Data Collection and Usage - Social media platforms collect extensive user data, including location, browsing history, contacts, and even health and fitness information [5][6] - Platforms like Facebook can infer sensitive information such as physical address, political and religious beliefs, and sexual orientation [7][8] - Companies are collecting data not just for targeted advertising but to control user behavior and decision-making [27] - Criminals exploit readily available personal data to manipulate individuals, emphasizing that users are targeted, not their devices [23] Security Vulnerabilities and Exploits - Applications with SMS access can be exploited to read and send OTPs, leading to financial losses [12][15] - Criminals are hacking individuals to reach their devices [23] - Even seemingly harmless actions, like a child installing an app for gaming currency, can have severe consequences [22] - User activities across devices linked to the same Gmail account can be tracked and exploited [18] Digital Footprint and Privacy - Individuals leave a unique digital fingerprint based on their internet usage patterns [24] - Google tracks user locations and activities precisely over many years, creating a detailed timeline [10][11] - This data can be used as court-admissible evidence [11] Recommendations - Users should be aware of the permissions granted to applications on their phones [13] - Users can check their Google activity to see what data is being tracked [17] - The industry should recognize that users are products of the data they consume, influencing their thoughts and aspirations [2]
Whispers of the Web: Exposing Data Privacy and Cyber Deception | Amit Dubey | TEDxNIIT University