Point of Privacy

I came face to face with an obvious Ai driven face recognition terminal at the payment desk of a high street retailer.

So not only do they have my payment history and patterns, but my full bio iD (obtained without my permission). Should I submit a subject access request or just let it fly. Maybe I just shop somewhere else now or cover my face on every purchase.

I guess it’s the same approach that cash machines take when your image is taken on every withdrawal.

The most unnerving element was watching the small screen at the payment point with my face being tracked. There are no hiding spots in public spaces so just get used to it.

I did catch a glimpse of a social media campaign encouraging people to go totally offline for the day seemingly in protest of how connectivity dominates our personal lives.  The real challenge is we don’t really have the mental toughness to turn it all off.

Tempted to take everything off-line.

Double Boss level completed

I’ve been tinkering for a while now, tweaking my expertise but not really using it to full effect. Having defeat two major bosses, I am now moving onto a new chapter fully geared up with new independant mobility stepping into a unknown path.

Rambling ramble but basically I’m a happy boy with over.

With DUAA now in force, it’s time to tweak my approach to data permissions and change tactics.

Tweaking your victim profile

The Netflix movie – The Accused was so intensely accurate in terms of what has happened and could indeed happen again to someone being wrongfully accused via our glorious social media ecosystem.

I had to stop watching it halfway through just to analyse the touch points (spoiler alert) –

Reading classification – personal threat, injury detail, discrimination, suicide

The victim profile

Threat / eventPossible risk counter measures
High number of followers 200+Do you know all these people?
Open profile – public access to personal data, followers, posts etcLimited how unknowns can tag you
Connected family and friend’s profiles are open and contain meta data such as location details, home address etcLimited how unknowns can map your relationships
Phone location services openTurn off when no Apps not in use
Images taken by 3rd party in public revealing locationTough one to tackle as people are always snapping
CCTV data mapped with social mediaAlmost impossible to hide
Monitoring a hashtag in real timeNo real reason to do this unless you are actually going to react
Online rumour pushed as factResponse to accusations in real time by key social media channels, put out a pubic statement, engage a legal advisor.
Online threat to life reported by phoneReport online and get a crime number
Open-source intelligence (OSINT) data used to compile and share personal data on public forums anonymously.Check yourself to see what you are sharing publicly
Sometimes you just need to help yourself

Newly Identified Defendants

The arena of International Law, Digital crime and Money creates an absolute boiling pot of complex, interconnected issues that can sometimes be difficult to understand. The case of Microsoft Corporation, Plaintiff verses Defendants in a Civil Action No. 1-24-cv-2323 in Virginia USA where the plaintiff disabled the abuse of their system and then took legal action is bedtime story reading.

The defendants were truly global and included end-users of a hacked system. Defendants were named and shamed but apparently the legal counsel of the plaintiff had personal information leaked publicly (Doxing). 

So much for privacy.

No one in the case is off-limits and brings a point that privacy is a gargantuan task nowadays where even high-level operatives are vulnerable to attack and exploitation.

Every run Data classification for our personal stuff?

It’s not business it’s personal

Ever tried watching a small business owner struggle to send private data securely? Inadvertently, they fallback to sending passport or credit card details over WhatsAPP. Not so bad as it’s end-to-end encryption right?

So this is not so bad and you have nothing to hide right?

Not many small business owners have the time or money to spend on drilling down to the right controls that should be in place for their business and naturally use what they use in the personal lives which often means the bare minimum.

Additonally, unless directly linked to finanical issues Data protection comes in last. So what can be done prior to a data breach incident for small business?

Firstly, take the personal pulse out of the mix and work with someone who is tech savvy and thinks like a business person with risk in mind.

Happy, Cyber Truck hunting.