contador web Saltar al contenido

Species phones expose your data to companies; understand | Downloads

How many times have you read the privacy policies and terms of use of websites and applications? If your answer was not every time, be aware that your digital security may be at risk. With the advancement of technology and the massive presence of the Internet on a daily basis, some care is essential to preserve your privacy. Mobile phones can listen to "what you say and know how to protect yourself, which is indispensable for maintaining a healthy relationship with technology.

READ: Google knows everything you do on the Internet; erase

Gustavo Artese, Information Technology Law Specialist and partner at Viseu Advogados, confirms that connectivity can indeed be a privacy risk. Despite all the advantages that technology can bring, you don't necessarily need to post on social networks to expose yourself. Having many objects and gadgets connected to the internet inside your home already does it for you.

Read the privacy policies and terms of use of websites and applications essential for your digital security. Photo: Luciana Maline / TechTudoRead the privacy policies and terms of use of websites and applications essential for your digital security. Photo: Luciana Maline / TechTudo

Read the privacy policies and terms of use of websites and applications essential for your digital security. Photo: Luciana Maline / TechTudo

This scenario is linked to the concept of Internet of Things (IoT), which defines the connectivity between objects, people and the internet. Software that collects and transmits data, GPS, bluetooth, facial recognition, artificial intelligence: it all forms a network that enters our lives instinctively, but without proper care can become dangerous.

Artese explains, for example, how just being in an environment with multiple internet-connected devices already connects you with the world. "Speaking of data protection, there is the potential risk that anyone will have their privacy affected by IoT. After all, they are computers in the form of household equipment, equipped with sensors and collecting a range of data such as voice, biometrics and consumption data, he explains.

It's like living in a glass house where anyone outside can watch what you do. Although it sounds scary, it does not mean that you should exclude technology from your life. Just use it consciously. For example, when we talk about facial recognition.

With the popularization of funny photo filters on social networks, it is impossible to consider that some applications use this technology to collect information. If the person is unsure if a particular application can do this, we suggest reading the privacy policy and terms of use. If these are not clear on the topic, do not use the application to solution, advises the expert.

Filters and apps can use face recognition to collect data. Photo: Nicolly Vimercate / TechTudoFilters and apps can use face recognition to collect data. Photo: Nicolly Vimercate / TechTudo

Filters and apps can use face recognition to collect data. Photo: Nicolly Vimercate / TechTudo

Another polemic involving IoT is the theory that our cell phone is "listening" to everything we talk about. Like that time you talked to someone about a specific brand and soon after you started receiving online ads of the same brand. Technically this is possible and likely to be done, even for the purpose of enhancing electronic assistant based services. Companies are still learning to hear us, says Artese.

The lawyer considers that the purpose of such listening "should be to improve an already existing service and not to offer new ones. To be transparent about this is a duty of the companies, as well as to take security measures regarding this process. Data should be discarded as soon as they have accomplished their purpose. In the computer world, this takes a fraction of a second, he says.

Who should oversee compliance with the General Data Protection Act National Data Protection Authority. But for those who want to take their own security measures, Artese indicates that an alternative to prevention is to turn off location sharing, Wi-Fi, Bluetooth, subscriptions and mobile ads.

Avoiding dubious links a way to protect your digital privacy Photo: Luana Marfim / TechTudoAvoiding dubious links a way to protect your digital privacy Photo: Luana Marfim / TechTudo

Avoiding dubious links a way to protect your digital privacy Photo: Luana Marfim / TechTudo

Another way to protect yourself by avoiding links and apps forwarded by others, even if they are friends and acquaintances. Ideally, according to Artese, search the company's official website to confirm his safety measures. Sites with the lock icon, for example, are considered more secure.

The expert points out that reading the privacy policies and terms of use of websites and applications is also essential. As well as checking links to confirm their authenticity, as pirate sites often use fonts and icons that are virtually identical to the official ones. Another alternative is to better research the reputation of these platforms on Google and Claim Here.

In social networks, I also need to be careful, especially when sharing information. You should not post information, photos or data that can in any way easily identify the person. For example: addresses, telephone numbers, ID, passport, school registration, and specifically, financial and health information, advises Artese.

Think your WhatsApp has been cloned? See tips on what to do on the TechTudo forum.

Learn how to choose a good antivirus; Look:

How to choose a good antivirus

How to choose a good antivirus