Tag Archives: VPN

Is Facebook Listening to Your Conversations? Not Exactly

Have you ever gotten that eerie feeling that someone is watching you? Of course, right? It’s a common phenomenon. Michael Jackson even wrote a song about it:

I always feel like somebody’s watching me
And I have no privacy

Facebook can give you that same impression when the app displays an ad that relates to something you just discussed privately on your smartphone.

Imagine you just got off the phone with your local florist. You launch Facebook out of habit, and the first ad you see is 1800Flowers.

The most obvious explanation is that Facebook must have spied on your conversation.

So, is Facebook listening? Likely not how you think they are (via recording audio), and it’s complicated. First, let’s look at why conspiracy theories about this abound, then examine the evidence.

Many Don’t Trust Facebook and Mark Zuckerberg

Research company Toluna found that Facebook is the least trusted tech company by a considerable amount. Forty percent of said they didn’t trust Facebook with their personal information.

Mark Zuckerberg has been grilled by congress on numerous occasions. They’ve blasted him for failing to curb the proliferation of fake news, not fact-checking political ads, Facebook’s Libra cryptocurrency, etc. Each time he appears in congress people the public is reminded that Zuckerberg is generally viewed with suspicion by government leaders.

Audio Transcription Tech Raises Concerns

In August 2019 Bloomberg wrote a piece about Facebook contacting an external company to create software that transcribes audio conversations in their Messenger app. The transcription tech was tested on users that opted in, and the possibility of human review of conversations was part of the terms associated with using it.

To the average reader this was confirmation that Facebook is indeed spying on its users’ private conversations. Years of conspiratorial speculations rose to the surface, as this news was exactly what Facebook’s critics needed to add legitimacy to their theories.

It was Senator Gary Peters that asked Zuckerberg whether Facebook listens to conversations and then generates targeted ads with that data. Zuckerberg replied, “You’re talking about this conspiracy theory that gets passed around that we listen to what’s going on on your microphone and use that for ads. We don’t do that.”

Facebook has attempted to set the matter straight via their Newsroom. They’ve stated that ads are generated based on people’s profile information: their interests, job title, brands they follow, etc., and not what you’re talking out loud about.

Is Spying on Users Practical or Even Possible?

Despite anecdotal claims that Facebook must be listening, the data doesn’t add up.

Wandera, a mobile cyber-security company, conducted a test to determine if audio picked up with the phone’s mic influences which ads are displayed.

They put a Samsung and Apple iPhone in a room, then played an audio loop of pet food ads for 30 minutes per day, for three days. They placed another set of phones in a silent room so they could compare the results.

No pet food ads appeared on any of the phones. And more tellingly, there were no differences in data consumption, battery use, and background activity.

Experts have pointed out that it would take an incredible amount of server resources for Facebook to listen to over 150 million daily active users in the U.S. alone.

Alternatively, if Facebook were to scan audio for keywords coming into the microphone it would take a considerable amount of your phone’s CPU processing power which would be impossible to hide.

Another reason Facebook would almost certainly never even consider doing this is it’s illegal to collect audio recordings of people.

Do You VPN?

People that simply don’t trust Zuck or Facebook can use a VPN to mask their location, IP address, etc. Read about LetMeBy’s top VPN picks to learn more.

A Reality Check

The truth is there are much more efficient and effective ways to gather data about users than harvesting audio.

Facebook has a complex algorithm that considers the information you post or input when determining which ads to show you.

It can be so stunningly accurate in determining what products or services you’re interested in you’d swear they must be listening to you. However, what really happened is the algorithm made an educated guess and managed to hit the bullseye.

There are valid reasons not to trust Facebook due to lack of privacy but spying on your conversations is not one based on the evidence.

Want to Upgrade Zoom’s Privacy and Security? Use a VPN

The pandemic forever changed the way we connect with friends and colleagues. Video chat apps have now become an even more integral part of our digital world.

Zoom recently peaked at #1 as the most downloaded app globally. Business and home users alike have quickly adopted it.

With that shift came greater concerns about privacy, as confidential information discussed at meetings could be intercepted by malicious users or authorities.

Free Comes at a Cost

Security experts have noted that the free version of Zoom lacks end-to-end encryption, and this is generally frowned upon in the software industry. Theoretically Zoom, the police or FBI could access calls if they wanted to, although the software company denies they would ever do this except if Zoom is used for obvious illegal activity.

Zoom elaborated on the policy in a statement. “Zoom does not proactively monitor meeting content, and we do not share information with law enforcement except in circumstances like child sex abuse. We do not have backdoors where participants can enter meetings without being visible to others. None of this will change,” said a spokesperson.

Take special note that just because they don’t proactively monitor calls doesn’t guarantee they won’t do it. So now the question becomes, is taking Zoom’s word for it good enough for you?

A system not requiring trust, made possible with tech, is always superior to believing a company. However, to get that with Zoom you have to pay for the premium version of the app.

The Troll in the Room

Some users have reported a phenomenon called Zoom bombing. This involves uninvited guests gaining access to group chats and dropping slurs, offensive images, etc.

Zoom is addressing this problem, but it’s an ongoing threat. Thus, it raises more concerns about the overall strength of the app’s security.

VPN Upgrade Alternative

Should you stick with Zoom despite these weaknesses? Although video conferencing alternatives with better privacy and security exist, it likely won’t be feasible to convert your friends or coworkers.

Luckily there’s a quick, easy way to upgrade Zoom’s encryption to prevent privacy leaks: simply use a VPN.

A virtual private network (VPN) is a secure tunnel between your device and a remote server operated by a VPN service provider. All online traffic goes through this encrypted tunnel so apps and websites cannot gain access to data such as your IP address, location, and certain actions you take.

If you don’t need the added features of the Zoom Pro or Business plan and want the best privacy and security, a VPN is the best option. A VPN service will give you added privacy with any app or sites you visit.

VPNs that are most recommended here at LetMeBy are below. For more detail, you can check out full reviews of the top 3 VPNs services.

Conclusion

Zoom is a terrific video conferencing app overall. It’s easy to use, as the user interface (UI) is simple and intuitive.

Privacy and security concerns shouldn’t prevent you from using it, as leveraging a VPN or upgrading to a paid plan takes care of the main shortcomings concerning encryption.

How to Unblock Instagram at School or Work

Social media allows us to accomplish diverse tasks: from video chats with friends to spreading the word about your company’s services.

Use of apps like Instagram may be productive and relevant to what you’re doing at school or work, however many people scroll through content to slack off.

So, many institutions have opted to ban social media apps entirely, and network administrators are able to follow through on this by blocking access to URLs like https://www.instagram.com/.

Situations can arise where you need to check Instagram to do your work, but the network won’t allow it. And this is when bending the rules on occasion may be reasonable.

Can Insta be Productive?

Content on Instagram varies a lot and it has evolved considerably from a place to take in beautiful photos or post photos of your road trip. In fact, education, business and self-improvement are very popular topics on the platform.

Instagram can be enriching or a waste of time depending on your habits. It’s important to be mindful of the accounts you follow. While a lot of the photos on Instagram will merely be a distraction at school or work, some of it provides succinct knowledge that could actually save you time.

If used correctly, it can increase your productivity. However, few people have the discipline to pull this off.

The app has a great feature that allows you to limit the time on spend on it daily. To use it, go to “Settings”, then tap on “Account.” Next, tap “Your Activity” and you’ll see reminder and notification settings.

Unblock Instagram

Use Phone Data

If you launch Instagram and can’t view your feed, try turning off Wi-Fi and enabling wireless data.

There’s a good chance this will work because Wi-Fi uses the network which has internet access rules applied by the admin, while mobile data works independently of the local network.

Get a VPN

If you don’t have mobile data or don’t want to use up your monthly bandwidth, you can also use a Virtual Private Network (VPN) to access Instagram.

A VPN service allows you to choose a new IP that is associated with the location of your choice. This provided IP allows you to bypass restrictions set by the network admin while still connecting to the network via Wi-Fi.

It’s the best solution for people that want to hide their identity, location, or unblock apps and websites. You need to be subscribed to VPN service, many of which are fast and affordable.

To get started, learn more about the best VPNs that are recommended here most.

Use Your PC with Tor

If you simply want to browse Instagram and don’t need to post, using your PC is an alternative that is often overlooked.

If the URL https://www.instagram.com/ is blocked on all devices, you may be able to download and install Tor. This is proxy software that allows you to use the IP of another user connected to the Tor network.

Once the software changes your IP, Instagram will be unblocked. It’s free but be warned that it’s not as safe or nearly as fast as a VPN.

Typically, Tor should be a last resort, only to be used temporarily then uninstalled. This approach will only work at small businesses that don’t restrict which software can be installed.

Wrapping It Up

Use these tips responsibly and enjoy your new-found access to Instagram!

As the app can be useful at both school and work, blocking access might not be the best policy. However, it’s best to be as respectful of the restrictions even if you’re forced to bypass them at times.

Should You Use a VPN When Downloading Torrents?

Have you ever wondered if someone is watching when you download a torrent?

The answer is categorically yes, even if you haven’t noticed any evidence of it. The snooping is indeed as undercover as it comes.

What you likely have noticed is irritating popup ads for VPNs on torrent sites. Then there are the flashing warnings that your IP address is exposed.

Sure, it’s an attempt to put the fear of god into you so you sign up with a VPN provider.

Nonetheless, is there some validity to covering your behind with a VPN when downloading torrents? Let’s explore that.

BitTorrent: Not Always Unethical

Before proceeding it should be said that LetMeBy.com doesn’t condone piracy. Moreover, it’s assumed the motives of the reader are pure.

Despite its reputation, BitTorrent distributes free content belonging to the public domain. Plus, it’s a protocol much like e-mail or www. So, don’t believe those who broadly label it as “bad.”

And then there are those many gray areas. Perhaps you want to download a video game ROM when you already own a physical copy. Or maybe you’d rather download MP3 files rather than ripping the music CD yourself.

Regardless, you have the ability and right to protect your privacy.

How BitTorrent Works

Downloading torrents isn’t as anonymous as it might seem. To understand why, we need to take a look at the basic mechanics of it.

The BitTorrent protocol is a peer-to-peer method of file sharing. It’s decentralized so there is no single point of failure.

So, when you start downloading a torrent you become an active participant in that system. Right from the top you help to serve the file. Thus, others can get the data you have so far. Then when the download is complete the file starts to seed, making you both an uploader and host of the content.

Who Can See Your IP Address?

During the process described above your IP address is accessible to others connected to the same torrent. So, it’s indeed plausible that an entity could monitor and record the IPs that connected to a torrent. Also, with apps like uTorrent you can view the IP of users quite casually by clicking on the Peers tab.

Savvy companies with big budgets use automated software to spy on users downloading their digital products without paying.

Another potential risk to your privacy is your internet service provider. This is the entity that can find out exactly who you are based on your IP. Although these companies rely on their users to maintain their business, they’ve clearly sided with other big business when it comes to copyright violations.

An online survey of 1,000 conducted by PCMag found that 25 percent of respondents named ISPs as the biggest threat to their online privacy.1

Those in the Crosshairs

Copyright holders are most concerned about stopping the original uploader of a torrent, followed by subsequent uploaders. Furthermore, since all downloaders are also uploaders by design, there is no way to shirk responsibly for proliferating copyrighted material.

The film and TV industries in particular have been vigilant about preventing unofficial distribution of their video.

Torrents and the Movie Industry

Napster first pulled the genie out of the bottle in the music industry. And it hasn’t been the same since.

The film industry was similarly slow to adapt to technological change. Initially, increased demand for digital downloads and streaming were often met by unofficial channels.

But in this case, studios have done better in terms of enforcing copyright. Along the way film studios managed to utilize incredible technology to defend their turf.

Trackers are now embedded into popular movies which automatically find users who download their material unlawfully. Copyright infringement notices are sent via e-email thanks to cooperation with the user’s ISP.

Thus, downloading movies from torrent sites carries greater risks than many imagine.

Recently 3,400 Canadians faced the legal consequences of illegally downloading movies in Federal Court. The crackdown was launched by a Toronto law firm on behalf of U.S. movie production houses hoping to enforce their copyright claims.

Defendants have paid anywhere from $100 to $5000 to settle these claims.2

How VPNs Protect Users

When you use a VPN (virtual private network), your traffic is encrypted and secured to ensure that no one can spy on your activity—even when you’re torrenting.

Your actual IP address is replaced with an IP provided by the service. This provides anonymity since the IP in use is not associated with any one person.

Recommended VPNs

As there has been a surge in demand for VPNs, there is no shortage of services to choose from. Luckily even the best VPNs are affordable, so there is no reason to go for anything less than top-notch.

Read full reviews of the best VPN providers here. Or if you’re short on time, click on one of the links below. These are currently among the top choices out there:

Wrapping it Up

Don’t kid yourself. ISPs and corporations with copyrights to protect have a very dim view of torrent use. Downloaders are treated with the same suspicion whether their activity is legitimate or not.

This is yet another reason to consider employing a VPN for all your internet use. You may have fared well so far, but there is no telling who is watching your activity waiting for an opportune time to take action.

 

Sources:

  1. https://www.pcmag.com/roundup/354396/the-best-vpns-for-bittorrent
  2. https://globalnews.ca/news/4933339/lawsuits-movie-downloading-uploading/

Substratum to Disrupt VPNs or Is the Dream Over?

It’s among the loftiest ideas in blockchain.

Substratum is building the foundation for a new decentralized internet. This is to be an open internet that cannot be censored by restrictive governments.

So, for those using a VPN or Tor to achieve anonymity online and to view blocked content, Substratum brings new hope for the future. Or If you’re a realist, it’s a new alternative to get around the frustrating deficiencies inherent to the web.

Of course, it takes more than great tech to make such a profound change in the internet. And while Substratum has talented people with the software chops, it’s their business ethics that may sink the ship. More on that later.

First let’s get a feel how Substratum works. After all, this project is backed by some game changing vision.

A Decentralized Web Hosting Solution

The established way to deliver web content across the globe is via a hosting service. Small businesses, corporations, and content creators alike rent rack-mounted servers stored in huge facilities, or in the case of many tech companies, operate their own facility.

It’s an effective system run by professionals. However, it’s centralized. This means a website can be blocked by targeting the IP address associated with the site. This is how ISPs, institutions and governments can potentially censor content.

Decentralized hosting has no single point of failure. Thus, specific sites cannot be blocked by simply targeting an IP. So, if one machine contributing to hosting the Substratum network (aka a node) goes down, the role is simply filled by another node. This is an internet hosted “by the people” with their home computers.

How the System Works

To keep their site on the Substratum network, an individual or business pays with Substrate (SUB) tokens. This is obtained by trading another cryptocurrency for SUB, or by exchanging one’s native currency for it.

Users are incentivized to run nodes. SUB tokens are earned relative to computing power and duration that computing power is used to support the network.

A Threat to VPN Services?

Using a VPN service is currently the best way to hide your identity online in terms of speed, effectiveness and user experience.

But free is tough to beat. And the Substratum economy directs all costs to site owners, not users of the network.

So, users seeking to attain greater privacy may gravitate towards the decentralized web over time. And this could put VPN providers in tough spot if Substratum is fast. VPN services are so affordable that many won’t bother to change their habits. However, if SUB succeeds it will take a bite out of their customer base.

Web Hosting Disruption

Substratum creates an interesting opportunity for techies that operate independently from a corporation. Anyone with computing power and an internet connection can contribute to the decentralized network. With the release of Substratum Node v0.5 software, everyone running it will be paid in SUB tokens.

However, it remains to be seen if this system will be profitable enough for hosting companies to participate in any capacity. It’s probable that home users will be undercutting professional web hosts, as new participants in the space will push the value of hosting down.

Thus, if SUB takes off, site owners will now need to think about hosting for both the centralized and decentralized web. Big players using cloud hosting services like AWS or Rackspace may be able to scale back on that and invest some hosting muscle into the decentralized web.

Uncertain Times for Blockchain and Substratum

The cryptocurrency bear market that occurred after the sharp highs of late 2017 to early 2018 took its toll on the psyche of many past zealots. A rain cloud formed over the collective sentiment of blockchain investors. Lower valuations of coins and tokens associated with blockchain projects led to greater scrutiny of the teams involved, and the projects as a whole.

In short, the notion that this would be the team to bring us the decentralized internet was more believable during the boom period. Many were riding high on euphoria when Bitcoin and Ethereum prices went parabolic.

Redditors expressed their disillusionment as the Substratum project couldn’t live up to the stratospheric hype. Substratum leadership has been criticized for promising their community the moon then failing to deliver.

Deceptive Marketing (aka Shilling) on YouTube

Ethereum holders particularly, emboldened by their seemingly perfect investment, were drawn to ICOs and new blockchain projects in late 2017. Substratum took advantage of this by ramping up their marketing activity. Allegedly getting various crypto YouTubers to shill SUB tokens was an especially questionable move. The shadiness was amplified when these YouTubers later became inactive or deleted their videos.

Substratum Delisted on Exchanges

Substratum was delisted on Kucoin in January 2019, and a month later it was also delisted from the world’s most popular exchange, Binance. This was nearly the death blow to SUB trading as almost 97 percent of the trading volume was on Binance.

Members of the Substratum team were accused of engaging in pump and dump schemes with their own coin. This activity would be illegal if it was a public company manipulating their stock price. But since we’re still in the wild west stage in crypto, the most that can be done is to delist tokens associated with unscrupulous projects.

It’s Not Over Yet

Although the hype and enthusiasm surrounding the project has dwindled, Substratum is still an active project with talented team members. And unlike many projects that appeared during the ICO boom, they have a working product.

The issue is, shady trading activities and overpromising have diminished their credibility. It will be a challenge to regain the public’s trust, especially due to the severity of the bear market that multiplied the negative effects. There’s still plenty of time for the tide to turn as the crypto market recovers. However, burned investors don’t easily forget and this turn of events has created many bitter critics.

While many failed projects pulled an exit scam and completely pulled the rug from underneath ICO investors, Substratum did not. So, this is a signal that Substratum is in this for the long haul despite errors in judgement by management.

Substratum tokens were a horrible investment for the many that jumped in during all-time-highs. Nevertheless, if the team manages to deliver a decentralized internet in the future, perhaps this sacrifice was in some ways worth it.