Topics
late
AI
Amazon
Image Credits:Melanie Lemahieu / 500px / Getty Images
Apps
Biotech & Health
Climate
Image Credits:Melanie Lemahieu / 500px / Getty Images
Cloud Computing
DoC
Crypto
Enterprise
EVs
Fintech
fundraise
Gadgets
game
Government & Policy
Hardware
layoff
Media & Entertainment
Meta
Microsoft
seclusion
Robotics
Security
Social
Space
Startups
TikTok
Transportation
speculation
More from TechCrunch
case
Startup Battlefield
StrictlyVC
Podcasts
Videos
Partner Content
TechCrunch Brand Studio
Crunchboard
get hold of Us
The anti-gift guide for 2023
It ’s the season to go a little overboard on gift gift . But this twelvemonth , give the gift of good security ( and privacy ) and shun technical school that can have untoward risks or repercussions . We ’re not talking about thing that go boom in the night or abruptly break up , but rather the gifts that can have irreversible or ongoing upshot in the future .
This year we ’ve see some of the biggest jade involve healthcare and inherited data point , a turn omnipresence of consumer surveillance tech snooping on unsuspectingeveryoneand on-going unscrupulous data practice session that sell your private information to anyone who wants to buy it . The best cure for some of this is to never engage to begin with .
We havea bunch of natural endowment ideasfor you to consider . As for what you should avoid …
Genetic testing kits like 23andMe can have lasting and unforeseen consequences
genetical examination is constantly . Once you spit in a tube and institutionalise it on its way , there ’s no elbow room of getting it back . And it ’s not just your genetics you ’re digitizing ; you also share your genetics with faithful family members and relatives . What could possibly go awry ?
This twelvemonth , the visibility and genetic data on millions of 23andMe customer was scrape from the company ’s systems , thought to be the biggest spill of genetic data in late years . But 23andMe isnot the firstto have datum spilled , nor will it be the last .
Even if certificate were n’t a concern , the fact that these society stack away huge trove of highly sensible information to begin with make it anattractive target for law enforcement stress to solve crimes . And while company like 23andMe and Ancestry have — so far , we emphasise — resisted efforts by law enforcement to get at its DNA datum per their transparentness reports , other company have need alaissez - faireapproach topolice access to the genetic datathey storage .
404 medium ’s Jason Koeblercouldn’t have said it any best : “ Doing 23andMe is an unretractable action that could have unforeseen ramifications not just for yourself but for your family or your potential materialization . ”
Join us at TechCrunch Sessions: AI
Exhibit at TechCrunch Sessions: AI
23andMe sustain hackers steal ancestry data on 6.9 million users
Video doorbells that see and heareverything
You might see some utility in seeing who is at the front room access before you get there , but the long - term consequences of cause a video camera tie to your front door opens up a world of surveillance in your neighbourhood that you — and your neighbors — might not feel comfortable with .
Video doorbells recordeverythingthey see and listen using their camera and microphone , which then beams recorded footage to the cloud for your later perusal . But that often makes that footage also procurable by law enforcement , which can be staggeringly invasive — peculiarly ifpolice incur footage from inside a homewithout the owner ’s permit .
End - to - end encrypted ( E2EE ) camera retain the most privacy ( assume that the company you ’ve grease one’s palms cameras fromisn’t lying to you about their encryption claim ) because they prevent anyone other than the owner from access their own footage , include the companies themselves . That ’s a good thing , especially since companies like Ring have been fin in the past forallowing their employees to snoop on customers ’ unencrypted videos . After Ring settle billing with federal governor , Ring now saysits staff will only access client footage in “ very special circumstances,”which , of course , Ring has not specified what those circumstance will be .
VPNs won’t keep you anonymous, but can expose your web data
If you thought a VPN , orvirtual individual internet , will keep you anon. on the internet , imagine again .
Consumer - face VPNs can lay claim to hide your IP address ( the set of issue that identifies you to other devices on the net ) and allow you to access otherwise - blocked cyclosis shows by “ appearing ” as though you ’re in that area . In realism , VPN supplier are bad for your secrecy and you should void them like the pest .
VPNs allow you to funnel all of your cyberspace dealings away from your cyberspace provider and instead through a VPN provider that ostensibly masks your privateness . Your internet dealings can bear selective information about which websites you visit , and when , and can contain extremely sore information like passwords and other credentials . But some VPN providers do n’t even cipher the users ’ data as it flows over their internet , despite claims that they do .
VPN provider need to make money like everyone else . Free VPN providers are by far the bad wrongdoer , since they make money by selling or share your cyberspace traffic to advertisers ( or other nefarious buyers ) . Even premium and paid - for services ca n’t promise namelessness if you ’re paying by course credit card or otherwise trackable means .
If you require on-line anonymity , you ’ll want to use the Tor web browser . It ’s a slower experience than the typical public net and it ’s not ideal for streaming video , but it ’s the compromise you make for the strong privacy . Otherwise , VPNs track down the jeopardy ofselling or otherwise spilling your highly sensible internet traffic . And if a VPN makes horse sense for your use case , at least considersetting up a VPN that you unravel yourself .
Tracking your kids with risky location-tracking apps is a terrible idea
Anyone can appreciate the tension and fearfulness of having kids in an age of unknown - danger and on-line harms . It ’s no wonderment that many parent require to keep lead of their shaver ’ speech sound location . But kid - tracking apps are a live mess for security and privacy , and the datum these apps collect seldom stays on the twist .
position data point is some of the most sensitive data belonging to a person ; location apps can fix where someone was at a particular time , which can be extremely revealing and invading . Yet , over the yearswe have account on leaky position divvy up appsthat expose people ’s tangible - time locating data point , andnefarious and buggy “ stalkerware ” appsthat release entropy to anyone on the net . Even one of the better - known family tracking apps , Life360 , was caughtselling the precise location data point of its usersto datum brokers .
There ’s no reason why you should n’t discourse the benefits and pitfalls of track your kidswithyour kids . trustfulness is key , not stealthy tracking . If your kids correspond to share their emplacement , turn over using the family unit and paternal control apps build up into most modern phone . Google also hasFamily Link , and Apple devices let you apportion your end - to - ending encrypted location with other Apple users so that nobody else can get at it .
Cheap knock-off Android tablets can hide malware
chintzy ( often ) is n’t better and Android equipment are no exception . Case in point : This twelvemonth , EFF ’s Alexis Hancock set up thata low - cost Android tablet fall in to her daughter landed preloaded with software considered malware . The pill was also running Android software bring out five years ago , and had an app storage designed for kids that was also out - of - date . Hancock adjoin the company that makes the pad , but never hear back .
As tempting as it can be to buy the tacky devices , it ’s not uncommon for manufacturers to include software for monetary kickbacks to offset the price of the equipment itself . Sometimes that preloaded software can send back data about the gimmick or its exploiter , or worse , have security bug that could put the gimmick ’s datum at risk .
Before you throw out that knock - off tablet , it might be salvageable . Hancock has agreat guide on how you may guarantee your kid ’s Android gimmick .
For your actual safety, avoid internet-connected sex toys
Lastly , but certainly not least . There ’s a oecumenical belief in cybersecurity that any twist or gadget that you add an cyberspace connection to will immensely increase the hazard of that gimmick being remotely hack , compromise or tampered with . One form of machine that should probably never have an internet connection is anything that goes inwardly of you .
We ’ve seen our fair share of horror chronicle involving internet - connected sexual activity toys . In 2020 , we report ona smart chastity lock with a security bug that risked lasting lock - in . And this year , anothersmart sex - miniature manufacturing business queer the substance abuser and locating datum of its customersthanks to its leaky server , which the ship’s company has yet to fix .
If your sex toy has a phone app , there ’s a good prospect the toy ( or the app itself ) could leak out your personal information , either accidentally or by mode of sharing data with adman . It ’s fine to be kinky , no judging here ! But if you absolutely must practice a remotely controlled sex toy , consider a machine with a Bluetooth remote only , as this foreshorten the wireless ambit in which someone could maliciously intervene .
The Internet of Dongs is a labor give to hacking and secure connected sex toys , and hasguidance and advice on knowing the risks and security feature article before you buy .
manufacturer of ‘ wise ’ chastity batting cage leave user ’ electronic mail , countersign , and position exposed