SlideShare a Scribd company logo
Page 1 of 10
A priest’s phone location data outed his private life. It could
happen to anyone.
How an unregulated market for personal data is legal, and what
it means for your privacy
The Washington Post
July 22, 2021
Page 2 of 10
What stands out about this particular incident isn’t that it’s
improbable but that it’s the exact worst-case scenario privacy
experts have been warning about for a long time. Personal data
is collected, sold and bought by a tangle of app developers, data
brokers and advertising companies with little oversight. The
biggest shock may be that it didn’t happen sooner.
“This is the first instance that I know of, of this data being used
by a journalistic entity to track a specific person and weaponize
their private, secretly collected information against them,” said
Bennett Cyphers, a staff technologist at the Electronic Frontier
Foundation, a digital rights organization. “This is exactly the kind
of privacy threat advocates have been describing for years.”
There is still much to be learned about how the priest’s private
data could have made the journey from his smartphone into the
hands of a Catholic newsletter’s writer. The newsletter, the Pillar,
didn’t name the source of the data or clarify how it obtained the
revealing location information, which it says spanned three
years. But the story implies it started with data that Grindr
Page 3 of 10
allegedly shared with advertising partners and data brokers in
the past that was then legally sold by a data broker.
In a statement posted to Twitter defending the article and the
anonymity it granted the data provider, method and funder, the
Pillar’s editor in chief, JD Flynn, said it weighed the balance
between an individual’s privacy and public interest, and was
“confident in our deliberation.” He added that “technology
accountability has been an issue of importance among church
leaders for quite some time.”
How anyone’s information could end up for sale
Right now, your smartphone is likely filled with apps that are
collecting details about you, including your age, gender, political
leanings, GPS data or browsing habits.
Grindr and other apps have long shared this kind of information
with third-party data brokers, which exist in a largely unregulated
sweet spot between websites, apps and advertisers. The brokers
gather the data from apps, then sell it on the open market to
Page 4 of 10
parties that use it for ad targeting, political profiling or even
research. It’s a well-established industry but one that doesn’t
typically draw this level of attention.
“Often the location data is used to determine what stores people
visit. Things like sexual orientation are used to determine what
demographics to target,” said Ashkan Soltani, an independent
researcher and a former chief technologist at the Federal Trade
Commission. “People don’t actually know or care that much that
they’re being targeted. Or it’s used by nation state actors to
surveil people, but that’s not publicly talked about.”
It’s all above board, app companies have claimed, because the
arrangement is spelled out in their privacy policies and there are
precautions built in.
Experts say those precautions aren’t enough. The data is
typically stripped of the most obvious identifying information like
a name, email or cell number. However, it still contains
information that could reveal the person behind it, such as a
device ID, an IP address or an advertising identifier. With the
Page 5 of 10
right outside information or a third-party service, so-called
anonymous data can be de-anonymized, as the Pillar claims it
did in the case of Burrill.
In this case, the Pillar says it “correlated a unique mobile device
to Burrill” using his presence at his family lake house, meetings
he attended and the USCCB staff residence and headquarters. It
did not say how it collected that information.The Pillar says the
data set it used was “commercially available app signal data”
from a data vendor that included Grindr information, but it did not
name the vendor or clarify if it bought the data directly from a
broker or received it from another party.
In a 2013 paper, researchers found that as little as four pieces of
data on average were enough to re-identify someone 95 percent
of the time. Latanya Sweeney, a data privacy expert and
professor at Harvard Kennedy School, showed how just a Zip
code, age and gender could be used to identify patients in
anonymous hospital data sets. Even something as simple as a
Page 6 of 10
person’s work and home address could be enough to find a
pattern strong enough to identify anonymous location data.
A 2020 study by the Norwegian Consumer Council found that
Grindr and other apps were sharing personal data about their
users with outside companies, including numerous data brokers.
In Grindr’s case, it also shared detailed location data, according
to the Norwegian researchers.
In January this year, the Norwegian Data Protection Authority
said it would fine Grindr $11.7 million for sharing data without
users’ consent. In its response, Grindr confirmed that it shared
data, including a hashed device ID, age, gender and location
information with advertisers, but claimed that it was done with
consent from users and that the app had since updated
its sharing policies.
“Historical data collection remains a problem,” said Tor Erling
Bjorstad, a security researcher at Mnemonic who was in charge
of the Norwegian Consumer Council research report. “GPS
Page 7 of 10
position data collected in 2019 and earlier is still out there, and
can still have explosive power.”
Grindr said in a statement in response to the Pillar newsletter
post on Tuesday that the alleged activities are “incredibly unlikely
to occur.” However, on Wednesday, it shared an updated
statement saying that “we do not believe Grindr is the source of
the data” and that the company had policies and systems in
place to protect personal data. It did not specify what they were.
How you can protect yourself
What is stopping similar instances from happening to other
people?
Very little, according to privacy experts.
“Consumers don’t really have the tools to be able to protect
themselves,” said Serge Egelman, research director of the
Usable Security and Privacy Group at the International
Computer Science Institute. “Once the data leaves the device,
there’s no way of knowing what’s actually going to happen to it,
Page 8 of 10
what other third parties will receive it. … There’s no knowledge
of how the data will be used by anyone.”
Trying to fully protect your data would be a full-time job, and not
something most smartphone owners could easily manage. To
start, you’d need to comb through every privacy policy, manually
opt out of any relevant sharing options for each app you
download, use a virtual private network, or VPN, and maybe
move somewhere with stronger consumer privacy protections
like the European Union or even California.
In California, individuals have the right to ask companies not to
sell their personal information, including anything under a
pseudonymous identification like their device ID, if they know it.
They can opt out of letting data brokers sell their information, one
by one — an arduous task. In other locations, that process isn’t
available or is impossible.
There are some steps you can take to try to reduce your
exposure, says EFF’s Cyphers.
Page 9 of 10
Download fewer smartphone apps in general and delete
anything you don’t use. Lock down the kinds of data the
remaining apps are able to access, especially your location. Go
into your phone’s privacy settings and look up location sharing,
where you should find a list of apps with access to your location.
Both Android and iOS devices let you limit when an app can
access your location. Always limit location access to while you’re
using the app or make the app ask each time, and never let an
app continuously track your location in the background without
an exceptionally good reason. Reset your advertising ID in your
smartphone’s settings.
If you’re worried about someone knowing your browsing history,
use a VPN, but be careful about which ones. (Cyphers says a
VPN won’t protect your location information as well.)
Ultimately, it’s an overwhelming amount of work to ask of regular
people. It’s a problem that may require more serious
intervention, such as privacy regulation or even stricter rules for
apps from the smartphone makers themselves.
Page 10 of 10
“Time and time again, whenever the burden is on users to opt
out of something, the vast amount of users are not going to opt
out of that thing,” said Cyphers.

More Related Content

What's hot

GRBN Trust and Personal Data Survey - Market Research Industry Special Report
GRBN Trust and Personal Data Survey - Market Research Industry Special ReportGRBN Trust and Personal Data Survey - Market Research Industry Special Report
GRBN Trust and Personal Data Survey - Market Research Industry Special Report
Andrew Cannon
 
US mining data from 9 leading internet firms and companies deny knowledge
US mining data from 9 leading internet firms and companies deny knowledgeUS mining data from 9 leading internet firms and companies deny knowledge
US mining data from 9 leading internet firms and companies deny knowledge
trupassion
 
Obama administration reverses on HealthCare.gov privacy policy after concerns
Obama administration reverses on HealthCare.gov privacy policy after concernsObama administration reverses on HealthCare.gov privacy policy after concerns
Obama administration reverses on HealthCare.gov privacy policy after concerns
wretchedphantom97
 
Obama administration reverses on HealthCare.gov privacy policy after concerns
Obama administration reverses on HealthCare.gov privacy policy after concernsObama administration reverses on HealthCare.gov privacy policy after concerns
Obama administration reverses on HealthCare.gov privacy policy after concerns
joblessbeach6696
 
CCPA: What You Need to Know
CCPA: What You Need to KnowCCPA: What You Need to Know
CCPA: What You Need to Know
IronCore Labs
 
Sbs facebook data privacy dilemma case study
Sbs   facebook data privacy dilemma case studySbs   facebook data privacy dilemma case study
Sbs facebook data privacy dilemma case study
smumbahelp
 
Pli government investigations 2020
Pli   government investigations 2020Pli   government investigations 2020
Pli government investigations 2020
rhedges
 
Open Source Insight: Drupageddon, Heartbleed Problems & Open Source 360 Surve...
Open Source Insight: Drupageddon, Heartbleed Problems & Open Source 360 Surve...Open Source Insight: Drupageddon, Heartbleed Problems & Open Source 360 Surve...
Open Source Insight: Drupageddon, Heartbleed Problems & Open Source 360 Surve...
Black Duck by Synopsys
 
Bericht icomp vol4
Bericht icomp vol4Bericht icomp vol4
Bericht icomp vol4
Greg Sterling
 
Exposing the Hidden Web
Exposing the Hidden WebExposing the Hidden Web
Exposing the Hidden Web
Luis Taveras EMBA, MS
 
Using Social Media Ethically
Using Social Media EthicallyUsing Social Media Ethically
Using Social Media Ethically
Jack Pringle
 
Privacy & Transparency in Digital Life
Privacy & Transparency in Digital LifePrivacy & Transparency in Digital Life
Privacy & Transparency in Digital Life
Susan Price
 
Fearsquare (1)
Fearsquare (1)Fearsquare (1)
Fearsquare (1)
ePSI Platform
 
Fraudsters Hackers & Thieves!
Fraudsters Hackers & Thieves!Fraudsters Hackers & Thieves!
Fraudsters Hackers & Thieves!
Echoworx
 
Report on data breach and privacy in nepal during covid19 by shreedeep rayamajhi
Report on data breach and privacy in nepal during covid19 by shreedeep rayamajhiReport on data breach and privacy in nepal during covid19 by shreedeep rayamajhi
Report on data breach and privacy in nepal during covid19 by shreedeep rayamajhi
Shreedeep Rayamajhi
 
Critical Update Needed: Cybersecurity Expertise in the Boardroom
Critical Update Needed: Cybersecurity Expertise in the BoardroomCritical Update Needed: Cybersecurity Expertise in the Boardroom
Critical Update Needed: Cybersecurity Expertise in the Boardroom
Stanford GSB Corporate Governance Research Initiative
 
Weekly eDiscovery Top Story Digest - March 5, 2014
Weekly eDiscovery Top Story Digest - March 5, 2014Weekly eDiscovery Top Story Digest - March 5, 2014
Weekly eDiscovery Top Story Digest - March 5, 2014
Rob Robinson
 
Toolkit on factchecking by shreedeep rayamajhi
Toolkit on factchecking by shreedeep rayamajhiToolkit on factchecking by shreedeep rayamajhi
Toolkit on factchecking by shreedeep rayamajhi
Shreedeep Rayamajhi
 
Right Forgotten_v
Right Forgotten_vRight Forgotten_v
Right Forgotten_v
Mei Wang
 
Privacy: Protecting Personal Information
Privacy: Protecting Personal InformationPrivacy: Protecting Personal Information
Privacy: Protecting Personal Information
Jonathan Bacon
 

What's hot (20)

GRBN Trust and Personal Data Survey - Market Research Industry Special Report
GRBN Trust and Personal Data Survey - Market Research Industry Special ReportGRBN Trust and Personal Data Survey - Market Research Industry Special Report
GRBN Trust and Personal Data Survey - Market Research Industry Special Report
 
US mining data from 9 leading internet firms and companies deny knowledge
US mining data from 9 leading internet firms and companies deny knowledgeUS mining data from 9 leading internet firms and companies deny knowledge
US mining data from 9 leading internet firms and companies deny knowledge
 
Obama administration reverses on HealthCare.gov privacy policy after concerns
Obama administration reverses on HealthCare.gov privacy policy after concernsObama administration reverses on HealthCare.gov privacy policy after concerns
Obama administration reverses on HealthCare.gov privacy policy after concerns
 
Obama administration reverses on HealthCare.gov privacy policy after concerns
Obama administration reverses on HealthCare.gov privacy policy after concernsObama administration reverses on HealthCare.gov privacy policy after concerns
Obama administration reverses on HealthCare.gov privacy policy after concerns
 
CCPA: What You Need to Know
CCPA: What You Need to KnowCCPA: What You Need to Know
CCPA: What You Need to Know
 
Sbs facebook data privacy dilemma case study
Sbs   facebook data privacy dilemma case studySbs   facebook data privacy dilemma case study
Sbs facebook data privacy dilemma case study
 
Pli government investigations 2020
Pli   government investigations 2020Pli   government investigations 2020
Pli government investigations 2020
 
Open Source Insight: Drupageddon, Heartbleed Problems & Open Source 360 Surve...
Open Source Insight: Drupageddon, Heartbleed Problems & Open Source 360 Surve...Open Source Insight: Drupageddon, Heartbleed Problems & Open Source 360 Surve...
Open Source Insight: Drupageddon, Heartbleed Problems & Open Source 360 Surve...
 
Bericht icomp vol4
Bericht icomp vol4Bericht icomp vol4
Bericht icomp vol4
 
Exposing the Hidden Web
Exposing the Hidden WebExposing the Hidden Web
Exposing the Hidden Web
 
Using Social Media Ethically
Using Social Media EthicallyUsing Social Media Ethically
Using Social Media Ethically
 
Privacy & Transparency in Digital Life
Privacy & Transparency in Digital LifePrivacy & Transparency in Digital Life
Privacy & Transparency in Digital Life
 
Fearsquare (1)
Fearsquare (1)Fearsquare (1)
Fearsquare (1)
 
Fraudsters Hackers & Thieves!
Fraudsters Hackers & Thieves!Fraudsters Hackers & Thieves!
Fraudsters Hackers & Thieves!
 
Report on data breach and privacy in nepal during covid19 by shreedeep rayamajhi
Report on data breach and privacy in nepal during covid19 by shreedeep rayamajhiReport on data breach and privacy in nepal during covid19 by shreedeep rayamajhi
Report on data breach and privacy in nepal during covid19 by shreedeep rayamajhi
 
Critical Update Needed: Cybersecurity Expertise in the Boardroom
Critical Update Needed: Cybersecurity Expertise in the BoardroomCritical Update Needed: Cybersecurity Expertise in the Boardroom
Critical Update Needed: Cybersecurity Expertise in the Boardroom
 
Weekly eDiscovery Top Story Digest - March 5, 2014
Weekly eDiscovery Top Story Digest - March 5, 2014Weekly eDiscovery Top Story Digest - March 5, 2014
Weekly eDiscovery Top Story Digest - March 5, 2014
 
Toolkit on factchecking by shreedeep rayamajhi
Toolkit on factchecking by shreedeep rayamajhiToolkit on factchecking by shreedeep rayamajhi
Toolkit on factchecking by shreedeep rayamajhi
 
Right Forgotten_v
Right Forgotten_vRight Forgotten_v
Right Forgotten_v
 
Privacy: Protecting Personal Information
Privacy: Protecting Personal InformationPrivacy: Protecting Personal Information
Privacy: Protecting Personal Information
 

Similar to A priest’s phone location data outed his private life. It could happen to anyone.

Data Mining: Privacy and Concerns
Data Mining: Privacy and ConcernsData Mining: Privacy and Concerns
Data Mining: Privacy and Concerns
Bradley Buchanan
 
Consumers' and Citizens' Privacy
Consumers' and Citizens' Privacy  Consumers' and Citizens' Privacy
Consumers' and Citizens' Privacy
Carolina Rossini
 
How to protect privacy sensitive data that is collected to control the corona...
How to protect privacy sensitive data that is collected to control the corona...How to protect privacy sensitive data that is collected to control the corona...
How to protect privacy sensitive data that is collected to control the corona...
Ulf Mattsson
 
Accessing Password Protected andor Encrypted Mobile DataAbstrac.docx
Accessing Password Protected andor Encrypted Mobile DataAbstrac.docxAccessing Password Protected andor Encrypted Mobile DataAbstrac.docx
Accessing Password Protected andor Encrypted Mobile DataAbstrac.docx
nettletondevon
 
iStart feature: Protect and serve how safe is your personal data?
iStart feature: Protect and serve how safe is your personal data?iStart feature: Protect and serve how safe is your personal data?
iStart feature: Protect and serve how safe is your personal data?
Hayden McCall
 
Where In The World Is Your Sensitive Data?
Where In The World Is Your Sensitive Data?Where In The World Is Your Sensitive Data?
Where In The World Is Your Sensitive Data?
Druva
 
Emerging Applications on Smart Phones: The Role of Privacy Concerns and its A...
Emerging Applications on Smart Phones: The Role of Privacy Concerns and its A...Emerging Applications on Smart Phones: The Role of Privacy Concerns and its A...
Emerging Applications on Smart Phones: The Role of Privacy Concerns and its A...
AIRCC Publishing Corporation
 
Privacy study Mobile and online Dating
Privacy study Mobile and online DatingPrivacy study Mobile and online Dating
Privacy study Mobile and online Dating
MobiDigger
 
Mobile Privacy and Security - Study by Mobidigger
Mobile Privacy and Security - Study by MobidiggerMobile Privacy and Security - Study by Mobidigger
Mobile Privacy and Security - Study by Mobidigger
Hubert Moik
 
AI for humans - the future of your digital self
AI for humans - the future of your digital selfAI for humans - the future of your digital self
AI for humans - the future of your digital self
Speck&Tech
 
Designing for Privacy in an Increasingly Public World
Designing for Privacy in an Increasingly Public WorldDesigning for Privacy in an Increasingly Public World
Designing for Privacy in an Increasingly Public World
Robert Stribley
 
httpsdigitalguardian.comblogsocial-engineering-attacks-common.docx
httpsdigitalguardian.comblogsocial-engineering-attacks-common.docxhttpsdigitalguardian.comblogsocial-engineering-attacks-common.docx
httpsdigitalguardian.comblogsocial-engineering-attacks-common.docx
adampcarr67227
 
9 Trends in Identity Verification (2023) by Regula
9 Trends in Identity Verification (2023) by Regula9 Trends in Identity Verification (2023) by Regula
9 Trends in Identity Verification (2023) by Regula
Regula
 
10 Criminology in the FutureCriminology in the FutureKristop.docx
10 Criminology in the FutureCriminology in the FutureKristop.docx10 Criminology in the FutureCriminology in the FutureKristop.docx
10 Criminology in the FutureCriminology in the FutureKristop.docx
hyacinthshackley2629
 
Carpe Datum! Who knows who you are?
Carpe Datum! Who knows who you are?Carpe Datum! Who knows who you are?
Carpe Datum! Who knows who you are?
Kuliza Technologies
 
Noggin - World's first marketplace for Personal Data
Noggin - World's first marketplace for Personal DataNoggin - World's first marketplace for Personal Data
Noggin - World's first marketplace for Personal Data
Noggin Asia
 
Social Network Crime on Rise
Social Network Crime on RiseSocial Network Crime on Rise
Social Network Crime on Rise
Dominic Karunesudas
 
Getting the social side of pervasive computing right
Getting the social side of pervasive computing rightGetting the social side of pervasive computing right
Getting the social side of pervasive computing right
blogzilla
 
privtechsomeassemb
privtechsomeassembprivtechsomeassemb
privtechsomeassemb
Jonathan Alley
 
Privacy
PrivacyPrivacy

Similar to A priest’s phone location data outed his private life. It could happen to anyone. (20)

Data Mining: Privacy and Concerns
Data Mining: Privacy and ConcernsData Mining: Privacy and Concerns
Data Mining: Privacy and Concerns
 
Consumers' and Citizens' Privacy
Consumers' and Citizens' Privacy  Consumers' and Citizens' Privacy
Consumers' and Citizens' Privacy
 
How to protect privacy sensitive data that is collected to control the corona...
How to protect privacy sensitive data that is collected to control the corona...How to protect privacy sensitive data that is collected to control the corona...
How to protect privacy sensitive data that is collected to control the corona...
 
Accessing Password Protected andor Encrypted Mobile DataAbstrac.docx
Accessing Password Protected andor Encrypted Mobile DataAbstrac.docxAccessing Password Protected andor Encrypted Mobile DataAbstrac.docx
Accessing Password Protected andor Encrypted Mobile DataAbstrac.docx
 
iStart feature: Protect and serve how safe is your personal data?
iStart feature: Protect and serve how safe is your personal data?iStart feature: Protect and serve how safe is your personal data?
iStart feature: Protect and serve how safe is your personal data?
 
Where In The World Is Your Sensitive Data?
Where In The World Is Your Sensitive Data?Where In The World Is Your Sensitive Data?
Where In The World Is Your Sensitive Data?
 
Emerging Applications on Smart Phones: The Role of Privacy Concerns and its A...
Emerging Applications on Smart Phones: The Role of Privacy Concerns and its A...Emerging Applications on Smart Phones: The Role of Privacy Concerns and its A...
Emerging Applications on Smart Phones: The Role of Privacy Concerns and its A...
 
Privacy study Mobile and online Dating
Privacy study Mobile and online DatingPrivacy study Mobile and online Dating
Privacy study Mobile and online Dating
 
Mobile Privacy and Security - Study by Mobidigger
Mobile Privacy and Security - Study by MobidiggerMobile Privacy and Security - Study by Mobidigger
Mobile Privacy and Security - Study by Mobidigger
 
AI for humans - the future of your digital self
AI for humans - the future of your digital selfAI for humans - the future of your digital self
AI for humans - the future of your digital self
 
Designing for Privacy in an Increasingly Public World
Designing for Privacy in an Increasingly Public WorldDesigning for Privacy in an Increasingly Public World
Designing for Privacy in an Increasingly Public World
 
httpsdigitalguardian.comblogsocial-engineering-attacks-common.docx
httpsdigitalguardian.comblogsocial-engineering-attacks-common.docxhttpsdigitalguardian.comblogsocial-engineering-attacks-common.docx
httpsdigitalguardian.comblogsocial-engineering-attacks-common.docx
 
9 Trends in Identity Verification (2023) by Regula
9 Trends in Identity Verification (2023) by Regula9 Trends in Identity Verification (2023) by Regula
9 Trends in Identity Verification (2023) by Regula
 
10 Criminology in the FutureCriminology in the FutureKristop.docx
10 Criminology in the FutureCriminology in the FutureKristop.docx10 Criminology in the FutureCriminology in the FutureKristop.docx
10 Criminology in the FutureCriminology in the FutureKristop.docx
 
Carpe Datum! Who knows who you are?
Carpe Datum! Who knows who you are?Carpe Datum! Who knows who you are?
Carpe Datum! Who knows who you are?
 
Noggin - World's first marketplace for Personal Data
Noggin - World's first marketplace for Personal DataNoggin - World's first marketplace for Personal Data
Noggin - World's first marketplace for Personal Data
 
Social Network Crime on Rise
Social Network Crime on RiseSocial Network Crime on Rise
Social Network Crime on Rise
 
Getting the social side of pervasive computing right
Getting the social side of pervasive computing rightGetting the social side of pervasive computing right
Getting the social side of pervasive computing right
 
privtechsomeassemb
privtechsomeassembprivtechsomeassemb
privtechsomeassemb
 
Privacy
PrivacyPrivacy
Privacy
 

More from LUMINATIVE MEDIA/PROJECT COUNSEL MEDIA GROUP

Howard Fineman, Veteran Political Journalist and TV Pundit, Dies at 75
Howard Fineman, Veteran Political Journalist and TV Pundit, Dies at 75Howard Fineman, Veteran Political Journalist and TV Pundit, Dies at 75
Howard Fineman, Veteran Political Journalist and TV Pundit, Dies at 75
LUMINATIVE MEDIA/PROJECT COUNSEL MEDIA GROUP
 
What Ukraine Has Lost During Russia’s Invasion
What Ukraine Has Lost During Russia’s InvasionWhat Ukraine Has Lost During Russia’s Invasion
What Ukraine Has Lost During Russia’s Invasion
LUMINATIVE MEDIA/PROJECT COUNSEL MEDIA GROUP
 
A.I. Has a Measurement Problem: Can It Be Solved?
A.I. Has a Measurement Problem: Can It Be Solved?A.I. Has a Measurement Problem: Can It Be Solved?
A.I. Has a Measurement Problem: Can It Be Solved?
LUMINATIVE MEDIA/PROJECT COUNSEL MEDIA GROUP
 
Let’s Say Someone Did Drop the Bomb. Then What?
Let’s Say Someone Did Drop the Bomb. Then What?Let’s Say Someone Did Drop the Bomb. Then What?
Let’s Say Someone Did Drop the Bomb. Then What?
LUMINATIVE MEDIA/PROJECT COUNSEL MEDIA GROUP
 
How Tech Giants Cut Corners to Harvest Data for A.I.
How Tech Giants Cut Corners to Harvest Data for A.I.How Tech Giants Cut Corners to Harvest Data for A.I.
How Tech Giants Cut Corners to Harvest Data for A.I.
LUMINATIVE MEDIA/PROJECT COUNSEL MEDIA GROUP
 
Why democracy dies in Trumpian boredom (by Edward Luce)
Why democracy dies in Trumpian boredom (by Edward Luce)Why democracy dies in Trumpian boredom (by Edward Luce)
Why democracy dies in Trumpian boredom (by Edward Luce)
LUMINATIVE MEDIA/PROJECT COUNSEL MEDIA GROUP
 
An interview with the director of "Zone of Interest"
An interview with the director of "Zone of Interest"An interview with the director of "Zone of Interest"
An interview with the director of "Zone of Interest"
LUMINATIVE MEDIA/PROJECT COUNSEL MEDIA GROUP
 
"Schindler’s List" : an oral history with the actors
"Schindler’s List" : an oral history with the actors"Schindler’s List" : an oral history with the actors
"Schindler’s List" : an oral history with the actors
LUMINATIVE MEDIA/PROJECT COUNSEL MEDIA GROUP
 
Chinese Startup 01.AI Is Winning the Open Source AI Race
Chinese Startup 01.AI Is Winning the Open Source AI RaceChinese Startup 01.AI Is Winning the Open Source AI Race
Chinese Startup 01.AI Is Winning the Open Source AI Race
LUMINATIVE MEDIA/PROJECT COUNSEL MEDIA GROUP
 
The mismeasuring of AI: How it all began
The mismeasuring of AI: How it all beganThe mismeasuring of AI: How it all began
The mismeasuring of AI: How it all began
LUMINATIVE MEDIA/PROJECT COUNSEL MEDIA GROUP
 
Google’s Gemini Marketing Trick: what a trickster!
Google’s Gemini Marketing Trick: what a trickster!Google’s Gemini Marketing Trick: what a trickster!
Google’s Gemini Marketing Trick: what a trickster!
LUMINATIVE MEDIA/PROJECT COUNSEL MEDIA GROUP
 
Inside the Magical World of AI Prompters on Reddit
Inside the Magical World of AI Prompters on RedditInside the Magical World of AI Prompters on Reddit
Inside the Magical World of AI Prompters on Reddit
LUMINATIVE MEDIA/PROJECT COUNSEL MEDIA GROUP
 
Regulators blame Bezos for making Amazon worse in new lawsuit details
Regulators blame Bezos for making Amazon worse in new lawsuit detailsRegulators blame Bezos for making Amazon worse in new lawsuit details
Regulators blame Bezos for making Amazon worse in new lawsuit details
LUMINATIVE MEDIA/PROJECT COUNSEL MEDIA GROUP
 
Bariatric Surgery at 16
Bariatric Surgery at 16Bariatric Surgery at 16
Palestinians Claim Social Media 'Censorship' Is Endangering Lives
Palestinians Claim Social Media 'Censorship' Is Endangering LivesPalestinians Claim Social Media 'Censorship' Is Endangering Lives
Palestinians Claim Social Media 'Censorship' Is Endangering Lives
LUMINATIVE MEDIA/PROJECT COUNSEL MEDIA GROUP
 
Who’s Responsible for the Gaza Hospital Explosion? Here’s Why It’s Hard to Know
Who’s Responsible for the Gaza Hospital Explosion? Here’s Why It’s Hard to KnowWho’s Responsible for the Gaza Hospital Explosion? Here’s Why It’s Hard to Know
Who’s Responsible for the Gaza Hospital Explosion? Here’s Why It’s Hard to Know
LUMINATIVE MEDIA/PROJECT COUNSEL MEDIA GROUP
 
Why ChatGPT Is Getting Dumber at Basic Math
Why ChatGPT Is Getting Dumber at Basic MathWhy ChatGPT Is Getting Dumber at Basic Math
Why ChatGPT Is Getting Dumber at Basic Math
LUMINATIVE MEDIA/PROJECT COUNSEL MEDIA GROUP
 
U.S. and E.U. Finalize Long-Awaited Deal on Sharing Data
U.S. and E.U. Finalize Long-Awaited Deal on Sharing DataU.S. and E.U. Finalize Long-Awaited Deal on Sharing Data
U.S. and E.U. Finalize Long-Awaited Deal on Sharing Data
LUMINATIVE MEDIA/PROJECT COUNSEL MEDIA GROUP
 
Will A.I. Become the New McKinsey?
Will A.I. Become the New McKinsey?Will A.I. Become the New McKinsey?
Will A.I. Become the New McKinsey?
LUMINATIVE MEDIA/PROJECT COUNSEL MEDIA GROUP
 
AI is already writing books, websites and online recipes
AI is already writing books, websites and online recipesAI is already writing books, websites and online recipes
AI is already writing books, websites and online recipes
LUMINATIVE MEDIA/PROJECT COUNSEL MEDIA GROUP
 

More from LUMINATIVE MEDIA/PROJECT COUNSEL MEDIA GROUP (20)

Howard Fineman, Veteran Political Journalist and TV Pundit, Dies at 75
Howard Fineman, Veteran Political Journalist and TV Pundit, Dies at 75Howard Fineman, Veteran Political Journalist and TV Pundit, Dies at 75
Howard Fineman, Veteran Political Journalist and TV Pundit, Dies at 75
 
What Ukraine Has Lost During Russia’s Invasion
What Ukraine Has Lost During Russia’s InvasionWhat Ukraine Has Lost During Russia’s Invasion
What Ukraine Has Lost During Russia’s Invasion
 
A.I. Has a Measurement Problem: Can It Be Solved?
A.I. Has a Measurement Problem: Can It Be Solved?A.I. Has a Measurement Problem: Can It Be Solved?
A.I. Has a Measurement Problem: Can It Be Solved?
 
Let’s Say Someone Did Drop the Bomb. Then What?
Let’s Say Someone Did Drop the Bomb. Then What?Let’s Say Someone Did Drop the Bomb. Then What?
Let’s Say Someone Did Drop the Bomb. Then What?
 
How Tech Giants Cut Corners to Harvest Data for A.I.
How Tech Giants Cut Corners to Harvest Data for A.I.How Tech Giants Cut Corners to Harvest Data for A.I.
How Tech Giants Cut Corners to Harvest Data for A.I.
 
Why democracy dies in Trumpian boredom (by Edward Luce)
Why democracy dies in Trumpian boredom (by Edward Luce)Why democracy dies in Trumpian boredom (by Edward Luce)
Why democracy dies in Trumpian boredom (by Edward Luce)
 
An interview with the director of "Zone of Interest"
An interview with the director of "Zone of Interest"An interview with the director of "Zone of Interest"
An interview with the director of "Zone of Interest"
 
"Schindler’s List" : an oral history with the actors
"Schindler’s List" : an oral history with the actors"Schindler’s List" : an oral history with the actors
"Schindler’s List" : an oral history with the actors
 
Chinese Startup 01.AI Is Winning the Open Source AI Race
Chinese Startup 01.AI Is Winning the Open Source AI RaceChinese Startup 01.AI Is Winning the Open Source AI Race
Chinese Startup 01.AI Is Winning the Open Source AI Race
 
The mismeasuring of AI: How it all began
The mismeasuring of AI: How it all beganThe mismeasuring of AI: How it all began
The mismeasuring of AI: How it all began
 
Google’s Gemini Marketing Trick: what a trickster!
Google’s Gemini Marketing Trick: what a trickster!Google’s Gemini Marketing Trick: what a trickster!
Google’s Gemini Marketing Trick: what a trickster!
 
Inside the Magical World of AI Prompters on Reddit
Inside the Magical World of AI Prompters on RedditInside the Magical World of AI Prompters on Reddit
Inside the Magical World of AI Prompters on Reddit
 
Regulators blame Bezos for making Amazon worse in new lawsuit details
Regulators blame Bezos for making Amazon worse in new lawsuit detailsRegulators blame Bezos for making Amazon worse in new lawsuit details
Regulators blame Bezos for making Amazon worse in new lawsuit details
 
Bariatric Surgery at 16
Bariatric Surgery at 16Bariatric Surgery at 16
Bariatric Surgery at 16
 
Palestinians Claim Social Media 'Censorship' Is Endangering Lives
Palestinians Claim Social Media 'Censorship' Is Endangering LivesPalestinians Claim Social Media 'Censorship' Is Endangering Lives
Palestinians Claim Social Media 'Censorship' Is Endangering Lives
 
Who’s Responsible for the Gaza Hospital Explosion? Here’s Why It’s Hard to Know
Who’s Responsible for the Gaza Hospital Explosion? Here’s Why It’s Hard to KnowWho’s Responsible for the Gaza Hospital Explosion? Here’s Why It’s Hard to Know
Who’s Responsible for the Gaza Hospital Explosion? Here’s Why It’s Hard to Know
 
Why ChatGPT Is Getting Dumber at Basic Math
Why ChatGPT Is Getting Dumber at Basic MathWhy ChatGPT Is Getting Dumber at Basic Math
Why ChatGPT Is Getting Dumber at Basic Math
 
U.S. and E.U. Finalize Long-Awaited Deal on Sharing Data
U.S. and E.U. Finalize Long-Awaited Deal on Sharing DataU.S. and E.U. Finalize Long-Awaited Deal on Sharing Data
U.S. and E.U. Finalize Long-Awaited Deal on Sharing Data
 
Will A.I. Become the New McKinsey?
Will A.I. Become the New McKinsey?Will A.I. Become the New McKinsey?
Will A.I. Become the New McKinsey?
 
AI is already writing books, websites and online recipes
AI is already writing books, websites and online recipesAI is already writing books, websites and online recipes
AI is already writing books, websites and online recipes
 

Recently uploaded

RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
KAMESHS29
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
sonjaschweigert1
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
shyamraj55
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
SOFTTECHHUB
 
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIEnchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Vladimir Iglovikov, Ph.D.
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
Zilliz
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc
 
20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website
Pixlogix Infotech
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
Kumud Singh
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
DianaGray10
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
Neo4j
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
名前 です男
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
James Anderson
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 

Recently uploaded (20)

RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
 
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIEnchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
 
20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 

A priest’s phone location data outed his private life. It could happen to anyone.

  • 1. Page 1 of 10 A priest’s phone location data outed his private life. It could happen to anyone. How an unregulated market for personal data is legal, and what it means for your privacy The Washington Post July 22, 2021
  • 2. Page 2 of 10 What stands out about this particular incident isn’t that it’s improbable but that it’s the exact worst-case scenario privacy experts have been warning about for a long time. Personal data is collected, sold and bought by a tangle of app developers, data brokers and advertising companies with little oversight. The biggest shock may be that it didn’t happen sooner. “This is the first instance that I know of, of this data being used by a journalistic entity to track a specific person and weaponize their private, secretly collected information against them,” said Bennett Cyphers, a staff technologist at the Electronic Frontier Foundation, a digital rights organization. “This is exactly the kind of privacy threat advocates have been describing for years.” There is still much to be learned about how the priest’s private data could have made the journey from his smartphone into the hands of a Catholic newsletter’s writer. The newsletter, the Pillar, didn’t name the source of the data or clarify how it obtained the revealing location information, which it says spanned three years. But the story implies it started with data that Grindr
  • 3. Page 3 of 10 allegedly shared with advertising partners and data brokers in the past that was then legally sold by a data broker. In a statement posted to Twitter defending the article and the anonymity it granted the data provider, method and funder, the Pillar’s editor in chief, JD Flynn, said it weighed the balance between an individual’s privacy and public interest, and was “confident in our deliberation.” He added that “technology accountability has been an issue of importance among church leaders for quite some time.” How anyone’s information could end up for sale Right now, your smartphone is likely filled with apps that are collecting details about you, including your age, gender, political leanings, GPS data or browsing habits. Grindr and other apps have long shared this kind of information with third-party data brokers, which exist in a largely unregulated sweet spot between websites, apps and advertisers. The brokers gather the data from apps, then sell it on the open market to
  • 4. Page 4 of 10 parties that use it for ad targeting, political profiling or even research. It’s a well-established industry but one that doesn’t typically draw this level of attention. “Often the location data is used to determine what stores people visit. Things like sexual orientation are used to determine what demographics to target,” said Ashkan Soltani, an independent researcher and a former chief technologist at the Federal Trade Commission. “People don’t actually know or care that much that they’re being targeted. Or it’s used by nation state actors to surveil people, but that’s not publicly talked about.” It’s all above board, app companies have claimed, because the arrangement is spelled out in their privacy policies and there are precautions built in. Experts say those precautions aren’t enough. The data is typically stripped of the most obvious identifying information like a name, email or cell number. However, it still contains information that could reveal the person behind it, such as a device ID, an IP address or an advertising identifier. With the
  • 5. Page 5 of 10 right outside information or a third-party service, so-called anonymous data can be de-anonymized, as the Pillar claims it did in the case of Burrill. In this case, the Pillar says it “correlated a unique mobile device to Burrill” using his presence at his family lake house, meetings he attended and the USCCB staff residence and headquarters. It did not say how it collected that information.The Pillar says the data set it used was “commercially available app signal data” from a data vendor that included Grindr information, but it did not name the vendor or clarify if it bought the data directly from a broker or received it from another party. In a 2013 paper, researchers found that as little as four pieces of data on average were enough to re-identify someone 95 percent of the time. Latanya Sweeney, a data privacy expert and professor at Harvard Kennedy School, showed how just a Zip code, age and gender could be used to identify patients in anonymous hospital data sets. Even something as simple as a
  • 6. Page 6 of 10 person’s work and home address could be enough to find a pattern strong enough to identify anonymous location data. A 2020 study by the Norwegian Consumer Council found that Grindr and other apps were sharing personal data about their users with outside companies, including numerous data brokers. In Grindr’s case, it also shared detailed location data, according to the Norwegian researchers. In January this year, the Norwegian Data Protection Authority said it would fine Grindr $11.7 million for sharing data without users’ consent. In its response, Grindr confirmed that it shared data, including a hashed device ID, age, gender and location information with advertisers, but claimed that it was done with consent from users and that the app had since updated its sharing policies. “Historical data collection remains a problem,” said Tor Erling Bjorstad, a security researcher at Mnemonic who was in charge of the Norwegian Consumer Council research report. “GPS
  • 7. Page 7 of 10 position data collected in 2019 and earlier is still out there, and can still have explosive power.” Grindr said in a statement in response to the Pillar newsletter post on Tuesday that the alleged activities are “incredibly unlikely to occur.” However, on Wednesday, it shared an updated statement saying that “we do not believe Grindr is the source of the data” and that the company had policies and systems in place to protect personal data. It did not specify what they were. How you can protect yourself What is stopping similar instances from happening to other people? Very little, according to privacy experts. “Consumers don’t really have the tools to be able to protect themselves,” said Serge Egelman, research director of the Usable Security and Privacy Group at the International Computer Science Institute. “Once the data leaves the device, there’s no way of knowing what’s actually going to happen to it,
  • 8. Page 8 of 10 what other third parties will receive it. … There’s no knowledge of how the data will be used by anyone.” Trying to fully protect your data would be a full-time job, and not something most smartphone owners could easily manage. To start, you’d need to comb through every privacy policy, manually opt out of any relevant sharing options for each app you download, use a virtual private network, or VPN, and maybe move somewhere with stronger consumer privacy protections like the European Union or even California. In California, individuals have the right to ask companies not to sell their personal information, including anything under a pseudonymous identification like their device ID, if they know it. They can opt out of letting data brokers sell their information, one by one — an arduous task. In other locations, that process isn’t available or is impossible. There are some steps you can take to try to reduce your exposure, says EFF’s Cyphers.
  • 9. Page 9 of 10 Download fewer smartphone apps in general and delete anything you don’t use. Lock down the kinds of data the remaining apps are able to access, especially your location. Go into your phone’s privacy settings and look up location sharing, where you should find a list of apps with access to your location. Both Android and iOS devices let you limit when an app can access your location. Always limit location access to while you’re using the app or make the app ask each time, and never let an app continuously track your location in the background without an exceptionally good reason. Reset your advertising ID in your smartphone’s settings. If you’re worried about someone knowing your browsing history, use a VPN, but be careful about which ones. (Cyphers says a VPN won’t protect your location information as well.) Ultimately, it’s an overwhelming amount of work to ask of regular people. It’s a problem that may require more serious intervention, such as privacy regulation or even stricter rules for apps from the smartphone makers themselves.
  • 10. Page 10 of 10 “Time and time again, whenever the burden is on users to opt out of something, the vast amount of users are not going to opt out of that thing,” said Cyphers.