Category

Social Networking

Consumer’s Trust in Data Protection

By | Social Networking | No Comments

The practice of buying Americans’ data has become routine, effectively hollowing out both Carpenter v. United States and privacy safeguards enacted by Congress.  Any company or government can go out and purchase customers’ data that the company has collected.  Just last year, Avast was caught selling their customers’ data for the second time1.  Their customers use their service to protect their information and prevent it from being sold, but Avast decided it was more profitable to sell that data rather than protect it.

Businesses have determined that it is more profitable to sell their customer’s data rather than protect it.  Laws like GDPR and CCPA provide the legal framework for consumer protection but more needs to be done for the business community. We need to expect more from our Technology Providers.  Customer data should be protected and should be at the core of any cybersecurity product.  The monetary value gained from selling customer’s data isn’t worth the trust that is lost once that data has been sold.  As a Public Benefit Corporation, Grey Market Labs believes protecting individual activity and organizational data is the foundation of trustworthy companies. As organizations look for companies to protect them, Public Benefit Corporations should be the first to consider, ensuring your information is kept private.

___________________________________________________________________________________

Grey Market Labs is a Public Benefit Corporation founded with the social mission to protect life online. We build revolutionary software and hardware products, and partner with like-minded industry leaders, to create a future with “privacy-as-a-service”.

Simply: we prevent data from being compromised and protect our customers’ work, online.

Contact us to see how we can work together.

Activity Tracking

By | Data Protection, Social Networking | No Comments

The concept of privacy is multifaceted and complex, a concept that has evolved over time with emerging technologies, across societies and cultures, and redefined as new domains are discovered and explored. A subset of privacy, information or data privacy, focuses on control over the collection, usage, and dissemination of people’s personal information. Boundaries for data privacy and data protection are often determined by analyzing a plurality of factors such as legal, policy, ethical, and economic considerations. Regardless of factors, the pervasiveness of data privacy-compromising methods and tools is overwhelming.

A common means of collecting personal information is through online tracking. There are numerous types of identifiers and attributes online trackers utilize. They work transparently in most cases, and their scope permeates throughout digital mediums and across sectors [1]. Each item in the list below relies on software and hardware-based methods for activity tracking:

  • Websites use browser provided information to identify and track users
  • Mobile devices have unique identifiers and numerous sensors that online trackers rely on [2]
  • Smart televisions can not only collect and disseminate what we watch, but they potentially open an attack vector for malicious actors [3]
  • Vehicles can use numerous sensors to record data on vehicle location, driver and driving characteristics, cabin environment, etc. [4]
  • Flight tracking services managed to predict significant business deals by monitoring the routes of company jets [5]

The wealth of collected data is used to build comprehensive profiles and generate insights. These profiles “can reveal our political affiliation, religious beliefs, sexual identity and activity, race and ethnicity, education level, income bracket, purchasing habits, and physical and mental health” [6]. This collected data is potentially shared and further enhanced, in some cases revealing the identity of the individuals behind the profile. Protecting life online requires a multifaceted data protection approach. To handle this evolving environment, Opaque is adaptable with security and privacy designed into its core.