Categories
infographic

Is Alexa listening to me?

Smart Home Devices

Alexa is an Amazon Echo-based smart home device that is capable of hearing a variety of voice commands. These commands are then sent to the Alexa app and its various capabilities. It is similar to an iPhone Siri, Android’s Google Now and other such digital assistants. The use of AI makes it extremely accurate at understanding natural speech and making sense of it. Because Alexa works with third-party devices, manufacturers are free to integrate their devices into Alexa’s ecosystem as well. That means anyone who has an Echo speaker can add their smart home product or gadget to Alexa’s deck. As a result, some users have been alarmed by what Alexa can hear as well as how they have to protect their privacy while using the smart home assistant. In this article, we take a look at what is Alexa and how you can improve your privacy in order to reduce the potential for any eavesdropping or recording with your voice device.

What is Alexa?

Alexa is a smart home service that is powered by Artificial Intelligence. It is also known as the Amazon Echo. The voice-activated device was launched as a smart home hub by the e-commerce giant in 2014. The company expanded its range of products with Alexa-enabled speakers, alarm clocks, and other home appliances. The hub allows users to interact with their connected devices, such as lights, music systems, and appliances. It also supports skills, which are third-party applications that provide specific functionalities.

Can Alexa Record Your Voice?

That depends… Technically yes. Samplings of your conversation can be and have been listened to by Amazon employees. But, this is illegal in many countries and Amazon claims they don’t allow eavesdropping. It claims to be: an assistant. As such, it does not take your voice as a source to be used. It only acts upon the information that is streamed through the app. – Alexa is not a microphone. It has a specific set of algorithms that enable it to receive commands and translate them into action. This includes voice recognition that translates speech streams into text and then sends it to the app.

How to Improve Privacy With Alexa

There are several ways in which you can improve your privacy with Alexa. Let’s take a closer look at them. – Use a headset – This is a simple but effective way to improve your privacy. This is because the Echo device only captures the sound that comes through the microphone. It does not record your voice. Hence, it is not affected by the same. This means that the only voice that gets recorded is the one coming through the headset. – Use a PIN code and Turn microphone off Button – If you want extra protection, you can use a PIN code to access Alexa’s functions. The PIN code should be entered before each use as it prevents the device from accessing certain information in the cloud. It also locks your privacy by blocking every command. This is because Alexa does not store your voice. Hence, it does not record it. You can also use the mute button to mute Alexa when it is not being used. – Use a different Echo device – Another way to improve your privacy with Alexa is to use a different Echo device. This is because the hub collects data from all the Echo devices that are connected to it. Meanwhile, your voice will only be sent to the microphone on the new device.

Protecting Your Privacy with a PIN Code and Turn microphone off Button

These are two simple steps that will ensure complete protection with Alexa. Here is how they work. – Use a PIN code – The PIN code is a unique four-digit code that you can use to access Alexa. This code should be entered before each use, which means that the device can only read and record your voice. However, it is not able to access any of the data stored in the cloud. – Switch off the microphone – The microphone on the Echo device is only active when it receives commands from the Alexa app. That is why it is turned off when not being used. The only sound that gets recorded is the sound that comes through the microphone. Switching it off will mute Alexa.

FAQs

Q: Is Alexa listening to everything that I say? A: No. Alexa only acts upon the information streamed from the app. Hence, it does not take your voice as a source to record. Q: Can I use Alexa in 2 rooms? A A: No. It is a single-room device. However, you can use an auxiliary device with a mic to connect it to the Echo. This is because the main device is only working as a hub that connects the device with the cloud. Q: Can Alexa read out what I am writing in Word? A: No. The hub reads out text but not other documents. These are some of the common questions and concerns regarding Alexa. If you still have some questions, drop us an email. We would be happy to help you out!

Categories
infographic

What is a Tracking Cookie?

A tracking cookie is a small piece of text that is placed in a file on your computer by a website you visit. It allows the website to recognise your computer as you navigate the site.

Tracking cookies are used by websites to help them improve the user experience by providing site operators with information about how visitors use their websites. For example, a tracking cookie may record your browser type, the sites you have visited, and the ads you have viewed or clicked on.

Tracking cookies may be used for targeted marketing.

Categories
infographic

What is a VPN?


VPN stands for Virtual Private Network and is a technology that allows you to encrypt your internet connection so that you can safely do things like banking or paying bills online without anyone being able to see your activity or identity.

A VPN is basically a tunnel that runs over the internet and allows you to send and receive data as if you are connected to a private network. When you connect to a VPN, all of your internet traffic is routed through this private tunnel so that no one can monitor or trace your activity.

When using a VPN, your data is securely encrypted and hidden from prying eyes on the outside world. In addition, activities such as online shopping, game-playing, banking, using public Wi-Fi hotspots and sharing personal information in emails with third parties are also shielded from hackers and thieves who are trying to steal your identity or money. Therefore, for all of these reasons, it’s wise to use a VPN regardless of where you are connecting from.

Categories
datacappy dsdefender oliverwjones

Who is this guy?

Only a few years ago “Musk” was a bad perfume (and some would say it still is). It’s now almost impossible to list the innovations associated with the name “Musk”. But like the laundry list of other brands that have transformed from “good” too “bad”, Elon and his Twitter purchase risk a similar fate. Yet again, he never ceases to surprise… And you can ask a lot of institutional investors, it can be costly to bet against him.

So what to make of this Twitter purchase? Dorsey seems on board. Is it a caprice of the ultra-wealthy? The mainstream media seems to think so. Is there some innovative vision behind the purchase? His fan club is on-board. Are there integration possibilities, us commoners refuse to see? A Twitter-SpaceX-Boring Phone? Maybe more profoundly, what impact will his purchase have on privacy and ultimately free speech?

The response to this question is more clear. Instead of leaving the rules for this public-square moderation in the hands of a “corporation”, they’re moving firmly into the hands of an “individual”. One thing that would dull the fear of so much influence resting in the hands of Musk, would be to open-source the algorithms that drive’s Twitter’s success.

Categories
datacappy dsdefender oliverwjones

Protect Your Digits

Protect your phone number and protect yourself. If a form on a website asks for it, think twice before typing it in. The more widely distributed your phone number is, the easier it is for companies to track your behavior online and serve up ads to you. And because your phone number is so closely tied to your identity, it’s a prize for hackers, too. Keep it close and protect yourself. If your kids have phones, they need to keep those numbers closer.

It seems innocuous. At the end of a transaction, a company asks for personal information such as your phone number or email address. While federal regulations prohibit soliciting phone numbers via autodialers, loopholes remain. Experts say if you give your phone number out, it will inevitably end up in a database of some sort—just another bit of their vast data collection efforts. Once that happens, an untold number of companies can use it to track you across the internet.

What Will They Do With My Number? 

Even if your number is on the Do Not Call list, businesses have the right to call you for 180 days after your transaction due to a “business relationship” exemption. (In this case, it must be a human calling rather than an automated machine which is more costly for the company.)  Additionally, there is no restriction on the number of times a business can text you even if you’re on the Do Not Call list. Lastly, companies outside the United States are not bound by these federal laws against automated calls and messages. This means that a company in India is free to call and text you frequently if you give their company your number.  The better option: Don’t let them have it. Protect your phone number.

Hacking’s Worse Than Tracking

That’s annoying. Worse, though, is when a hacker finds your phone number. Because banks and billing services use your phone number to verify your identity, it’s a useful valuable piece of information. In some ways, it’s a key. One of several, usually, but an important one. For that reason, too, you want to avoid sharing your number online.

There are instances in which can’t avoid it. If you pay bills online, you’ll likely have to enter your phone number. Not ideal, but if it’s a secure site that has your number, it’s probably not worth worrying about now. More worrisome are the single-use forms, services, quizzes and games that seem to fill the internet. If there’s any way you can, protect your phone number.

Categories
datacappy dsdefender oliverwjones

Big Tech: Kids and Big Brother

Here’s a hard truth for parents: Big Tech knows more about your kids than you do. 

Amazon, Apple, Facebook, Google, Twitter and so many more are vacuuming up countless bits of digital information about users. The details, when aggregated, paint a portrait of each person online that ordinary humans are unable to put together themselves.

These organizations may not know more about your kids’ personality than you do. But if  your children are online, the people behind the websites they visit know an astonishing amount about their interests, taste, relationships and the things they desire and want to buy.

That’s true if your children have their own smartphone, tablet or laptop computer, but it even applies to information about your kids that you put online yourself. Across platforms and with no regard to the age of the users, Big Tech is tracking you.

What Big Tech Knows and How

As the Associated Press put it, “The companies gather vast data on what users read and like and leverage it to help advertisers target their messages to the individuals they want to reach.” For context, Facebook earned 99% of its money from ads in the previous year and Google’s corporate parent Alphabet saw 85% of revenue from ads, per the AP. 

Meanwhile, Amazon records the details of not only each product you purchase, but also about what items you browsed for and compared before making a decision. If your kids are shopping online, Amazon has all that information about them, too. Though you and your family bear the cost, it’s a windfall for Amazon. AP noted that Amazon uses the user data it collects to boost the value of its ads. Ad sales revenue surpassed $10 billion in 2018 representing more than twice the earnings from the previous year (the latest statistics available). There is a huge financial incentive for Big Tech to know more about your kids than you.

In addition to boosting advertising and marketing for goods and services, the information collected by Big Tech about you and your family can include a whole range of other sensitive details. Think political affiliation, sexual preference and detailed geographical updates about where you live, work and vacation.

No Age Restrictions on Tracking

Big Tech companies track your whereabouts based on details from your smartphone as you are out and about. They know how old you are and where you spend time (shopping malls, churches, bars, and so on) to learn about demographics in your area and to target you even more precisely. If your kids have smartphones, Big Tech is tracking them in the same way. There are no age restrictions when it comes to tracking.

The information is used to predict as well as influence what you might be most interested in buying or which candidate you seem to favor for elected office. All the while, you’re presented with advertisements and “news” is fed to you in a curated, tailor-made experience.

Remember that it’s not just kids’ own online activity that Big Tech is tracking. These companies are also gathering information about the products that parents just like you are buying for their kids. They record what programs parents enroll their children in, what movies they watch and the photos that parents post online. All of this data is valuable to advertisers, which is why they take such pains to collect it on a massive scale.

What You Can Do

What are concerned parents to do under these circumstances? Part of your New Year’s resolutions could be to sit down and have a family discussion about the negative consequences that come from revealing so much information about ourselves.

The goal should be to emphasize security online and to protect your privacy from those who have no business snooping around your personal information. 

Take steps to limit companies tracking  you. Delete cookies when closing a web browser. Restricting how many personal details are posted online. Ask yourself if it’s really worth it to reveal your information to a new company by signing in using your Facebook credentials.

Maybe you’ll be less inclined to give up information to Big Brother when you consider just how much technology companies stand to benefit while you have so much to lose.

Reprinted with permission: privacyparent.com

Categories
datacappy dsdefender oliverwjones

Jingle Bells, Jingle Bells Want my Data?

Purchasing online with a little extra protection this holiday season makes a lot of sense. According to Marco Bellin, CEO of Privacy Parent, using a VPN and Private Browser might be the smartest gift to give. I stumbled on this article in “Women Love Tech” and they make a few really good points: 1) You don’t really know what you’re giving up 2) add in predictive analytics and say goodbye to any control you think you might have had and 3) we’re talking about your children’s’ data here!

Categories
datacappy dsdefender oliverwjones

Amazon, Gutting Privacy Rights

Power rests with those who have the most information, the most detailed information, and the most up-to-date information. Amazon’s public-policy department is an army of lobbyists swatting at and gutting any privacy legislation showing up on a state’s docket. The power Amazon has to manipulate outcomes is akin to manipulating the human genome, but on a world wide scale. Please read the 3rd article in a series by Reuters “The Amazon lobbyists who kill U.S. consumer privacy protections”. You’ll leave saddened by how they take advantage of your data to manipulate you (and local protections) to add to their bottom line.

Read this!

The Amazon lobbyists who kill U.S. consumer privacy protections (reuters.com)

Categories
datacappy dsdefender oliverwjones

Next Gen AI in the hands of Facebook, cool…

Who really wants Facebook to capture data from our stylish Ray-Bans®? They’re currently recruiting developers and scientists to evaluate, manipulate, and dream about uses for ‘immersive’ data: data captured from a third party perspective. These videos, images, and sound watch what you’re doing and hopefully give some very smart people the ability to predict what you’ll do next. These same smart people will be asking questions (benchmarks) defined by Facebook.

  • What happened when? (eg: “Where did I leave my keys?”)
  • What am I likely to do next? (eg: “Wait, you’ve already added salt to this recipe”)
  • What am I doing? (eg: “Teach me how to play the drums”)
  • Who said what when? (eg: “What was the main topic during class?”)
  • Who is interacting with whom? (eg: “Help me better hear the person talking to me at this noisy restaurant”)

Am I the only one, that thinks this is worse than creepy? I’d like to add one more benchmark: Why would I trust those watching me? (eg: “Sell my data so that I can better decide which brand of soy sauce to put in my noodles.”)

I saw this on the BBC, here.

Categories
datacappy dsdefender oliverwjones

Where is the whistle Facebook?

The recent 60minutes interview with Frances Haugen, a former data scientist at Facebook has the media classes in a bit of a frenzy. They’re tripping over themselves and repeating what we already know: “Facebook over and over again has shown it chooses profit over safety.” Haugen has lined up testimony in front of Congress, and triggered another cycle of investigative reporting. Fine, that’s good, right? But haven’t we seen this before? Remember Cambridge Analytica? It’s starting to remind me of “Climate Change”. Facebook is the boogey man and we should reduce your carbon footprint! Jan 6 was Facebook’s fault not that other guys… A weekend in the capital for a CEO lashing sounds fun. Seriously, it’s all kind of like a traveling circus.

We’re all responsible for not caring about our data enough to pay for a trustworthy service. Can someone just say that? Why are these products free??? Homer Simpson says it best…