Tag Archives: VPN

Instagram and Facebook Can Use Your Photos, and You Agreed to It

They say always read the fine print. And when it comes to apps, not many actually do.

When you signed up with Instagram or Facebook you had to agree to the terms of service. You probably didn’t read it. You likely don’t remember tapping ‘agree’, but there’s no going back on that now.

That hasn’t stopped people from trying to block either app’s access to their photos after the fact… with a chain-letter.

Chain-letter Hoax Still Going

Since 2012 users have been posting a chain-letter hoax with a fake deadline. The letter warns their followers that there’s a new rule that allows either Instagram or Facebook to use their photos. And to opt out of the rule, they’re encouraged to repost the letter of course.

From there it contains a legal passage that attempts to thwart the supposedly new policy from affecting the poster.

“I do not give Instagram or any entities associated with Instagram permission to use my pictures, information, messages or posts, both past and future,” it reads. “With this statement, I give notice to Instagram it is strictly forbidden to disclose, copy, distribute, or take action against me based on this profile and/or its contents.”

Nice try, but anyone posting this has given the app access to their GPS, location, camera and photos. Posting a chain-letter won’t revoke privileges that have already been granted.

In fact, the apps often need access to these features on your phone to function. So restricting access isn’t always worth it, even when you can.

Facebook has stated that they also collect info about your network, the device your using, and many other data points.

And to be clear, Instagram and Facebook can access much more than the photos you post to their platform. The company has access to your entire photo library!

How Facebook Uses Your Photos

Would Mark Zuckerberg and friends ever actually harvest your photos and use it on their app without your permission?

Actually, their ad platform does this frequently. However, before you get alarmed, it’s not nearly as bad as you might assume. Some functions show your photos to you exclusively, rather than your friends or the public.

They will use a photo you uploaded earlier to grab your attention and encourage you to run an ad.

Another way Facebook uses your photos is by showing you a memory you posted several years ago and encouraging you to repost it with an updated caption.

Blocking Instagram’s Access to Photos on Your Phone

So, is it possible to simply block apps like Instagram from getting to your photos via the settings in Android or iOS? Yes, you can block them from scraping data associated with your images.

On an Apple device launch ‘Settings,’ then tap on ‘Instagram.’ From there you tap ‘Photos,’ then select ‘Never.’

Consider Using a VPN with Instagram and Facebook

Those that still have privacy concerns may want to review their privacy settings within the app, and then considering using a VPN.

A VPN (virtual private server) acts like an encrypted tunnel between your device and the internet for improved privacy and security.

Using a VPN hides your location and other private data so apps and websites can’t collect as much information about you.

To learn more, read LetMeBy’s reviews of the top VPN providers.

Conclusion

Instagram and Facebook collect data about your photos and have access to everything you upload to the apps as well as your photo gallery by default.

Luckily there are measures you can take to limit their access to your data. You can do this with privacy settings in the app, system settings, or with a VPN. Be aware, simply posting a chain-letter regarding revoking access to your photos won’t do any good.

Is Facebook Listening to Your Conversations? Not Exactly

Have you ever gotten that eerie feeling that someone is watching you? Of course, right? It’s a common phenomenon. Michael Jackson even wrote a song about it:

I always feel like somebody’s watching me
And I have no privacy

Facebook can give you that same impression when the app displays an ad that relates to something you just discussed privately on your smartphone.

Imagine you just got off the phone with your local florist. You launch Facebook out of habit, and the first ad you see is 1800Flowers.

The most obvious explanation is that Facebook must have spied on your conversation.

So, is Facebook listening? Likely not how you think they are (via recording audio), and it’s complicated. First, let’s look at why conspiracy theories about this abound, then examine the evidence.

Many Don’t Trust Facebook and Mark Zuckerberg

Research company Toluna found that Facebook is the least trusted tech company by a considerable amount. Forty percent of said they didn’t trust Facebook with their personal information.

Mark Zuckerberg has been grilled by congress on numerous occasions. They’ve blasted him for failing to curb the proliferation of fake news, not fact-checking political ads, Facebook’s Libra cryptocurrency, etc. Each time he appears in congress people the public is reminded that Zuckerberg is generally viewed with suspicion by government leaders.

Audio Transcription Tech Raises Concerns

In August 2019 Bloomberg wrote a piece about Facebook contacting an external company to create software that transcribes audio conversations in their Messenger app. The transcription tech was tested on users that opted in, and the possibility of human review of conversations was part of the terms associated with using it.

To the average reader this was confirmation that Facebook is indeed spying on its users’ private conversations. Years of conspiratorial speculations rose to the surface, as this news was exactly what Facebook’s critics needed to add legitimacy to their theories.

It was Senator Gary Peters that asked Zuckerberg whether Facebook listens to conversations and then generates targeted ads with that data. Zuckerberg replied, “You’re talking about this conspiracy theory that gets passed around that we listen to what’s going on on your microphone and use that for ads. We don’t do that.”

Facebook has attempted to set the matter straight via their Newsroom. They’ve stated that ads are generated based on people’s profile information: their interests, job title, brands they follow, etc., and not what you’re talking out loud about.

Is Spying on Users Practical or Even Possible?

Despite anecdotal claims that Facebook must be listening, the data doesn’t add up.

Wandera, a mobile cyber-security company, conducted a test to determine if audio picked up with the phone’s mic influences which ads are displayed.

They put a Samsung and Apple iPhone in a room, then played an audio loop of pet food ads for 30 minutes per day, for three days. They placed another set of phones in a silent room so they could compare the results.

No pet food ads appeared on any of the phones. And more tellingly, there were no differences in data consumption, battery use, and background activity.

Experts have pointed out that it would take an incredible amount of server resources for Facebook to listen to over 150 million daily active users in the U.S. alone.

Alternatively, if Facebook were to scan audio for keywords coming into the microphone it would take a considerable amount of your phone’s CPU processing power which would be impossible to hide.

Another reason Facebook would almost certainly never even consider doing this is it’s illegal to collect audio recordings of people.

Do You VPN?

People that simply don’t trust Zuck or Facebook can use a VPN to mask their location, IP address, etc. Read about LetMeBy’s top VPN picks to learn more.

A Reality Check

The truth is there are much more efficient and effective ways to gather data about users than harvesting audio.

Facebook has a complex algorithm that considers the information you post or input when determining which ads to show you.

It can be so stunningly accurate in determining what products or services you’re interested in you’d swear they must be listening to you. However, what really happened is the algorithm made an educated guess and managed to hit the bullseye.

There are valid reasons not to trust Facebook due to lack of privacy but spying on your conversations is not one based on the evidence.

Want to Upgrade Zoom’s Privacy and Security? Use a VPN

The pandemic forever changed the way we connect with friends and colleagues. Video chat apps have now become an even more integral part of our digital world.

Zoom recently peaked at #1 as the most downloaded app globally. Business and home users alike have quickly adopted it.

With that shift came greater concerns about privacy, as confidential information discussed at meetings could be intercepted by malicious users or authorities.

Free Comes at a Cost

Security experts have noted that the free version of Zoom lacks end-to-end encryption, and this is generally frowned upon in the software industry. Theoretically Zoom, the police or FBI could access calls if they wanted to, although the software company denies they would ever do this except if Zoom is used for obvious illegal activity.

Zoom elaborated on the policy in a statement. “Zoom does not proactively monitor meeting content, and we do not share information with law enforcement except in circumstances like child sex abuse. We do not have backdoors where participants can enter meetings without being visible to others. None of this will change,” said a spokesperson.

Take special note that just because they don’t proactively monitor calls doesn’t guarantee they won’t do it. So now the question becomes, is taking Zoom’s word for it good enough for you?

A system not requiring trust, made possible with tech, is always superior to believing a company. However, to get that with Zoom you have to pay for the premium version of the app.

The Troll in the Room

Some users have reported a phenomenon called Zoom bombing. This involves uninvited guests gaining access to group chats and dropping slurs, offensive images, etc.

Zoom is addressing this problem, but it’s an ongoing threat. Thus, it raises more concerns about the overall strength of the app’s security.

VPN Upgrade Alternative

Should you stick with Zoom despite these weaknesses? Although video conferencing alternatives with better privacy and security exist, it likely won’t be feasible to convert your friends or coworkers.

Luckily there’s a quick, easy way to upgrade Zoom’s encryption to prevent privacy leaks: simply use a VPN.

A virtual private network (VPN) is a secure tunnel between your device and a remote server operated by a VPN service provider. All online traffic goes through this encrypted tunnel so apps and websites cannot gain access to data such as your IP address, location, and certain actions you take.

If you don’t need the added features of the Zoom Pro or Business plan and want the best privacy and security, a VPN is the best option. A VPN service will give you added privacy with any app or sites you visit.

VPNs that are most recommended here at LetMeBy are below. For more detail, you can check out full reviews of the top 3 VPNs services.

Conclusion

Zoom is a terrific video conferencing app overall. It’s easy to use, as the user interface (UI) is simple and intuitive.

Privacy and security concerns shouldn’t prevent you from using it, as leveraging a VPN or upgrading to a paid plan takes care of the main shortcomings concerning encryption.

How to Unblock Instagram at School or Work

Social media allows us to accomplish diverse tasks: from video chats with friends to spreading the word about your company’s services.

Use of apps like Instagram may be productive and relevant to what you’re doing at school or work, however many people scroll through content to slack off.

So, many institutions have opted to ban social media apps entirely, and network administrators are able to follow through on this by blocking access to URLs like https://www.instagram.com/.

Situations can arise where you need to check Instagram to do your work, but the network won’t allow it. And this is when bending the rules on occasion may be reasonable.

Can Insta be Productive?

Content on Instagram varies a lot and it has evolved considerably from a place to take in beautiful photos or post photos of your road trip. In fact, education, business and self-improvement are very popular topics on the platform.

Instagram can be enriching or a waste of time depending on your habits. It’s important to be mindful of the accounts you follow. While a lot of the photos on Instagram will merely be a distraction at school or work, some of it provides succinct knowledge that could actually save you time.

If used correctly, it can increase your productivity. However, few people have the discipline to pull this off.

The app has a great feature that allows you to limit the time on spend on it daily. To use it, go to “Settings”, then tap on “Account.” Next, tap “Your Activity” and you’ll see reminder and notification settings.

Unblock Instagram

Use Phone Data

If you launch Instagram and can’t view your feed, try turning off Wi-Fi and enabling wireless data.

There’s a good chance this will work because Wi-Fi uses the network which has internet access rules applied by the admin, while mobile data works independently of the local network.

Get a VPN

If you don’t have mobile data or don’t want to use up your monthly bandwidth, you can also use a Virtual Private Network (VPN) to access Instagram.

A VPN service allows you to choose a new IP that is associated with the location of your choice. This provided IP allows you to bypass restrictions set by the network admin while still connecting to the network via Wi-Fi.

It’s the best solution for people that want to hide their identity, location, or unblock apps and websites. You need to be subscribed to VPN service, many of which are fast and affordable.

To get started, learn more about the best VPNs that are recommended here most.

Use Your PC with Tor

If you simply want to browse Instagram and don’t need to post, using your PC is an alternative that is often overlooked.

If the URL https://www.instagram.com/ is blocked on all devices, you may be able to download and install Tor. This is proxy software that allows you to use the IP of another user connected to the Tor network.

Once the software changes your IP, Instagram will be unblocked. It’s free but be warned that it’s not as safe or nearly as fast as a VPN.

Typically, Tor should be a last resort, only to be used temporarily then uninstalled. This approach will only work at small businesses that don’t restrict which software can be installed.

Wrapping It Up

Use these tips responsibly and enjoy your new-found access to Instagram!

As the app can be useful at both school and work, blocking access might not be the best policy. However, it’s best to be as respectful of the restrictions even if you’re forced to bypass them at times.

Should You Use a VPN When Downloading Torrents?

Have you ever wondered if someone is watching when you download a torrent?

The answer is categorically yes, even if you haven’t noticed any evidence of it. The snooping is indeed as undercover as it comes.

What you likely have noticed is irritating popup ads for VPNs on torrent sites. Then there are the flashing warnings that your IP address is exposed.

Sure, it’s an attempt to put the fear of god into you so you sign up with a VPN provider.

Nonetheless, is there some validity to covering your behind with a VPN when downloading torrents? Let’s explore that.

BitTorrent: Not Always Unethical

Before proceeding it should be said that LetMeBy.com doesn’t condone piracy. Moreover, it’s assumed the motives of the reader are pure.

Despite its reputation, BitTorrent distributes free content belonging to the public domain. Plus, it’s a protocol much like e-mail or www. So, don’t believe those who broadly label it as “bad.”

And then there are those many gray areas. Perhaps you want to download a video game ROM when you already own a physical copy. Or maybe you’d rather download MP3 files rather than ripping the music CD yourself.

Regardless, you have the ability and right to protect your privacy.

How BitTorrent Works

Downloading torrents isn’t as anonymous as it might seem. To understand why, we need to take a look at the basic mechanics of it.

The BitTorrent protocol is a peer-to-peer method of file sharing. It’s decentralized so there is no single point of failure.

So, when you start downloading a torrent you become an active participant in that system. Right from the top you help to serve the file. Thus, others can get the data you have so far. Then when the download is complete the file starts to seed, making you both an uploader and host of the content.

Who Can See Your IP Address?

During the process described above your IP address is accessible to others connected to the same torrent. So, it’s indeed plausible that an entity could monitor and record the IPs that connected to a torrent. Also, with apps like uTorrent you can view the IP of users quite casually by clicking on the Peers tab.

Savvy companies with big budgets use automated software to spy on users downloading their digital products without paying.

Another potential risk to your privacy is your internet service provider. This is the entity that can find out exactly who you are based on your IP. Although these companies rely on their users to maintain their business, they’ve clearly sided with other big business when it comes to copyright violations.

An online survey of 1,000 conducted by PCMag found that 25 percent of respondents named ISPs as the biggest threat to their online privacy.1

Those in the Crosshairs

Copyright holders are most concerned about stopping the original uploader of a torrent, followed by subsequent uploaders. Furthermore, since all downloaders are also uploaders by design, there is no way to shirk responsibly for proliferating copyrighted material.

The film and TV industries in particular have been vigilant about preventing unofficial distribution of their video.

Torrents and the Movie Industry

Napster first pulled the genie out of the bottle in the music industry. And it hasn’t been the same since.

The film industry was similarly slow to adapt to technological change. Initially, increased demand for digital downloads and streaming were often met by unofficial channels.

But in this case, studios have done better in terms of enforcing copyright. Along the way film studios managed to utilize incredible technology to defend their turf.

Trackers are now embedded into popular movies which automatically find users who download their material unlawfully. Copyright infringement notices are sent via e-email thanks to cooperation with the user’s ISP.

Thus, downloading movies from torrent sites carries greater risks than many imagine.

Recently 3,400 Canadians faced the legal consequences of illegally downloading movies in Federal Court. The crackdown was launched by a Toronto law firm on behalf of U.S. movie production houses hoping to enforce their copyright claims.

Defendants have paid anywhere from $100 to $5000 to settle these claims.2

How VPNs Protect Users

When you use a VPN (virtual private network), your traffic is encrypted and secured to ensure that no one can spy on your activity—even when you’re torrenting.

Your actual IP address is replaced with an IP provided by the service. This provides anonymity since the IP in use is not associated with any one person.

Recommended VPNs

As there has been a surge in demand for VPNs, there is no shortage of services to choose from. Luckily even the best VPNs are affordable, so there is no reason to go for anything less than top-notch.

Read full reviews of the best VPN providers here. Or if you’re short on time, click on one of the links below. These are currently among the top choices out there:

Wrapping it Up

Don’t kid yourself. ISPs and corporations with copyrights to protect have a very dim view of torrent use. Downloaders are treated with the same suspicion whether their activity is legitimate or not.

This is yet another reason to consider employing a VPN for all your internet use. You may have fared well so far, but there is no telling who is watching your activity waiting for an opportune time to take action.

 

Sources:

  1. https://www.pcmag.com/roundup/354396/the-best-vpns-for-bittorrent
  2. https://globalnews.ca/news/4933339/lawsuits-movie-downloading-uploading/