Sadly WhatsApp will start sharing your account information with Facebook. You can’t prevent Facebook getting the data, you can only opt-out of them using it for ads.
There’re still privacy differences when you compare messenger apps all using the Signal protocol:
In this article, I’m going to compare WhatsApp, Signal, and Allo from a privacy perspective.
While all three apps use the same secure-messaging protocol, they differ on exactly what information is encrypted, what metadata is collected, and what, precisely, is stored in the cloud — and therefore available, in theory at least, to government snoops and wily hackers.
In the end, I’m going to advocate you use Signal whenever you can — which actually may not end up being as often as you would like.
Facebook started targeting ads based on its perception of a person’s race or ethnicity, but just to be safe without actually taking into account their race or ethnicity. The magic PR BS word they invented for it is “ethnic affinity.”
They want to monetize every aspect of your identity, whether that’s an ethnic affiliation or a preference for bean thread noodles.
The problem is that profiling somebody’s ethnic affinities has a lot more cultural baggage attached to it—to say the least—than profiling somebody’s taste in restaurants. And that’s why Facebook’s multicultural targeting scheme is getting a lot more pushback than the company bargained for.
How much data are the most popular apps on Android and iOS leaking to third parties (i.e. people who have nothing to do with the app you’re using). A LOT!
It looks like Google has been recording your voice searches (German). There have been rumors all along and it was assumed this was going on. They have the actual voice recordings and their transcripts and also generate a “finger print” of your voice to be able to verify it.
If you extrapolate from that they can by now
- transcribe speech almost instantaneously,
- have (over time) enough data to recognize your voice among others and
- are also able to speak in your voice stitching together chopped-up samples of your speech.
But here is the thing — and this is crucial — the address for Cryptome is listed to be the location of a fiber optic cable junction in Sterling, VA (next to an Amusement Machine company)… which is quite some distance away from your location in NYC, and a considerable distance from your ISP who hosts your file, and it is located away from any signal switching systems use in the area, but it is virtually next door to fiber that goes to a large NSA listening post nearby.
The reason it is notable, is that someone at or near the location in Sterling, VA is performing a MITM attack on Cryptome visitors, and this image out of the slidedeck with the two GPS coordinates is the U.S. Government performing a MITM attack against Cryptome and sharing the collected intelligence with the Brits, or the U.S. Government giving the British government backdoor access into the U.S. (illegal) collection systems.