In one way or another, we’ve got involved in Tiktok’s content, especially during this quarantine, where we are forced to stay home.
However, in the last weeks, the app has seen itself shrugged off some controversies dealing with cybersecurity challenges.
It has been entangled with India, where it was canceled along with 58 Chinese apps. The main reason for the cancellation was “stealing and secretly’ unofficially transferring data.
Later, it became an aim of Trump’s administration to sever the US and China relationships, with apparent effect on Wells Fargo and Amazon.
While geopolitical reasons mainly drove the ban on TikTok’s data collection processes, some studies suggest that TikTok has no difference from other Western apps in terms of privacy and security. One case in point clearly showing this was the Facebook–Cambridge Analytica data scandal.
What about cybersecurity?
We can state now that even crypto has gained popularity, its cybersecurity remained one of its weak points. With the increasing demand for “relaibale apps” in storing our data, mainstream apps have become more stringent about this feature.
But each year in the blockchain space, hackers can extract a hefty amount of money from cryptocurrency exchanges and decent investors. After this, criminals remain untraceable and anonymous.
To give a little explanation, in terms of “data collection,” we can highlight a different angle vs. hacks. The latter can be identified in a grayer regulatory area.
In geek terms, the use of “private data” is an umbrella coinage that refers to consent to data collections; they download an app and approve its terms and conditions.
One channel asking this kind of access is mobile apps that are very into targeted advertising to collect specific information to a planned campaign.
A cybersecurity agency executive, Hartej Sawhney, said that many apps track users even though the mobile app is not in use. This could even get to allowing access even audio thru microphone mobiles.
Another case study happened when Twitter user Sherpa posted a screenshot of a certificate issuer in a tweet, telling that the permissions requested by the top cryptocurrency transactions in its Android app have access to the camera and audio.
The Binance, however, refuted this possible misinterpretation and said the then, the camera is dedicated only during the KYC verification process. The code does not include access to microphones. This forced finance to issue internal orders to keep access requests to the bare minimum.
How do we collect data?
The access of one’s app can be the foot-in-the-door step of an app to the user.
The clipboard is an avenue of stealing private keys. According to Harry Halpin, the CEO of Nym Technologies, various crypto applications asking for your key material can be an outright way to get some of your funding.
Wit these issues (Tiktok et al.) at hand, people are just trying to avoid “Coin Theft”. The term is an affiliated risk that can be linked with cryptocurrency applications and wallets.
One expert told that attackers or only hackers craft repositories and social engineering to capture the wallet and private keys of susceptible users.
Can we say crypto is safer, then?
There are divided opinions about this.
Some say that the nature of crypto is similar to some finance apps available in the market because users are often required to give identification information for KYC/AML compliance.
Matt Senter, the co-founder, and the chief technology officer at Bitcoin rewards app Lolli, said that putting forward an incentivization scheme is a lie.
The chances of cheating and stealing are very high in Bitcoin apps than traditional apps. Some also quipped that sharing cryptocurrency to a public ledger creates a platform for someone to spy on your transaction.
But how does one protect oneself from these?
With the recent Twitter hacks were duped into getting funding is secure, the famous platform indeed highlights of people’s lack of understanding (though they are not a Bitcoin app).
Crypto apps’ user-friendly interface, they say, can he;p consumer can harness a feeling of security as their data are precise where to be stored.
Halpin of Nym Technologies also added that it’s safer to trust a random group of people with your app than a single third party. Accountability and actual decentralization must be strengthened.