Search
Content type: Long Read
“Hey [enter AI assistant name here], can you book me a table at the nearest good tapas restaurant next week, and invite everyone from the book club?” Billions of dollars are invested in companies to deliver on this. While this is a dream that their marketing departments want to sell, this is a potential nightmare in the making.Major tech companies have all announced flavours of such assistants: Amazon’s Alexa+, Google’s Gemini inspired by Project Astra, Microsoft’s Copilot AI companion and…
Content type: Guide step
The information you (consciously or not) share with Telegram can be very revealing. It can also be (mis)interpreted by government agencies and used to profile individuals. Once installed on a device, depending on your settings, the Telegram app may have access to information such as your location, contact information and media stored on the same device. All of this data can be potentially be accessed remotely using cloud extraction technology.
Your Telegram app generates a lot of data that can…
Content type: Guide step
The information you (consciously or not) share with Facebook can be very revealing. It can also be (mis)interpreted by government agencies and used to profile individuals. Once installed on a device, depending on your settings, the Facebook app may have access to information such as your location, contact information and media stored on the same device. All of this data can be potentially be accessed remotely using cloud extraction technology.
Your Facebook app generates a lot of data that can…
Content type: Guide step
The information you share on WhatsApp can be very revealing. Once installed on a device, the app potentially has access to information such as your location, contact information, and media stored on the same device.
Your WhatsApp app generates a lot of data that can also be stored on your device and elsewhere. It’s important for you to be able to understand the types of data that apps like WhatsApp generate. Government agencies may seek access to this data through at least two routes: they…
Content type: News & Analysis
As Amnesty International and Forbidden Stories continue to publish crucial information about the potential targets of NSO Group’s spyware, we know this much already: something needs to be done.
But what exactly needs to be done is less obvious. Even though this is not the first time that the world has learned about major abuses by the surveillance industry (indeed, it’s not even the first time this month), it’s difficult to know what needs to change.
So how can the proliferation and use of…
Content type: News & Analysis
It is difficult to imagine a more intrusive invasion of privacy than the search of a personal or home computer ... when connected to the internet, computers serve as portals to an almost infinite amount of information that is shared between different users and is stored almost anywhere in the world.
R v Vu 2013 SCC 60, [2013] 3 SCR 657 at [40] and [41].
The controversial Police Crime Sentencing and Courts Bill includes provision for extracting data from electronic devices.
The Bill…
Content type: Explainer
Where are my images, contacts and documents stored?
You generate data every time you use your phone e.g. you generate data when you take photographs or record videos, when you create or edit notes and documents on the go, and when you add new names and numbers to your contacts directory.
All this data is created through dedicated apps - your camera and photo apps, social media apps, notes apps, and your contacts app are just some examples.
It is important to note that when you create any…
Content type: Explainer
Where are my communications stored?
Text messages/phone calls: Traditional cellphone communications happen over the cellular network. You usually access those with the text message and phone call apps that are provided as standard on your phone. While phone calls aren’t stored anywhere, text messages are stored locally on your and the recipient’s devices. They might also be temporarily stored by the network provider.
Messaging apps: Messaging platforms enable fairly secure communication…