<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>security Archives - SmartFrame</title>
	<atom:link href="https://smartframe.io/blog/tag/security/feed/" rel="self" type="application/rss+xml" />
	<link>https://smartframe.io/blog/tag/security/</link>
	<description>Ideal Presentation, Robust Protection and Easy Monetization</description>
	<lastBuildDate>Wed, 16 Jul 2025 11:47:21 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://smartframe.io/wp-content/uploads/2023/09/fav-48x48-1.png</url>
	<title>security Archives - SmartFrame</title>
	<link>https://smartframe.io/blog/tag/security/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Transparency in the advertising industry: Initiatives supporting the ecosystem</title>
		<link>https://smartframe.io/blog/transparency-advertising-industry-initiatives-supporting-the-ecosystem/</link>
		
		<dc:creator><![CDATA[Liam Machin]]></dc:creator>
		<pubDate>Mon, 05 Jun 2023 11:16:28 +0000</pubDate>
				<category><![CDATA[In-image advertising]]></category>
		<category><![CDATA[News & Features]]></category>
		<category><![CDATA[buyers.json]]></category>
		<category><![CDATA[CAI]]></category>
		<category><![CDATA[IAB]]></category>
		<category><![CDATA[security]]></category>
		<category><![CDATA[transparency]]></category>
		<guid isPermaLink="false">https://smartframe.io/?p=80887</guid>

					<description><![CDATA[<p>As the advertising industry continues to evolve, the ever-growing importance of transparency [&#8230;]</p>
<p>The post <a href="https://smartframe.io/blog/transparency-advertising-industry-initiatives-supporting-the-ecosystem/">Transparency in the advertising industry: Initiatives supporting the ecosystem</a> appeared first on <a href="https://smartframe.io">SmartFrame</a>.</p>
]]></description>
										<content:encoded><![CDATA[		<div data-elementor-type="wp-post" data-elementor-id="80887" class="elementor elementor-80887" data-elementor-post-type="post">
				<div class="elementor-element elementor-element-7cc49bd7 e-flex e-con-boxed e-con e-parent" data-id="7cc49bd7" data-element_type="container" data-e-type="container" data-settings="{&quot;ekit_has_onepagescroll_dot&quot;:&quot;yes&quot;}">
					<div class="e-con-inner">
				<div class="elementor-element elementor-element-79f34333 elementor-widget elementor-widget-text-editor" data-id="79f34333" data-element_type="widget" data-e-type="widget" data-settings="{&quot;ekit_we_effect_on&quot;:&quot;none&quot;}" data-widget_type="text-editor.default">
									<p class="blog-stand-first">As the advertising industry continues to evolve, the ever-growing importance of transparency requires more industry collaboration to find the best solutions. Here are some initiatives striving to do better.</p>

<p>Transparency is a term that&#8217;s often thrown around in many different industries. And in the advertising sector, the introduction of GDPR and the subsequent <a href="https://smartframe.io/the-rise-of-contextual-targeting-in-a-cookieless-world/" target="_blank" rel="noopener">demise of the third-party cookie</a> mean it&#8217;s more prevalent than ever. </p>
<p>As consumer data remains a hot topic at many industry events, it&#8217;s worth considering what initiatives are in place – both on the media buying and selling sides – to help create a more transparent advertising ecosystem.</p>
<h4>Why is transparency so important within the advertising industry?</h4>
<p>In short, data, ethics, and the fact that there is <em>a lot</em> of money involved, both for businesses and for the average person buying a product.</p>
<p>Consumers associate brands that are open about how they use data with more positive outcomes because there is a shared understanding that their information is being handled responsibly.</p>
<p><a href="https://www.edelman.com/trust/2022-trust-barometer" target="_blank" rel="noopener">Edelman’s Trust Barometer</a> states that the default setting for almost 60% of consumers is to distrust something until there is clear evidence to believe otherwise. </p>
<p>Through the use of distinct opt-in messages and transparent privacy policies throughout any process, businesses are able to develop more rapport with their prospective customer(s), provide better-suited and personalized advertising, and protect themselves against any potential privacy issues down the line. </p>
<p>Such discussions and projects centered around transparency have only recently become more prevalent in business-to-business transactions. Businesses, agencies, and publishers around the globe are starting to recognize the value of alignment when it comes to company ethos, from sustainability to media buying.</p>
<p>With the number of digital publishers continuing to grow across the world, programmatic advertising in particular is having to struggle with delivering quality ads, at speed, without risking the <a href="https://www.marketingweek.com/ritson-google-brand-safety/" target="_blank" rel="noopener">safety of any given brand</a>. </p>
<p><script async src="https://static.smartframe.io/embed.js"></script><smartframe-embed customer-id="7d0b78d6f830c45ae5fcb6734143ff0d" image-id="adobestock_76705211_1685617297662" theme="blog-new" style="width: 100%; display: inline-flex; aspect-ratio: 4256/2832; max-width: 4256px;"></smartframe-embed></p>
<h4>What’s being done to improve transparency within the advertising industry?</h4>
<p>There are a number of initiatives that have been conceived to help improve transparency. Here are a few of the most prominent ones.</p>
<h5>Buyers.json and DemandChain Object</h5>
<p>In 2021, the IAB Tech Lab introduced <a href="https://iabtechlab.com/wp-content/uploads/2021/06/DemandChainObject-1.0-June2021.pdf" target="_blank" rel="noopener">two new buy-side transparency standards</a> to help curb the issues of malvertising and scam ads. </p>
<p>Having seen success with <a href="https://digiday.com/media/wtf-is-supplychain-object/" target="_blank" rel="noopener">sellers.json and SupplyChain Object</a>, Buyers.json and DemandChain Object are expected to evolve into a strategy that improves transparency in the advertising industry for publishers by authenticating those who provide ads.</p>
<h5>What is buyers.json and DemandChain Object?</h5>
<p>Buyers.json allows advertising systems to publicly declare the buyers they represent, while DemandChain Object provides transparency around each entity involved in a specific transaction. </p>
<p>With this information, publishers and supply-side platforms (SSPs) can highlight any risks (such as malvertising, scam ads, or other malicious content), protect themselves accordingly, and create a record of their actions for future reference.</p>
<p>Furthermore, DemandChain Object has the potential to revolutionize the advertising supply chain since this enables advertisers to track the journey of their ad from creation to delivery, which in turn allows them to confirm that it reaches the appropriate audience in the intended manner.</p>
<p>The implementation of these types of frameworks has already created more transparent communication channels on each side of the coin – and it’s a promising sign to see so many leading businesses support such initiatives.</p>
<p><a href="https://iabtechlab.com/buyers-json-demand-chain/" target="_blank" rel="noopener"><i>Read more about buyers.json and DemandChain Object on the IAB Tech Lab site</i></a></p>
<h5>Measurement metrics</h5>
<p>Industry-recognized metrics, such as viewability, completion rates, and engagement, now serve as a common language for evaluating ad performance.</p>
<p>Advertisers and publishers can both review campaigns against a consistent metric, allowing for honest feedback and evaluations of campaign performance.</p>
<h5>How do measurement metrics help transparency across the advertising industry?</h5>
<p>Metrics for measuring performance are critical for promoting advertising transparency as they provide a standardized performance benchmark for evaluating campaigns and making better decisions in the future.</p>
<p>The recent hype surrounding the attention economy has increased industry collaboration, as this particular form of measurement has yet to be christened with a specific form of value or number, making it difficult to track success.</p>
<p>Nonetheless, the work done by the likes of <a href="https://newdigitalage.co/general/roundtable-recap-attention-turns-to-contextual-advertising/" target="_blank" rel="noopener">New Digital Age</a> and other associations has instigated discussions around how best to measure this newfound advertising gold dust, increasing transparency between all segments of the ad tech ecosystem. </p>
<p><a href="https://smartframe.io/the-smartframe-guide-to-the-attention-economy/" target="_blank" rel="noopener"><i>Check out SmartFrame&#8217;s guide to the attention economy</i></a></p>
<h5>Content Authenticity Initiative</h5>
<p>The Content Authenticity Initiative (CAI) is a relatively new community that has come about to combat the spread of misinformation by implementing a new standard for verifying digital content. </p>
<p>Led by Adobe, the community comprises a range of tech companies and media organizations including:</p>
<ul>
	<li>SmartFrame Technologies</li>
	<li>Canon</li>
	<li>Nikon</li>
	<li>PA Media</li>
	<li>The Associated Press</li>
	<li>The BBC</li>
	<li>Microsoft</li>
	<li>NVIDIA</li>
</ul>
<h5>How does the Content Authenticity Initiative promote transparency?</h5>
<p>Through the use of cryptographically verifiable metadata, the CAI provides a secure, tamper-evident record of an image&#8217;s provenance and modification history. This allows online audiences to gain a better idea of the trustworthiness of online media, which, in turn, helps them to make more informed decisions about the content they consume, and to avoid misinformation and disinformation.</p>
<p><script async src="https://static.smartframe.io/embed.js"></script><smartframe-embed customer-id="7d0b78d6f830c45ae5fcb6734143ff0d" image-id="adobestock_513369903_1685617547363" theme="blog-new" style="width: 100%; display: inline-flex; aspect-ratio: 6000/4000; max-width: 6000px;"></smartframe-embed></p>
<h4>Restoring trust with consumers</h4>
<p>Transparency should be a fundamental pillar of the advertising industry. Initiatives such as sellers.json, SupplyChain Object, buyers.json, and DemandChain Object can play a crucial role in enhancing transparency, combating ad fraud, and improving the overall trust of ads between businesses before they reach consumers.</p>
<p>The rise of ad blockers in recent years highlights the erosion of trust between consumers and advertisers. In order to restore this trust, the industry must focus on delivering ads that are <a href="https://www.iabuk.com/opinions/argument-fewer-better-ads" target="_blank" rel="noopener">high in quality and genuinely useful to consumers</a> – and this starts from within. </p>
<p>Removing outdated techniques like cookie dropping is forcing our industry to reshape the way we reach target audiences and prioritize user trust in a safe manner for the greater good.</p> 								</div>
					</div>
				</div>
				</div>
		<p>The post <a href="https://smartframe.io/blog/transparency-advertising-industry-initiatives-supporting-the-ecosystem/">Transparency in the advertising industry: Initiatives supporting the ecosystem</a> appeared first on <a href="https://smartframe.io">SmartFrame</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Smart glasses: Everything you need to know</title>
		<link>https://smartframe.io/blog/smart-glasses-everything-you-need-to-know/</link>
		
		<dc:creator><![CDATA[Peter Townshend]]></dc:creator>
		<pubDate>Thu, 03 Nov 2022 12:02:50 +0000</pubDate>
				<category><![CDATA[News & Features]]></category>
		<category><![CDATA[articles]]></category>
		<category><![CDATA[security]]></category>
		<guid isPermaLink="false">https://smartframe.io/?p=78829</guid>

					<description><![CDATA[<p>Smart glasses might not have made much of a dent in the [&#8230;]</p>
<p>The post <a href="https://smartframe.io/blog/smart-glasses-everything-you-need-to-know/">Smart glasses: Everything you need to know</a> appeared first on <a href="https://smartframe.io">SmartFrame</a>.</p>
]]></description>
										<content:encoded><![CDATA[		<div data-elementor-type="wp-post" data-elementor-id="78829" class="elementor elementor-78829" data-elementor-post-type="post">
				<div class="elementor-element elementor-element-25da95ef e-flex e-con-boxed e-con e-parent" data-id="25da95ef" data-element_type="container" data-e-type="container" data-settings="{&quot;ekit_has_onepagescroll_dot&quot;:&quot;yes&quot;}">
					<div class="e-con-inner">
				<div class="elementor-element elementor-element-65136dcb elementor-widget elementor-widget-text-editor" data-id="65136dcb" data-element_type="widget" data-e-type="widget" data-settings="{&quot;ekit_we_effect_on&quot;:&quot;none&quot;}" data-widget_type="text-editor.default">
									<p class="blog-stand-first">Smart glasses might not have made much of a dent in the wearables market, but the odds are that they aren&#8217;t going anywhere anytime soon. Here&#8217;s what you need to know about them, including the arguments for and against their use</p>
<p>Smart glasses have been around for some time now, but as the technology becomes more refined and some of the world’s biggest players in tech get in on the action, it begs the question: is there a solid future for these space-age specs?</p>
<p>Before we answer this, let&#8217;s try to understand exactly what these are and look at the products that got us to where we are today.</p>
<h4>What are smart glasses?</h4>
<p>As the name suggests, smart glasses are glasses that combine some kind of technology. They may, for example, have built-in cameras, displays, audio, Bluetooth connectivity, or <a href="https://www.techtarget.com/whatis/definition/augmented-reality-AR#:~:text=Augmented%20reality%20(AR)%20is%20the,overlaid%20on%20top%20of%20it." target="_blank" rel="noopener">augmented reality</a> (AR) capabilities, and they usually operate by connecting wirelessly to an app on another smart device, such as a phone or tablet.</p>
<p>Just as smartphones blend technology with a telephone, and smart watches combine technology with a wristwatch, smart glasses bring together technology with a pair of spectacles. They have been around in one form or another for decades; eyewear brand Oakley, for example, <a href="https://www.bbc.co.uk/news/technology-17745935" target="_blank" rel="noopener">claims</a> to have been working on the technology since 1997 and has filed over 600 patents. </p>
<p>However, because the technology existed only behind closed doors, it has never been something that the general consumer could enjoy – until now.</p>
<p>In recent years, this technology has become relatively affordable, sparking the beginning of a new era of modern smart glasses that look like they’re set to quickly become commonplace. </p>
<h4>Examples of smart glasses</h4>
<p>There are many types of smart glasses that offer different features, so perhaps the most helpful way to understand the format as a whole is to examine the most popular models. To keep things relevant to imaging, however, we will only examine those that have built-in camera technology.</p>
<h5>Google Glass</h5>
<p>Google Glass was the product that started the current wave of modern smart glasses. <a href="https://www.washingtonpost.com/news/the-switch/wp/2014/02/27/everything-you-need-to-know-about-google-glass/" target="_blank" rel="noopener">Launched in 2013 to great excitement</a>, Google Glass glasses featured a mini display, a camera, and a touchpad, which allowed you to connect with your smartphone to browse websites, take photos, post to social media platforms, and even get directions. Voice commands also meant that much of this could be carried out hands-free.</p>
<p>Google Glass was, however, <a href="https://www.forbes.com/sites/tarunwadhwa/2014/04/24/the-google-glass-explorer-program-was-a-social-experiment-that-backfired/" target="_blank" rel="noopener">less of a launch and more of an experiment</a>. The tech was only available to selected developers via the Google Glass Explorer Program and, if you were lucky enough to be selected, the product cost a lofty $1,500. The Glass Explorer Edition was essentially a prototype and the launch was a way to test it in the real world, gathering feedback and improving the technology. </p>
<p>Both the Google Glass Explorer Program and the product were <a href="https://support.google.com/glass/answer/9649198?hl=en&amp;ref_topic=3063354" target="_blank" rel="noopener">discontinued</a> in 2020. These smart glasses do, however, live on for commercial clients as Google Glass Enterprise Edition, with the aim of helping businesses operate more efficiently.</p>
<p>There are no known plans to bring Google Glass back to general consumers, but we would be surprised if Google didn’t break into this market as the technology gains popularity. </p>
<h5>Ray-Ban Stories</h5>
<p>With a very public <a href="https://about.fb.com/news/2021/10/facebook-company-is-now-meta/" target="_blank" rel="noopener">pivot towards the metaverse</a>, and a proven history in <a href="https://tech.fb.com/ar-vr/" target="_blank" rel="noopener">VR headsets</a>, it was only a matter of time before the freshly rebranded Meta made its presence known in the smart glasses market.</p>
<p>In 2021, it <a href="https://www.meta.com/gb/glasses/" target="_blank" rel="noopener">joined forces</a> with iconic eyewear brand <a href="https://www.ray-ban.com/" target="_blank" rel="noopener">Ray-Ban</a> to produce the <a href="https://www.ray-ban.com/uk/ray-ban-stories" target="_blank" rel="noopener">Ray-Ban Stories</a> smart glasses, which feature dual 5MP cameras, touch control, and built-in speakers.</p>
<p>One of the biggest issues with smart glasses – particularly Google Glass – has been that, while technologically capable, they simply haven&#8217;t looked very good. Understandably, this is problematic in the context of wearable tech. Ray-Ban Stories, on the other hand, sit at the opposite end of the spectrum.</p>
<p>While they undoubtedly look great, they are a little light on features – somewhat surprising considering Meta’s pedigree in the VR headset space. </p>
<h5>Snap Spectacles</h5>
<p>If Google Glass was more about substance and Ray-Ban Stories more about style, Spectacles from social media company <a href="https://snap.com/" target="_blank" rel="noopener">Snap Inc.</a> attempts to find a balance between the two.</p>
<p>The currently available third generation of Snap’s Spectacles offers similar capabilities to Ray-Ban Stories, with dual cameras, audio, and touch controls. However, there is also a fourth generation of Spectacles, which feature dual displays that promise to open up a whole new world of AR possibilities.</p>
<p>They are not currently available to buy, however. Snap is only making them available to AR creators through an online application process, the idea being to properly test their capabilities and develop the effects that can be used with them.</p>
<p>But the fact Snap is not exactly keeping these new glasses a secret is likely a sign that Spectacles 4 will be available to consumers at some point in the not-too-distant future.</p>
<h5>Vuzix BLADE</h5>
<p>When it comes to consumer-ready AR smart glasses, a leading provider in the field is <a href="https://www.vuzix.com/" target="_blank" rel="noopener">Vuzix</a> and its <a href="https://www.vuzix.com/products/vuzix-blade-2-smart-glasses" target="_blank" rel="noopener">BLADE 2</a> glasses. Vuzix has been around for some time creating smart glasses for commercial enterprises to streamline workflows for front-line workers, but BLADE 2 is a more compact version designed for general consumers.</p>
<p>The BLADE 2 glasses are equipped with an 8MP camera, which can take pictures and stream video, while a transparent screen that sits in the center of the wearer’s field of vision makes AR a real possibility. The glasses are controlled using a touchpad, but also respond to voice commands that <a href="https://www.vuzix.com/blogs/vuzix-blog/amazon-alexa-for-smart-glasses-on-the-vuzix-blade" target="_blank" rel="noopener">work with Amazon’s Alexa technology</a> for the most responsive operation.</p>
<h5>Xiaomi Mijia Glasses</h5>
<p>The <a href="https://www.xiaomitoday.com/2022/08/04/mijia-glasses-camera-review/" target="_blank" rel="noopener">Mijia Smart Glasses</a>, which were recently announced by Chinese tech company <a href="https://www.mi.com/" target="_blank" rel="noopener">Xiaomi</a>, illustrate just how quickly smart-glasses technology is advancing.</p>
<p>In addition to an in-view display, AR functions, and real-time translations, the Mijia Glasses also feature a <a href="https://petapixel.com/2022/08/01/xiaomis-new-mijia-smart-glasses-have-a-50mp-camera-and-15x-zoom/" target="_blank" rel="noopener">50MP built-in camera with a 15x hybrid zoom</a>.</p>
<p>It sounds impressive, although the snag is that these glasses are not yet available to consumers – and it is unclear whether they will ever become available outside China.</p>
<h5>Apple Glasses</h5>
<p><a href="https://www.tomsguide.com/news/apple-glasses" target="_blank" rel="noopener">Very little is known</a> about Apple’s smart glasses offering, but the company&#8217;s rumored forays into the category indicate just how mainstream smart glasses may become.</p>
<p>Furthermore, considering the company’s reputation for quality, style, and usability, Apple Glasses arguably have the best shot of striking a balance where others have struggled.</p>
<p>Just as the <a href="https://www.businessinsider.com/a-timeline-of-how-the-apple-watch-was-created-2015-3?r=US&amp;IR=T" target="_blank" rel="noopener">Apple Watch helped to transform the smartwatch</a> from something out of James Bond into a fashionable part of everyday life, we would expect Apple’s influence to help smart glasses become the norm sooner than you might expect.</p>
<p><script async src="https://static.smartframe.io/embed.js"></script><smartframe-embed customer-id="7d0b78d6f830c45ae5fcb6734143ff0d" image-id="shutterstock_1153763470_1666967198041" theme="blog-new" style="width: 100%; display: inline-flex; aspect-ratio: 5472/3648; max-width: 5472px;"></smartframe-embed><!-- https://smartframe.io/embedding-support --></p>
<h4>The case for smart glasses</h4>
<p>The list of potential benefits smart glasses could bring is endless.</p>
<p>AR and point-of-view cameras alone have countless positive applications, both in personal and professional life – so when combined with voice controls and built-in audio, it&#8217;s impossible to list them all. </p>
<p>Here are some of the main areas in which they can make a positive contribution.</p>
<h5>Entertainment</h5>
<p>The breadth of possibilities smart glasses create for entertainment through their AR capabilities is difficult to overstate.</p>
<p>The most obvious of these is gaming. <a href="https://www.tekrevol.com/blogs/22-best-augmented-reality-games/" target="_blank" rel="noopener">AR games</a> are nothing new, but the accessibility of smart glasses could bring them further into the mainstream, from something as simple as office-desk-whack-a-mole on your lunch break to highly complex platform games in real-life settings.</p>
<p>However, the potential for fun doesn’t stop there. Imagine the possibilities for digital art exhibitions, visually enhanced theater shows, immersive AR movies, or experiential marketing such as interactive restaurant menus or billboard posters.</p>
<h5>Safety and security</h5>
<p>Smart glasses could also help to increase personal security. At the most basic level, the ability to film an experience in the first person so quickly and easily has the potential to discourage threatening behavior through the <a href="https://www.simplypsychology.org/hawthorne-effect.html" target="_blank" rel="noopener">Hawthorne Effect</a>. </p>
<p>Furthermore, with the help of AR and <a href="https://www.kaspersky.com/resource-center/definitions/what-is-facial-recognition" target="_blank" rel="noopener">facial recognition</a> software, it could be possible to check the credentials of a professional such as a tradesman, cold caller, or police officer before allowing them into your home.</p>
<p>AR could even help to keep you secure in everyday life by providing contextual warnings and safety information. This could range from an alert telling you to ‘mind the step’ right through to more serious warnings about entering restricted or unsafe areas where there is a danger of death.</p>
<h5>Communication</h5>
<p>There is no doubt that smart glasses could aid communication. Built-in microphones and speakers make it possible to send and receive calls completely hands-free. The same could be true for checking emails and messages, which could be displayed directly in your field of view. </p>
<p>The frame-mounted cameras on smart glasses could also play a big part here. Not only would they make it easier than ever to share photos and videos on social media, but they also open up the possibility to send a live point-of-view (POV) feed of whatever you’re doing. This makes <a href="https://www.vuzix.com/pages/field-service" target="_blank" rel="noopener">remote supervision, assessment, and collaboration</a> much easier and more effective.   </p>
<h5>Documentation </h5>
<p>Whether it is to record a cycling trip to share with friends, have a skill or activity assessed, or document a situation for legal protection, the ability to instantly record images and videos from the point of view of the photographer without having to hold on to a camera has many advantages.</p>
<h5>Convenience</h5>
<p>While mobile phones are small enough to fit in your pocket and smartwatches can fit on your wrist, both require a certain level of engagement and physical interaction that can be impossible in certain situations.</p>
<p>Having everything you need in a lightweight and comfortable package that is always in place and is accessible without any physical effort offers a game-changing level of convenience.</p>
<p><script async src="https://static.smartframe.io/embed.js"></script><smartframe-embed customer-id="7d0b78d6f830c45ae5fcb6734143ff0d" image-id="shutterstock_1783490738_1666967197993" theme="blog-new" style="width: 100%; display: inline-flex; aspect-ratio: 5616/3159; max-width: 5616px;"></smartframe-embed><!-- https://smartframe.io/embedding-support --></p>
<h5>The case against smart glasses</h5>
<p>While there are many obvious benefits of smart glasses, they are a controversial technology that has attracted plenty of criticism. <a href="https://www.cnet.com/tech/services-and-software/seattle-dive-bar-becomes-first-to-ban-google-glass/" target="_blank" rel="noopener">Bars</a> and <a href="https://www.searchenginejournal.com/top-10-places-that-have-banned-google-glass/66585/" target="_blank" rel="noopener">other venues</a> even banned Google Glass devices from their premises before they were released.</p>
<p>Below we have outlined some of the most popular arguments against the rollout of the technology.</p>
<h5>Privacy</h5>
<p>Unsurprisingly, the biggest concern around smart glasses concerns privacy.</p>
<p>With cameras and microphones built into their frames, smart glasses can quickly and easily be used to record people in situations without their knowledge or consent.</p>
<p><a href="https://petapixel.com/2022/07/14/meta-admits-smart-glasses-put-privacy-at-risk-offers-no-solutions/" target="_blank" rel="noopener">Many believe</a> the use of these recording devices could facilitate the illegal collection of biometric and behavioral data, and, in the worst case, could lead to the creation of a surveillance state.</p>
<p>Referring again to the Hawthorne Effect, the knowledge alone that these recording functions could be used may seriously affect freedom of expression, stifling social interaction, discouraging debate, and leading to a reduction in open and effective communication. </p>
<h5>Health and safety</h5>
<p>The fact that smart glasses are so convenient and easy to use without hands could also be seen as a negative.</p>
<p>The distraction of in-vision displays could lead to a rise in accidents – and when combined with a potential reduction in peripheral vision caused by the often chunky frames required to house the tech, there is real potential for increased injuries and even deaths.</p>
<p>There are also questions on the long-term health risks from prolonged exposure to non-ionizing radiation. While <a href="https://www.icnirp.org/en/activities/news/news-article/rf-guidelines-2020-published.html" target="_blank" rel="noopener">guidelines</a> from the International Commission on Non-Ionizing Radiation Protection (ICNIRP) ensure that smart devices only emit safe levels of radiation, <a href="https://emf-harmony.eu/blogs/news/complete-guide-to-wearable-tech-radiation" target="_blank" rel="noopener">some believe</a> that there is simply not yet enough evidence to be completely sure – especially considering the devices’ close proximity to the brain.</p>
<h5>Security</h5>
<p>In the same way that smart glasses could help to increase security, they may also do the opposite.</p>
<p>It is highly possible that this technology could bring an end to anonymity which, while in some cases is a great asset, in others is a frightening prospect.</p>
<p>For example, this technology could help government agencies to safeguard the streets against potential threats – but it could also make it easier for oppressive regimes to track down those seeking political asylum.</p>
<p>With this in mind, it&#8217;s certainly a technology that needs to be closely monitored, particularly from the point of view of cyber security. If smart glasses are easily hacked, there could be huge implications for security on both a personal and national level.</p>
<h5>Copyright infringement</h5>
<p>There are also <a href="https://www.nbcnews.com/tech/innovation/its-official-google-glass-banned-movie-theaters-n236841" target="_blank" rel="noopener">concerns</a> over copyright infringement. With such high-resolution cameras mounted so discreetly on a person’s face, it would be much easier for fraudsters to record ticketed shows and events undetected.</p>
<p>Obvious targets would be movies, stage shows, comedy acts, and musical performances. The same could also be true for still images – for example, artwork or limited-edition photographic prints displayed in exclusive exhibitions.</p>
<h4>Conclusion</h4>
<p>The possibilities that smart glasses present are undoubtedly exciting, but the technology is something of a double-edged sword that has the potential to cause damage to both individuals and society as a whole.</p>
<p>The biggest problem with technology like this is that the rate at which it develops is far quicker than the rate at which authorities and governments can pass laws to ensure it is properly regulated. By the time they do, it is often too late.</p>
<p>With this in mind, smart glasses technology needs to be handled with great care to ensure it is used responsibly and, ultimately, for good. If we manage to do this, these devices stand a chance of revolutionizing how we live our lives.</p>								</div>
					</div>
				</div>
				</div>
		<p>The post <a href="https://smartframe.io/blog/smart-glasses-everything-you-need-to-know/">Smart glasses: Everything you need to know</a> appeared first on <a href="https://smartframe.io">SmartFrame</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>AI image generators: Everything you need to know</title>
		<link>https://smartframe.io/blog/ai-image-generators-everything-you-need-to-know/</link>
		
		<dc:creator><![CDATA[Peter Townshend]]></dc:creator>
		<pubDate>Tue, 18 Oct 2022 11:31:44 +0000</pubDate>
				<category><![CDATA[Image security]]></category>
		<category><![CDATA[News & Features]]></category>
		<category><![CDATA[artificial intelligence]]></category>
		<category><![CDATA[copyright]]></category>
		<category><![CDATA[digital imaging]]></category>
		<category><![CDATA[image security]]></category>
		<category><![CDATA[protection]]></category>
		<category><![CDATA[security]]></category>
		<guid isPermaLink="false">https://smartframe.io/?p=78706</guid>

					<description><![CDATA[<p>AI image generators have exploded in popularity. But how exactly do they [&#8230;]</p>
<p>The post <a href="https://smartframe.io/blog/ai-image-generators-everything-you-need-to-know/">AI image generators: Everything you need to know</a> appeared first on <a href="https://smartframe.io">SmartFrame</a>.</p>
]]></description>
										<content:encoded><![CDATA[		<div data-elementor-type="wp-post" data-elementor-id="78706" class="elementor elementor-78706" data-elementor-post-type="post">
				<div class="elementor-element elementor-element-52a1f60d e-flex e-con-boxed e-con e-parent" data-id="52a1f60d" data-element_type="container" data-e-type="container" data-settings="{&quot;ekit_has_onepagescroll_dot&quot;:&quot;yes&quot;}">
					<div class="e-con-inner">
				<div class="elementor-element elementor-element-53019620 elementor-widget elementor-widget-text-editor" data-id="53019620" data-element_type="widget" data-e-type="widget" data-settings="{&quot;ekit_we_effect_on&quot;:&quot;none&quot;}" data-widget_type="text-editor.default">
									<p class="blog-stand-first">AI image generators have exploded in popularity. But how exactly do they work? And why are some people raising concerns about their usage?</p>
<p>Generating images with the use of artificial intelligence (AI) is something that has been widely discussed in recent years. Stories range from positive reviews of how impressively capable this new technology is to fears that it marks the beginning of the end for the photography and creative industries.</p>
<p>But how do they work? And what can they be used for? In this article, we take a closer look at the technology to answer these questions and explore how it has already managed to gain a bad reputation in the photography industry. But first – what exactly is an AI image generator?</p>
<h4>What is an AI image generator?</h4>
<p>An AI image generator, otherwise known as a text-to-image generator, is a piece of software that uses AI to create digital images from scratch using text prompts input by a human user.</p>
<p>AI image generators have many uses, from functional jobs such as <a href="https://interiorai.com/" target="_blank" rel="noopener">redesigning the interior of your apartment</a>, creative projects like <a href="https://www.vice.com/en/article/bvmvqm/an-ai-generated-artwork-won-first-place-at-a-state-fair-fine-arts-competition-and-artists-are-pissed" target="_blank" rel="noopener">producing fine art</a>, or <a href="https://adage.com/article/agency-news/how-agencies-use-ai-image-generators-dalle-e-2-midjourney-and-stable-diffusion/2430126" target="_blank" rel="noopener">bespoke images for advertising</a> to potentially more sinister uses such as creating <a href="https://www.creativebloq.com/features/deepfake-examples" target="_blank" rel="noopener">deepfakes</a>.</p>
<h4>How do AI image generators work?</h4>
<p>At the most basic level, a user inputs a number of keywords into a piece of software and a digital image based on those keywords is created.</p>
<p>This may sound simple, but an awful lot of technology would have been used to create and train the software.</p>
<p>Just like a human, a computer cannot create an image of something it has never seen. Therefore, every AI image generator has been trained on millions, if not billions, of digital images to understand what things look like. It then uses this knowledge to make an educated choice about what to draw when prompted by text keywords.</p>
<p>Without such training, AI image generators would not be fit for purpose. For example, if you had never seen what a cat looks like – or heard a description of one – trying to draw an accurate representation from the name alone would prove difficult. AI image generators can encounter the same problem.</p>
<p>For further reading, we recently wrote an article <a href="https://smartframe.io/blog/the-problem-with-googles-new-sr3-image-upscaling-technology/">that f</a><a href="https://smartframe.io/blog/the-problem-with-googles-new-sr3-image-upscaling-technology/">ocused on Google’s SR-3 AI-powered image upscaling technology</a>, which uses very similar techniques.</p>
<h4>Can anyone use AI image generators?</h4>
<p>Yes and no. In most cases, you do not need to be a software engineer to use AI image generators. Indeed, there are already reports of <a href="https://petapixel.com/2022/09/06/you-can-now-buy-and-sell-ai-image-prompts-on-a-marketplace/" target="_blank" rel="noopener">AI image generator prompts for sale</a> on marketplaces, which makes it even easier for users to create high-quality results.</p>
<p>The more sought-after technology, however, is often subject to waiting lists and paywalls. Anyone can register for access, though, so once the model has been properly tested, you should expect to see AI image generators readily available to the general public.</p>
<h3>Examples of AI image generators</h3>
<p>Three of the main AI image generator models are DALL-E, Stable Diffusion, and Midjourney. They each have different ways of working and, indeed, different results. Take a closer look below:</p>
<h5>DALL-E</h5>
<p><strong>Author:</strong> OpenAI</p>
<p><strong>Website:</strong> <a href="https://openai.com/blog/dall-e/" target="_blank" rel="noopener">https://openai.com/blog/dall-e/</a></p>
<div class="youtube-container">
<p><iframe title="YouTube video player" src="https://www.youtube.com/embed/qTgPSKKjfVg" width="560" height="315" frameborder="0" allowfullscreen="allowfullscreen"></iframe></p>
</div>

<h5>Stable Diffusion</h5>
<p><strong>Author:</strong> StabilityAI</p>
<p><strong>Website:</strong> <a href="https://stability.ai/blog/stable-diffusion-public-release" target="_blank" rel="noopener">https://stability.ai/blog/stable-diffusion-public-release</a></p>
<div class="youtube-container">
<p><iframe title="YouTube video player" src="https://www.youtube.com/embed/ltLNYA3lWAQ" width="560" height="315" frameborder="0" allowfullscreen="allowfullscreen"></iframe></p>
</div>

<h5>Midjourney</h5>
<p><strong>Author:</strong> Midjourney</p>
<p><strong>Website:</strong> <a href="https://midjourney.gitbook.io/docs/" target="_blank" rel="noopener">https://midjourney.gitbook.io/docs/</a></p>
<div class="youtube-container">
<p><iframe title="YouTube video player" src="https://www.youtube.com/embed/m5FnWkSxNp8" width="560" height="315" frameborder="0" allowfullscreen="allowfullscreen"></iframe></p>
</div>

<h4>What’s the problem with AI image generators?</h4>
<p>Arguably the main problem with AI image generators concerns the general lack of regulation around the technology.</p>
<p>Perhaps the most widely discussed issue is the harm that can be caused by deepfakes, although the problems with the technology are broader than this, and could bring serious issues for the photography industry on many levels.</p>
<h5>Deepfakes</h5>
<p>Some generators prevent a user from creating images that include celebrities or other famous faces. But as the technology develops and becomes democratized, it is impossible to deny the threat of disinformation that can arise from this.</p>
<p><a href="https://www.boredpanda.com/ai-images-of-celebrities-as-if-nothing-happened-to-them-alper-yesiltas" target="_blank" rel="noopener">This </a><a href="https://www.boredpanda.com/ai-images-of-celebrities-as-if-nothing-happened-to-them-alper-yesiltas" target="_blank" rel="noopener">article</a> by a photographer who used AI to imagine how dead celebrities would look if they were still alive today shows the remarkable possibilities. Furthermore, the video below shows the somewhat unnerving capabilities of the technology in video.</p>
<p><strong>Learn more: </strong><a href="https://smartframe.io/blog/deepfake-videos-have-us-concerned-are-we-overlooking-another-threat/"><strong>Deepfake videos have us concerned, but are we overlooking a more sinister threat found within them?</strong></a></p>
<div class="youtube-container">
<p><iframe loading="lazy" title="YouTube video player" src="https://www.youtube.com/embed/iyiOVUbsPcM" width="560" height="315" frameborder="0" allowfullscreen="allowfullscreen"></iframe></p>
</div>
<h5>Copyright infringement</h5>
<p>There are two main issues around copyright and AI image generators. The first is whether the images that are used to train the software have been licensed. The second is the issue of who owns the copyright to the final image.</p>
<p><strong>Image training</strong></p>
<p>As AI image generators are trained using existing digital images, there is also a question over how these images have been sourced – and whether they have been properly licensed.</p>
<p>For example, take a look at <a href="https://www.theverge.com/2022/9/15/23340673/ai-image-generation-stable-diffusion-explained-ethics-copyright-data" target="_blank" rel="noopener">this article</a> from <em>The Verge</em>, which includes evidence of an AI image generator reproducing the Getty Images watermark. This suggests the software is being trained using images that have not been paid for.</p>
<p>Furthermore, the question of whether <a href="https://www.globenewswire.com/en/news-release/2022/03/22/2407399/0/en/Getty-Images-Launches-Industry-First-Model-Release-Supporting-Data-Privacy-in-Artificial-Intelligence-and-Machine-Learning.html" target="_blank" rel="noopener">valid model releases</a> have been obtained raises another issue around personal data misuse.</p>
<p>All this evidence has prompted <a href="https://petapixel.com/2022/09/21/getty-images-ban-ai-generated-pictures-shutterstock-following-suit/" target="_blank" rel="noopener">Getty Images</a> and <a href="https://petapixel.com/2022/09/15/photography-website-bans-ai-generated-images-from-its-platform/" target="_blank" rel="noopener">PurplePort</a> to ban AI-generated images from their platforms – and <a href="https://www.vice.com/en/article/v7vzpj/shutterstock-is-removing-ai-generated-images" target="_blank" rel="noopener">Shutterstock is following suit</a>.</p>
<p><strong>Intellectual property</strong></p>
<p>Another potential problem is the question of who owns the rights to the final image that is produced.</p>
<p>The <a href="https://www.copyright.gov/" target="_blank" rel="noopener">US Copyright Office</a> recently <a href="https://www.copyright.gov/rulings-filings/review-board/docs/a-recent-entrance-to-paradise.pdf" target="_blank" rel="noopener">dismissed a claim</a> by an AI image creator who tried to attribute the rights to an AI-generated image to the algorithm that created it.</p>
<p>US law says that works can only be protected by copyright if they were created by a human. Therefore, if a computer, a <a href="https://www.wipo.int/wipo_magazine/en/2018/01/article_0007.html" target="_blank" rel="noopener">monkey</a>, or some other non-human author was responsible for it coming into existence, it is not possible for anyone to claim ownership over that work.</p>
<p>This is, however, a contentious issue that we would expect to continue evolving as the technology grows.</p>
<h4>Taking work away from creators</h4>
<p>While the above issues focus on specific pieces of AI-generated imagery, there is a wider concern over the photography and creative industries as a whole.</p>
<p>As this technology matures and becomes more capable, people may no longer see the benefit of paying for creative talent.</p>
<p>This issue of democratizing creativity is one that could have a significant impact on not just the photography industry, but also art, CGI, architecture, and much more.</p>
<p><script async src="https://static.smartframe.io/embed.js"></script><smartframe-embed customer-id="7d0b78d6f830c45ae5fcb6734143ff0d" image-id="shutterstock_337756166_1665572192667" theme="blog-new" style="width: 100%; display: inline-flex; aspect-ratio: 6000/4000; max-width: 6000px;"></smartframe-embed></p>
<!-- https://smartframe.io/embedding-support -->
<h4>Why is the AOP concerned about changes to the UK’s copyright framework?</h4>
<p>It is perhaps unsurprising that many potential issues surrounding AI image generators have caught the attention of the <a href="https://www.the-aop.org/" target="_blank" rel="noopener">Association of Photographers</a> (AOP), a UK-based organization that promotes and protects the rights of photographers, which has recently released a <a href="https://www.aopawards.com/ai-data-mining-and-what-it-means-for-you/" target="_blank" rel="noopener">statement</a> regarding the <a href="https://www.gov.uk/government/consultations/artificial-intelligence-and-ip-copyright-and-patents/outcome/artificial-intelligence-and-intellectual-property-copyright-and-patents-government-response-to-consultation#about-the-consultation" target="_blank" rel="noopener">proposed exception to the UK’s copyright bill</a> – the Text and Data Mining Exception.</p>
<p>In its own words, the AOP states that: “Currently, the Text and Data Mining exception (to copyright protection) permits non-commercial purpose machine analysis of online content, provided that there is lawful access (such as a subscription). It is also limited to prevent the resale or reuse for other purposes and must be accompanied by an acknowledgment of the source.</p>
<p>“This new proposed Text and Data Mining exception for commercial purposes – by the UK government – undermines this by freely allowing the machine mining of all imagery published online for any use by anyone, including AI developers. It would cover both copyright works and those protected by the <a href="https://www.gov.uk/guidance/sui-generis-database-rights" target="_blank" rel="noopener">UK Database Rights</a>.”</p>
<p>It goes on to talk about “serious economic consequences”, saying that the proposal “completely short-circuits the licensing process allowing AI developers and others free commercial access to content for which, under normal circumstances, they would have to license and pay for.”</p>
<p>Identifying AI bots and crawlers as being able to scrape images from creators’ websites and social media pages in an instant, the AOP concludes that this “change in UK legislation would fundamentally turn the tables on creators giving way to economically harmful competition by allowing a content ‘free for all’ and invoking an unfair machine-endeavour vs. human endeavour scenario.”</p>
<h4>What does it all mean for the digital imaging industry?</h4>
<p>With so much still to be decided, it is hard to predict just how AI image generators will affect the imaging industry.</p>
<p>With bottom lines being squeezed tighter than ever, many commercial organizations will welcome the arrival of a cheaper alternative to traditional methods. But will the appeal of truly human creation ever die? The character that comes with an artist’s unique personality and life experience is something that is impossible to emulate.</p>
<p>With photography, it&#8217;s easy to imagine concerns over commercial usage in genres such as fashion or fine art. But in most cases, photography is used commercially as a way to document real-life occurrences or locations, such as a wedding day, a news event, or a travel destination – and it would be extremely difficult to effectively replace this kind of photography with an AI image generator.</p>
<p>There is, of course, also a certain magic in capturing the beauty of a moment you have witnessed. And when you consider this, it&#8217;s difficult to imagine a world of humans without photography.</p>								</div>
					</div>
				</div>
				</div>
		<p>The post <a href="https://smartframe.io/blog/ai-image-generators-everything-you-need-to-know/">AI image generators: Everything you need to know</a> appeared first on <a href="https://smartframe.io">SmartFrame</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>The 5 biggest GDPR fines and why they were issued</title>
		<link>https://smartframe.io/blog/the-5-biggest-gdpr-fines-and-why-they-were-issued/</link>
		
		<dc:creator><![CDATA[Peter Townshend]]></dc:creator>
		<pubDate>Fri, 23 Sep 2022 12:17:21 +0000</pubDate>
				<category><![CDATA[Image security]]></category>
		<category><![CDATA[In-image advertising]]></category>
		<category><![CDATA[News & Features]]></category>
		<category><![CDATA[advertising]]></category>
		<category><![CDATA[security]]></category>
		<guid isPermaLink="false">https://smartframe.io/?p=78349</guid>

					<description><![CDATA[<p>Here’s our rundown of the five biggest fines issued under the European [&#8230;]</p>
<p>The post <a href="https://smartframe.io/blog/the-5-biggest-gdpr-fines-and-why-they-were-issued/">The 5 biggest GDPR fines and why they were issued</a> appeared first on <a href="https://smartframe.io">SmartFrame</a>.</p>
]]></description>
										<content:encoded><![CDATA[		<div data-elementor-type="wp-post" data-elementor-id="78349" class="elementor elementor-78349" data-elementor-post-type="post">
				<div class="elementor-element elementor-element-440c1966 e-flex e-con-boxed e-con e-parent" data-id="440c1966" data-element_type="container" data-e-type="container" data-settings="{&quot;ekit_has_onepagescroll_dot&quot;:&quot;yes&quot;}">
					<div class="e-con-inner">
				<div class="elementor-element elementor-element-4c8d459a elementor-widget elementor-widget-text-editor" data-id="4c8d459a" data-element_type="widget" data-e-type="widget" data-settings="{&quot;ekit_we_effect_on&quot;:&quot;none&quot;}" data-widget_type="text-editor.default">
									<p class="blog-stand-first">Here’s our rundown of the five biggest fines issued under the European Union’s General Data Protection Regulation (GDPR)</p>
<p><a href="https://gdpr.eu/" target="_blank" rel="noopener">GDPR</a> was implemented in 2018 with the aim of protecting personal data and privacy in the European Union (EU) and European Economic Area (EEA).</p>
<p>Since its introduction, there have been a number of big fines for big tech. But with Instagram racking up the second largest fine under the regulation just weeks ago, are there still lessons to be learned?</p>
<p>In this article we list the five biggest GDPR fines since the regulations were introduced, take a closer look at why they were issued, and explore why some believe the regulation isn’t capable of delivering on its promises.</p>
<h4> 1: Amazon – €746m</h4>
<p>Currently, the biggest GDPR fine by far is the €746m whopper that was imposed on Amazon by Luxembourg’s <a href="https://cnpd.public.lu/en.html" target="_blank" rel="noopener">National Commission for Data Protection</a> (CNPD) on 16 July 2021.</p>
<p>The fine was likely triggered thanks to a <a href="https://gafam.laquadrature.net/wp-content/uploads/sites/9/2018/05/amazon.pdf" target="_blank" rel="noopener">complaint</a> filed in May 2018 by 10,000 people, through the French privacy rights group <a href="https://www.laquadrature.net/" target="_blank" rel="noopener">La Quadrature du Net</a>. This complaint alleged that Amazon had utilized users’ private data to target advertisements without consent. A full statement from La Quadrature du Net can be found <a href="https://www.laquadrature.net/2021/07/30/amende-de-746-millions-deuros-contre-amazon-suite-a-nos-plaintes-collectives/" target="_blank" rel="noopener">here</a>.</p>
<p>In its <a href="https://d18rn0p25nwr6d.cloudfront.net/CIK-0001018724/cbae1abf-eddb-4451-9186-6753b02cc4eb.pdf" target="_blank" rel="noopener">company filings</a> dated 29 July 2021, Amazon made clear its disagreement with the fine, saying: “We believe the CNPD’s decision to be without merit and intend to defend ourselves vigorously in this matter.” Amazon <a href="https://www.bloomberg.com/news/articles/2021-10-15/amazon-fights-record-865-million-eu-data-protection-fine?leadSource=uverify%20wall" target="_blank" rel="noopener">filed its appeal</a> in October 2021 and the case is ongoing at the time of writing.</p>
<p>With previous fines for <a href="https://techcrunch.com/2020/10/16/uks-ico-downgrades-british-airways-data-breach-fine-to-20m-after-originally-setting-it-at-184m/" target="_blank" rel="noopener">British Airways</a> and for <a href="https://techcrunch.com/2020/10/30/uk-watchdog-reduces-marriott-data-breach-fine-to-23-8m-down-from-123m/" target="_blank" rel="noopener">Marriott</a> being reduced significantly, it is possible that Amazon could still shake off this somewhat unwelcome title – so watch this space.</p>
<h4>2: Instagram – €405m</h4>
<p>The second biggest GDPR fine on the list is the €405m fine Instagram was hit with on 28 July 2022 by the <a href="https://www.dataprotection.ie/" target="_blank" rel="noopener">Irish Data Protection Commission</a> (DPC) – Ireland’s supervisory authority for the GDPR.</p>
<p>A <a href="https://www.dataprotection.ie/en/news-media/press-releases/data-protection-commission-announces-decision-instagram-inquiry" target="_blank" rel="noopener">statement</a> from the DPC outlined the reasons behind the fine, saying it marks the end of an inquiry into “the processing of personal data relating to child users of the Instagram social networking service.”</p>
<p>The DPC names US data scientist David Stier as the source of information that sparked the inquiry back in September 2020, noting the two main complaints as “the public disclosure of email addresses and/or phone numbers of children using the Instagram business account feature and a public-by-default setting for personal Instagram accounts of children.”</p>
<p>Following the referral of the case to the <a href="https://edpb.europa.eu/edpb_en" target="_blank" rel="noopener">European Data Protection Board</a> (EDPB) due to objections from a number of Concerned Supervisory Authorities (CSAs), a binding decision was <a href="https://edpb.europa.eu/our-work-tools/our-documents/binding-decision-board-art-65/binding-decision-22022-dispute-arisen_en" target="_blank" rel="noopener">published</a> on 15 September 2022, imposing the €405m fine. The fine was accompanied by an order for Instagram’s owner, Meta Platforms Ireland Limited, “to bring its processing into compliance by taking a range of specified remedial actions.”</p>
<p>Instagram has since updated its settings and released new safety features. However, Reuters has <a href="https://www.reuters.com/technology/irish-regulator-fines-instagram-400-million-over-chidrens-data-2022-09-05/" target="_blank" rel="noopener">reported</a> that a spokesperson for the platform said: “Instagram disagrees with how the fine was calculated and is carefully reviewing the decision.”</p>
<h4>3: WhatsApp – €225m</h4>
<p>The third biggest GDPR fine was issued to Meta-owned messaging app WhatsApp in 2021 by the Irish DPC.</p>
<p>It was the result of an investigation that began on 10 December 2018 into what the DPC described in a <a href="https://www.dataprotection.ie/en/news-media/press-releases/data-protection-commission-announces-decision-whatsapp-inquiry" target="_blank" rel="noopener">statement</a> as “the provision of information and the transparency of that information to both users and non-users of WhatsApp’s service.”</p>
<p>Once again, the Irish DPC faced opposition from CSAs, meaning the case was referred to the EDPB, which <a href="https://edpb.europa.eu/our-work-tools/our-documents/binding-decision-board-art-65/binding-decision-12021-dispute-arisen_en" target="_blank" rel="noopener">published</a> a binding decision on 2 September 2021.</p>
<p>The BBC <a href="https://www.bbc.co.uk/news/technology-58422465" target="_blank" rel="noopener">reported</a> a WhatsApp spokesperson saying: “We have worked to ensure the information we provide is transparent and comprehensive and will continue to do so. We disagree with the decision today regarding the transparency we provided to people in 2018 and the penalties are entirely disproportionate.”</p>
<p>WhatsApp launched an <a href="https://eur-lex.europa.eu/legal-content/EN/TXT/PDF/?uri=CELEX:62021TN0709" target="_blank" rel="noopener">appeal</a> against the ruling on 3 January 2022. At the time of writing the case is ongoing.</p>
<h4>4 and 5: Google – €90m + €60m</h4>
<p>Google was on the receiving end of the fourth and fifth biggest GDPR fines when the <a href="https://www.cnil.fr/en/home" target="_blank" rel="noopener">Commission Nationale de l’Informatique et des Libertés</a> (CNIL – French Data Protection Authority) found it to be more difficult for French users to reject cookies on google.fr and youtube.com than it was to accept them.</p>
<p>Fines of €90m for Google LLC and €60m for Google Ireland Ltd – in line with the GDPR’s <a href="https://ec.europa.eu/info/law/law-topic/data-protection/reform/rules-business-and-organisations/enforcement-and-sanctions/enforcement/what-happens-if-my-company-processes-data-different-eu-member-states_en#:~:text=The%20GDPR%20also%20introduces%20the,case%20of%20cross%2Dborder%20processing." target="_blank" rel="noopener">One Stop Shop</a> mechanism – were <a href="https://www.cnil.fr/sites/default/files/atoms/files/deliberation_of_the_restricted_committee_no._san-2021-023_of_31_december_2021_concerning_google_llc_and_google_ireland_limited.pdf" target="_blank" rel="noopener">imposed</a> by the CNIL on 31 December 2021, followed by a 6 January 2022 <a href="https://www.cnil.fr/en/cookies-google-fined-150-million-euros" target="_blank" rel="noopener">announcement</a> on the authority’s website to clarify the decision, saying:</p>
<p>“The restricted committee, the CNIL body in charge of issuing sanctions, judged that making the refusal mechanism more complex actually discourages users from refusing cookies and encourages them to opt for the ease of the ‘I accept’ button.</p>
<p>“The restricted committee considered that this process affects the freedom of consent of Internet users and constitutes an infringement of Article 82 of the French Data Protection Act, since it is not as easy to refuse cookies as to accept them.”</p>
<p>It goes on to justify the fine amounts “by the number of people affected and the considerable profits that the companies make from advertising revenues indirectly generated from the data collected by cookies.”</p>
<p>Notably, the CNIL includes that it had already warned Google about these breaches prior to the penalties and that this was taken into consideration when calculating the fines.</p>
<p>Google’s response was one of acceptance, with Reuters <a href="https://www.reuters.com/world/europe/france-imposes-fines-facebook-ireland-google-2022-01-06/" target="_blank" rel="noopener">quoting</a> a Google spokesperson as saying: “People trust us to respect their right to privacy and keep them safe. We understand our responsibility to protect that trust and are committing to further changes and active work with the CNIL in light of this decision.”</p>
<p><script src="https://embed.smartframe.io/7d0b78d6f830c45ae5fcb6734143ff0d.js" data-image-id="shutterstock_497068513_1663753828110" data-width="100%" data-max-width="5760px" data-theme="captions-article-1"></script></p>
<h4>Is GDPR working?</h4>
<p>Since the launch of GDPR, many have doubted its effectiveness in controlling the use of data by big businesses, especially the tech behemoths of Silicon Valley.</p>
<p>With this combined top five totaling an eye-watering €1.526bn, regulators seem to be flexing their muscles. But is it enough to make a difference?</p>
<p>Let’s take a look at the numbers.</p>
<p>While €746m is certainly a lot of money, it was approximately only 0.2%* of Amazon’s 2020 annual revenue, which <a href="https://www.forbes.com/sites/shelleykohan/2021/02/02/amazons-net-profit-soars-84-with-sales-hitting-386-billion/" target="_blank" rel="noopener">reportedly</a> totaled $386bn. This is far from the maximum 4% of turnover <a href="https://gdpr.eu/fines/" target="_blank" rel="noopener">outlined</a> on the GDPR website.</p>
<p>Google had it even easier, with €150m making up approximately 0.09%* of its <a href="https://www.globaldata.com/data-insights/internet-services-technology-media-and-telecom/googles-revenue/" target="_blank" rel="noopener">reported</a> $182.53bn 2020 revenue.</p>
<p>And with revenue of $117.9bn <a href="https://www.globaldata.com/data-insights/internet-services-social-media-technology-media-and-telecom/metas-annual-revenue/" target="_blank" rel="noopener">reported</a> for the 2021 fiscal year, Instagram’s owner Meta had generated enough money to match its €405m fine in approximately a day and a half.*</p>
<p>When you consider that many of the tech giants <a href="https://www.statista.com/statistics/218701/largest-source-of-revenue-of-leading-tech-companies/" target="_blank" rel="noopener">generate a large proportion</a> of their revenues from digital advertising (which in most cases has historically used third-party cookies to target audiences), many could argue that these fines are a small price to pay.</p>
<p>Furthermore, when you combine this with the fact that the long timeframes required to enforce such fines have led to significant <a href="https://www.cpomagazine.com/data-protection/outgoing-privacy-commissioner-calls-gdpr-broken-says-that-basic-model-cant-work/" target="_blank" rel="noopener">backlogs</a>, it’s easy to see why many <a href="https://www.wired.com/story/gdpr-2022/" target="_blank" rel="noopener">question</a> how effective GDPR really is.</p>
<p>Having said that, while these fines may seem small in the context of the recipients’ overall revenue, they are by no means insignificant and have certainly grabbed headlines, helping to raise global awareness of the issues surrounding online privacy and personal data.</p>
<p>It is also important to remember that the 4% of turnover figure mentioned above is the maximum penalty. The actual fines that are imposed must reflect the severity of the offense. After all, if every violation was met with the maximum punishment, there would be no reason for a potential offender to hold back.</p>
<p>Finally and perhaps most crucially of all is that, in most cases, the GDPR fines that have been imposed have brought about positive change to the way the recipients handle personal data.</p>
<p>With this in mind, it’s hard to deny that a digital world with GDPR is ultimately a better place than it was without it.</p>
<p><em>*Calculated using exchange rates correct on the date of the fine being issued.</em></p>								</div>
					</div>
				</div>
				</div>
		<p>The post <a href="https://smartframe.io/blog/the-5-biggest-gdpr-fines-and-why-they-were-issued/">The 5 biggest GDPR fines and why they were issued</a> appeared first on <a href="https://smartframe.io">SmartFrame</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Negative body image: Should retouched images be labeled as such?</title>
		<link>https://smartframe.io/blog/negative-body-image-should-retouched-images-be-labeled-as-such/</link>
		
		<dc:creator><![CDATA[Peter Townshend]]></dc:creator>
		<pubDate>Wed, 21 Sep 2022 14:43:45 +0000</pubDate>
				<category><![CDATA[Image security]]></category>
		<category><![CDATA[Presentation]]></category>
		<category><![CDATA[digital imaging]]></category>
		<category><![CDATA[presentation]]></category>
		<category><![CDATA[protection]]></category>
		<category><![CDATA[security]]></category>
		<category><![CDATA[social media]]></category>
		<guid isPermaLink="false">https://smartframe.io/?p=78128</guid>

					<description><![CDATA[<p>A recent paper reported clear links between negative body image and retouched [&#8230;]</p>
<p>The post <a href="https://smartframe.io/blog/negative-body-image-should-retouched-images-be-labeled-as-such/">Negative body image: Should retouched images be labeled as such?</a> appeared first on <a href="https://smartframe.io">SmartFrame</a>.</p>
]]></description>
										<content:encoded><![CDATA[		<div data-elementor-type="wp-post" data-elementor-id="78128" class="elementor elementor-78128" data-elementor-post-type="post">
				<div class="elementor-element elementor-element-7ec85b68 e-flex e-con-boxed e-con e-parent" data-id="7ec85b68" data-element_type="container" data-e-type="container" data-settings="{&quot;ekit_has_onepagescroll_dot&quot;:&quot;yes&quot;}">
					<div class="e-con-inner">
				<div class="elementor-element elementor-element-13f3a0da elementor-widget elementor-widget-text-editor" data-id="13f3a0da" data-element_type="widget" data-e-type="widget" data-settings="{&quot;ekit_we_effect_on&quot;:&quot;none&quot;}" data-widget_type="text-editor.default">
									<p class="blog-stand-first">A recent paper reported clear links between negative body image and retouched digital images in advertising and on social media. So is labeling retouched images the answer?</p>
<p>On August 2, 2022, the UK’s <a href="https://committees.parliament.uk/committee/81/health-and-social-care-committee/" target="_blank" rel="noopener">Health &amp; Social Care Committee</a> published a <a href="https://publications.parliament.uk/pa/cm5803/cmselect/cmhealth/114/report.html" target="_blank" rel="noopener">report</a> that focused on the impact of body image on mental and physical health.</p>
<p>The report had some alarming findings – and, unsurprisingly, found that retouched digital images were recognized as a driver of negative body image. Here, we look at the broader findings of the report, the recommendations it makes, the role played by digital images in particular, and the ways in which the issue could be mitigated. </p>
<h4>What is negative body image?</h4>
<p>Negative body image refers to a person&#8217;s dissatisfaction with the way their body looks. This could be down to its size, for example, its shape, or its general appearance.</p>
<p>Looking in the mirror and feeling like you could lose a few pounds may be dismissed as a harmless passing thought by many. But in such a hyper-connected world that is dominated by unregulated digital media, negative body image has the potential to develop into a more serious issue.</p>
<p>For example, <a href="https://centerforchange.com/battling-bodies-understanding-overcoming-negative-body-images" target="_blank" rel="noopener">it has been linked</a> to damaging physical and mental disorders, such as body dysmorphic disorder, anorexia nervosa, bulimia nervosa, and depression.</p>
<h4>What were the findings of the report?</h4>
<p>The Health &amp; Social Care Committee’s paper reported a number of concerning statistics around body image and mental health.</p>
<p>A <a href="https://www.mentalhealth.org.uk/explore-mental-health/articles/body-image-report-executive-summary" target="_blank" rel="noopener">2019 study by the Mental Health Foundation</a>, for example, found that 20% of adults felt shame, 34% felt down or low, and 19% felt disgusted by their body image at some point in the preceding year. The same study found that 13% of adults felt suicidal thoughts as a result of negative body image.</p>
<p>Furthermore, it was found that 21% of adults cited images used in advertising as a cause of negative body image, while 40% of teenagers said their body image issues were caused by images on social media.</p>
<p>In this article, our main focus is on sections 61-63 of the report, which concentrate on the potential link between negative body image and retouched digital images used in advertising and social media. The report states:</p>
<p>“We believe that more needs to be done in regard to the regulation of digitally altered images for advertising and social media use. We heard evidence about the potential harm from online content that promotes an idealized, often doctored and unrealistic, body image and the link to developing low self-esteem and related mental health conditions.”</p>
<p>The report goes on to recommend that specific action is taken, calling for new research into the impact of social media on body image dissatisfaction. It emphasizes the need to better equip new generations with skills such as critical thinking and image appraisal that can help them recognize when an image has been retouched.</p>
<p>It also calls for the clear labeling of retouched commercial images. “We believe the Government should introduce legislation that ensures commercial images are labeled with a logo where any part of the body,” it says, “including its proportions and skin tone, are digitally altered.” </p>
<p>This is a practice <a href="https://www.dpreview.com/news/1157704583/norway-passes-law-requiring-influencers-to-label-retouched-photos-on-social-media" target="_blank" rel="noopener">already adopted</a> in Norway with the passing of a <a href="https://www.stortinget.no/no/Saker-og-publikasjoner/Vedtak/Beslutninger/Lovvedtak/2020-2021/vedtak-202021-146/" target="_blank" rel="noopener">new law</a> in 2021 that requires content creators to &#8220;ensure that the advertisement in which the shape, size or skin of a body has been changed by retouching or other manipulation must be marked.&#8221;</p>
<p><script async src="https://static.smartframe.io/embed.js"></script><smartframe-embed customer-id="7d0b78d6f830c45ae5fcb6734143ff0d" image-id="shutterstock_2175784879_1662466566117" theme="blog-new" style="width: 100%; display: inline-flex; aspect-ratio: 6776/5208; max-width: 6776px;"></smartframe-embed><!-- https://smartframe.io/embedding-support --></p>
<h4>What role do digital images play in fueling negative body image?</h4>
<p>With so much different content hitting us from so many different angles today, there are countless ways retouched digital images can find their way into our lives and contribute to negative body image.</p>
<p>However, the Health &amp; Social Care Committee’s report quotes a number of individuals who cite social media as playing a significant role. This view is backed up by a <a href="https://www.sciencedirect.com/science/article/abs/pii/S1740144516300912" target="_blank" rel="noopener">study from Science Direct</a>, which found that social networking is positively related to body image concerns.</p>
<p>With a <a href="https://datareportal.com/reports/digital-2022-july-global-statshot" target="_blank" rel="noopener">reported</a> 4.7 billion social media users worldwide spending an average of 2hrs 29min a day on these networks, is the connection really a surprise?</p>
<p>Social media influencers in particular have faced criticism for their role in this in recent years, leading to body-positive campaigns like the <a href="https://www.dove.com/uk/stories/about-dove/dove-real-beauty-pledge.html" target="_blank" rel="noopener">Dove Real Beauty Pledge</a> and hashtags like #bodypositive and #nofilter, which have helped to put a greater focus on self-esteem and authenticity.</p>
<p>However, while this greater responsibility around commercial content has helped to raise awareness, <a href="https://www.sciencedirect.com/science/article/abs/pii/S1740144514001375?via%3Dihub" target="_blank" rel="noopener">research</a> shows that the biggest driver of negative body image is actually content from friends and acquaintances.</p>
<p>This is concerning because, while commercial content can be regulated by consumer-protection bodies such as the UK’s <a href="https://www.asa.org.uk/" target="_blank" rel="noopener">Advertising Standards Authority</a> (ASA) and the USA’s <a href="https://www.ftc.gov/business-guidance/advertising-marketing" target="_blank" rel="noopener">Federal Trade Commission</a> (FTC), personal content from friends and connections is much harder to control.</p>
<h4>What defines a retouched image?</h4>
<p>The idea of labeling an image to indicate it has been retouched – as the Health and Social Care Committee’s paper suggests – is certainly the right sentiment. The only problem is that defining a ‘retouched’ image is harder than it sounds.</p>
<p>It wasn’t long ago that many of us would regard image retouching as a practice reserved for professionals in expensive photo-editing suites, airbrushing images of supermodels on national magazine covers and high-level advertising campaigns.</p>
<p>Today, however, retouching images is easy and often free through software programs and <a href="https://www.perfectcorp.com/consumer/blog/selfie-editing/top-5-best-free-selfie-app-for-editing-and-enhancing" target="_blank" rel="noopener">countless apps</a> that can do anything from adding eye shadow to completely reshaping facial features. These apps are simple to use and, in many cases, the technology is so advanced that it can be difficult for the untrained eye to spot.</p>
<p>Apps such as these are the more extreme examples of image retouching being used to deliberately alter a subject’s physical appearance, but there are many other less obvious and arguably less damaging ways to change the appearance of an image. So where do you draw the line?  </p>
<p>For example, professional portrait photographers often spend a significant amount of time and effort using image-editing software to ensure their photographs look their best. While they may not change the physical appearance of the subject, it is likely they will make tweaks to contrast or color to enhance the overall result. So should these images be flagged as being retouched?</p>
<p>Even digital images straight out of the camera with no filters or subsequent editing cannot be described as truly authentic due to the processing that happens in-camera between the sensor capturing the scene and the image file being created.</p>
<p>Then there is the question of the hardware that is used. A lens with a moderately long focal length and a wide aperture that can achieve a shallow depth-of-field is usually the most flattering equipment setup for portraiture. Granted, this is not <em>re</em>touching, but could be considered a form of image manipulation. Should this also be taken into consideration?  </p>
<p>With so many ways to alter an image, and degrees to which it can be manipulated, what is the answer? </p>
<p><script async src="https://static.smartframe.io/embed.js"></script><smartframe-embed customer-id="7d0b78d6f830c45ae5fcb6734143ff0d" image-id="shutterstock_1599273028_1662466565846" theme="blog-new" style="width: 100%; display: inline-flex; aspect-ratio: 5120/2880; max-width: 5120px;"></smartframe-embed><!-- https://smartframe.io/embedding-support --></p>
<h4>Potential solutions</h4>
<p>Labeling images as one or the other is a step in the right direction. But with so much grey area surrounding what constitutes a &#8216;retouched&#8217; image, the more useful option would be to provide complete transparency over what edits have been made.</p>
<p>This can already be achieved with technology such as the <a href="https://contentauthenticity.org/" target="_blank" rel="noopener">Content Authenticity Initiative</a> (CAI), which is currently in development. By adopting CAI technology, it is possible to automatically attach tamper-evident image provenance data to a digital image in-camera at the time of its capture, such as date, location, author, and technical information.</p>
<p>Furthermore, CAI can track and record every edit that is made to a digital image throughout its lifetime, from simple contrast adjustments or filters right up to compositing and more advanced image editing. It is even possible to view thumbnails of the image before and after edits were made.</p>
<p>Rather than having to determine whether or not each and every image has been retouched, this approach provides the user with all the information they need to make their own decision on the trustworthiness of what they see. </p>
<p><strong>Learn more:  </strong><strong><a href="https://smartframe.io/blog/content-authenticity-initiative-what-you-need-to-know/">Content Authenticity Initiative: What you need to know</a></strong></p>
<p><a href="https://smartframe.io/">Image-streaming technology</a>, which has been used to display the images in the body of this article, can also be useful here.</p>
<p>This method of publishing images online provides built-in captions for context; permanent attribution and theft deterrents for security; and interactive features like Hyper Zoom and full-screen viewing for higher engagement. A <a href="https://smartframe.io/blog/smartframe-and-cai-working-together-to-validate-provenance-and-improve-image-protection/" rel="noopener">demo that incorporates both systems</a> has also been developed.</p>
<h4>Conclusion</h4>
<p>While some images used for advertising or posted on social media can be problematic, deciding on and labeling retouched images is a complicated and potentially time-consuming process that could be difficult to implement effectively.</p>
<p>By adopting the technologies mentioned above, social media platforms could ensure transparency when it comes to image editing and manipulation, and address some of the issues they have had to grapple with in recent years around negative body image. </p>
<p>They could lead the way in creating safe havens for digital imaging in which users can make their own decisions on the authenticity of the content they are viewing, and this could in turn pave the way for a whole new digital image ecosystem for the wider web in which content can once again be trusted.</p>								</div>
					</div>
				</div>
				</div>
		<p>The post <a href="https://smartframe.io/blog/negative-body-image-should-retouched-images-be-labeled-as-such/">Negative body image: Should retouched images be labeled as such?</a> appeared first on <a href="https://smartframe.io">SmartFrame</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Do you own the copyright to a photo of yourself? Probably not – and here’s why</title>
		<link>https://smartframe.io/blog/do-you-own-the-copyright-to-a-photo-of-yourself-probably-not-and-heres-why/</link>
		
		<dc:creator><![CDATA[Joel Miller]]></dc:creator>
		<pubDate>Mon, 18 Jul 2022 00:26:47 +0000</pubDate>
				<category><![CDATA[Image security]]></category>
		<category><![CDATA[News & Features]]></category>
		<category><![CDATA[copyright]]></category>
		<category><![CDATA[credit]]></category>
		<category><![CDATA[image security]]></category>
		<category><![CDATA[licensing]]></category>
		<category><![CDATA[protection]]></category>
		<category><![CDATA[security]]></category>
		<category><![CDATA[social media]]></category>
		<guid isPermaLink="false">https://smartframe.io/?p=77740</guid>

					<description><![CDATA[<p>Following a number of cases in which celebrities have been sued for [&#8230;]</p>
<p>The post <a href="https://smartframe.io/blog/do-you-own-the-copyright-to-a-photo-of-yourself-probably-not-and-heres-why/">Do you own the copyright to a photo of yourself? Probably not – and here’s why</a> appeared first on <a href="https://smartframe.io">SmartFrame</a>.</p>
]]></description>
										<content:encoded><![CDATA[		<div data-elementor-type="wp-post" data-elementor-id="77740" class="elementor elementor-77740" data-elementor-post-type="post">
				<div class="elementor-element elementor-element-15ea5fbc e-flex e-con-boxed e-con e-parent" data-id="15ea5fbc" data-element_type="container" data-e-type="container" data-settings="{&quot;ekit_has_onepagescroll_dot&quot;:&quot;yes&quot;}">
					<div class="e-con-inner">
				<div class="elementor-element elementor-element-3cb37dba elementor-widget elementor-widget-text-editor" data-id="3cb37dba" data-element_type="widget" data-e-type="widget" data-settings="{&quot;ekit_we_effect_on&quot;:&quot;none&quot;}" data-widget_type="text-editor.default">
									<p class="blog-stand-first">Following a number of cases in which celebrities have been sued for posting photos of themselves on social media without permission, we explore the rules around this aspect of copyright law</p>
<p><a href="https://smartframe.io/blog/can-you-post-photos-of-others-on-social-media-heres-what-you-need-to-know/">Our recent article</a> on the rules around posting photographs of other people on social media explained the various restrictions that different platforms imposed. But when it comes to posting photos of yourself, what&#8217;s actually allowed?</p>
<p>Believe it or not, being the subject of a photograph doesn’t necessarily mean you own the rights to it. Indeed, there has been a flurry of cases in recent years in which high-profile celebrities from the worlds of sport, music, and reality TV have found themselves in trouble after posting photos of themselves to social media without permission from the copyright holder.</p>
<p>Here, we take a closer look at the rules, list some specific examples of subjects being accused of copyright infringement on social media, and discuss ways in which all parties can protect themselves.</p>
<h4>Do you own the copyright to photos of yourself?</h4>
<p>Not necessarily. While privacy laws were put in place to protect the subjects of photographs, copyright laws are designed to protect the creators. As explained in the USA’s <a href="https://www.copyright.gov/title17/" target="_blank" rel="noopener">Copyright Act of 1976</a> and the UK’s <a href="https://www.legislation.gov.uk/ukpga/1988/48/contents" target="_blank" rel="noopener">Copyright, Designs and Patents Act 1988</a>, the copyright to any photograph, regardless of who or what it features, falls by default to the person who took it.</p>
<p>The main exception to this is when there has been some kind of contractual agreement beforehand, such as when an individual takes photographs during their employment. This could be a photographer who is shooting on behalf of a commercial organization, for example, or a staff photojournalist working for a newspaper.</p>
<p>While there are some exemptions, listed for the US <a href="https://www.copyright.gov/fair-use/more-info.html" target="_blank" rel="noopener">here</a> and the UK <a href="https://www.gov.uk/guidance/exceptions-to-copyright" target="_blank" rel="noopener">here</a>, it is safest to assume that unless a subject of a photo has been assigned the copyright – or indeed, the photo is a selfie – they need to seek permission from the copyright holder before they can publish it.</p>
<p><strong>Learn more: <a href="https://smartframe.io/blog/copyright-and-images-what-you-need-to-know/">Copyright and images: What you need to know</a></strong></p>
<p>If asked, it is unlikely that your best friend will mind you using a photo they took of you as your personal profile picture. On the contrary, they will probably be quite flattered. The same could be true even for a professional who took your photo at a relative’s wedding. Many photographers will simply request that they be credited.</p>
<p>Problems arise in the eyes of the photographer – and the law – if subjects use the images for commercial gain without prior permission. If there is evidence to suggest a photographer has lost earnings from such action, they will likely seek reimbursement.</p>
<p><script async src="https://static.smartframe.io/embed.js"></script><smartframe-embed customer-id="7d0b78d6f830c45ae5fcb6734143ff0d" image-id="shutterstock_719491435_1657798213343" theme="blog-new" style="width: 100%; display: inline-flex; aspect-ratio: 5315/3543; max-width: 5315px;"></smartframe-embed></p>
<!-- https://smartframe.io/embedding-support -->
<h4>Photographer vs subject copyright infringement case examples</h4>
<p>Here are a few recent examples of image owners filing lawsuits against subjects for publishing photographs of themselves without permission.</p>
<h3>Robert Barbera sues Dua Lipa</h3>
<p>New York-based photographer Robert Barbera is currently <a href="https://www.billboard.com/pro/dua-lipa-lawsuit-paparazzi-photos-instagram/" target="_blank" rel="noopener">suing</a> British singer Dua Lipa for allegedly publishing photos he took of her in 2018 without his permission.</p>
<p>The photographs were posted to the singer’s Instagram page in 2019. Barbera argues that because the page is used to promote Lipa&#8217;s music and brand, his work benefited her financially.</p>
<p>Barbera is therefore seeking actual damages, disgorgement of all profits linked to the infringement, and court costs.</p>
<p>Both parties have form. Lipa faced a similar <a href="https://storage.courtlistener.com/recap/gov.uscourts.cacd.825154/gov.uscourts.cacd.825154.1.0.pdf" target="_blank" rel="noopener">case</a> brought by Integral Images in July 2021, while Barbera has previously filed lawsuits against <a href="https://www.nme.com/news/music/ariana-grande-sued-by-photographer-for-posting-photo-of-herself-2490058" target="_blank" rel="noopener">Ariana Grande</a> and <a href="https://www.billboard.com/pro/justin-bieber-settles-copyright-lawsuit-paparazzi-photo-instagram/" target="_blank" rel="noopener">Justin Bieber</a>.</p>
<p>The case is ongoing.</p>
<h3>Backgrid sues Lisa Rinna</h3>
<p>Photo agency Backgrid brought a copyright infringement <a href="https://s3.documentcloud.org/documents/21076010/rinna-complaint-clean.pdf" target="_blank" rel="noopener">case</a> against reality TV star Lisa Rinna in June 2021, claiming she published photographs they own of her without its permission.</p>
<p>The photographs, which were taken by paparazzi photographers represented by Backgrid, were posted to Rinna’s Instagram account. At the time, Rinna had 2.7 million followers.</p>
<p>Backgrid launched a legal campaign demanding $1.2m in statutory damages, claiming loss of income. Rinna <a href="https://s3.documentcloud.org/documents/21076011/rinna-answer-clean.pdf" target="_blank" rel="noopener">responded</a> by asking the judge to dismiss the case, saying Backgrid “effectively weaponized the Copyright Act to augment its income.”</p>
<p>The two parties have <a href="https://petapixel.com/2022/06/27/actress-who-said-paparazzi-weaponize-copyright-settles-lawsuit/" target="_blank" rel="noopener">reportedly</a> now settled with the court, avoiding the need for a public trial.</p>
<h3>Steven Mitchell sues LeBron James</h3>
<p>Sports photographer Steven Mitchell sued LA Lakers basketball player LeBron James for using a picture he took of James dunking the ball against the Miami Heat in 2019.</p>
<p>The suit was filed in March 2020 against both James and his companies, Uninterrupted Digital Ventures and LRMR Ventures LLC, which Mitchell says manage the player’s Facebook page.</p>
<p>According to <a href="https://heitnerlegal.com/wp-content/uploads/LeBron-James-Copyright-Lawsuit.pdf" target="_blank" rel="noopener">court </a><a href="https://heitnerlegal.com/wp-content/uploads/LeBron-James-Copyright-Lawsuit.pdf" target="_blank" rel="noopener">documents</a>, Mitchell was seeking profits made from the Facebook post, or $150,000 for every time James used the image.</p>
<p>Interestingly, James responded by filing a <a href="https://theathletic.com/2279041/2020/12/22/lebron-james-photographer-lawsuit/?source=rss" target="_blank" rel="noopener">countersuit</a> against Mitchell for $1m, arguing that Mitchell was unlawfully using photographs of James on his website to promote his business.</p>
<p>In the end, both parties reached a <a href="https://theathletic.com/2365850/2021/02/03/lebron-james-lakers-settle-photographer-lawsuit/" target="_blank" rel="noopener">settlement</a> outside of court that resulted in the closing of both lawsuits in February 2021.</p>
<p><script async src="https://static.smartframe.io/embed.js"></script><smartframe-embed customer-id="7d0b78d6f830c45ae5fcb6734143ff0d" image-id="shutterstock_752231824_1657798213563" theme="blog-new" style="width: 100%; display: inline-flex; aspect-ratio: 4500/3003; max-width: 4500px;"></smartframe-embed></p>
<!-- https://smartframe.io/embedding-support -->
<h4>Why does this keep happening?</h4>
<p>The above cases are just a small selection of recent examples. Celebrities such as <a href="https://petapixel.com/2022/07/05/la-lakers-player-sued-by-same-photographer-who-fought-lebron-james/" target="_blank" rel="noopener">Kendrick Nunn</a>, <a href="https://petapixel.com/2017/04/28/khloe-kardashian-sued-posting-copyrighted-photo-instagram/" target="_blank" rel="noopener">Khloe Kardashian</a>, <a href="https://www.nbcnews.com/pop-culture/pop-culture-news/gigi-hadid-sued-over-unauthorized-posting-photo-instagram-n964351" target="_blank" rel="noopener">Gigi Hadid</a>, and <a href="https://petapixel.com/2022/06/22/photographer-sues-emily-ratajkowski-for-posting-his-photo-on-instagram" target="_blank" rel="noopener">Emily Ratajkowski</a> have all found themselves in similar situations. But why does this keep happening?</p>
<p>Arguably the biggest reason for the increase in cases like this is the free-sharing nature of social media, which provides access to enormous audiences that are often completely out of the publisher’s control. When combined with increasingly blurred lines between editorial and commercial content, you have a recipe for litigation.</p>
<p>At the heart of the problem sit the insecure image formats that are used online. Formats like JPEG, PNG, GIF, and others can easily be copied and redistributed with minimal effort.</p>
<p>This lack of protection leaves the images open to theft, but it is important to remember that not all theft is deliberate.</p>
<p>The fact that these images can be so easily copied and misappropriated means that users unfamiliar with copyright law are often stealing them without even realizing they are doing anything wrong.</p>
<h4>Preventing copyright infringement</h4>
<p>Several measures can be taken to protect both parties, such as <a href="https://smartframe.io/blog/what-makes-a-good-watermark/">watermarking</a>, <a href="https://smartframe.io/blog/low-resolution-images-make-sense-from-the-perspective-of-security-theres-just-one-problem/">downsampling</a>, and <a href="https://smartframe.io/blog/how-to-attach-copyright-information-to-every-image-you-take/">adding copyright information</a> to image captions or metadata.</p>
<p>However, none of these offer a comprehensive solution that finds the right blend of strong protection and compelling presentation.</p>
<p>For example, effective watermarking and downsampling sacrifice image quality by either obscuring the image or reducing its resolution, while standard captions are not permanently attached to the image, and metadata can be easily deleted – if it is ever actually seen in the first place.</p>
<p>The most comprehensive solution out there is the use of <a href="https://smartframe.io/blog/image-streaming-how-it-works-why-you-need-it-and-everything-else-you-need-to-know/">image-streaming</a> technology. In a nutshell, it is a new way to display images online that provides a more secure and engaging alternative to the current file formats.</p>
<p>With image streaming, the content owner uploads a high-resolution image file to a secure central server and streams it to websites using an embed code – much like embedding a YouTube video.</p>
<p>This makes it possible for an image to appear on unlimited web pages without a single copy being made.</p>
<p>Each image is displayed in high resolution with interactive features such as <a href="https://smartframe.io/blog/spotlight-hyper-zoom/">multi-level zoom</a> and <a href="https://smartframe.io/blog/spotlight-smartframes-full-screen-viewing-mode/">full-screen viewing</a> while maintaining fast page-loading times. This creates the perfect balance between quality, security, and user experience.</p>
<p>If fully integrated, image streaming could revolutionize social media networks, providing a safer and even more engaging place to connect. Below is a rundown of how the technology can benefit all parties involved.</p>
<h5>Benefits to content owners</h5>
<p>For content owners, there are a number of benefits when using our technology starting with full distribution control over their images, allowing them to monitor and manage where their content appears across the web.</p>
<p>Through a comprehensive list of URLs, owners can easily track unauthorized use and promptly block domains whenever needed.</p>
<p>As well as that, our theft protection features make it significantly harder for images to be stolen, with measures against right-clicks and screenshot attempts.</p>
<p>Permanent attribution is ensured through embedded captions and credits, guaranteeing that images are always correctly attributed, regardless of where they&#8217;re shared.</p>
<p>Lastly, image analytics are provided to give the creators valuable insights into viewership metrics such as detailed data on image views and their origins.</p>
<h5>Benefits to content sharers</h5>
<p>For content sharers, our platform offers customizable deterrent messages triggered by right-click or screenshot attempts.</p>
<p>These messages inform users about copyright protection and direct them to the terms and conditions of sharing, educating them on legal sharing practices and preventing unintentional theft.</p>
<p>Like content owners, sharers benefit from permanent attribution, as embedded captions and credits accompany images wherever they&#8217;re shared, ensuring proper crediting and contextual integrity.</p>
<h5>Benefits to social media platforms</h5>
<p>By streaming every displayed image from a single source file, social media platforms can better police and trace images back to their origin, making it a more manageable task and enabling swift action if necessary.</p>
<p>Our controlled distribution options, including optional sharing buttons, help platforms maintain exclusivity over shared content, ensuring images remain within the intended platform ecosystem.</p>
<h4>Calls for changes to the law</h4>
<p>Following her experience, Emily Ratajkowski wrote an <a href="https://www.thecut.com/article/emily-ratajkowski-owning-my-image-essay.html" target="_blank" rel="noopener">article</a> for <em>The Cut</em> that raised questions about the rights people have to photographs of themselves. Her view is shared by other celebrities such as <a href="https://petapixel.com/2022/03/09/snoop-dogg-photographers-shouldnt-own-their-photos-of-celebrities/" target="_blank" rel="noopener">Snoop Dogg</a> and <a href="https://www.theverge.com/2019/6/24/18715675/gigi-hadid-copyright-instagram-lawsuit-paparazzi" target="_blank" rel="noopener">Gigi Hadid</a> who have both called for changes to the law.</p>
<p>Copyright law has, however, been designed to protect the creator, so image owners may argue that any exceptions could lead to abuse, especially if the image is in the public interest.</p>
<h4>Final thoughts</h4>
<p>Whatever the law says, image formats that are currently used online can easily leave all parties unprotected against image misuse, whether deliberate or not.</p>
<p>With this in mind, we believe the main focus should be on protecting those at risk by educating everyone involved on what is permissible and what isn’t, while also preventing images from being stolen in the first place.</p>								</div>
					</div>
				</div>
				</div>
		<p>The post <a href="https://smartframe.io/blog/do-you-own-the-copyright-to-a-photo-of-yourself-probably-not-and-heres-why/">Do you own the copyright to a photo of yourself? Probably not – and here’s why</a> appeared first on <a href="https://smartframe.io">SmartFrame</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Browser fingerprinting: Everything you need to know</title>
		<link>https://smartframe.io/blog/browser-fingerprinting-everything-you-need-to-know/</link>
		
		<dc:creator><![CDATA[Peter Townshend]]></dc:creator>
		<pubDate>Fri, 27 May 2022 09:43:44 +0000</pubDate>
				<category><![CDATA[In-image advertising]]></category>
		<category><![CDATA[News & Features]]></category>
		<category><![CDATA[advertising]]></category>
		<category><![CDATA[articles]]></category>
		<category><![CDATA[protection]]></category>
		<category><![CDATA[security]]></category>
		<guid isPermaLink="false">https://smartframe.io/?p=76546</guid>

					<description><![CDATA[<p>Browser fingerprinting was invented to help keep our online data safe, but [&#8230;]</p>
<p>The post <a href="https://smartframe.io/blog/browser-fingerprinting-everything-you-need-to-know/">Browser fingerprinting: Everything you need to know</a> appeared first on <a href="https://smartframe.io">SmartFrame</a>.</p>
]]></description>
										<content:encoded><![CDATA[		<div data-elementor-type="wp-post" data-elementor-id="76546" class="elementor elementor-76546" data-elementor-post-type="post">
				<div class="elementor-element elementor-element-7b110bc1 e-flex e-con-boxed e-con e-parent" data-id="7b110bc1" data-element_type="container" data-e-type="container" data-settings="{&quot;ekit_has_onepagescroll_dot&quot;:&quot;yes&quot;}">
					<div class="e-con-inner">
				<div class="elementor-element elementor-element-57283516 elementor-widget elementor-widget-text-editor" data-id="57283516" data-element_type="widget" data-e-type="widget" data-settings="{&quot;ekit_we_effect_on&quot;:&quot;none&quot;}" data-widget_type="text-editor.default">
									<p class="blog-stand-first">Browser fingerprinting was invented to help keep our online data safe, but in many cases, it does the exact opposite. Here, we take a deep dive into this covert online tracking technique.</p>
<p>Online user privacy has been a much-discussed topic in recent years, with a slew of news stories revealing the <a href="https://www.theguardian.com/news/2018/mar/17/data-war-whistleblower-christopher-wylie-faceook-nix-bannon-trump" target="_blank" rel="noopener">misuse of sensitive data</a> by some of the biggest names in the tech business.</p>
<p>The result has been an almost universal <a href="https://smartframe.io/blog/the-rise-and-demise-of-ad-personalization-is-this-the-end-of-an-era/">rejection of the third-party cookie</a>, which to date has been the most prevalent online tracking tool. However, the third-party cookie is not the only way to track a user’s online behavior.</p>
<p>In this article, we explore browser fingerprinting, which is an accurate form of online tracking that is highly evasive, difficult to trace, and, as yet, unregulated. </p>
<h4>What is browser fingerprinting?</h4>
<p>Browser fingerprinting is a term used to describe the act of discreetly gathering software and device settings data through an internet user’s browser when they&#8217;re online. This combination of settings is then used to build a unique identity – or ‘fingerprint’ – for that individual. It&#8217;s also sometimes referred to as ‘device fingerprinting’ or simply ‘fingerprinting’.</p>
<h4>How does browser fingerprinting work?</h4>
<p>Every time you visit a website, your browser has to provide the hosting server with a certain amount of essential information to ensure the website works properly for your individual machine.</p>
<p>These pieces of information could include device model and spec, language and keyboard layout, location, time zone, installed hardware, software versions, and much more.</p>
<p>Individually, these settings and configurations might seem innocuous – and they are. But when put together, they can create a unique combination or ‘fingerprint’.</p>
<p>Considering the number of connected devices worldwide (<a href="https://www.statista.com/statistics/802690/worldwide-connected-devices-by-access-technology/" target="_blank" rel="noopener">projected</a> to hit 38.6 billion in 2025), browser fingerprinting can be surprisingly accurate. This <a href="https://coveryourtracks.eff.org/static/browser-uniqueness.pdf" target="_blank" rel="noopener">study</a>, for example, found that 83.6% of tested browsers were unique.</p>
<h4>What is browser fingerprinting used for?</h4>
<p>Fingerprinting is <a href="https://www.computer.org/csdl/proceedings-article/sp/2021/893400a283/1mbmHGY5Lpu" target="_blank" rel="noopener">reportedly</a> used by over a quarter of the top 10,000 websites online.</p>
<p>Many of these sites use device fingerprints to maximize the user experience for their audience or to keep accounts secure. However, many others use it to track user activity and then pass that information on to data brokers who will sell it to various ends.</p>
<h5>Security</h5>
<p>Browser fingerprinting was originally developed to track and block devices associated with suspicious activity. These could be <a href="https://www.paloaltonetworks.com/cyberpedia/what-is-botnet" target="_blank" rel="noopener">botnets</a> using multiple devices and locations to access online accounts, <a href="https://www.paloaltonetworks.com/cyberpedia/what-is-a-phishing-attack" target="_blank" rel="noopener">phishing</a> scammers creating numerous social media profiles, or bad actors using repetitive trial-and-error tactics.</p>
<p>Fingerprinting is such an efficient identifier that it can bypass private browser windows, <a href="https://www.paloaltonetworks.com/cyberpedia/what-is-a-vpn" target="_blank" rel="noopener">virtual private networks</a> (VPNs), and other evasion measures to track this activity, making it harder for fraudulent internet users to conceal their actions. </p>
<p>While it is not foolproof, browser fingerprinting can form an integral part of a robust security strategy when combined with other anti-fraud measures.</p>
<h5>Marketing</h5>
<p>Such an effective way to identify and track user activity has inevitably drawn the attention of the digital advertising industry.</p>
<p>Global digital ad revenue <a href="https://www.statista.com/statistics/237974/online-advertising-spending-worldwide/" target="_blank" rel="noopener">totaled</a> $378.16bn in 2020 and much of this relied on targeted advertising. In an industry of this size, data is considered to be extremely valuable because it enables marketers to accurately personalize their campaigns.</p>
<p>For example, if a global tour company can see from your online activity that you have booked a holiday to Paris, it will know to serve you advertising that specifically promotes its Paris tours. Furthermore, if it can see that you also have an interest in art because of the websites you have visited, it could be even more specific by promoting its &#8216;Paris Gallery Tour&#8217;.  </p>
<p>By working with websites, ad tech companies can recognize a user’s fingerprint when they arrive on a web page and, in a split second, serve an ad that matches their behavior profile.</p>
<h5>Privacy concerns</h5>
<p>While personalized digital advertising may not be a huge issue for many – <a href="https://www.adlucent.com/resources/blog/71-of-consumers-prefer-personalized-ads/" target="_blank" rel="noopener">research</a> suggests it is even welcomed by some – there are other, more concerning possible uses.</p>
<p>It is very hard to cite specific cases due to the lack of transparency surrounding the practice, but they could include fingerprinting data being used to pre-qualify a user for certain services or to inform dynamic pricing.</p>
<p>An example of the latter is the aforementioned tour company charging you more than others after using your device fingerprint to see that you are located in an affluent area and recently shopped for designer clothing.</p>
<p>While there may never be a specific name associated with a user’s digital fingerprint, there are undoubtedly potential privacy issues to be considered.</p>
<p><script async src="https://static.smartframe.io/embed.js"></script><smartframe-embed customer-id="7d0b78d6f830c45ae5fcb6734143ff0d" image-id="shutterstock_407643964_1653386655087" theme="blog-new" style="width: 100%; display: inline-flex; aspect-ratio: 4595/3067; max-width: 4595px;"></smartframe-embed></p>
<!-- https://smartframe.io/embedding-support -->
<h4>Browser fingerprinting vs cookies</h4>
<p>While essentially used for the same purpose – identification and tracking – there are some big differences between cookies and fingerprinting.</p>
<h5>Storage</h5>
<p>Cookies are stored on a user’s device, which means they can be easily blocked or deleted. Device fingerprints are stored remotely, which makes them very difficult to control.</p>
<h5>Regulation</h5>
<p>The <a href="https://gdpr.eu/what-is-gdpr/" target="_blank" rel="noopener">General Data Privacy Regulations</a> (GDPR) in the EU and the <a href="https://oag.ca.gov/privacy/ccpa" target="_blank" rel="noopener">California Consumer Privacy Act</a> (CCPA) in the US have both imposed rules that regulate the use of cookies for the protection of user privacy, with <a href="https://gdpr.eu/fines/" target="_blank" rel="noopener">hefty fines</a> for those who break them.</p>
<p>Fingerprinting, on the other hand, is unregulated, which gives more freedom to those who collect this data.</p>
<h5>Transparency</h5>
<p>The above regulations have brought transparency to the use of cookies, whereby websites must notify a user that they will be capturing data, explain what it will be used for, and offer them the opportunity to opt out.</p>
<p>Fingerprinting takes place covertly using data that is necessary for websites to work properly. This makes it very difficult for a user to even detect the activity, let alone opt out.</p>
<h5>Reliability</h5>
<p>Cookies are unique pieces of tracking code that are placed directly onto a user’s device, which makes them very reliable.</p>
<p>Conversely, fingerprinting relies on probability rather than certainty. While it can be very accurate, it inevitably leaves some room for error.</p>
<h4>Browser fingerprinting methods</h4>
<p>Aside from recording top-level configurations such as software versions, extensions, cookie settings, and languages, to name a few, there are additional more intricate fingerprinting techniques that can be used. Some examples of these are below – and the more of these that are used together, the more accurate the fingerprint will be.</p>
<h5>Canvas fingerprinting</h5>
<p>Most websites are <a href="https://w3techs.com/technologies/details/ml-html5" target="_blank" rel="noopener">constructed using HTML coding</a>, which features an element called <a href="https://developer.mozilla.org/en-US/docs/Web/API/Canvas_API" target="_blank" rel="noopener">canvas</a>. Using this element, websites are able to force browsers to draw a picture and text behind the scenes during a user’s visit.</p>
<p>When devices are configured differently, they render this image and text in a slightly different way, which reveals a whole host of information about a device’s graphics hardware, such as its graphics processing unit (GPU), graphics driver, or graphics card.</p>
<p>Using this information, the device is assigned a unique hash that serves as an identifier (or &#8216;canvas fingerprint&#8217;).</p>
<h5>WebGL fingerprinting</h5>
<p>Web Graphics Library (<a href="https://developer.mozilla.org/en-US/docs/Web/API/WebGL_API" target="_blank" rel="noopener">WebGL</a>) is a JavaScript Application Programming Interface (API) that works alongside HTML Canvas to render 2D and 3D images.</p>
<p>The WebGL fingerprinting process is the same as canvas fingerprinting in that it forces a user’s device to draw an image in the background without their knowledge, records its graphics hardware information, then assigns it an identification hash.</p>
<h5>Audio fingerprinting</h5>
<p>In a similar way that canvas fingerprinting uses HTML Canvas to measure how a device renders an image, audio fingerprinting uses the <a href="https://developer.mozilla.org/en-US/docs/Web/API/Web_Audio_API" target="_blank" rel="noopener">Web Audio API</a> to measure how a device produces sound.</p>
<h5>Connected device fingerprinting</h5>
<p>Connected device fingerprinting is a technique that gathers information about the media devices connected to a user’s machine. This could include external devices such as headphones or speakers, together with internal devices like sound cards or video cards.</p>
<p><script async src="https://static.smartframe.io/embed.js"></script><smartframe-embed customer-id="7d0b78d6f830c45ae5fcb6734143ff0d" image-id="shutterstock_1849945921_1653386655179" theme="blog-new" style="width: 100%; display: inline-flex; aspect-ratio: 5217/3499; max-width: 5217px;"></smartframe-embed></p>
<!-- https://smartframe.io/embedding-support -->
<h5>What data makes up a device fingerprint?</h5>
<p>There is a wide range of different data that&#8217;s gathered using various methods, and this all comes together to create a device fingerprint. Here is a list of some of the most common types.</p>
<table width="450">
<tbody>
<tr>
<td width="225">IP address</td>
<td width="225">User-agent string</td>
</tr>
<tr>
<td>Installed fonts</td>
<td>Installed hardware</td>
</tr>
<tr>
<td>Cookie settings</td>
<td>Screen resolution</td>
</tr>
<tr>
<td>OS version</td>
<td>HTTP header attributes</td>
</tr>
<tr>
<td>Language settings</td>
<td>Browser extensions</td>
</tr>
<tr>
<td>Keyboard layout</td>
<td>Audio fingerprinting data</td>
</tr>
<tr>
<td>Browser privacy</td>
<td>HTML canvas fingerprinting data</td>
</tr>
</tbody>
</table>
<h4>Is browser fingerprinting illegal?</h4>
<p>No, browser fingerprinting is not illegal. While it has raised concerns and opposition from privacy advocates, there is nothing to stop a website from fingerprinting users as they visit.</p>
<p>The GDPR and CCPA regulations imposed strict rules to protect online privacy, although the main focus is cookies and therefore they do not apply to data obtained through fingerprinting.</p>
<p>The reason fingerprinting can dodge these regulations is that it only uses what is considered to be public information. No personal data is gathered during the fingerprinting process, therefore no current laws are being broken.</p>
<p>There are, however, plans to regulate browser fingerprinting in the EU, which – <a href="https://iapp.org/media/pdf/resource_center/GDPR-at-Three-Infographic_v3.pdf" target="_blank" rel="noopener">as GDPR did with cookies</a> – could spark momentum towards a global standard.</p>
<p>The proposed <a href="https://digital-strategy.ec.europa.eu/en/policies/eprivacy-regulation" target="_blank" rel="noopener">ePrivacy Regulation</a> is set to apply the same rules to fingerprinting that currently govern the use of cookies. However, at the time of writing it is still in the <a href="https://eur-lex.europa.eu/legal-content/EN/HIS/?uri=CELEX%3A52017PC0010#2021-02-10_DIS_byCONSIL" target="_blank" rel="noopener">trilogue process</a> and is therefore subject to change.</p>
<h4>How to prevent browser fingerprinting</h4>
<p>Fingerprinting is difficult to prevent – and there are two main reasons for this.</p>
<ol>
	<li>The data gathered is essential for websites to work properly, so preventing them from taking it would significantly diminish a user’s browsing experience.</li>
	<li>Fingerprinting data is stored off-device, which makes it very difficult to find, control, and remove.</li>
</ol>
<h5>Ad blockers, private browsing windows and VPNs</h5>
<p>The use of ad blockers, private browsing windows, and VPNs can help by hiding certain data such as a user’s real IP address and location. However, their use does nothing to hide the more detailed information covered earlier in this article.</p>
<p>In fact, using any of these tools could actually add a whole new facet to a device’s configuration that would not have been there before.</p>
<h5>Privacy-focused browsers</h5>
<p>Aside from making a device less unique by using default settings wherever possible, the most effective defense against fingerprinting is to use a privacy-focused browser such as Firefox, Brave, or Tor.</p>
<p>Firefox, for example, combats fingerprinting by <a href="https://blog.mozilla.org/security/2020/01/07/firefox-72-fingerprinting/" target="_blank" rel="noopener">blocking</a> third-party requests from websites known to partake in the activity. While this is a positive step, it is limited to the websites its provider (Mozilla) is aware of and is therefore not a watertight solution.</p>
<p>Brave’s <a href="https://github.com/brave/brave-browser/wiki/Fingerprinting-Protections" target="_blank" rel="noopener">protection</a> against fingerprinting also makes use of a blocking technique, but this is complemented by randomization. This means it attempts to make a user’s device appear different to a fingerprinting tool each time it visits a website. While this combination certainly bolsters protection, it is unable to stop the most determined of fingerprinting tools.</p>
<p>Tor’s <a href="https://2019.www.torproject.org/projects/torbrowser/design/#fingerprinting-linkability" target="_blank" rel="noopener">technique</a>, on the other hand, is to make every user’s browser fingerprint the same, which provides a level of anonymity among the crowd.</p>
<p>While this protection is considered to be strong, there are some downsides. The most significant of these is relatively slow loading speeds, which occur as a result of the software working hard to disguise a user’s identity.</p>
<p>Also, because of Tor’s popularity with users who do not want to be tracked, it is regarded with suspicion by many authorities. Therefore, somewhat ironically, it could actually end up attracting attention from parties that are arguably more concerning than the marketing executives most users are trying to avoid.</p>
<h5>Reluctant acceptance</h5>
<p>There&#8217;s no doubt that combining these measures with efforts to make a device less unique by using default settings wherever possible can make fingerprinting more difficult.</p>
<p>However, the bottom line is that complete prevention is impossible. Therefore, at least for the time being, fingerprinting is something that goes part-and-parcel with internet usage.</p>
<p>Until relevant regulations are introduced, it&#8217;s worth considering whether the risk of fingerprinting is a price you are prepared to pay for the content you are consuming.</p>
<p><script async src="https://static.smartframe.io/embed.js"></script><smartframe-embed customer-id="7d0b78d6f830c45ae5fcb6734143ff0d" image-id="shutterstock_1563648283_crop_1653387909763" theme="blog-new" style="width: 100%; display: inline-flex; aspect-ratio: 3870/2421; max-width: 3870px;"></smartframe-embed></p>
<!-- https://smartframe.io/embedding-support -->
<h4>Will fingerprinting replace third-party cookies?</h4>
<p>With the EU’s ePrivacy Regulation still in progress, it is impossible to predict exactly what the future holds for browser fingerprinting. However, considering the general public&#8217;s increasing awareness of personal data collection and misuse, coupled with a lack of transparency around how fingerprinting is being used, it is probably safe to expect some attempt at regulation in the future.</p>
<p>For example, one academic <a href="https://www.researchgate.net/publication/341616474_Long-Term_Observation_on_Browser_Fingerprinting_Users'_Trackability_and_Perspective" target="_blank" rel="noopener">study</a> found that 85.5% of users were concerned about browser fingerprinting and 78.5% felt that being protected from it was important to them.</p>
<p>With overwhelming majorities like this, some form of change is likely. But to what extent these regulations will go – and indeed how effective they will be – remains to be seen.</p>
<p>Regardless of the efficacy of these potential regulations, with such low user opinion, it would be remiss of brands and marketers around the world to rely on fingerprinting as a replacement for the third-party cookie. Instead, investment in alternative forms of targeting such as contextual advertising – which is <a href="https://www.forbes.com/sites/forbesagencycouncil/2021/07/22/the-new-rise-of-contextual-advertising/?sh=381461525e5d" target="_blank" rel="noopener">regarded</a> by many as having a big role in the future of the industry – would be a better alternative.</p>								</div>
					</div>
				</div>
				</div>
		<p>The post <a href="https://smartframe.io/blog/browser-fingerprinting-everything-you-need-to-know/">Browser fingerprinting: Everything you need to know</a> appeared first on <a href="https://smartframe.io">SmartFrame</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Counterfeit goods online: How big is the problem and how can you combat it?</title>
		<link>https://smartframe.io/blog/counterfeit-goods-online-how-big-is-the-problem-and-how-can-you-combat-it/</link>
		
		<dc:creator><![CDATA[Robert Sewell]]></dc:creator>
		<pubDate>Thu, 12 May 2022 09:55:54 +0000</pubDate>
				<category><![CDATA[Image security]]></category>
		<category><![CDATA[News & Features]]></category>
		<category><![CDATA[counterfeit goods]]></category>
		<category><![CDATA[image security]]></category>
		<category><![CDATA[security]]></category>
		<category><![CDATA[smartframe]]></category>
		<guid isPermaLink="false">https://smartframe.io/?p=76449</guid>

					<description><![CDATA[<p>The internet has brought great opportunities for retail, but it&#8217;s not all [&#8230;]</p>
<p>The post <a href="https://smartframe.io/blog/counterfeit-goods-online-how-big-is-the-problem-and-how-can-you-combat-it/">Counterfeit goods online: How big is the problem and how can you combat it?</a> appeared first on <a href="https://smartframe.io">SmartFrame</a>.</p>
]]></description>
										<content:encoded><![CDATA[		<div data-elementor-type="wp-post" data-elementor-id="76449" class="elementor elementor-76449" data-elementor-post-type="post">
				<div class="elementor-element elementor-element-1ba66cd0 e-flex e-con-boxed e-con e-parent" data-id="1ba66cd0" data-element_type="container" data-e-type="container" data-settings="{&quot;ekit_has_onepagescroll_dot&quot;:&quot;yes&quot;}">
					<div class="e-con-inner">
				<div class="elementor-element elementor-element-725c3d8d elementor-widget elementor-widget-text-editor" data-id="725c3d8d" data-element_type="widget" data-e-type="widget" data-settings="{&quot;ekit_we_effect_on&quot;:&quot;none&quot;}" data-widget_type="text-editor.default">
									<p class="blog-stand-first">The internet has brought great opportunities for retail, but it&#8217;s not all positive. We look at the growth of the counterfeit goods market and how retailers can protect themselves.</p>
<p>The growth of online shopping has been <a href="https://www.statista.com/statistics/379046/worldwide-retail-e-commerce-sales/" target="_blank" rel="noopener">steady</a> for a number of years, and with the global pandemic introducing many consumers to the convenience of e-commerce in everyday life, those numbers are now higher than ever.</p>
<p>The European Union Intellectual Property Office (EUIPO) <a href="https://euipo.europa.eu/tunnel-web/secure/webdav/guest/document_library/observatory/documents/Awareness_campaigns/spring_campaign_2021/2021_Spring_Campaign_en.pdf" target="_blank" rel="noopener">reported</a> that 70% of Europeans bought something online in 2020. US e-commerce sales, meanwhile, are <a href="https://on.emarketer.com/Report-20220425-GoodwayGroup_BusTYPage.html" target="_blank" rel="noopener">projected</a> to exceed $1tn in 2022 and to make up nearly 22% of total retail sales by 2026.</p>
<p>Such figures show the extensive reach, growth, and value of the e-commerce market, but where there is great value, there is inevitably the risk of bad actors – in this case, from the burgeoning online counterfeit goods market.</p>
<h4>How big is the counterfeit goods market?</h4>
<p>According to recent <a href="https://www.statista.com/chart/27289/global-trade-volume-with-counterfeit-goods-compared-to-gdp-of-selected-countries-regions/?utm_source=Statista+Newsletters&amp;utm_campaign=b7bf857aa9-All_InfographTicker_daily_COM_AM_KW14_2022_Fr_COPY&amp;utm_medium=email&amp;utm_term=0_662f7ed75e-b7bf857aa9-339782178" target="_blank" rel="noopener">figures</a>, the value of the global counterfeit goods market was $449bn in 2019 – larger than the entire economy of Ireland.</p>
<p>Furthermore, in March of the same year, the Organisation for Economic Co-operation and Development (OECD) <a href="https://www.oecd.org/newsroom/trade-in-fake-goods-is-now-33-of-world-trade-and-rising.htm" target="_blank" rel="noopener">reported</a> that trade in counterfeit and pirated goods makes up 3.3% of global trade and stated that this figure was continuing to rise.</p>
<p>These are startling figures – and when you consider the potential impacts the fake goods market can have on economies, businesses, and everyday people, they become even more concerning.</p>
<h4>What proportion of the counterfeit goods market is traded online?</h4>
<p>While it is difficult to provide a definitive figure, a joint EUIPO-OECD <a href="https://euipo.europa.eu/ohimportal/en/web/observatory/misuse-e-commerce-trade-in-counterfeits" target="_blank" rel="noopener">study</a> found that between 2017 and 2019, over 50% of counterfeit goods seized on entry to the EU were related to online transactions.</p>
<p>This could be seen as an indication of the potential overall scale of the problem. The knowledge that it is this significant online certainly makes sense when you consider that largely unregulated digital environments allow criminals to better maintain their anonymity and remain as elusive as possible to the authorities.</p>
<p><script async="" src="https://static.smartframe.io/embed.js"></script><smartframe-embed customer-id="7d0b78d6f830c45ae5fcb6734143ff0d" image-id="shutterstock_1846546738_1652089984759" theme="blog-new" style="width: 100%; display: inline-flex; aspect-ratio: 2.21739 / 1; max-width: 7548px; --canvas-wedge-error-size: 7548;" lazy="" class="error md sff-error" tabindex="0"></smartframe-embed><!-- https://smartframe.io/embedding-support --></p>
<h4>What is the impact of counterfeit goods on businesses?</h4>
<p>The effects of IP theft and counterfeiting on businesses are huge. In 2020, <a href="https://www.statista.com/statistics/1117921/sales-losses-due-to-fake-good-by-industry-worldwide/" target="_blank" rel="noopener">global losses</a> resulting from the sale of bogus goods amounted to €26.3bn in the clothing sector alone.</p>
<p>But while the sale of fake products at cheaper prices can have a big impact on bottom lines, the wider issue is the effect it can have on a brand’s reputation.</p>
<p>Counterfeit goods can lower customer satisfaction and erode brand value. For example, if a consumer receives a product they believe is genuine, they will expect a certain level of quality. Therefore, if that product is a substandard fake that arrives faulty or fails shortly after purchase, they will understandably be disappointed.</p>
<p><a href="https://www.brightlocal.com/research/local-consumer-review-survey/" target="_blank" rel="noopener">Research</a> shows that 77% of consumers regularly read reviews when researching local businesses and that only 3% would consider buying from a business with an average rating of two stars and under.</p>
<p>In a marketplace where reviews are this powerful, dissatisfied customers can be particularly damaging to a brand’s reputation.</p>
<p>Additionally, businesses could find themselves wasting time and resources dealing with undeserved complaints and even making unnecessary refunds.</p>
<p><strong>Learn more: <a href="https://smartframe.io/blog/brand-protection-the-problems-and-solutions-around-keeping-your-brand-safe-online">Brand protection: The problems and solutions around keeping your brand safe online</a> </strong></p>
<h4>What is the impact of counterfeit goods on consumers?</h4>
<p><span style="font-weight: 400;">From a consumer’s point of view, counterfeit goods can present a tempting opportunity to buy expensive items at a fraction of their typical retail price, but this is often a false economy.</span></p>
<p><span style="font-weight: 400;">Rock-bottom prices usually go hand in hand with rock-bottom quality. This means it is likely that counterfeit items will need to be replaced long before their genuine equivalents would, which ultimately means higher costs in the long term.</span></p>
<p><span style="font-weight: 400;">The negative impact of fake goods isn’t just financial. In many cases, it can also pose a serious health risk.</span></p>
<p>One example is the global trade in counterfeit pharmaceuticals, which the EUIPO and OECD <a href="https://euipo.europa.eu/ohimportal/en/web/observatory/trade-in-counterfeit-pharmaceutical-products" target="_blank" rel="noopener">estimate</a> is worth up to $4.4bn (and, <a href="https://www.who.int/news-room/fact-sheets/detail/substandard-and-falsified-medical-products" target="_blank" rel="noopener">according to</a> the World Health Organization, has harmful effects in every region in the world).</p>
<p>Ineffective or weakened pharmaceuticals can leave ailments untreated or contribute to drug-resistant infections, while unknown ingredients could provoke unexpected side effects, allergic reactions, and, in some cases, even <a href="https://www.american.edu/kogod/news/a-global-model-to-reduce-deaths-from-counterfeit-drugs-in-the-pharmaceutical-industry.cfm#_ftn2" target="_blank" rel="noopener">death</a>.</p>
<p><span style="font-weight: 400;">Another example is electronic goods. A </span><a href="https://www.electricalsafetyfirst.org.uk/media/1510/true-cost-of-a-counterfeit.pdf" target="_blank" rel="noopener"><span style="font-weight: 400;">report</span></a><span style="font-weight: 400;"> from UK charity Electrical Safety First states that faulty electrical products are the cause of more than 7,000 house fires a year in the UK. The report goes on to state the results from tests of a number of counterfeit products, including phone chargers and hair straighteners, many of which were found to have posed a serious safety risk.</span></p>
<p>Finally, an often overlooked negative impact of fake products is that of privacy. There are <a href="https://www.techradar.com/uk/news/warning-this-fake-windows-11-upgrade-is-filled-with-malware" target="_blank" rel="noopener">reports</a> of fake software updates and <a href="https://www.computerworld.com/article/2488173/pre-installed-malware-found-on-new-android-phones.html" target="_blank" rel="noopener">cases</a> of Android phones being imported from the gray market with malware pre-installed, both of which are designed to expose a user’s personal data to fraudsters.</p>
<p><script async src="https://static.smartframe.io/embed.js"></script><smartframe-embed customer-id="7d0b78d6f830c45ae5fcb6734143ff0d" image-id="shutterstock_1166453734_1651854068859" theme="blog-new" style="width: 100%; display: inline-flex; aspect-ratio: 5472/3078; max-width: 5472px;"></smartframe-embed></p>
<!-- https://smartframe.io/embedding-support -->
<h4>What is the impact of counterfeit goods on society?</h4>
<p>There are many implications that counterfeit goods have on a country’s economy, and the most obvious of these is the loss of tax revenue. Because revenues bypass official channels, governments lose funds from value-added tax, corporate income tax, and personal income tax that could otherwise be invested for the good of communities.</p>
<p>One OECD <a href="https://www.oecd.org/gov/risk/trade-in-counterfeit-products-and-uk-economy-report-update-2019.pdf" target="_blank" rel="noopener">paper</a> reported that in 2016, forgone tax revenue from the UK retail and wholesale sector amounted to £3.1bn. <span style="font-weight: 400;">The same paper stated that at least 86,300 jobs were lost due to counterfeiting and piracy.</span></p>
<p>Other knock-on effects include an increase in the prices of legitimate products, as brands try to recoup the billions of dollars of global losses, and the aforementioned dangers to public health.</p>
<p>There is also a major humanitarian issue to consider. The United Nations Office on Drugs and Crime (UNODC) <a href="https://www.unodc.org/documents/counterfeit/FocusSheet/Counterfeit_focussheet_EN_HIRES.pdf" target="_blank" rel="noopener">identifies</a> clear links between counterfeit goods and transnational organized crime networks, stating that the sale of fake products could be connected to the trafficking of drugs, firearms, or people.</p>
<h4>The role of images in the online counterfeit goods market</h4>
<p>Before the days of e-commerce, it was possible to hold, inspect, and even test the product you were buying before handing over your money. However, in today’s digital environment, all you have to go on is the presentation of the website, the description of the item, and most importantly of all, the images used.</p>
<p>As it currently stands, anyone can go to a brand’s website and make copies of every official image they can find using a right-click, drag-and-drop action, or a screenshot. Using these images, they are able to create highly believable online product listings.</p>
<p>Possibly the most common place where fraudsters list their bootleg products online is e-commerce marketplaces. It is relatively quick and easy to set up a seller profile on one of these websites and, in doing so, criminals can gain fast access to a truly global market.</p>
<p>Alternatively, counterfeiters will often build an entire website that&#8217;s little more than a clone of an official site. By copying logos, matching brand colors and typefaces, and most importantly of all, using stolen official product photography, these websites can be astonishingly convincing.</p>
<p><script async src="https://static.smartframe.io/embed.js"></script><smartframe-embed customer-id="7d0b78d6f830c45ae5fcb6734143ff0d" image-id="shutterstock_1930282586_1651854068809" theme="blog-new" style="width: 100%; display: inline-flex; aspect-ratio: 7192/4795; max-width: 7192px;"></smartframe-embed></p>
<!-- https://smartframe.io/embedding-support -->
<h4>How to combat the sale of counterfeit goods online</h4>
<p>The big players in e-commerce have measures in place to stop the sale of counterfeit goods on their platforms. For example, eBay’s <a href="https://pages.ebay.com/seller-center/listing-and-marketing/verified-rights-owner-program.html" target="_blank" rel="noopener">VeRO program</a> and Amazon’s <a href="https://www.aboutamazon.com/news/policy-news-views/a-blueprint-for-private-and-public-sector-partnership-to-stop-counterfeiters#:~:text=Amazon%20believes%20we%20have%20a,stopping%20fraud%2C%20counterfeit%20and%20abuse." target="_blank" rel="noopener">investment</a> in AI to help weed out the fakes.</p>
<p>However, many believe it is too little too late, with <a href="https://www.cnbc.com/2016/07/20/birkenstock-quits-amazon-in-us-after-counterfeit-surge.html" target="_blank" rel="noopener">Birkenstock</a> having already left Amazon.com, and <a href="https://www.forbes.com/sites/forbesbusinesscouncil/2020/01/22/why-nike-cut-ties-with-amazon-and-what-it-means-for-other-retailers/?sh=509ae53664ff" target="_blank" rel="noopener">Nike</a> having withdrawn as a first-party vendor from Amazon worldwide, each due to concerns over counterfeiting.</p>
<h5>Preventing image theft</h5>
<p>While any efforts to tackle the problem of counterfeit goods online are of course well-received, prevention is often better than cure.</p>
<p>A highly effective step towards achieving this is for brands to protect their images from theft at source. After all, the fake websites and listings mentioned above would be far less convincing without the use of official product photography.</p>
<p>By <a href="https://smartframe.io/blog/image-streaming-how-it-works-why-you-need-it-and-everything-else-you-need-to-know/">streaming images</a> instead of displaying them in formats like JPEG and PNG, brands can ensure there is only ever one high-quality copy of each product photograph online.</p>
<p>For example, each of the images you can see in the body of this article is being streamed. This means they are protected from theft and can be displayed on an unlimited number of URLs without a single copy being made. It works in a similar way to embedding a <a href="https://www.youtube.com/" target="_blank" rel="noopener">YouTube</a> video.</p>
<p>It is even possible to monitor where an image appears and control its distribution by preventing unwanted domains from embedding it. Furthermore, by attaching captions and credits at source, which will follow the image wherever it is embedded, it is possible to ensure the image always appears in context.</p>
<p>By preventing bad actors from stealing and repurposing valuable product photography, there’s no doubt that a counterfeiter’s job becomes much more difficult.</p>
<h4>Conclusion</h4>
<p>The online counterfeit goods market is undoubtedly a big issue for brands, consumers, and governments around the world. There will never be a quick fix for a problem of this scale, and indeed no single solution. However, by making changes to the way in which products are promoted, and protecting a brand’s assets at the same time, it could be possible to restrict these criminals’ ability to appear legitimate.</p>								</div>
					</div>
				</div>
				</div>
		<p>The post <a href="https://smartframe.io/blog/counterfeit-goods-online-how-big-is-the-problem-and-how-can-you-combat-it/">Counterfeit goods online: How big is the problem and how can you combat it?</a> appeared first on <a href="https://smartframe.io">SmartFrame</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>How is AI regulated around the world?</title>
		<link>https://smartframe.io/blog/how-is-ai-regulated-around-the-world/</link>
		
		<dc:creator><![CDATA[Peter Townshend]]></dc:creator>
		<pubDate>Thu, 28 Apr 2022 13:55:03 +0000</pubDate>
				<category><![CDATA[Image security]]></category>
		<category><![CDATA[News & Features]]></category>
		<category><![CDATA[artificial intelligence]]></category>
		<category><![CDATA[security]]></category>
		<guid isPermaLink="false">https://smartframe.io/?p=75713</guid>

					<description><![CDATA[<p>Artificial intelligence (AI) tools develop quickly and this has left many unanswered [&#8230;]</p>
<p>The post <a href="https://smartframe.io/blog/how-is-ai-regulated-around-the-world/">How is AI regulated around the world?</a> appeared first on <a href="https://smartframe.io">SmartFrame</a>.</p>
]]></description>
										<content:encoded><![CDATA[		<div data-elementor-type="wp-post" data-elementor-id="75713" class="elementor elementor-75713" data-elementor-post-type="post">
				<div class="elementor-element elementor-element-550b630a e-flex e-con-boxed e-con e-parent" data-id="550b630a" data-element_type="container" data-e-type="container" data-settings="{&quot;ekit_has_onepagescroll_dot&quot;:&quot;yes&quot;}">
					<div class="e-con-inner">
				<div class="elementor-element elementor-element-24d11146 elementor-widget elementor-widget-text-editor" data-id="24d11146" data-element_type="widget" data-e-type="widget" data-settings="{&quot;ekit_we_effect_on&quot;:&quot;none&quot;}" data-widget_type="text-editor.default">
									<p style="font-size: 21px; line-height: 30px;"><b>Artificial intelligence (AI) tools develop quickly and this has left many unanswered questions about the rules around their usage. In this article, we examine how these tools are currently being regulated</b></p>
<p>AI has always attracted plenty of controversy. Tools that in some way make use of AI are currently being used by the biggest tech companies for a multitude of purposes, and as a result of this relatively unchecked usage, countless very real concerns exist across the board. </p>
<p>One example is AI in imaging, which has seen significant news coverage in recent months. There have been concerns around copyright, such as the <a href="https://smartframe.io/blog/the-problem-with-googles-new-sr3-image-upscaling-technology/">potential threat</a> that AI super-resolution technology could pose to the security of image assets, as well as the question of <a href="https://www.theverge.com/2022/2/21/22944335/us-copyright-office-reject-ai-generated-art-recent-entrance-to-paradise" target="_blank" rel="noopener">how AI-generated images should be attributed</a>.</p>
<p>Privacy in AI imaging has also become a hot topic, with the <a href="https://www.texasattorneygeneral.gov/news/releases/paxton-sues-facebook-using-unauthorized-biometric-data" target="_blank" rel="noopener">State of Texas suing Facebook</a> in February 2022 for the misuse of facial recognition AI technology. Furthermore, Getty Images implemented an <a href="http://press.gettyimages.com/getty-images-launches-industry-first-model-release-supporting-data-privacy-in-artificial-intelligence-and-machine-learning/" target="_blank" rel="noopener">industry-first model release</a> in March 2022 that protects the privacy of a subject’s biometric data from AI technologies.</p>
<p>With such scattered activity surrounding the regulation of this fast-developing and often complicated area, it can be hard to keep up with exactly where you stand when it comes to the regulation of AI, whether you’re an owner, developer, or user of the technology.</p>
<p>Below we provide an outline of EU, UK, US, and Chinese AI regulations, along with links to this and other AI regulations around the world.</p>
<p><script async src="https://static.smartframe.io/embed.js"></script><smartframe-embed customer-id="7d0b78d6f830c45ae5fcb6734143ff0d" image-id="shutterstock_1162919845_1650987972210" theme="blog-new" style="width: 100%; display: inline-flex; aspect-ratio: 6720/3780; max-width: 6720px;"></smartframe-embed></p>
<!-- https://smartframe.io/embedding-support -->
<h3>AI regulation in the EU</h3>
<p>The EU was the first of the big global players to draft a <a href="https://digital-strategy.ec.europa.eu/en/policies/regulatory-framework-ai" target="_blank" rel="noopener">regulatory framework</a> for governing the development and use of AI. It has been developed as part of the EU’s <a href="https://digital-strategy.ec.europa.eu/en/policies/european-approach-artificial-intelligence" target="_blank" rel="noopener">approach to artificial intelligence</a>, which focuses on ensuring excellence and trust in AI.</p>
<p>The <a href="https://artificialintelligenceact.eu/" target="_blank" rel="noopener">EU AI Act</a> was first published in April 2021 and describes its aim as ensuring AI applications reflect EU values and protect human rights. As such, the law splits AI applications into four areas of risk: minimal risk, low risk, high risk, and unacceptable risk.</p>
<p>Technology deemed to pose an unacceptable risk includes any systems considered by the EU to be “a clear threat to the safety, livelihoods and rights of people” and would be subject to an immediate ban.</p>
<p>High-risk applications would have strict rules imposed, while limited-risk applications would need to adhere to specific transparency obligations.</p>
<p>Systems that are deemed to pose minimal or no risk are allowed to be used freely. Examples provided by the EU of this type of system include AI-enabled video games and spam filters.</p>
<p>Critically, the EU AI Act has been designed to evolve with the ever-changing nature of AI technology. As such, the rules would be adaptable according to how the technology develops. This means providers would need to perform ongoing assessments to ensure they are continuing to work within the law.</p>
<h3>AI regulation in the UK</h3>
<p>While the UK Government has not yet released a legal framework, it has laid out a 10-year <a href="https://www.gov.uk/government/publications/national-ai-strategy/national-ai-strategy-html-version" target="_blank" rel="noopener">National AI Strategy</a> for developing the technology within its borders.</p>
<p>In its own words, the UK Government seeks to position its territory as “the best place to live and work with AI; with clear rules, applied ethical principles and a pro-innovation regulatory environment.”</p>
<p>The first major step in the UK’s attempts to become a global voice of authority on AI regulation came by way of a <a href="https://www.gov.uk/government/publications/the-roadmap-to-an-effective-ai-assurance-ecosystem/the-roadmap-to-an-effective-ai-assurance-ecosystem" target="_blank" rel="noopener">roadmap to an effective AI assurance ecosystem</a>. This detailed document sets out the Government’s plan to, in its own words, create a “thriving and effective AI assurance ecosystem within the next five years.”</p>
<p>This was followed by the <a href="https://www.gov.uk/government/news/new-uk-initiative-to-shape-global-standards-for-artificial-intelligence" target="_blank" rel="noopener">announcement</a> of a new AI Standards Hub in January 2022. This government initiative will be piloted by <a href="https://www.turing.ac.uk/" target="_blank" rel="noopener">The Alan Turing Institute</a>, the <a href="https://www.bsigroup.com/en-GB/" target="_blank" rel="noopener">British Standards Institution</a> (BSI), and the <a href="https://www.npl.co.uk/" target="_blank" rel="noopener">National Physical Laboratory</a> (NPL), and its stated aim is to provide an online resource for educational materials and practical tools designed to help organizations “develop and benefit from global standards.”</p>
<p>While all of this is still in its early stages, these efforts show that the UK is certainly serious about establishing itself as a global authority on AI. Whether or not it achieves that goal – and exactly what it will look like – remains to be seen.</p>
<p><script async src="https://static.smartframe.io/embed.js"></script><smartframe-embed customer-id="7d0b78d6f830c45ae5fcb6734143ff0d" image-id="shutterstock_1783490738_1650987971801" theme="blog-new" style="width: 100%; display: inline-flex; aspect-ratio: 5616/3159; max-width: 5616px;"></smartframe-embed></p>
<!-- https://smartframe.io/embedding-support -->
<h3>AI regulation in the USA</h3>
<p>While there is currently no regulation in place at the federal level in the US, there has been a lot of activity across various government departments that aims to address concerns around AI.</p>
<p>For example, the Federal Trade Commission wrote a <a href="https://www.ftc.gov/business-guidance/blog/2021/04/aiming-truth-fairness-equity-your-companys-use-ai" target="_blank" rel="noopener">blog post</a> advising companies on how they should operate fairly in the age of AI, which hints at future rules. Also, the US Equal Employment Opportunity Commission launched an <a href="https://www.eeoc.gov/newsroom/eeoc-launches-initiative-artificial-intelligence-and-algorithmic-fairness" target="_blank" rel="noopener">Initiative on Artificial Intelligence and Algorithmic Fairness</a> to ensure AI used in the employment process adheres to human rights laws.</p>
<p>However, the most recent and decisive step saw Congress instructing the National Institute of Standards and Technology (NIST), part of the US Department of Commerce, to work with public and private sectors to develop the <a href="https://www.nist.gov/itl/ai-risk-management-framework" target="_blank" rel="noopener">AI Risk Management Framework</a> (AI RMF).</p>
<p>This framework takes <a href="https://www.nscai.gov/2021-final-report/" target="_blank" rel="noopener">recommendations</a> from the National Security Commission on Artificial Intelligence and NIST’s own paper <em><a href="https://www.nist.gov/system/files/documents/2019/08/10/ai_standards_fedengagement_plan_9aug2019.pdf" target="_blank" rel="noopener">US Leadership in AI: A Plan for Federal Engagement in Developing Technical Standards and Related Tools</a></em> to create guidelines that will, according to NIST’s website, help “improve the ability to incorporate trustworthiness considerations into the design, development, use, and evaluation of AI products, services and systems.”</p>
<p>All things considered, while the US’s overall position seems somewhat fragmented, there are sure signs it is taking steps towards overarching national regulation. Indeed, with the diplomatic challenges the EU faces in finding agreement from all member states, it could end up overtaking the EU AI Act in its implementation.</p>
<h3>AI regulation in China</h3>
<p>While progress in the EU, the UK, and the US seems to be picking up pace, progress in China has moved significantly faster, with laws regulating AI coming into force on March 1, 2022.</p>
<p>The <a href="http://www.cac.gov.cn/2021-08/27/c_1631652502874117.htm" target="_blank" rel="noopener">Internet Information Service Algorithmic Recommendation Management Provisions</a> (translated text available <a href="https://digichina.stanford.edu/work/translation-internet-information-service-algorithmic-recommendation-management-provisions-effective-march-1-2022/" target="_blank" rel="noopener">here</a>), created by the Cyberspace Administration of China (CAC), introduced new rules on the use of algorithms to make recommendations.</p>
<p>These are overarching regulations that target all forms of algorithms designed to provide information to users. However, the following specific algorithmic recommendation technologies are mentioned: generative or synthetic, personalized recommendation, ranking and selection, search filter, and dispatching and decision-making.</p>
<p>The rules aim to safeguard national security and social interests, with a particular focus on combating the dissemination of disinformation and preserving the safety of minors and the elderly.</p>
<p>The above translation describes its purpose as aiming to “carry forward the Socialist core value view, safeguard national security and the social and public interest, protect the lawful rights and interests of citizens, legal persons, and other organizations, and stimulate the healthy development of Internet information services.&#8221;</p>
<p>While China’s AI regulations may not be mirrored by the west, there’s little doubt that governments around the world will be paying keen attention in the coming years.</p>
<p><script async src="https://static.smartframe.io/embed.js"></script><smartframe-embed customer-id="7d0b78d6f830c45ae5fcb6734143ff0d" image-id="shutterstock_1025003299_1650987972240" theme="blog-new" style="width: 100%; display: inline-flex; aspect-ratio: 6720/4000; max-width: 6720px;"></smartframe-embed></p>
<!-- https://smartframe.io/embedding-support -->
<h3>AI regulation around the world</h3>
<p>This article has focused on the activities of a few of the world’s biggest regulatory superpowers, although efforts to regulate AI are going on within many territories around the world.</p>
<p>This <a href="https://oecd.ai/en/dashboards" target="_blank" rel="noopener">dashboard</a> from the Organisation for Economic Co-operation and Development (OECD) provides a useful resource for finding out the current state of play in territories around the globe, listing over 700 policy initiatives and strategies from over 60 countries and territories, plus the EU.</p>
<h3>The future of AI regulation</h3>
<p>While there is plenty of activity concerning AI regulation around the world, at this early stage it is impossible to say exactly how things will look moving into the future, especially when dealing with such fast-moving technology.</p>
<p>Indeed, the ever-evolving nature of AI and the resulting fluidity of the proposed regulation makes it very difficult to predict the future.</p>
<p>Granted, there is a clear synergy across all proposals in their aim to protect common values, prevent disinformation, and shield the most vulnerable in society from harm. But it’s important to remember that we are a long way from global regulation, and when dealing across borders, cultures, and governments, there is always an element of subjectivity.</p>
<p>With this in mind, whether you are using AI or developing it, in such a hyper-connected digital arena it’s essential to familiarize yourself with the rules of the territories in which the technology was created.</p>
<p><em>The information contained in this article is intended to be used and must be used for informational purposes only and does not in any way constitute professional legal advice. If you are unsure of the law, always take independent legal advice from a professional.</em></p>								</div>
					</div>
				</div>
				</div>
		<p>The post <a href="https://smartframe.io/blog/how-is-ai-regulated-around-the-world/">How is AI regulated around the world?</a> appeared first on <a href="https://smartframe.io">SmartFrame</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>How to create a strong password: Everything you need to know</title>
		<link>https://smartframe.io/blog/how-to-create-a-strong-password/</link>
		
		<dc:creator><![CDATA[Matt Golowczynski]]></dc:creator>
		<pubDate>Fri, 22 Apr 2022 10:15:45 +0000</pubDate>
				<category><![CDATA[How To]]></category>
		<category><![CDATA[News & Features]]></category>
		<category><![CDATA[security]]></category>
		<guid isPermaLink="false">https://smartframe.io/?p=75523</guid>

					<description><![CDATA[<p>Are your passwords strong enough? How should you use numbers when creating [&#8230;]</p>
<p>The post <a href="https://smartframe.io/blog/how-to-create-a-strong-password/">How to create a strong password: Everything you need to know</a> appeared first on <a href="https://smartframe.io">SmartFrame</a>.</p>
]]></description>
										<content:encoded><![CDATA[		<div data-elementor-type="wp-post" data-elementor-id="75523" class="elementor elementor-75523" data-elementor-post-type="post">
				<div class="elementor-element elementor-element-7e7af206 e-flex e-con-boxed e-con e-parent" data-id="7e7af206" data-element_type="container" data-e-type="container" data-settings="{&quot;ekit_has_onepagescroll_dot&quot;:&quot;yes&quot;}">
					<div class="e-con-inner">
				<div class="elementor-element elementor-element-539f271f elementor-widget elementor-widget-text-editor" data-id="539f271f" data-element_type="widget" data-e-type="widget" data-settings="{&quot;ekit_we_effect_on&quot;:&quot;none&quot;}" data-widget_type="text-editor.default">
									<p class="blog-stand-first">Are your passwords strong enough? How should you use numbers when creating them? And what about multi-factor authentication? Here’s what you need to know about creating and maintaining strong passwords.</p>
<p>How do you create a strong password, one that can withstand being cracked by even the most sophisticated attacks?</p>
<p>Most of us know not to use commonly used passwords and personal details when setting these, and instead to use numbers, special characters, and so on.</p>
<p>But even if we follow this advice, our passwords may leave us vulnerable to attacks.</p>
<p>So why is this? And what should we be doing instead? First, let&#8217;s look at the two main reasons our passwords don&#8217;t quite cut it.</p>
<h3>The two main reasons your password isn’t strong enough</h3>
<p>We&#8217;re often led to believe a password is stronger than it actually is for two reasons.</p>
<p>The first reason is that the average user will be happy to be guided by the site on which a password is created as to what they should do. </p>
<p>This is a problem as it&#8217;s easy to confuse the minimum conditions for creating a password on a particular site with best practices around password creation in general. </p>
<p>A password you create may well satisfy the criteria for a particular website, and may include a number and a special character for additional security, but if it’s one you tend to use elsewhere, it’s not necessarily a good idea to continue using it on additional sites. The site in question, of course, won’t know just how frequently you’ve used it previously, and so it cannot advise you here.</p>
<p><script async src="https://static.smartframe.io/embed.js"></script><smartframe-embed customer-id="7d0b78d6f830c45ae5fcb6734143ff0d" image-id="roupplarshutterstock_1927950092_copy_1650619492017" theme="blog-new" style="width: 100%; display: inline-flex; aspect-ratio: 10417/6667; max-width: 10417px;"></smartframe-embed></p>
<!-- https://smartframe.io/embedding-support -->
<p>It’s perfectly normal to want to make life easy for yourself and to balance security with convenience. If you only need to define a password that’s eight characters in length, with one special character and one number among these, why make it longer and more complicated than that?</p>
<p>The second key reason explains why we should. </p>
<p>Most online users want their accounts to be secure, but they lack sufficient awareness of how threats to passwords have evolved over time, and whether the advice we have always believed to be best is still sound.</p>
<p>Again, this is perfectly understandable. Password security is hardly the most exciting subject and it takes effort to stay on top of how things change in this space.</p>
<p>As online threats evolve over time, we should take notice of new recommendations so that these can be defeated. But in reality, most of us slip into a habit of doing things one way and just stick with it.</p>
<p>For example, many of us will now habitually use special characters and numbers in our passwords as we have been prompted to do so for some time. The theory behind this is that a more unique combination will be harder to crack. </p>
<p>But as the use of special characters has become commonplace, password-cracking methods have adapted to this. To understand how, it&#8217;s useful to look at the two main ways in which passwords are cracked, namely through dictionary attacks and brute force attacks. </p>
<h4>Dictionary attacks vs brute force attacks</h4>
<p>Dictionary attacks are commonly thought of as the process of using every word in a dictionary to guess a password until the correct one is found.</p>
<p>The title is somewhat misleading, however, as the requirement for special characters and numbers in today&#8217;s password means this approach wouldn&#8217;t be particularly effective today.</p>
<p>For that reason, these attacks may not actually use every word in a dictionary as such, but will typically make use of common words together with lists of commonly used passwords, such as those that have been scraped from previous data breaches.</p>
<p>Brute force attacks differ in that they attempt to use every combination within a set of parameters. This could, for example, be every combination of numbers, characters, capital letters, and symbols within a set password length. This means that they can guess passwords dictionary attacks may easily miss.</p>
<h4>How to create a strong password</h4>
<p>So what&#8217;s the best way to create a strong password? In short, a reasonably long password that&#8217;s randomly generated, or made using random words to create a nonsensical phrase, and saved with a password manager for convenience will serve most users best. Let&#8217;s examine this in more depth.</p>
<h4>Use a longer password</h4>
<p>Longer passwords are harder to crack than shorter ones, as there is more information to work out and a broader range of number-letter-special character combinations. So you should aim to make your password as long as is practical.</p>
<p>A brute force attack may attempt every combination up to a certain point, but it cannot guess forever. This is why a twenty-character password is more secure than a ten-character one. This is harder to remember, of course, but if you are using a password manager (discussed below) to remember your password, there is little excuse for not making this particularly lengthy. </p>
<h4>Don’t use a single password on every site</h4>
<p>Password lists that are sold on the dark web are known to be used for dictionary attacks. This is where commonly used passwords are added to dictionary attack lists in order to maximize the chance of successfully guessing a password.</p>
<p>If you&#8217;re unlucky enough to have your details included in such a list, using the same password across multiple sites opens you up to the risk of having other accounts associated with your email address being compromised.</p>
<p>If you use a password manager, even one built into your browser, you may be notified when you have repeatedly used the same password, and you may be prompted to change this.</p>
<h4>Avoid personal details</h4>
<p><a href="https://nordpass.com/most-common-passwords-list/" target="_blank" rel="noopener">NordPass’s Top 200 Most Common Passwords list for 2021</a> shows that a number of popular passwords are simply first names such as Thomas and Jennifer. </p>
<p><script async src="https://static.smartframe.io/embed.js"></script><smartframe-embed customer-id="7d0b78d6f830c45ae5fcb6734143ff0d" image-id="shutterstock_412523491_1649324968838" theme="blog-new" style="width: 100%; display: inline-flex; aspect-ratio: 8765/5412; max-width: 8765px;"></smartframe-embed></p>
<!-- https://smartframe.io/embedding-support -->
<p>While dictionary attacks will easily discover these, they are also obvious passwords that can be guessed by people known to the account holder, so they should be best avoided. </p>
<p>The same applies, albeit to a lesser extent, to cities, sports teams, and musical groups. </p>
<h4>Don’t use obvious substitutions</h4>
<p>A handful of numbers and symbols make obvious substitutions for letters, such as 4 for A and 5 for S. The idea behind this approach is that it makes passwords more secure while keeping them memorable.</p>
<p>But as a general rule, what’s obvious is best avoided as some dictionary attacks now incorporate searching for these kinds of obvious substitutions.</p>
<p>If you do plan on using a memorable word or phrase and you need to make use of numbers, it’s best to place them randomly as additional, rather than substitutional, elements.   </p>
<h4>Avoid the obvious – and the not so obvious too</h4>
<p>Everyone knows that using <i>qwerty,</i> <i>password</i>, and repetitive or sequential number combinations such as <em>111111</em> or <em>123456</em>, is best avoided when creating passwords. </p>
<p>In fact, you may actually find some common options to be automatically banned when creating a password. This is typically the result of a website operator feeding <a href="https://www.infosecurity-magazine.com/blogs/passwords-in-password-blacklist-1/" target="_blank" rel="noopener">a list of common passwords</a> into the system to prevent them from being submitted.</p>
<p><script async src="https://static.smartframe.io/embed.js"></script><smartframe-embed customer-id="7d0b78d6f830c45ae5fcb6734143ff0d" image-id="vitalii_vodolazskyi_shutterstock_1197236665_1650620619991" theme="blog-new" style="width: 100%; display: inline-flex; aspect-ratio: 5500/3667; max-width: 5500px;"></smartframe-embed></p>
<!-- https://smartframe.io/embedding-support -->
<p>But what they may not know is that <a href="https://nordpass.com/most-common-passwords-list/">some of the most common passwords</a> make use of less obvious combinations that follow some kind of order, such as <em>1q2w3e</em>, <em>asdasd</em>, <em>123321</em>, and <em>qwe123</em>. And given that some dictionary attacks are known to make use of lists from previous data breaches, commonly used passwords like these are obvious candidates for attack. </p>
<p>So as a general rule, you should be wary of passwords that are convenient to type out. If you’re thinking of doing it, it’s highly likely other people have done so too.</p>
<h4>Use password generators</h4>
<p>There are various online tools that can be used to generate passwords, and many of these allow you to specify password length, the use of special characters, and even whether to exclude similarly appearing characters to create a more unusual result. </p>
<p>Of course, there is nothing stopping you from simply hitting keys on your keyboard at random as an alternative to this, although this approach may end up with a password that’s a little less diverse overall. </p>
<h4>Use password managers</h4>
<p>Traditionally, the role of a password manager has been to encrypt and store passwords that have already been created so that they can be quickly recalled when needed. This has made them useful for longer and more complex passwords, particularly those that have been randomly generated. </p>
<p>Today’s password managers, however, provide many additional conveniences. They will typically generate strong passwords and let you know if you are using these across multiple sites, for example, and even notify you if these may have been among details discovered in recent data breaches.</p>
<p>These used to only exist as standalone programs (or browser extensions), which would typically come in both free and paid-for versions. The majority of people who use password managers today, however, will typically opt for the equivalent features that are built into browsers such as Safari and Chrome.   </p>
<p>Aside from the convenience of remembering longer passwords, a further advantage of these is that they make passwords easy to recall across different devices. Premium, paid-for options will also typically allow passwords to be shared with trusted friends and family, together with extra storage space, and easy syncing of other credentials such as credit card details and Wi-Fi passcodes. </p>
<h4>Use nonsensical passphrases</h4>
<p>One obvious drawback to the use of numbers and special characters is that it can make a password less memorable, particularly if those numbers and characters have been added randomly. </p>
<p>An alternative way to create a strong and memorable password is to use a phrase that makes little or no sense to someone else, but that can be easily remembered by its creator.</p>
<p><script async src="https://static.smartframe.io/embed.js"></script><smartframe-embed customer-id="7d0b78d6f830c45ae5fcb6734143ff0d" image-id="shutterstock_2120940602_copy_1650620719847" theme="blog-new" style="width: 100%; display: inline-flex; aspect-ratio: 2000/1146; max-width: 2000px;"></smartframe-embed></p>
<!-- https://smartframe.io/embedding-support -->
<p>For example, the phrase &#8216;PackageSidewalkCrushingDonkeyBright&#8217; makes little sense, but it&#8217;s not difficult to remember and such a unique combination would test even more advanced cracking approaches. Using the lyrics from a song can also work here. </p>
<p>Another significant advantage of using a phrase of this nature is that it will naturally create a relatively long password, which is also a boon for security.</p>
<h3>How to keep a password protected</h3>
<p>Setting a strong password is one thing. Making sure it continues to provide the protection you expect long after you created it is another. So what should you consider?</p>
<h4>Stay up to date on data breaches</h4>
<p>Data breaches occur when a hacker obtains a list of personal details from a website and these will typically include passwords. <a href="https://ico.org.uk/for-organisations/guide-to-pecr/communications-networks-and-services/security-breaches/#:~:text=You%20do%20not%20need%20to,likely%20to%20adversely%20affect%20them" target="_blank" rel="noopener">Depending on the jurisdiction, and whether this information was encrypted</a>, the company in question may notify you by email that this occurred and the extent of information that leaked out.</p>
<p>You should stay up to date on these breaches by keeping an eye on security-focused news, perhaps by following social media accounts that tend to report on these for ease. </p>
<p>Checking whether your details were included in any historic data breaches using a site such as <a href="https://haveibeenpwned.com/" target="_blank" rel="noopener">Have I Been Pwned</a> is also recommended.</p>
<h4>Routinely scan your devices for threats</h4>
<p>Password-stealing malware isn’t just confined to laptops and desktop devices. It can also hide in apps downloaded for mobile devices. Common signs that a phone is infected with malware include high data usage, fast battery drainage, and general sluggishness in operation.</p>
<p><script async src="https://static.smartframe.io/embed.js"></script><smartframe-embed customer-id="7d0b78d6f830c45ae5fcb6734143ff0d" image-id="panuwat_phimpha_shutterstock_641261479_1650619492030" theme="blog-new" style="width: 100%; display: inline-flex; aspect-ratio: 4807/3525; max-width: 4807px;"></smartframe-embed></p>
<!-- https://smartframe.io/embedding-support -->
<p>While it’s possible to download apps that can scan mobile devices for threats and neutralize them, some phones have anti-malware features installed as standard. If you are unsure whether yours does, check the manufacturer&#8217;s product page for your specific device.</p>
<p>If you use an Android phone or tablet, you can also run a quick check by using Google&#8217;s <a href="https://support.google.com/googleplay/answer/2812853?hl=en-GB" target="_blank" rel="noopener">Play Protect</a> feature. You can find this option by clicking on your profile icon in the Google Play store. </p>
<div class="“highlight-note”">
<div class="“info-icon”"> </div>
<div class="note">
<h5 class="note-heading">Should you use multi-factor authentication?</h5>
<div class="note-body">
<p>Multi-factor authentication (MFA), which is most commonly two-factor authentication (2FA), provides an additional layer of security to a straightforward username/password login.</p>
<p>While this process is still initiated by a conventional username/password login, by requesting that a user inputs a code that’s sent to their email address or phone – or alternatively from an authenticator app such as Google Authenticator or Microsoft Authenticator – they can quickly prove they are in possession of the phone or email account that has been specified as belonging to them, which increases the likelihood of them being who they claim to be.</p>
<p>Multi-factor authentication is now standard across many social media sites and online services, and many of us use it without much thought. But a number of incidents in recent years have highlighted how it&#8217;s not always the failsafe measure one would expect.</p>
<p>These include using <a href="https://biztechmagazine.com/article/2020/12/how-detect-and-prevent-sim-swap-attack-perfcon" target="_blank" rel="noopener">sim swapping</a> to intercept text messages sent to users with one-time passwords, as well as various <a href="https://blog.malwarebytes.com/reports/2022/01/intercepting-2fa-over-1200-man-in-the-middle-phishing-toolkits-detected/" target="_blank" rel="noopener">phishing attempts</a>, and even exploitation of <a href="https://www.bleepingcomputer.com/news/security/hackers-rob-thousands-of-coinbase-customers-using-mfa-flaw/" target="_blank" rel="noopener">account recovery processes</a>.</p>
<p>Phones can, of course, also be stolen or infected by malware, and email addresses can be hacked. Nevertheless, as you will generally be the only person to have access to both your devices and your email account, the benefits outweigh the risks, so you should consider setting this up if it has not been set up already.</p>
<p>Multi-factor authentication systems that work on the submission of some kind of biometric authentication, such as a fingerprint, rather than a code that may be sent via email or text message, are generally better from the perspective of security. Bear in mind that some apps that use some form of MFA may offer biometric authentication without having it enabled as the default option, so it&#8217;s worth exploring available options.</p>
</div>
</div>
<h4>Get into the habit of changing key passwords regularly</h4>
<p>A password can only provide sufficient protection as long as it&#8217;s unknown to others, but it&#8217;s easy to miss a data breach in which this may have been revealed.</p>
<p>For this reason, you should consider changing passwords on a regular basis and saving them using a password manager for convenience.</p>
<script async src="https://static.smartframe.io/embed.js"></script><smartframe-embed customer-id="7d0b78d6f830c45ae5fcb6734143ff0d" image-id="shutterstock_2075760727_1649323106734" theme="blog-new" style="width: 100%; display: inline-flex; aspect-ratio: 5633/3755; max-width: 5633px;"></smartframe-embed>
<h4>Set up suspicious activity alerts</h4>
<p>Some social media platforms and other online properties allow you to request an alert whenever your account has been accessed from an unknown location or device. </p>
<p>You may have already received such an alert when accessing an online account from a new device or when on holiday, or perhaps when using a VPN. </p>
<p>These alerts aren’t necessarily on at default so you should investigate whether the site or service in question offers this. And, of course, if you do receive one of these, you should respond to it promptly to protect your account from any authorized access.</p>
<h4>Use a VPN when using public Wi-Fi</h4>
<p>Public Wi-Fi networks are convenient, and sometimes even essential, but they’re also notoriously risky as anyone with the necessary know-how can intercept your communications and steal sensitive information such as passwords. </p>
<p>If you must use public Wi-Fi, you should do so in conjunction with a Virtual Private Network (VPN). These mask your IP and hide it from all third parties – even your ISP – and provide a tunnel between yourself and the internet that encrypts all your data and online activities.</p>
<script async src="https://static.smartframe.io/embed.js"></script><smartframe-embed customer-id="7d0b78d6f830c45ae5fcb6734143ff0d" image-id="shutterstock_1901782519_1650619492079" theme="blog-new" style="width: 100%; display: inline-flex; aspect-ratio: 6476/4318; max-width: 6476px;"></smartframe-embed><!-- https://smartframe.io/embedding-support -->
<p>Not all VPNs are the same, however, and some are viewed more favorably than others when it comes to privacy and protecting your information. </p>
<p>Ideally, any VPN service you use should have a strict no-logging policy that is periodically audited by an independent third party. </p>
<p>Many free VPNs exist, although paid-for versions typically offer more by way of security and convenience. They may, for example, include a broader range of worldwide servers to connect to, and might also have a kill switch that immediately takes you offline if the VPN momentarily loses its connection.</p>
</div>								</div>
					</div>
				</div>
				</div>
		<p>The post <a href="https://smartframe.io/blog/how-to-create-a-strong-password/">How to create a strong password: Everything you need to know</a> appeared first on <a href="https://smartframe.io">SmartFrame</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
