SlideShare a Scribd company logo
1 of 10
Download to read offline
Page 1 of 10
A priest’s phone location data outed his private life. It could
happen to anyone.
How an unregulated market for personal data is legal, and what
it means for your privacy
The Washington Post
July 22, 2021
Page 2 of 10
What stands out about this particular incident isn’t that it’s
improbable but that it’s the exact worst-case scenario privacy
experts have been warning about for a long time. Personal data
is collected, sold and bought by a tangle of app developers, data
brokers and advertising companies with little oversight. The
biggest shock may be that it didn’t happen sooner.
“This is the first instance that I know of, of this data being used
by a journalistic entity to track a specific person and weaponize
their private, secretly collected information against them,” said
Bennett Cyphers, a staff technologist at the Electronic Frontier
Foundation, a digital rights organization. “This is exactly the kind
of privacy threat advocates have been describing for years.”
There is still much to be learned about how the priest’s private
data could have made the journey from his smartphone into the
hands of a Catholic newsletter’s writer. The newsletter, the Pillar,
didn’t name the source of the data or clarify how it obtained the
revealing location information, which it says spanned three
years. But the story implies it started with data that Grindr
Page 3 of 10
allegedly shared with advertising partners and data brokers in
the past that was then legally sold by a data broker.
In a statement posted to Twitter defending the article and the
anonymity it granted the data provider, method and funder, the
Pillar’s editor in chief, JD Flynn, said it weighed the balance
between an individual’s privacy and public interest, and was
“confident in our deliberation.” He added that “technology
accountability has been an issue of importance among church
leaders for quite some time.”
How anyone’s information could end up for sale
Right now, your smartphone is likely filled with apps that are
collecting details about you, including your age, gender, political
leanings, GPS data or browsing habits.
Grindr and other apps have long shared this kind of information
with third-party data brokers, which exist in a largely unregulated
sweet spot between websites, apps and advertisers. The brokers
gather the data from apps, then sell it on the open market to
Page 4 of 10
parties that use it for ad targeting, political profiling or even
research. It’s a well-established industry but one that doesn’t
typically draw this level of attention.
“Often the location data is used to determine what stores people
visit. Things like sexual orientation are used to determine what
demographics to target,” said Ashkan Soltani, an independent
researcher and a former chief technologist at the Federal Trade
Commission. “People don’t actually know or care that much that
they’re being targeted. Or it’s used by nation state actors to
surveil people, but that’s not publicly talked about.”
It’s all above board, app companies have claimed, because the
arrangement is spelled out in their privacy policies and there are
precautions built in.
Experts say those precautions aren’t enough. The data is
typically stripped of the most obvious identifying information like
a name, email or cell number. However, it still contains
information that could reveal the person behind it, such as a
device ID, an IP address or an advertising identifier. With the
Page 5 of 10
right outside information or a third-party service, so-called
anonymous data can be de-anonymized, as the Pillar claims it
did in the case of Burrill.
In this case, the Pillar says it “correlated a unique mobile device
to Burrill” using his presence at his family lake house, meetings
he attended and the USCCB staff residence and headquarters. It
did not say how it collected that information.The Pillar says the
data set it used was “commercially available app signal data”
from a data vendor that included Grindr information, but it did not
name the vendor or clarify if it bought the data directly from a
broker or received it from another party.
In a 2013 paper, researchers found that as little as four pieces of
data on average were enough to re-identify someone 95 percent
of the time. Latanya Sweeney, a data privacy expert and
professor at Harvard Kennedy School, showed how just a Zip
code, age and gender could be used to identify patients in
anonymous hospital data sets. Even something as simple as a
Page 6 of 10
person’s work and home address could be enough to find a
pattern strong enough to identify anonymous location data.
A 2020 study by the Norwegian Consumer Council found that
Grindr and other apps were sharing personal data about their
users with outside companies, including numerous data brokers.
In Grindr’s case, it also shared detailed location data, according
to the Norwegian researchers.
In January this year, the Norwegian Data Protection Authority
said it would fine Grindr $11.7 million for sharing data without
users’ consent. In its response, Grindr confirmed that it shared
data, including a hashed device ID, age, gender and location
information with advertisers, but claimed that it was done with
consent from users and that the app had since updated
its sharing policies.
“Historical data collection remains a problem,” said Tor Erling
Bjorstad, a security researcher at Mnemonic who was in charge
of the Norwegian Consumer Council research report. “GPS
Page 7 of 10
position data collected in 2019 and earlier is still out there, and
can still have explosive power.”
Grindr said in a statement in response to the Pillar newsletter
post on Tuesday that the alleged activities are “incredibly unlikely
to occur.” However, on Wednesday, it shared an updated
statement saying that “we do not believe Grindr is the source of
the data” and that the company had policies and systems in
place to protect personal data. It did not specify what they were.
How you can protect yourself
What is stopping similar instances from happening to other
people?
Very little, according to privacy experts.
“Consumers don’t really have the tools to be able to protect
themselves,” said Serge Egelman, research director of the
Usable Security and Privacy Group at the International
Computer Science Institute. “Once the data leaves the device,
there’s no way of knowing what’s actually going to happen to it,
Page 8 of 10
what other third parties will receive it. … There’s no knowledge
of how the data will be used by anyone.”
Trying to fully protect your data would be a full-time job, and not
something most smartphone owners could easily manage. To
start, you’d need to comb through every privacy policy, manually
opt out of any relevant sharing options for each app you
download, use a virtual private network, or VPN, and maybe
move somewhere with stronger consumer privacy protections
like the European Union or even California.
In California, individuals have the right to ask companies not to
sell their personal information, including anything under a
pseudonymous identification like their device ID, if they know it.
They can opt out of letting data brokers sell their information, one
by one — an arduous task. In other locations, that process isn’t
available or is impossible.
There are some steps you can take to try to reduce your
exposure, says EFF’s Cyphers.
Page 9 of 10
Download fewer smartphone apps in general and delete
anything you don’t use. Lock down the kinds of data the
remaining apps are able to access, especially your location. Go
into your phone’s privacy settings and look up location sharing,
where you should find a list of apps with access to your location.
Both Android and iOS devices let you limit when an app can
access your location. Always limit location access to while you’re
using the app or make the app ask each time, and never let an
app continuously track your location in the background without
an exceptionally good reason. Reset your advertising ID in your
smartphone’s settings.
If you’re worried about someone knowing your browsing history,
use a VPN, but be careful about which ones. (Cyphers says a
VPN won’t protect your location information as well.)
Ultimately, it’s an overwhelming amount of work to ask of regular
people. It’s a problem that may require more serious
intervention, such as privacy regulation or even stricter rules for
apps from the smartphone makers themselves.
Page 10 of 10
“Time and time again, whenever the burden is on users to opt
out of something, the vast amount of users are not going to opt
out of that thing,” said Cyphers.

More Related Content

What's hot

GRBN Trust and Personal Data Survey - Market Research Industry Special Report
GRBN Trust and Personal Data Survey - Market Research Industry Special ReportGRBN Trust and Personal Data Survey - Market Research Industry Special Report
GRBN Trust and Personal Data Survey - Market Research Industry Special ReportAndrew Cannon
 
US mining data from 9 leading internet firms and companies deny knowledge
US mining data from 9 leading internet firms and companies deny knowledgeUS mining data from 9 leading internet firms and companies deny knowledge
US mining data from 9 leading internet firms and companies deny knowledgetrupassion
 
Obama administration reverses on HealthCare.gov privacy policy after concerns
Obama administration reverses on HealthCare.gov privacy policy after concernsObama administration reverses on HealthCare.gov privacy policy after concerns
Obama administration reverses on HealthCare.gov privacy policy after concernswretchedphantom97
 
Obama administration reverses on HealthCare.gov privacy policy after concerns
Obama administration reverses on HealthCare.gov privacy policy after concernsObama administration reverses on HealthCare.gov privacy policy after concerns
Obama administration reverses on HealthCare.gov privacy policy after concernsjoblessbeach6696
 
CCPA: What You Need to Know
CCPA: What You Need to KnowCCPA: What You Need to Know
CCPA: What You Need to KnowIronCore Labs
 
Sbs facebook data privacy dilemma case study
Sbs   facebook data privacy dilemma case studySbs   facebook data privacy dilemma case study
Sbs facebook data privacy dilemma case studysmumbahelp
 
Pli government investigations 2020
Pli   government investigations 2020Pli   government investigations 2020
Pli government investigations 2020rhedges
 
Open Source Insight: Drupageddon, Heartbleed Problems & Open Source 360 Surve...
Open Source Insight: Drupageddon, Heartbleed Problems & Open Source 360 Surve...Open Source Insight: Drupageddon, Heartbleed Problems & Open Source 360 Surve...
Open Source Insight: Drupageddon, Heartbleed Problems & Open Source 360 Surve...Black Duck by Synopsys
 
Using Social Media Ethically
Using Social Media EthicallyUsing Social Media Ethically
Using Social Media EthicallyJack Pringle
 
Privacy & Transparency in Digital Life
Privacy & Transparency in Digital LifePrivacy & Transparency in Digital Life
Privacy & Transparency in Digital LifeSusan Price
 
Fraudsters Hackers & Thieves!
Fraudsters Hackers & Thieves!Fraudsters Hackers & Thieves!
Fraudsters Hackers & Thieves!Echoworx
 
Report on data breach and privacy in nepal during covid19 by shreedeep rayamajhi
Report on data breach and privacy in nepal during covid19 by shreedeep rayamajhiReport on data breach and privacy in nepal during covid19 by shreedeep rayamajhi
Report on data breach and privacy in nepal during covid19 by shreedeep rayamajhiShreedeep Rayamajhi
 
Weekly eDiscovery Top Story Digest - March 5, 2014
Weekly eDiscovery Top Story Digest - March 5, 2014Weekly eDiscovery Top Story Digest - March 5, 2014
Weekly eDiscovery Top Story Digest - March 5, 2014Rob Robinson
 
Toolkit on factchecking by shreedeep rayamajhi
Toolkit on factchecking by shreedeep rayamajhiToolkit on factchecking by shreedeep rayamajhi
Toolkit on factchecking by shreedeep rayamajhiShreedeep Rayamajhi
 
Right Forgotten_v
Right Forgotten_vRight Forgotten_v
Right Forgotten_vMei Wang
 
Privacy: Protecting Personal Information
Privacy: Protecting Personal InformationPrivacy: Protecting Personal Information
Privacy: Protecting Personal InformationJonathan Bacon
 

What's hot (20)

GRBN Trust and Personal Data Survey - Market Research Industry Special Report
GRBN Trust and Personal Data Survey - Market Research Industry Special ReportGRBN Trust and Personal Data Survey - Market Research Industry Special Report
GRBN Trust and Personal Data Survey - Market Research Industry Special Report
 
US mining data from 9 leading internet firms and companies deny knowledge
US mining data from 9 leading internet firms and companies deny knowledgeUS mining data from 9 leading internet firms and companies deny knowledge
US mining data from 9 leading internet firms and companies deny knowledge
 
Obama administration reverses on HealthCare.gov privacy policy after concerns
Obama administration reverses on HealthCare.gov privacy policy after concernsObama administration reverses on HealthCare.gov privacy policy after concerns
Obama administration reverses on HealthCare.gov privacy policy after concerns
 
Obama administration reverses on HealthCare.gov privacy policy after concerns
Obama administration reverses on HealthCare.gov privacy policy after concernsObama administration reverses on HealthCare.gov privacy policy after concerns
Obama administration reverses on HealthCare.gov privacy policy after concerns
 
CCPA: What You Need to Know
CCPA: What You Need to KnowCCPA: What You Need to Know
CCPA: What You Need to Know
 
Sbs facebook data privacy dilemma case study
Sbs   facebook data privacy dilemma case studySbs   facebook data privacy dilemma case study
Sbs facebook data privacy dilemma case study
 
Pli government investigations 2020
Pli   government investigations 2020Pli   government investigations 2020
Pli government investigations 2020
 
Open Source Insight: Drupageddon, Heartbleed Problems & Open Source 360 Surve...
Open Source Insight: Drupageddon, Heartbleed Problems & Open Source 360 Surve...Open Source Insight: Drupageddon, Heartbleed Problems & Open Source 360 Surve...
Open Source Insight: Drupageddon, Heartbleed Problems & Open Source 360 Surve...
 
Bericht icomp vol4
Bericht icomp vol4Bericht icomp vol4
Bericht icomp vol4
 
Exposing the Hidden Web
Exposing the Hidden WebExposing the Hidden Web
Exposing the Hidden Web
 
Using Social Media Ethically
Using Social Media EthicallyUsing Social Media Ethically
Using Social Media Ethically
 
Privacy & Transparency in Digital Life
Privacy & Transparency in Digital LifePrivacy & Transparency in Digital Life
Privacy & Transparency in Digital Life
 
Fearsquare (1)
Fearsquare (1)Fearsquare (1)
Fearsquare (1)
 
Fraudsters Hackers & Thieves!
Fraudsters Hackers & Thieves!Fraudsters Hackers & Thieves!
Fraudsters Hackers & Thieves!
 
Report on data breach and privacy in nepal during covid19 by shreedeep rayamajhi
Report on data breach and privacy in nepal during covid19 by shreedeep rayamajhiReport on data breach and privacy in nepal during covid19 by shreedeep rayamajhi
Report on data breach and privacy in nepal during covid19 by shreedeep rayamajhi
 
Critical Update Needed: Cybersecurity Expertise in the Boardroom
Critical Update Needed: Cybersecurity Expertise in the BoardroomCritical Update Needed: Cybersecurity Expertise in the Boardroom
Critical Update Needed: Cybersecurity Expertise in the Boardroom
 
Weekly eDiscovery Top Story Digest - March 5, 2014
Weekly eDiscovery Top Story Digest - March 5, 2014Weekly eDiscovery Top Story Digest - March 5, 2014
Weekly eDiscovery Top Story Digest - March 5, 2014
 
Toolkit on factchecking by shreedeep rayamajhi
Toolkit on factchecking by shreedeep rayamajhiToolkit on factchecking by shreedeep rayamajhi
Toolkit on factchecking by shreedeep rayamajhi
 
Right Forgotten_v
Right Forgotten_vRight Forgotten_v
Right Forgotten_v
 
Privacy: Protecting Personal Information
Privacy: Protecting Personal InformationPrivacy: Protecting Personal Information
Privacy: Protecting Personal Information
 

Similar to A priest’s phone location data outed his private life. It could happen to anyone.

Data Mining: Privacy and Concerns
Data Mining: Privacy and ConcernsData Mining: Privacy and Concerns
Data Mining: Privacy and ConcernsBradley Buchanan
 
Consumers' and Citizens' Privacy
Consumers' and Citizens' Privacy  Consumers' and Citizens' Privacy
Consumers' and Citizens' Privacy Carolina Rossini
 
How to protect privacy sensitive data that is collected to control the corona...
How to protect privacy sensitive data that is collected to control the corona...How to protect privacy sensitive data that is collected to control the corona...
How to protect privacy sensitive data that is collected to control the corona...Ulf Mattsson
 
Accessing Password Protected andor Encrypted Mobile DataAbstrac.docx
Accessing Password Protected andor Encrypted Mobile DataAbstrac.docxAccessing Password Protected andor Encrypted Mobile DataAbstrac.docx
Accessing Password Protected andor Encrypted Mobile DataAbstrac.docxnettletondevon
 
iStart feature: Protect and serve how safe is your personal data?
iStart feature: Protect and serve how safe is your personal data?iStart feature: Protect and serve how safe is your personal data?
iStart feature: Protect and serve how safe is your personal data?Hayden McCall
 
Where In The World Is Your Sensitive Data?
Where In The World Is Your Sensitive Data?Where In The World Is Your Sensitive Data?
Where In The World Is Your Sensitive Data?Druva
 
Emerging Applications on Smart Phones: The Role of Privacy Concerns and its A...
Emerging Applications on Smart Phones: The Role of Privacy Concerns and its A...Emerging Applications on Smart Phones: The Role of Privacy Concerns and its A...
Emerging Applications on Smart Phones: The Role of Privacy Concerns and its A...AIRCC Publishing Corporation
 
Mobile Privacy and Security - Study by Mobidigger
Mobile Privacy and Security - Study by MobidiggerMobile Privacy and Security - Study by Mobidigger
Mobile Privacy and Security - Study by MobidiggerHubert Moik
 
Privacy study Mobile and online Dating
Privacy study Mobile and online DatingPrivacy study Mobile and online Dating
Privacy study Mobile and online DatingMobiDigger
 
AI for humans - the future of your digital self
AI for humans - the future of your digital selfAI for humans - the future of your digital self
AI for humans - the future of your digital selfSpeck&Tech
 
Designing for Privacy in an Increasingly Public World
Designing for Privacy in an Increasingly Public WorldDesigning for Privacy in an Increasingly Public World
Designing for Privacy in an Increasingly Public WorldRobert Stribley
 
httpsdigitalguardian.comblogsocial-engineering-attacks-common.docx
httpsdigitalguardian.comblogsocial-engineering-attacks-common.docxhttpsdigitalguardian.comblogsocial-engineering-attacks-common.docx
httpsdigitalguardian.comblogsocial-engineering-attacks-common.docxadampcarr67227
 
9 Trends in Identity Verification (2023) by Regula
9 Trends in Identity Verification (2023) by Regula9 Trends in Identity Verification (2023) by Regula
9 Trends in Identity Verification (2023) by RegulaRegula
 
10 Criminology in the FutureCriminology in the FutureKristop.docx
10 Criminology in the FutureCriminology in the FutureKristop.docx10 Criminology in the FutureCriminology in the FutureKristop.docx
10 Criminology in the FutureCriminology in the FutureKristop.docxhyacinthshackley2629
 
Carpe Datum! Who knows who you are?
Carpe Datum! Who knows who you are?Carpe Datum! Who knows who you are?
Carpe Datum! Who knows who you are?Kuliza Technologies
 
Noggin - World's first marketplace for Personal Data
Noggin - World's first marketplace for Personal DataNoggin - World's first marketplace for Personal Data
Noggin - World's first marketplace for Personal DataNoggin Asia
 
Getting the social side of pervasive computing right
Getting the social side of pervasive computing rightGetting the social side of pervasive computing right
Getting the social side of pervasive computing rightblogzilla
 

Similar to A priest’s phone location data outed his private life. It could happen to anyone. (20)

Data Mining: Privacy and Concerns
Data Mining: Privacy and ConcernsData Mining: Privacy and Concerns
Data Mining: Privacy and Concerns
 
Consumers' and Citizens' Privacy
Consumers' and Citizens' Privacy  Consumers' and Citizens' Privacy
Consumers' and Citizens' Privacy
 
How to protect privacy sensitive data that is collected to control the corona...
How to protect privacy sensitive data that is collected to control the corona...How to protect privacy sensitive data that is collected to control the corona...
How to protect privacy sensitive data that is collected to control the corona...
 
Accessing Password Protected andor Encrypted Mobile DataAbstrac.docx
Accessing Password Protected andor Encrypted Mobile DataAbstrac.docxAccessing Password Protected andor Encrypted Mobile DataAbstrac.docx
Accessing Password Protected andor Encrypted Mobile DataAbstrac.docx
 
iStart feature: Protect and serve how safe is your personal data?
iStart feature: Protect and serve how safe is your personal data?iStart feature: Protect and serve how safe is your personal data?
iStart feature: Protect and serve how safe is your personal data?
 
Where In The World Is Your Sensitive Data?
Where In The World Is Your Sensitive Data?Where In The World Is Your Sensitive Data?
Where In The World Is Your Sensitive Data?
 
Emerging Applications on Smart Phones: The Role of Privacy Concerns and its A...
Emerging Applications on Smart Phones: The Role of Privacy Concerns and its A...Emerging Applications on Smart Phones: The Role of Privacy Concerns and its A...
Emerging Applications on Smart Phones: The Role of Privacy Concerns and its A...
 
Mobile Privacy and Security - Study by Mobidigger
Mobile Privacy and Security - Study by MobidiggerMobile Privacy and Security - Study by Mobidigger
Mobile Privacy and Security - Study by Mobidigger
 
Privacy study Mobile and online Dating
Privacy study Mobile and online DatingPrivacy study Mobile and online Dating
Privacy study Mobile and online Dating
 
AI for humans - the future of your digital self
AI for humans - the future of your digital selfAI for humans - the future of your digital self
AI for humans - the future of your digital self
 
Designing for Privacy in an Increasingly Public World
Designing for Privacy in an Increasingly Public WorldDesigning for Privacy in an Increasingly Public World
Designing for Privacy in an Increasingly Public World
 
httpsdigitalguardian.comblogsocial-engineering-attacks-common.docx
httpsdigitalguardian.comblogsocial-engineering-attacks-common.docxhttpsdigitalguardian.comblogsocial-engineering-attacks-common.docx
httpsdigitalguardian.comblogsocial-engineering-attacks-common.docx
 
9 Trends in Identity Verification (2023) by Regula
9 Trends in Identity Verification (2023) by Regula9 Trends in Identity Verification (2023) by Regula
9 Trends in Identity Verification (2023) by Regula
 
10 Criminology in the FutureCriminology in the FutureKristop.docx
10 Criminology in the FutureCriminology in the FutureKristop.docx10 Criminology in the FutureCriminology in the FutureKristop.docx
10 Criminology in the FutureCriminology in the FutureKristop.docx
 
Carpe Datum! Who knows who you are?
Carpe Datum! Who knows who you are?Carpe Datum! Who knows who you are?
Carpe Datum! Who knows who you are?
 
Noggin - World's first marketplace for Personal Data
Noggin - World's first marketplace for Personal DataNoggin - World's first marketplace for Personal Data
Noggin - World's first marketplace for Personal Data
 
Social Network Crime on Rise
Social Network Crime on RiseSocial Network Crime on Rise
Social Network Crime on Rise
 
Getting the social side of pervasive computing right
Getting the social side of pervasive computing rightGetting the social side of pervasive computing right
Getting the social side of pervasive computing right
 
privtechsomeassemb
privtechsomeassembprivtechsomeassemb
privtechsomeassemb
 
Privacy
PrivacyPrivacy
Privacy
 

More from LUMINATIVE MEDIA/PROJECT COUNSEL MEDIA GROUP

Who’s Responsible for the Gaza Hospital Explosion? Here’s Why It’s Hard to Know
Who’s Responsible for the Gaza Hospital Explosion? Here’s Why It’s Hard to KnowWho’s Responsible for the Gaza Hospital Explosion? Here’s Why It’s Hard to Know
Who’s Responsible for the Gaza Hospital Explosion? Here’s Why It’s Hard to KnowLUMINATIVE MEDIA/PROJECT COUNSEL MEDIA GROUP
 

More from LUMINATIVE MEDIA/PROJECT COUNSEL MEDIA GROUP (20)

A.I. Has a Measurement Problem: Can It Be Solved?
A.I. Has a Measurement Problem: Can It Be Solved?A.I. Has a Measurement Problem: Can It Be Solved?
A.I. Has a Measurement Problem: Can It Be Solved?
 
Let’s Say Someone Did Drop the Bomb. Then What?
Let’s Say Someone Did Drop the Bomb. Then What?Let’s Say Someone Did Drop the Bomb. Then What?
Let’s Say Someone Did Drop the Bomb. Then What?
 
How Tech Giants Cut Corners to Harvest Data for A.I.
How Tech Giants Cut Corners to Harvest Data for A.I.How Tech Giants Cut Corners to Harvest Data for A.I.
How Tech Giants Cut Corners to Harvest Data for A.I.
 
Why democracy dies in Trumpian boredom (by Edward Luce)
Why democracy dies in Trumpian boredom (by Edward Luce)Why democracy dies in Trumpian boredom (by Edward Luce)
Why democracy dies in Trumpian boredom (by Edward Luce)
 
An interview with the director of "Zone of Interest"
An interview with the director of "Zone of Interest"An interview with the director of "Zone of Interest"
An interview with the director of "Zone of Interest"
 
"Schindler’s List" : an oral history with the actors
"Schindler’s List" : an oral history with the actors"Schindler’s List" : an oral history with the actors
"Schindler’s List" : an oral history with the actors
 
Chinese Startup 01.AI Is Winning the Open Source AI Race
Chinese Startup 01.AI Is Winning the Open Source AI RaceChinese Startup 01.AI Is Winning the Open Source AI Race
Chinese Startup 01.AI Is Winning the Open Source AI Race
 
The mismeasuring of AI: How it all began
The mismeasuring of AI: How it all beganThe mismeasuring of AI: How it all began
The mismeasuring of AI: How it all began
 
Google’s Gemini Marketing Trick: what a trickster!
Google’s Gemini Marketing Trick: what a trickster!Google’s Gemini Marketing Trick: what a trickster!
Google’s Gemini Marketing Trick: what a trickster!
 
Inside the Magical World of AI Prompters on Reddit
Inside the Magical World of AI Prompters on RedditInside the Magical World of AI Prompters on Reddit
Inside the Magical World of AI Prompters on Reddit
 
Regulators blame Bezos for making Amazon worse in new lawsuit details
Regulators blame Bezos for making Amazon worse in new lawsuit detailsRegulators blame Bezos for making Amazon worse in new lawsuit details
Regulators blame Bezos for making Amazon worse in new lawsuit details
 
Bariatric Surgery at 16
Bariatric Surgery at 16Bariatric Surgery at 16
Bariatric Surgery at 16
 
Palestinians Claim Social Media 'Censorship' Is Endangering Lives
Palestinians Claim Social Media 'Censorship' Is Endangering LivesPalestinians Claim Social Media 'Censorship' Is Endangering Lives
Palestinians Claim Social Media 'Censorship' Is Endangering Lives
 
Who’s Responsible for the Gaza Hospital Explosion? Here’s Why It’s Hard to Know
Who’s Responsible for the Gaza Hospital Explosion? Here’s Why It’s Hard to KnowWho’s Responsible for the Gaza Hospital Explosion? Here’s Why It’s Hard to Know
Who’s Responsible for the Gaza Hospital Explosion? Here’s Why It’s Hard to Know
 
Why ChatGPT Is Getting Dumber at Basic Math
Why ChatGPT Is Getting Dumber at Basic MathWhy ChatGPT Is Getting Dumber at Basic Math
Why ChatGPT Is Getting Dumber at Basic Math
 
U.S. and E.U. Finalize Long-Awaited Deal on Sharing Data
U.S. and E.U. Finalize Long-Awaited Deal on Sharing DataU.S. and E.U. Finalize Long-Awaited Deal on Sharing Data
U.S. and E.U. Finalize Long-Awaited Deal on Sharing Data
 
Will A.I. Become the New McKinsey?
Will A.I. Become the New McKinsey?Will A.I. Become the New McKinsey?
Will A.I. Become the New McKinsey?
 
AI is already writing books, websites and online recipes
AI is already writing books, websites and online recipesAI is already writing books, websites and online recipes
AI is already writing books, websites and online recipes
 
What happens when ChatGPT lies about real people?
What happens when ChatGPT lies about real people?What happens when ChatGPT lies about real people?
What happens when ChatGPT lies about real people?
 
The Brilliant Inventor Who Made Two of History’s Biggest Mistakes
The Brilliant Inventor Who Made Two of History’s Biggest MistakesThe Brilliant Inventor Who Made Two of History’s Biggest Mistakes
The Brilliant Inventor Who Made Two of History’s Biggest Mistakes
 

Recently uploaded

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfhans926745
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 

Recently uploaded (20)

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 

A priest’s phone location data outed his private life. It could happen to anyone.

  • 1. Page 1 of 10 A priest’s phone location data outed his private life. It could happen to anyone. How an unregulated market for personal data is legal, and what it means for your privacy The Washington Post July 22, 2021
  • 2. Page 2 of 10 What stands out about this particular incident isn’t that it’s improbable but that it’s the exact worst-case scenario privacy experts have been warning about for a long time. Personal data is collected, sold and bought by a tangle of app developers, data brokers and advertising companies with little oversight. The biggest shock may be that it didn’t happen sooner. “This is the first instance that I know of, of this data being used by a journalistic entity to track a specific person and weaponize their private, secretly collected information against them,” said Bennett Cyphers, a staff technologist at the Electronic Frontier Foundation, a digital rights organization. “This is exactly the kind of privacy threat advocates have been describing for years.” There is still much to be learned about how the priest’s private data could have made the journey from his smartphone into the hands of a Catholic newsletter’s writer. The newsletter, the Pillar, didn’t name the source of the data or clarify how it obtained the revealing location information, which it says spanned three years. But the story implies it started with data that Grindr
  • 3. Page 3 of 10 allegedly shared with advertising partners and data brokers in the past that was then legally sold by a data broker. In a statement posted to Twitter defending the article and the anonymity it granted the data provider, method and funder, the Pillar’s editor in chief, JD Flynn, said it weighed the balance between an individual’s privacy and public interest, and was “confident in our deliberation.” He added that “technology accountability has been an issue of importance among church leaders for quite some time.” How anyone’s information could end up for sale Right now, your smartphone is likely filled with apps that are collecting details about you, including your age, gender, political leanings, GPS data or browsing habits. Grindr and other apps have long shared this kind of information with third-party data brokers, which exist in a largely unregulated sweet spot between websites, apps and advertisers. The brokers gather the data from apps, then sell it on the open market to
  • 4. Page 4 of 10 parties that use it for ad targeting, political profiling or even research. It’s a well-established industry but one that doesn’t typically draw this level of attention. “Often the location data is used to determine what stores people visit. Things like sexual orientation are used to determine what demographics to target,” said Ashkan Soltani, an independent researcher and a former chief technologist at the Federal Trade Commission. “People don’t actually know or care that much that they’re being targeted. Or it’s used by nation state actors to surveil people, but that’s not publicly talked about.” It’s all above board, app companies have claimed, because the arrangement is spelled out in their privacy policies and there are precautions built in. Experts say those precautions aren’t enough. The data is typically stripped of the most obvious identifying information like a name, email or cell number. However, it still contains information that could reveal the person behind it, such as a device ID, an IP address or an advertising identifier. With the
  • 5. Page 5 of 10 right outside information or a third-party service, so-called anonymous data can be de-anonymized, as the Pillar claims it did in the case of Burrill. In this case, the Pillar says it “correlated a unique mobile device to Burrill” using his presence at his family lake house, meetings he attended and the USCCB staff residence and headquarters. It did not say how it collected that information.The Pillar says the data set it used was “commercially available app signal data” from a data vendor that included Grindr information, but it did not name the vendor or clarify if it bought the data directly from a broker or received it from another party. In a 2013 paper, researchers found that as little as four pieces of data on average were enough to re-identify someone 95 percent of the time. Latanya Sweeney, a data privacy expert and professor at Harvard Kennedy School, showed how just a Zip code, age and gender could be used to identify patients in anonymous hospital data sets. Even something as simple as a
  • 6. Page 6 of 10 person’s work and home address could be enough to find a pattern strong enough to identify anonymous location data. A 2020 study by the Norwegian Consumer Council found that Grindr and other apps were sharing personal data about their users with outside companies, including numerous data brokers. In Grindr’s case, it also shared detailed location data, according to the Norwegian researchers. In January this year, the Norwegian Data Protection Authority said it would fine Grindr $11.7 million for sharing data without users’ consent. In its response, Grindr confirmed that it shared data, including a hashed device ID, age, gender and location information with advertisers, but claimed that it was done with consent from users and that the app had since updated its sharing policies. “Historical data collection remains a problem,” said Tor Erling Bjorstad, a security researcher at Mnemonic who was in charge of the Norwegian Consumer Council research report. “GPS
  • 7. Page 7 of 10 position data collected in 2019 and earlier is still out there, and can still have explosive power.” Grindr said in a statement in response to the Pillar newsletter post on Tuesday that the alleged activities are “incredibly unlikely to occur.” However, on Wednesday, it shared an updated statement saying that “we do not believe Grindr is the source of the data” and that the company had policies and systems in place to protect personal data. It did not specify what they were. How you can protect yourself What is stopping similar instances from happening to other people? Very little, according to privacy experts. “Consumers don’t really have the tools to be able to protect themselves,” said Serge Egelman, research director of the Usable Security and Privacy Group at the International Computer Science Institute. “Once the data leaves the device, there’s no way of knowing what’s actually going to happen to it,
  • 8. Page 8 of 10 what other third parties will receive it. … There’s no knowledge of how the data will be used by anyone.” Trying to fully protect your data would be a full-time job, and not something most smartphone owners could easily manage. To start, you’d need to comb through every privacy policy, manually opt out of any relevant sharing options for each app you download, use a virtual private network, or VPN, and maybe move somewhere with stronger consumer privacy protections like the European Union or even California. In California, individuals have the right to ask companies not to sell their personal information, including anything under a pseudonymous identification like their device ID, if they know it. They can opt out of letting data brokers sell their information, one by one — an arduous task. In other locations, that process isn’t available or is impossible. There are some steps you can take to try to reduce your exposure, says EFF’s Cyphers.
  • 9. Page 9 of 10 Download fewer smartphone apps in general and delete anything you don’t use. Lock down the kinds of data the remaining apps are able to access, especially your location. Go into your phone’s privacy settings and look up location sharing, where you should find a list of apps with access to your location. Both Android and iOS devices let you limit when an app can access your location. Always limit location access to while you’re using the app or make the app ask each time, and never let an app continuously track your location in the background without an exceptionally good reason. Reset your advertising ID in your smartphone’s settings. If you’re worried about someone knowing your browsing history, use a VPN, but be careful about which ones. (Cyphers says a VPN won’t protect your location information as well.) Ultimately, it’s an overwhelming amount of work to ask of regular people. It’s a problem that may require more serious intervention, such as privacy regulation or even stricter rules for apps from the smartphone makers themselves.
  • 10. Page 10 of 10 “Time and time again, whenever the burden is on users to opt out of something, the vast amount of users are not going to opt out of that thing,” said Cyphers.