Categories
Mobile Syrup

ChatGPT probably read your cringey blog posts

OpenAI’s ChatGPT is the current hype, especially thanks to Microsoft’s recently announced integration of an updated ChatGPT into Bing and Edge.

Despite the hype, there’s a ton of concern about ChatGPT and AI tools in general, such as the potential for misinformation or the impact on jobs. However, a less discussed impact of tools like ChatGPT is the impact on privacy.

An article published in The Conversation (and republished by Gizmodo) highlights several concerns with ChatGPT and its (mis)use of personal data. For starters, it highlights how OpenAI trained ChatGPT using some 300 billion words scraped from the internet. These words came from books, articles, websites, blog posts and more. The words also included personal information obtained without consent (though this is one of many problems with using the internet to train ChatGPT).

Put another way, anything you’ve written online — a blog post, product review, comment on an article, etc. — possibly got vacuumed up to train ChatGPT and other AI language tools.

While you may not think that’s a huge problem, The Conversation highlights a few issues with this kind of data collection. First, OpenAI didn’t ask anyone if it could use the data, which is particularly concerning when it comes to sensitive information or data that could identify someone.

The publication also notes that OpenAI doesn’t offer a way for people to check if their personal information is being stored or request that the information be deleted.

Beyond individuals who’ve posted on the internet, The Conversation notes that ChatGPT doesn’t consider copyright protections. As an example, the publication was able to make the tool generate the first few paragraphs of a copyrighted novel. (I was able to recreate this by getting ChatGPT to write a few paragraphs of The Hobbit, but a similar prompt to write a page from Dune didn’t work).

ChatGPT writing the first couple paragraphs of The Hobbit.

ChatGPT wrote the first two paragraphs of The Hobbit.

More to this, OpenAI didn’t pay for the data it scraped from the internet, which is particularly frustrating as the company moves to monetize ChatGPT.

The Conversation goes on to examine ChatGPT’s privacy policy, which says that OpenAI gathers user information like IP address, browser type and settings, data on interactions with the site and more. It also collects information about users’ browsing activities over time and across websites (something that’s more alarming given Microsoft is building OpenAI tools into its Edge browser).

Whatever happens with ChatGPT and other AI tools going forward, those planning to use the tools should keep the privacy implications front of mind.

Image credit: Shutterstock

Source: The Conversation Via: Gizmodo

Categories
Mobile Syrup

Canadian carriers app include trackers from Facebook, Google, more

Several Canadian carriers and their flanker brands include trackers from Google, Facebook and others in mobile apps offered to customers.

After recently switching to Telus, I downloaded the company’s mobile app to see if there were any features I wanted to use. Within a few hours of downloading the My Telus app, I noticed that DuckDuckGo’s App Tracking Protection had blocked almost 1,400 tracking attempts using known third-party trackers from Google, Facebook and Adobe.

App Tracking Protection, if you haven’t heard of it, is a feature offered in the DuckDuckGo mobile app for Android. The functionality has been around for almost a year (I first wrote about it early in 2022), but it recently entered public beta, meaning anyone with an Android phone can download the app and try it out. It uses a VPN to filter network traffic coming from your device and blocks known third-party trackers to prevent data from leaving your device. Even though it uses Android’s built-in VPN feature, DuckDuckGo says everything is handled on-device, and App Tracking Protection doesn’t route data through external servers. The search company even made the blocklist used for App Tracking Protection publicly available on GitHub.

Curious if Telus was an outlier, I downloaded the mobile apps offered by several Canadian carriers and wireless providers available in Ontario, including:

  • My Telus
  • MyRogers
  • Fido My Account
  • My Chatr
  • MyBell
  • Virgin Plus My Account
  • Lucky Mobile
  • Freedom My Account

It’s worth noting that Telus’ flanker brands Koodo and Public Mobile don’t offer mobile apps. Additionally, testing was performed on a Pixel 7 running Android 13 and the November 2022 security patch. The apps weren’t tested on iPhone since the iOS version of the DuckDuckGo app doesn’t support App Tracking Protection (iOS does offer built-in App Tracking Transparency, which I’ll touch on further down).

Trackers collect a variety of data

The trackers blocked by DuckDuckGo’s App Tracking Protection can collect a wide array of data. App Tracking Protection lists information that each tracker is known to collect, such as information about the device being used, such as screen resolution, network/carrier, OS version, charging status, device language, headphone status, system volume, rotation data, and more. The trackers also try to collect some personal data, including location, gender, postal code, and email. Trackers also collect unique identifiers, advertising IDs, GPS coordinates, available memory and storage, and much, much more.

The screenshots below show the trackers detected in Canadian carrier apps and what those trackers are known to collect:

Allison Goodman, a senior communications manager for DuckDuckGo, told MobileSyrup in an interview that apps may include these trackers for things like analytics and marketing, noting that over 96 percent of popular free Android apps tested by DuckDuckGo contain hidden third-party trackers. 87 percent sent data to Google, and 68 percent sent data to Facebook. DuckDuckGo also cited an AppCensus report with similar results.

“Personal data companies like Facebook and Google use that information to build a profile that advertisers and content-targeting companies use to influence what you see online,” Goodman wrote.

“The problems with all this information collection go way beyond so-called ‘relevant’ (aka creepy) advertising and targeting. Tracking networks can sell your data to other companies like data brokers, advertisers, and governments, resulting in more substantial harms like ideological manipulation, discrimination, personal price manipulation, polarization, and more.”

Trackers in carrier apps

App Tracking Protection blocked Google, Facebook, and Adobe trackers in the My TELUS app.

App Tracking Protection blocked Google, Facebook, and Adobe trackers in the My TELUS app.

The My Telus app racked up tracking attempts faster than apps from other providers and was also one of only two that included trackers from Facebook. The other was Freedom Mobile’s My Account app. My Telus also included Google and Adobe trackers.

Telus did not provide comment in time for publication.

App Tracking Protection blocked Google, Facebook, and Adobe trackers in the Freedom app.

App Tracking Protection blocked Google, Facebook, and Adobe trackers in the Freedom app

Along with the Facebook trackers, App Tracking Protection blocked Google and Adobe trackers from Freedom Mobile’s app.

Freedom did not provide comment in time for publication.

App Tracking Protection blocked Google and Adobe trackers in Rogers' and Fido's apps.

App Tracking Protection blocked Google and Adobe trackers in Rogers’ and Fido’s apps

Rogers, as well as flanker brand Fido, had both Google and Adobe trackers. Interestingly, App Tracking Protection blocked no trackers from the Chatr app.

A Rogers spokesperson told MobileSyrup that information collected by the MyRogers and Fido My Account apps is used for internal analytics and diagnostics to determine app functionality and operating system support. Moreover, the spokesperson said that the apps don’t disclose customer information with third parties for cross-tracking across apps and websites. Instead, all data is collected and used solely by Rogers and Fido. The Rogers spokesperson said that only customers can choose whether to enable location services and that doing so allows customers to receive more relevant information, like regional service offerings or details about regional network issues.

The spokesperson also emphasized that Rogers’ apps comply with all Canadian privacy laws, including PIPEDA, and both the Google and Apple developer policies.

Bell app tracking attempts blocked by App Tracking Protection

Bell app tracking attempts blocked by App Tracking Protection

Finally, the Bell, Virgin Plus, and Lucky Mobile apps all had trackers blocked by App Tracking Protection. For the most part, Bell and related apps used a third-party tracker from Branch Metrics. According to the Branch Metrics website, it “provides the leading mobile linking platform, with solutions that unify user experience and measurement across different devices, platforms, and channels,” which sounds a lot like analytics. Still, the App Tracking Protection detailed that Branch Metrics is known to collect data like location, email address, postal code, device details, local IP address, and more.

In a statement to MobileSyrup, Bell said:

“The MyBell, Virgin Plus MyAccount and Lucky Mobile apps are used by customers to manage their account and billing, check their usage as well as technical support. In order to provide these services to customers, we need certain information such as device platform, the version of the operating system, and IP address. We also know which province that the customer is located in, because our pricing and services are based by region. However, we do not collect location below the provincial level, nor do we request or use background location. Maintaining the privacy and security of our customers’ personal information is a priority for us, and we do not share this information with other parties.”

What about iPhone users?

As I mentioned above, DuckDuckGo’s iPhone app doesn’t offer App Tracking Protection, but iOS has a built-in App Tracking Transparency feature. However, it differs from App Tracking Protection by operating primarily on an agreement with app developers — if a user chooses to opt out of tracking for an app, then that app can’t use that user’s Identifier for Advertisers (IDFA). However, research revealed many apps build digital fingerprints on users by collecting other data, meaning App Tracking Transparency doesn’t actually do much to stop tracking (Moreover, Apple’s own apps don’t follow the setting).

MobileSyrup asked each carrier whether their apps respected the App Tracking Transparency feature included in iOS. Those that provided comment to MobileSyrup for this story did not directly answer the question, and only Rogers brought up Apple developer policies.

Ultimately, you may want to remove any carrier apps installed on your smartphone, especially if you have concerns about the tracking. Most carrier apps offer the same functionality as what’s available through carrier websites, so there isn’t really a need to install the apps anyway. Moreover, if your Android device comes with one of these apps pre-installed and you can’t remove it, head to Settings > Apps > See all apps > Select the carrier app > Tap ‘Disable.’ This is about as close to uninstalling a pre-installed app as you can get.

Alternatively, download DuckDuckGo’s app and enable App Tracking Protection. Honestly, you might want to do this anyway — it will block trackers from more than just carrier apps. The DuckDuckGo app is available for free on the Play Store.

Categories
Mobile Syrup

New tool could help detect which in-app browsers try to track you

Earlier this month, security researcher and former Google employee Felix Krause published a report detailing how Instagram, Facebook, and other apps can use the in-app browser to track people’s online behaviour. Now Krause is back with a tool that can help show users the extent of this tracking.

Here’s a quick explainer in case you missed Krause’s original report. Many apps feature a built-in web browser that opens links users click in the app. Krause highlights apps from Meta, like Facebook and Instagram, in the report, but many other apps do this too. (Tiktok is one of the more egregious – Krause claims TikTok can monitor all keyboard inputs and taps in its custom browser, but the company told Forbes it only uses the JavaScript in question for debugging.)

It’s worth noting that not all in-app browsers are bad. While some apps use custom in-app browsers, others use Apple’s Safari. Twitter, Reddit, Gmail, and other apps rely on Safari or the ‘SFSafariViewController’ to open websites in apps. Krause offers a list of apps that do this, noting that they are “on the safe side” as there’s no way for apps to inject code. Android offers a ‘Custom Tab’ feature that leverages users’ default browser, if it supports Custom Tabs, to load websites inside of apps. It’s not clear if JavaScript injections similarly impact this.

On the one hand, this probably shouldn’t come as a huge surprise to most people. If apps track what you’re doing in the app, why would that change for the in-app browser? On the other, this could serve as a wake-up call for some and, hopefully, encourage some action to prevent this tracking. That could come from those in control of app stores (for example, Apple could adjust its guidelines to prevent this kind of behaviour or perhaps extend its App Tracking Transparency feature to cover this kind of behaviour).

More likely, users will be on their own to protect themselves. The best way is to avoid using an in-app browser — thankfully, most apps include an option to use the default browser instead, which means whatever link you click will open in your actual browser, not the in-app option.

Another thing you can do? Test which apps inject JavaScript into the in-app browser using Krause’s new tool. Called ‘inappbrowser.com,’ it’s a website users can open that will detect JavaScript injections. There are, of course, limitations. The inappbrowser.com tool can’t detect all JavaScript commands that are executed, and just because JavaScript is present doesn’t mean something malicious is happening.

Still, running the inappbrowser.com test could let you know if an app is injecting JavaScript and if it is, that could mean it’s tracking something. To use the tool, navigate to ‘inappbrowser.com’ with an in-app browser. The trick, of course, is to get there — most in-app browsers don’t let you type in a URL. Instead, you have to click the link within the app you want to test. For example, you could post a comment with the link and click it or send a DM to yourself.

You can learn more about in-app browser tracking here.

Source: Felix Krause Via: The Verge

Categories
Mobile Syrup

Firefox can now strip trackers out of website URLs

Mozilla’s Firefox browser got a new feature to help stop companies from tracking users.

As part of Firefox version 102, the browser can now automatically strip tracking parameters out of website URLs. The feature is called ‘Query Parameter Stripping.’ For those unfamiliar with the practice of URL parameters, it’s commonly used by social media and other companies to track what links people click on.

For example, Bleeping Computer outlines various URL trackers Firefox can now block, including those used by companies like Facebook, Marketo, Olytics, and more:

  • Facebook (fbclid=, mc_eid=)
  • Olytics (oly_enc_id=, oly_anon_id=)
  • Drip (__s=)
  • Vero (vero_id=)
  • HubSpot (_hsenc=)
  • Marketo (mkt_tok=)

Generally, these URL parameters include a string of letters and numbers after the equals sign (=). For example: “https://www.example.com/?fbclid=IwAR4HesRZLT-fxhhh3nZ7WKsOpaiFzsg4nH0K4WLRHw1h467GdRjaLilWbLs.”

Bleeping Computer also generated a test page with ‘example.com’ links featuring each of the above trackers so users can test if their browser is stripping those parameters from their URLs. You can check out that test site here (click one of the links on the page and then check the URL bar to see if there are any of the listed URL trackers in it).

How to enable Query Parameter Stripping

Unfortunately, Firefox’s Query Parameter Stripping isn’t turned on by default. To access the feature, users need to switch Firefox’s ‘Enhanced Tracking Protection’ feature to ‘Strict.’ Along with stripping URL trackers, Strict mode blocks social media trackers, cross-site cookies, tracking content, cryptominers, and fingerprinters. It also can break some websites, or make certain elements display incorrectly.

As someone who uses Firefox regularly, and often with ‘Strict’ Enhanced Tracking Protection, the biggest issue I’ve noticed is that it messes with embedded social media posts (like from Twitter or Instagram). Of course, there may be broader problems as well, so for some using Strict mode might be more hassle than it’s worth to get URL parameter stripping.

To enabled Strict mode, open Firefox’s settings > Privacy & Security > Enhanced Tracking Protection > Strict. Bleeping Computer also notes that this doesn’t impact Firefox’s private browsing mode (read: incognito mode), so if you want to enabled URL stripping in private mode too, you’ll need to toggle some settings in the ‘about:config’ menu. Bleeping Computer has detailed instructions for that here.

Alternate solutions for non-Firefox users

Although the addition of the feature is a move in the right direction, it’s worth noting that Firefox only strips a limited number of URL trackers. Bleeping Computer notes that Brave, a Chromium-based browser with a focus on privacy and crypto, blocks additional URL trackers. However, for those not interested in switching their browser, the ‘ClearURLs‘ extension can serve the same purpose.

ClearURLs can be added to most modern browsers and handles the task of removing URL tracking parameters. I’ve been using ClearURLs for a long time and will likely continue using it for the foreseeable future since it covers much more than the built-in stripper Firefox uses.

That said, ideally, Firefox’s built-in future eventually improves enough that ClearURLs is no longer necessary. Not that there’s anything wrong with ClearURLs — it’s just I’d prefer to minimize the number of extensions I use when possible.

You can learn more about ClearURLs here.

Query Parameter Stripping is one of many privacy features Mozilla has added to Firefox recently. Earlier this month, Mozilla rolled out ‘Total Cookie Protection,’ which gives each website its own cookie jar so that sites can’t snoop on your other online activities. You can read more about that here.

Source: Bleeping Computer

Categories
Mobile Syrup

Apple users might never do CAPTCHAs again thanks to iOS 16 feature

Apple’s upcoming iOS 16 and macOS Ventura updates will give users a reprieve from annoying CAPTCHA tests.

As spotted on Reddit (via 9to5Mac), a feature called ‘Automatic Verification’ uses ‘Private Access Tokens’ to confirm to websites that users are, in fact, real people and not robots. This confirmation will allow users to bypass CAPTCHAs on websites that support the feature.

Apple detailed how the feature works in a WWDC session called “Replace CAPTCHAs with Private Access Token,” explaining:

“Private Access Tokens are a powerful alternative that help you identify HTTP requests from legitimate devices and people without compromising their identity or personal information. We’ll show you how your app and server can take advantage of this tool to add confidence to your online transactions and preserve privacy.”

Those curious about how this all works should check out the WWDC session here. In short, web servers can use a new HTTP authentication method called ‘PrivateToken’ to request access to a token that confirms the user passed an ‘attestation check’ — in other words, proof that the user is legitimate. Apple devices with Automatic Verification generate these tokens through a combination of details, such as information about your device and Apple ID.

Crucially, Apple says the cryptographic signatures used in the process are “unlinkable,” which means that servers can only use the tokens to confirm that a user is legitimate. Servers cannot use the tokens to discover users’ identities or track users.

Put simply, Apple verifies that users are legitimate and then vouches for them to websites so users don’t need to complete CAPTCHAs.

Moreover, it’s worth noting that Automatic Verification utilizes a new industry standard called ‘Privacy Pass.’ That means the underlying tech isn’t an Apple-exclusive feature and we could see similar CAPTCHA bypass features come to, say, Android or Windows, in the future. Cloudflare has a whole blog post about Privacy Pass and how it works, including an explanation of how it improves privacy by reducing the need for websites to gather user data.

9to5 reports that companies like Fastly and Cloudflare are already building support for Privacy Pass and have enabled their issuer services. Later this year, other companies will be able to sign up for the feature through Apple’s website.

For now, Automatic Verification is only available in the first developer beta of Apple’s new software. Those trying out Apple’s new software may be able to test Automatic Verification on websites that support the feature. However, once iOS 16 and macOS Ventura become widely available, Apple users may see way fewer CAPTCHAs.

Source: Apple, Reddit Via: 9to5Mac

Categories
Mobile Syrup

Canadian government’s new bill proposes expanded rules on privacy, AI

Innovation, Science and Industry minister François-Philippe Champagne and Justice minister David Lametti introduced the ‘Digital Charter Implementation Act, 2022′ on June 16th to strengthen Canada’s privacy laws, create new rules around artificial intelligence (AI) and more.

The act includes three proposals. First, the proposed Consumer Privacy Protection Act (CPPA) aims to protect Canadians’ privacy by establishing clear rules around how organizations can handle personal information.

Second, the proposed Personal Information and Data Protection Tribunal Act will create a new tribunal to enforce the CPPA.

Finally, the proposed Artificial Intelligence and Data Act (AIDA) will introduce new rules around the development and deployment of AI systems.

The CPPA will help bring Canadian privacy law in line with international partners

In a press release, the government described some of the goals of the CPPA, which will ultimately replace the Personal Information Protection and Electronic Documents Act (PIPEDA) once passed. It’s worth noting that a previous version of the Digital Charter introduced in 2020 was considered a “step back” by Privacy Commissioner Daniel Therrien.

The CPPA will increase control and transparency around how organizations handle Canadians’ personal information. For example, it will require companies provide plain-language information about how they use Canadians’ data so that Canadians can give meaningful consent.

Additionally, the act will give Canadians the freedom to securely move information from one organization to another.

A major focus of the CPPA includes protections for minors, such as limiting the ability of organizations to collect information on minors. The act aims to hold organizations that handle the information of minors to a higher standard. Another part of this focus will be ensuring that Canadians can request that their information be disposed of when it’s no longer needed (parents will be able to make these requests on behalf of minors).

Along with this, the CPPA will enable broad, order-making powers for the Privacy Commissioner of Canada. These powers include the ability to make a company stop collecting data or using personal information.

Finally, the CPPA will establish fines for organizations that fail to comply. Fines can total up to five percent of global revenue or $25 million, whichever is greater, for the most serious offences.

Canada will get an AI and Data Commissioner

One of the main benefits AIDA will introduce will be a new AI and Data Commissioner. That commissioner will support the Minister of Innovation, Science, and Industry in fulfilling the responsibilities of the act. For example, that includes monitoring company compliance, ordering third-party audits, and sharing information with other regulators and enforcers.

AIDA aims to protect Canadians from potential AI harms through the establishment of rules to ensure developing and deploying “high-impact AI systems” mitigates harm and bias. Further, AIDA will outline clear criminal prohibitions and penalties around the use of unlawfully obtained data in AI development, reckless deployment of AI that can pose serious harm, and fraudulent intent to cause substantial economic loss through AI deployment.

The Canadian government has posted details about the Digital Charter Implementation Act on the Innovation, Science, and Economic Development (ISED) website, including text and visual summaries of the bill. You can find that here. Moreover, the full text of the bill will become available later today here, although it’s disappointing the bill was not made available sooner.

You can find the full proposed bill here.

Image credit: Shutterstock

Categories
Mobile Syrup

Mozilla rolling out Total Cookie Protection feature to all Firefox users

Mozilla announced that it will start rolling out its ‘Total Cookie Protection’ (TCP) feature by default to all desktop Firefox users worldwide.

In a blog post about the feature, Mozilla detailed how TCP will improve user privacy by confining cookies to the website that created them. Mozilla describes the feature as giving each website its own cookie jar, rather than letting websites share one giant cookie jar (check the illustration above).

This approach to cookies makes it more difficult for trackers to link user activity across websites:

“Any time a website, or third-party content embedded in a website, deposits a cookie in your browser, that cookie is confined to the cookie jar assigned to only that website. No other websites can reach into the cookie jars that don’t belong to them and find out what the other websites’ cookies know about you — giving you freedom from invasive ads and reducing the amount of information companies gather about you.”

Mozilla says that TCP helps prevent the worst privacy problems of third-party cookies while also allowing those cookies to fulfill some less invasive use cases, such as analytics.

However, Firefox isn’t the only browser taking on third-party cookies. Google previously announced plans to phase out third-party cookies in Chrome but has delayed the move until 2023. Apple’s Safari also offers ‘Intelligent Tracking Prevention’ that helps prevent cross-site tracking.

TCP was first made available in Firefox back in May as an opt-in feature while Mozilla tested it. Today’s announcement will shift the feature from opt-in to on-by-default, which is a big step forward.

Unfortunately, not all Firefox users will have TCP. Notably, mobile versions of the Firefox browser don’t have TCP — at least, for now. Mozilla’s chief security officer, Marshall Erwin, told The Verge that there’s a different timeline for bringing TCP to Firefox on Android. TCP is available on ‘Firefox Focus,’ a version of mobile Firefox that’s all about privacy. However, Erwin also noted that Firefox users on iOS won’t be able to use TCP, citing Apple’s restriction that forces iOS web browsers to use the WebKit browser engine (the same one used by Safari).

TCP will be available in the latest version of Firefox, although it seems unclear how users will be able to verify if the feature is enabled. Previously, users who were invited to test TCP could check whether it was enabled by heading to Settings > Privacy & Security > Enhanced Tracking Protection. Although I’m running the latest version of Firefox, I wasn’t able to find TCP in my settings, although perhaps I’ve jumped the gun on checking since Mozilla only just announced the rollout.

You can learn more about how TCP works here.

Header image credit: Mozilla

Source: Mozilla Via: The Verge

Categories
Mobile Syrup

Results of joint investigation into Tim Hortons app will be released Wednesday

Canada’s Office of the Privacy Commissioner will release a joint report Wednesday detailing how Tim Hortons’ app collects and uses app users’ geolocation information.

The commissioners of Canada, Quebec, Alberta and British Columbia launched the investigation in June 2020.

It started after media reports detailed the allegations. The National Post, the first one to report on the matter, said the app constantly tracked users’ movements, even if they were outside of Canada.

The Globe and Mail reports that more than one in 10 Canadians use the app every month, with more than 4.3 million active monthly users.

The company also faces four lawsuits, arguing the company used personal information to grow the app digitally.

“Geolocation data can be very sensitive as it can reveal information about the habits and activities of individuals, for example, medical visits or places that they regularly frequent,” the four commissioners stated when launching their investigation.

Source: National Post, Globe and Mail 

Categories
Mobile Syrup

Caregiver Aware provides wellness checks for seniors without disrupting their privacy

Canadian tech company Cognitive Systems is giving seniors the option to age in the places they love through Caregiver Aware — a system that allows caregivers to perform remote wellness checks on the people they love without intruding on their privacy.

Cognitive Systems powers the application through another one of its innovations — Wi-Fi Motion. It connects devices within the home into a motion-sensor network. The company says additional hardware isn’t needed and it doesn’t impact broadband performance.

“Wi-Fi Motion determines what ‘normal’ activity (or lack thereof) in your home looks like,” Amanda Forsyth, director of product management at Cognitive Systems, told MobileSyrup. “The longer Wi-Fi Motion is active in the space, the more accurately it can learn patterns to identify and predict behavioural trends.”

The Caregiver Aware app keeps track of activity changes. Image credit: Cognitive Systems

She added caregivers could monitor sleep or activity patterns, and Caregiver Aware uses algorithms to detect if something’s disturbing that routine, which could be the cause of an underlying health issue.

While Wi-Fi Motion was initially used for home monitoring, the company says Caregiver Aware was always on their map. The application’s development was sped up this year following the demand for healthcare technology. The spread of the novel coronavirus and presenting more proactive measures for care also played a role.

Regarding privacy, Forsyth said the technology is more private than other caregiver technologies that rely on cameras and microphones, as it doesn’t need to see or hear to identify motion and instead focuses on if motion is occurring at all and at what time. “Wi-Fi Motion doesn’t ‘see’ shapes, walls, or furniture, so it can’t determine the layout of your home, who is in it, or what they’re doing,” Forsyth said.

Cognitive Systems is trialling Caregiver Aware with service providers inside and outside Canada, but confidentiality agreements bar the company from providing further information. “Wi-Fi Motion applications, including caregiving, are now on the radar of executives at most tier-one internet service providers (ISPs) globally, including the Canadian ISPs,” Forsyth said.

Categories
Mobile Syrup

Government tracked Canadians’ movement via smartphones amid the pandemic

A new report sent to the House of Commons ethics committee has revealed that Canadians’ movements were tracked by the government via their smartphone amid the still ongoing COVID-19 pandemic.

According to The Canadian Press’ reporting, outbreak intelligence analyst BlueDot created reports for Public Health Canada using anonymized movement data pulled from Canadians’ smartphones. The public health agency then utilized this anonymized data to gain an understanding of Canadians’ travel patterns during the height of the pandemic in an effort to better manage its response.

The report goes on to reveal that the data included trips to the grocery store, visits to family and friends, time spent at home and movement outside of provinces and the country. Members of Parliament that are part of the ethics committee stated that they were surprised by the amount of detail included in the report.

“Questions remain about the specifics of the data provided, if Canadians’ rights were violated, and what advice the Liberal government was given,” said Damien Kurek, Conservative MP for Battle River-Crowfoot, Alberta, in a statement to The Canadian Press. 

Public Health Canada says that it took protecting the privacy of Canadians seriously and emphasized that the analysis of the data wasn’t focused on individual citizens’ activities and instead was focused on “understanding whether the number of visits to specific locations have increased or decreased over time.”

The data given to BlueDot didn’t include names or identifying personal information, said Public Health Canada.

The committee says that in the future the government should inform Canadian if it is collecting data about their movement and allow them to opt-out.

Source: Canadian Government Via: The Canadian Press (CP24)