the ring main!! We had apologies from Jonathan, Sianed and Christine. We welcomed back Stella who had been suffering from the after effects of her Covid jabs.
We also agreed to experiment with a voice-to-text transliteration system to assist folk who were finding it difficult to follow the audio in Zoom meetings.
I started the meeting by explaining the changes to the website, and doing a quick demo. [I further made some more changes the following day – I note that some of the Help screens, now need new images. They’ll have to wait …] I also was pleased to report that I’d sorted Fred’s Signal installation out, and had finally managed to reply to Phil’s Signal message on using Thought grazing. I offered to help anyone having difficulties with either the website, or Signal, to get in touch.
I then highlighted a few items that I’d added to Flipboard – a lot of them connected to Privacy, which seems a very live issue currently. Apple, after it’s developer’s conference is certainly focussing on privacy, including traps of pixel trackers, it’s intentions to move away from passwords and the addition of FaceID and/or TouchID to Google’s Authenticator – increasing the security of this means of connecting to websites. The EU appears to be going after the way multi-nationals (Google, Microsoft, Apple, twitter and Facebook) export data – an issue I’ve been mentioning for a while – watch this space! The UK’s Competition & Market Authority are also going after Google because of its use of cookies to track users, and usage, in Chrome. Google says, don’t worry we’re going to stop using cookies, and we’re going to give the industry an open-source alternative – FLoC; but it doesn’t appear that anyone else wants to follow. The US Congress is also looking at introducing anti-trust legislation and this is causing the multi-nationals to be a little bit more than concerned and they are lobbying hard against it. Here’s Apple’s plea to Nancy Pelosi. Apple take Privacy very seriously and they have released this white paper which you might care to read.
Mike was delighted with his new speakers which had improved his music listening (from the computer) as well as the quality of his Zoom calls.
Owen reported that he could not recommend the cookie-completion software he’d mentioned four weeks previously. In a test of at least 100 websites, he’d found that it had only worked with 7 sites and in some cases had stopped the websites working. Back to the drawing board! He also reported that the Committee was contemplating a reservation system for when we return to face-to-face meetings to cope with any constraints in numbers and/or social distancing in certain venues. I indicated that I was not too happy with such a proposal. It may not come to pass, however Owen has been charged (or volunteered) to see if the current systems can be tweaked to facilitate this. Zoom has now introduced ‘Live Transcript’, an automated subtitling system. It is by no means 100% perfect, but it should enable those who find it hard to follow in Zoom meetings an enhanced opportunity to hear and see what is spoken. Further information is to be found here. We then discussed how best we might extend the Group to those not participating via Zoom, and I agreed to try to see if any members wanted to join the Signal group.
David H mused on the death of John McAffee (as did Jim later); he reported that the barn was being converted as per his CAD drawings; that he had solved a Samsung phone problem with the radical solution of turning it off, and then switching it back on again; and enquired as to whether anyone had advice on purchasing a new TV. There was a lot of discussion; Steve commended 4K; Ann mentioned the Which? tool to assess size of TV vs size of room, viewing angle and distance from the screen; I asserted that most reviews appeared to favour LG’s OLED technology over Samsung’s QLED technology; we all agreed it was important to assess what we wanted, before we made a decision.
Paul was having problems with rapid battery drain on his Android phone; unfortunately no one had a concrete answer to the problem other than ditching unwanted, unused apps; enquiring whether an update had recently taken place, and again (radical thinking) – switch it off, and back on again!!! Here’s a link that might be useful too.
Don had bought a new Dell G3 system from JLP and it had arrived very quickly. It was so fast, it was like driving an Audi after the Vauxhall he’d had previously (no disrespect intended). He enquired about installing the security package from BT – I suggested to wait awhile before doing that – to try using Windows Defender first. He was going to investigate how to transfer his data from the old laptop. Neil (We will fix your PC) would do it for £30, or put the old hard disk in a caddy for £20. He also enquired about how to get his Gmail onto the new machine – I suggested using Windows native email client and offered to speak to him offline and provide some assistance [which I’ve done].
Phil drew attention to something he’d written about Podcasts which he and many of us use and like and commended CyberClean as a product to clean keyboards. Following the meeting he added another Topic to the Genealogy Forum on one of his ancestors which I recommend you read as a great multi-media experience.
Steve had brought his Sony HX90 camera to show Ann, and she was delighted that after visiting the Camera Centre, she’d plumped for a Sony HX99 for her carry around take pictures of birds camera. A great choice! That or the Panasonic TZ200 would have been my shortlist. He also commended BBC Sounds for Podcasts – good recommendation, thanks! He also enquired whether we thought showing a YouTube video on Zoom infringed copyright – we thought not.
Renee was wanting to look at Tasks in Google but couldn’t find it; we suggested it was included in one of the other members of the Google Office Suite – maybe Calendar. Hopefully this link will help – you access it from either Mail or Calendar.
Finally Ann just told her of her experience (very good) of visiting Camera Centre to purchase her camera which she expected to pickup after the meeting. She was buying a refurbished (but guaranteed unused) model at a discount. All the best – I suggested that she might like to consider joining the afternoon Photography group.
Apologies (yet again), I seem to have a spurt in getting the notes out quickly, followed by a delay so that they become almost useless – except as a historic record – by getting them out “just in time”!!!
Anyway thanks to Jim for the photo above, one of the best and shows we manage to have a bit of fun! Apologies from Jonathan, Margaret, Barbara, Christine and Owen – who were unable to join us.
I’m pleased to be able to report that Fred and I finally managed to hook-up and have a chat about connecting to Signal, and I did manage to reply to Phil about his message on sending a post to this site. So, it’s not been a complete lack of activity. The other thing has been the stylistic changes to the website that I mentioned at the meeting. These have now moved on again, and I’ll talk about that this afternoon, coupled with a demo of accessing the website, as it’s apparent a couple of you have not managed to login.
So what did we discuss. I went through a number of links which I’ve put on Flipboard – I’ll highlight some of them. The cookie pop-up problem brought to our attention by Owen – which we’ll return to this afternoon as well.
The sharing of patient data by NHS England caused some discussion – it appears now that this does not effect us in Wales – they’ve put off the implementation date now to September 1st. This led on to a discussion on Patient Records in general and the workings of the Patient Information System in Wales – perhaps not working as well as it should with many disparate GP systems not working closely with any centralised system. Also noted that you are entitled to get a printout of your Patient Record, but the practice is also entitled to ask you for an administrative charge in providing it. Then we diverged into discussing Lateral Flow Tests, and I described how I’d been able to receive the test kits within 24hours from a website. It’s unlclear whether we (in Wales) are able to upload the results due to our NHS numbers not being in the same format as the English ones – and the same problem arises with the vaccination passports now being launched in England as an app. In wales there will be a website you can register your vaccination history, etc.
Ann asked about Two factor Authentication, and how it worked – especially with the banks. I explained that the addition of a metric such as FaceID or TouchID (both Apple trademarks) the banks were ensuring much better that the person using their apps were the actual customers. The organisation trusts the device provider to ensure that the person is who they are through their personal credentials – face or fingerprint. If working on a browser they will challenge you to provide a code they send to the registered device they have for you. This is obviously not as secure – remember my SIM swap scam episode of 2019. The other way that the organisation you’re connecting to can ensure it’s you they’re providing access to is by using an Authenticator app, that sends a code to your phone that you then type into the box in your browser. Hence two-factor – the code (or Identity features) on a device different from the browser.
Sianed advised us of the Census scam that had been going the rounds.
John told us about an interesting photography programme he’d been watching – the Great British Photography Challenge – now available on iPlayer.
Renee advised us that the NHS app discussed on the TV was not available in Wales.
Phil had a Victor Meldrew moment and lamented the lack of telephone numbers on websites that made it almost impossible to connect to a person to discuss an issue. Fred suggested keeping a list of CEOs to address complaints to. Someone else suggested using the Companies House website – a good idea!! Someone then recounted the recent case where a worldwide undercover operation had revealed criminals.
Jim wondered whether everyone was having as many Signal updates as he was, and on all devices – we are, and all is OK!!!
David H was pleased to announce that his CAD system was now working and enquired about whether there were any recommendations about property contents only insurance. I’ve also noted that there was discussion on harvesting data from browser searches, and a comment “Zoom and the Arts” – but I have no idea what either of these referred to!!!
Paul had some issues with Google accounts (again I can’t remember what these were); and advised that he had tried out Reader View (as discussed at the previous meeting).
Mike was having problems with the volume on his equipment and I hope the advice we provided has helped in some way.
Steve said he’d setup ICE and enquired about the website What 3 Words to provide exact locations. We experimented!!!
It’s not long ago that Google was described as “the evil empire” because of its perceived intent on hoovering up all the data it could about us in the endeavour to “provide the best search experience for its users”. Baloney of course – they just wanted to drive the monetisation of their platform as far as they thought they could get away with, and by now you shouldn’t pay too much attention to the search results that appear at the top of a Google search – they’ve almost always been “paid-for”.
However, out of bad publicity they learned a lesson. When changing terms and conditions of use, or service, its best to explain clearly, and in advance, what they want, and expect, to do, and invite comment. That was most certainly missing from Facebook’s recent debacle with WhatsApp. So to show how it perhaps should be done, I’me including some recent screen shots from Google over the past few months …
A very recent change to Google services that is being proposed and communicated to users in an email. This was the first email sent …
… which was followed up with this one, which prompted me to do something about it!!!
Once into the application, you receive a screen like this one …
I’ve now switched off these personalisations, but what I was doing was very clearly explained.
Then there is this advance warning of changes to the storage policy that covers your Drive and Photos accounts. [I must do something about this as I have a number of Google accounts knocking about.]
A clear explanation of changes to YouTube – not ones I like, but there’s no attempt to hide what they intend to do, and it provides a hint that they will apply to us later this year when Google leave Ireland for the US.
Changes to the Google Photos policy which is causing some distress, but is explained clearly and gives you a lot of time to work out how to use the service after June 1st 2021.
Early notice of the intended changes to Google Drive, and how files will be deleted.
Finally, another company explains clearly how and why it’s changing it’s Terms and Conditions – not something WhatsApp did. Shame on them!
“When WhatsApp was acquired by Facebook in 2014, it promised netizens that its instant-messaging app would not collect names, addresses, internet searches, or location data. CEO Jan Koum wrote in a blog post: “Above all else, I want to make sure you understand how deeply I value the principle of private communication. For me, this is very personal. I was born in Ukraine, and grew up in the USSR during the 1980s
One of my strongest memories from that time is a phrase I’d frequently hear when my mother was talking on the phone: ‘This is not a phone conversation; I’ll tell you in person.’ The fact that we couldn’t speak freely without the fear that our communications would be monitored by KGB is in part why we moved to the United States when I was a teenager.”
Two years later, however, that vow was eroded by, well, capitalism, and WhatsApp revealed it would be “coordinating more with Facebook,” and gave people the opportunity to opt out of any data sharing. This time around, there is no opt-out for the sharing of data with Facebook and its tentacles. Koum left in 2018.”
So this all started 4 years ago, when WhatsApp announced a change to their Terms and Conditions (Ts&Cs) – the first change in many years, and the first since being taken over by Facebook. It was possible to opt out of this change which was announced as only to “improve the experience of Facebook users” (that’s kind of them – do I believe that?).
I don’t know whether I chose to opt out, I suspect I did, but I have no way of knowing!!! Whatever … I only had 30-days to opt out then, and I can’t go back and opt-out now.
I was alerted to the current impending change on February 8th, which is a take it, or leave it choice by this article in a well respected techie (UK-based) blog – The Register. It’s subsequently been updated, and may be updated again I suspect as more information is squeezed out of Facebook.
Before Christmas in a meeting of the Cardiff U3A Computer Group, I referred to the repatriation of UK-data to the US as a consequence of Brexit. So far Facebook and Google (and there could be more) have announced their attention to do just that, and others will undoubtedly follow. Free from Europe, our government has said we will follow GDPR (it had very little option), but the US tech companies see the wisdom of not having a European base for their (our) data and are hopeful of less stringent Federal privacy restrictions under a new Democratic Party controlled Senate committed to introducing legislation.
Once out of the European protection, we in Britain could in the course of time, and after the repatriation of Facebook data to California (read the article above), be deemed not to be part of the European area and so the protection offered by WhatsApp/Facebook suggested in this article in “The i“, would cease to apply. So the short-term acceptance of these Ts&Cs thinking they don’t apply to us, might be scuppered should the data-hosting move to the US.
As of today, I’m at a loss to know what to advise or do. I’m hopeful of further clarification in the days to come, but I’ll leave acceptance of the new Ts&Cs to the last few days before February 8th.