Utah bill would bring ID-based age verification to online platforms

A state lawmaker in Utah has introduced a bill that would require teens to get parental consent before they can use social media. The bill would require handing over more personal information to check the age of platform users.

This week, State Sen. Mike McKell introduced SB 152, a bill that would require social media platforms to not only verify age but also require children under the age of 18 to get a parent’s approval before creating a social media account.

We obtained a copy of the bill for you here.

The bill calls for users of platforms to show a valid driver’s license, a birth certificate, a currently valid passport, or a currently valid identification card or certificate.

The bill would also allow parents to have access to their child’s social media accounts.

Keep reading

Social Media Is Influencing Teens To Adopt Mental Illness Identities, Researchers Say

Researchers have examined the troubling trend of teens self-diagnosing mental illness through social media. 

new paper published earlier this month in Comprehensive Psychiatry proposed that “social contagion” through prolonged social media use can explain why some teens, mostly adolescent females, self-diagnose their purported rare mental illnesses and personality disorders online. 

“We believe there is an urgent need for focused empirical research investigation into this concerning phenomenon that is related to the broader research and discourse examining social media influences on mental health,” said the study’s lead author, John D. Haltigan, and co-author, Gayathiri Rajkumar, in a recent article for Reality’s Last Stand.

The paper focused on the uptick in teens presenting with tics with no known biological cause and the resurgence of the extremely rare multiple personality disorder, now called Dissociative Identity Disorder (DID), in which a person claims to harbor multiple distinct personalities. Also mentioned are the prevalence of autism, depression, eating disorders, and gender identity-related conditions on social media. 

“That rates of teen and adolescent depression, anxiety, and suicidal ideation have risen precipitously since the advent of social media and smartphones is likely no coincidence,” the authors said.

The paper proposes that social media platforms like TikTok, whose core user base are teen girls, and the popularity of online communities that glamorize mental illness, may act as a “spread vector” for adolescents to adopt various disorders as part of their online personas.

Keep reading

What Privacy? This AI Can Identify You by Your Computer Habits

The world of privacy is a constant battlefield. It’s not a static decision where once you’ve done this one single step, you’re now good until the end of time. Instead, you have to stay abreast of the research, studying the ways that privacy is constantly being diminished so that you can then take the appropriate steps to respond.

If you’ve read through a privacy policy for an app, website, or contract in the past, you’ve likely noticed that they state they may sell your data to third parties. Exactly who these third parties are, you never know, nor what your information is being used for in the first place.

But sometimes you find the privacy policy tries to add a feel-good clause here, saying something to the extent that “our data about you is completely anonymous.”

Keep reading

The dark web’s criminal minds see Internet of Things as next big hacking prize

John Hultquist, vice president of intelligence analysis at Google-owned cybersecurity firm Mandiant, likens his job to studying criminal minds through a soda straw. He monitors cyberthreat groups in real time on the dark web, watching what amounts to a free market of criminal innovation ebb and flow.

Groups buy and sell services, and one hot idea — a business model for a crime — can take off quickly when people realize that it works to do damage or to get people to pay. Last year, it was ransomware, as criminal hacking groups figured out how to shut down servers through what’s called directed denial of service attacks. But 2022, say experts, may have marked an inflection point due to the rapid proliferation of IoT (Internet of Things) devices.

Attacks are evolving from those that shut down computers or stole data, to include those that could more directly wreak havoc on everyday life. IoT devices can be the entry points for attacks on parts of countries’ critical infrastructure, like electrical grids or pipelines, or they can be the specific targets of criminals, as in the case of cars or medical devices that contain software.

“What I wish is that the vulnerabilities of cybersecurity could never negatively affect human life and infrastructure,” says Meredith Schnur, cyber brokerage leader for US & Canada at Marsh & McLennan, which insures large companies against cyberattacks. “Everything else is just business.”

Keep reading

Government Spending Billions To Expand Broadband but Can’t Tell Who Needs It

In November 2021, Congress passed and President Joe Biden signed the Infrastructure Investment and Jobs Act (IIJA), a $1.2 trillion grab bag of public spending wish list items. One of those projects, the Broadband Equity, Access, and Deployment (BEAD) Program, would expand broadband access to communities that currently lack access to high-speed internet. BEAD would dole out $42.45 billion in state grants, and the Government Accountability Office estimated that the projects could require as many as 23,000 additional telecom workers to complete.

The only problem is that the government currently has no idea where broadband actually is and is not available.

The government defines broadband as any high-speed internet connection that is always on without needing to dial up. According to the text of the IIJA, “Access to affordable, reliable, high-speed broadband is essential to full participation in modern life in the United States,” especially in an era of remote work and Zoom schooling. As such, the law set out to bridge the so-called “digital divide” wherein some rural and low-income communities do not have easy broadband access.

To determine what areas need investment, the government relies on maps from the Federal Communications Commission (FCC). But despite costing $350 million, the FCC’s maps are notoriously unreliable and have been for many years. In 2021, The Washington Post noted the maps are based on census data, so “if even one household in a census block—a statistical area that conveys population data—has broadband available, then the agency considers the entire group served. In rural areas, one block could cover dozens of square miles.” The FCC’s maps also don’t take into account physical impediments, like trees and mountains, which can disrupt wireless signals.

Keep reading

New browser extension replaces Wikipedia pages in search results with Encyclosphere pages

Wikipedia co-founder Larry Sanger has announced the launch of a browser plugin that adds Encyclosphere results, while offering the possibility to remove those from Wikipedia – when performing a search using Google or DuckDuckGo.

Other search engines will be added soon, according to the plugin’s page on Chrome Web Store (also works with Brave). The description also notes that Wikipedia results are removed when there are relevant ones from the Encyclosphere.

Another feature, which Sanger admits in one of the tweets announcing the launch of the extension is likely to be “properly appreciated” only by “techies” is the inclusion of a built-in peer-to-peer encyclopedia reader, which opens articles from WebTorrent, in this way rendering the browser into a network node.

Keep reading

Biden Admin Funds AI To Police Online Language

Government spending records have revealed that the Biden Administration is dishing out more than half a million dollars in grants to fund the development of artificial intelligence that will censor language on social media in order to eliminate ‘microaggressions’.

The Washington Free Beacon reports that the funding was part of Biden’s $1.9 trillion ‘American Rescue Plan’ and was granted to researchers at the University of Washington in March to develop technologies that could be used to protect online users from ‘discriminatory’ language.

Judicial Watch president Tom Fitton compared the move to the Chinese Communist Party’s efforts to “censor speech unapproved by the state,” calling it a “project to make it easier for their leftist allies to censor speech.”

Keep reading

Israel to introduce sweeping online censorship law

The Israeli government has announced that it will adopt recommendations to regulate social media platforms to create a “safer” online environment. The recommendations are similar to the social media rules in the EU’s Digital Services Act (DSA), which will take effect next year.

Outgoing Communications Minister Yoaz Hendel announced that Israel would adopt recommendations made by the committee for examining legislation on online social media platforms, which was formed in October 2021. The committee, which was led by the Communications Ministry director-general Liran Avisar Ben-Horin, was created to find solutions to tackle the regulatory and ethical questions related to social media.

“This is an unregulated space where negative and harmful social phenomena have emerged,” said Hendel, as reported by the Times of Israel. “Legal responsibility needs to be applied to digital platforms in relation to the distribution of illegal sexual content, incitement to violence and terrorism, and more.”

“The step we are taking today brings us closer to a more protected and safer online space while preserving freedom of expression.”

The committee recommended that social media companies should be obligated to immediately remove illegal and offensive content, create an online hotline for reporting offensive and illegal content, create a system where users can appeal censorship and suspension decisions, and be more transparent.

Courts will be given the power to issue content removal orders, and a social media regulator will be created. Platforms operating in Israel will be required to set up offices in Israel.

Keep reading

New web tracking technique is bypassing privacy protections

Advertisers and web trackers have been able to aggregate users’ information across all of the websites they visit for decades, primarily by placing third-party cookies in users’ browsers.

Two years ago, several browsers that prioritize user privacy—including Safari, Firefox, and Brave—began to block third-party cookies for all users by default. This presents a significant issue for businesses that place ads on the web on behalf of other companies and rely on cookies to track click-through rates to determine how much they need to get paid.

Advertisers have responded by pioneering a new method for tracking users across the Web, known as user ID (or UID) smuggling, which does not require third-party cookies. But no one knew exactly how often this method was used to track people on the Internet.

Researchers at UC San Diego have for the first time sought to quantify the frequency of UID smuggling in the wild, by developing a measurement tool called CrumbCruncher. CrumbCruncher navigates the Web like an ordinary user, but along the way, it keeps track of how many times it has been tracked using UID smuggling.

The researchers found that UID smuggling was present in about 8 percent of the navigations that CrumbCruncher made. They presented these results at the Internet Measurement Conference Oct. 25 to 27, 2022 in Nice, France. The team is also releasing both their complete dataset and their measurement pipeline for use by browser developers.

The team’s main goal is to raise awareness of the issue with browser developers, said first author Audrey Randall, a computer science Ph.D. student at UC San Diego. “UID smuggling is more widely used than we anticipated,” she said. “But we don’t know how much of it is a threat to user privacy.”

UID smuggling can have legitimate uses, the researchers say. For example, embedding user IDs in URLs can allow a website to realize a user is already logged in, which means they can skip the login page and navigate directly to content. It’s also a tool that a company that owns websites with different domains can use to track user traffic.

It’s also, of course, a tool for affiliate advertisers to track traffic and get paid. For example, a blogger who advertises a product using affiliate links might be paid a commission if anyone clicks their links and then makes a purchase. UID smuggling can identify which blogger should get the commision.

But there are potentially more dangerous uses that researchers worry about. For example, a data broker could use UID smuggling to gather a database of users’ Internet navigation.

Keep reading

Major Web Browsers Drop Mysterious Authentication Company After Ties To US Military Contractor Exposed

This week several major web browsers quickly severed ties with a mysterious software company used to certify the security of websites, three weeks after the Washington Post exposed its connections to a US military contractor, the Post reports.

TrustCor Systems provided ‘certificates’ to browsers to Mozilla Firefox and Microsoft Edge, which vouched for the legitimacy of said websites.

“Certificate Authorities have highly trusted roles in the internet ecosystem and it is unacceptable for a CA to be closely tied, through ownership and operation, to a company engaged in the distribution of malware,” said Mozilla’s Kathleen Wilson in an email to browser security experts. “Trustcor’s responses via their Vice President of CA operations further substantiates the factual basis for Mozilla’s concerns.”

According to TrustCor’s Panamanian (!?) registration records, the company has the same slate of officers, agents and officers as Arizona-based Packet Forensics, which has sold communication interception services to the U.S. government for over a decade.

One of those contracts listed the “place of performance” as Fort Meade, Md., the home of the National Security Agency and the Pentagon’s Cyber Command.

The case has put a new spotlight on the obscure systems of trust and checks that allow people to rely on the internet for most purposes. Browsers typically have more than a hundred authorities approved by default, including government-owned ones and small companies, to seamlessly attest that secure websites are what they purport to be. -WaPo

Also of concern, TrustCor’s small staff in Canada lists its place of operation at a UPS Store mail drop, according to company executive Rachel McPherson, who says she told their Canadian staffers to work remotely. She also acknowledged that the company has ‘infrastructure’ in Arizona as well.

McPherson says that ownership in TrustCor was transferred to employees despite the fact that some of the same holding companies had invested in both TrustCor and Packet Forensics.

Various technologists in the email discussion said they found TrustCor to be evasive when it came to basic facts such as legal domicile and ownership – which they said was not appropriate for a company responsible for root certificate authority that verifies a secure ‘https’ website is not an imposter.

Keep reading