<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	
	xmlns:georss="http://www.georss.org/georss"
	xmlns:geo="http://www.w3.org/2003/01/geo/wgs84_pos#"
	>

<channel>
	<title>Privacy &#8211; Spress</title>
	<atom:link href="https://en.spress.net/tag/privacy/feed/" rel="self" type="application/rss+xml" />
	<link>https://en.spress.net</link>
	<description>Spress is a general newspaper in English which is updated 24 hours a day.</description>
	<lastBuildDate>Sun, 27 Jun 2021 13:40:05 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	
<site xmlns="com-wordpress:feed-additions:1">191965906</site>	<item>
		<title>The original European Central Bank accelerates the promotion of the digital euro: strictly separates it from encrypted currencies and provides better privacy protection</title>
		<link>https://en.spress.net/the-original-european-central-bank-accelerates-the-promotion-of-the-digital-euro-strictly-separates-it-from-encrypted-currencies-and-provides-better-privacy-protection/</link>
		
		<dc:creator><![CDATA[editor]]></dc:creator>
		<pubDate>Sun, 27 Jun 2021 13:40:05 +0000</pubDate>
				<category><![CDATA[Business]]></category>
		<category><![CDATA[accelerates]]></category>
		<category><![CDATA[Bank]]></category>
		<category><![CDATA[Central]]></category>
		<category><![CDATA[Central bank]]></category>
		<category><![CDATA[currencies]]></category>
		<category><![CDATA[Digital]]></category>
		<category><![CDATA[encrypted]]></category>
		<category><![CDATA[euro]]></category>
		<category><![CDATA[European]]></category>
		<category><![CDATA[Original]]></category>
		<category><![CDATA[Privacy]]></category>
		<category><![CDATA[Promotion]]></category>
		<category><![CDATA[Protection]]></category>
		<category><![CDATA[separates]]></category>
		<category><![CDATA[Strictly]]></category>
		<guid isPermaLink="false">https://en.spress.net/the-original-european-central-bank-accelerates-the-promotion-of-the-digital-euro-strictly-separates-it-from-encrypted-currencies-and-provides-better-privacy-protection/</guid>

					<description><![CDATA[With the rise of the digital economy, various countries have intensified their research on digital currencies in recent years. The emergence of sovereign digital currencies in various countries also means that we are about to enter a new era of digital currencies and digital payments. The Central Bank of my country announced the launch of [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong> With the rise of the digital economy, various countries have intensified their research on digital currencies in recent years. The emergence of sovereign digital currencies in various countries also means that we are about to enter a new era of digital currencies and digital payments.</strong></p>
<p><span id="more-27673"></span></p>
<p>The Central Bank of my country announced the launch of its own legal digital currency DC/EP on May 8, 2020, and it is conducting trials in many cities across the country. The European Central Bank (ECB) is expected to accelerate research on the digital euro in the next few months and launch the digital euro as soon as possible.</p>
<h1> The EU takes the first step in the &#8220;digital euro&#8221;</h1>
<p>The European Union has always been more cautious about digital currencies. This is due to the protection of the stability of the euro and European financial considerations. However, as some countries have successively launched the process of launching sovereign digital currencies, including some well-known companies have also launched digital currencies, the EU cannot turn a blind eye.</p>
<p>While cautious, the EU is also preparing for the advent of the digital currency era. In 2018, the European Union promulgated the &#8220;Fifth Edition of the Anti-Money Laundering Order&#8221;. In this decree, the EU classifies cryptocurrency business and banking, payment processing, gaming and other services into the same legal category, which in fact provides protection for cryptocurrency business.</p>
<p>According to the previous agreement reached by the EU finance ministers, when the risk of digital currency has not been completely eradicated, or the relevant legal and supervisory framework has not been established, the EU will eliminate the use of private digital currencies, and member states shall not include the introduction of encrypted currencies. Its laws and regulations. Although Europe is not as active as the United States and China in the era of digital economy, as a highly developed capital-intensive region, Europeans’ consumption, savings, and investment behaviors are becoming more and more digital, and the euro’s trust in the member states is also based on this. Starting point, the European Central Bank has drawn a rough blueprint for the future &#8220;digital euro&#8221;.</p>
<p>In October 2020, the European Central Bank officially issued a document introducing the European Union&#8217;s plan to develop digital currencies. The European Central Bank believes that no matter which technology the &#8220;digital euro&#8221; uses, it must be strictly distinguished from encrypted currencies. The EU&#8217;s vision for the &#8220;digital euro&#8221; is to be safe, efficient, convenient, and legally compliant, while at the same time building a high degree of trust among EU citizens.</p>
<h1> The digital euro may suck up 8% of deposits in eurozone banks</h1>
<p>According to previous news, the European Central Bank (ECB) will speed up the study of the digital euro in the next few months. Although there are still a few years before the final launch, it has not neglected the impact of the launch of the digital euro.</p>
<p>Whether the introduction of a digital sovereign currency will eat into the funds in the current commercial bank accounts is something that more than 90% of the world’s central banks that are studying digital currencies need to consider. For the European Union, the member states cannot be ignored.</p>
<p>Morgan Stanley analysts estimate that all euro zone citizens over 15 years old will transfer 3,000 euros ($3,637) to a “digital wallet” controlled by the European Central Bank. This estimate is based on a “bear market” scenario.</p>
<p> The digital euro may suck up 8% of customer deposits in euro zone banks, especially for small countries such as Estonia, Slovakia, Latvia, and Lithuania, which will be more than 8%. In theory, this could reduce total deposits in the Eurozone by 873 billion Euros (close to 8%). </p>
<h1> Digital euro can provide better privacy protection</h1>
<p> Although the European Central Bank has a lot of concerns about all kinds of digital currencies, in terms of protecting privacy, Fabio Panetta, a member of the ECB&#8217;s executive board, believes that the digital euro will play a positive role and can also protect the euro zone from the &#8220;threat&#8221; of cryptocurrencies. Officials of the European Central Bank believe that if the European Central Bank participates in digital payments, it will pay more attention to privacy protection than private companies. Compared with private companies that collect large amounts of data from users to satisfy their business interests, the European Central Bank will not store, manage, and user data. Involving commercial interests. It is reported that the European Central Bank has conducted a small offline payment experiment before. Transfers of tens of euros or even hundreds of euros can be completed through Bluetooth between devices. There will be no payment except in the wallets of the payer and the payee. data record. There is no doubt that payment privacy is one of the main concerns when people use digital currencies, and the European Central Bank is trying to show everyone that it has the ability to separate identity information from payment information. If everything goes smoothly, it is expected that the digital euro will circulate on a large scale in the euro area around 2025</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">27673</post-id>	</item>
		<item>
		<title>Apple&#8217;s privacy director reiterated its anti-iOS app sideloading stance</title>
		<link>https://en.spress.net/apples-privacy-director-reiterated-its-anti-ios-app-sideloading-stance/</link>
		
		<dc:creator><![CDATA[editor]]></dc:creator>
		<pubDate>Fri, 25 Jun 2021 17:00:08 +0000</pubDate>
				<category><![CDATA[Tech]]></category>
		<category><![CDATA[antiiOS]]></category>
		<category><![CDATA[app]]></category>
		<category><![CDATA[apples]]></category>
		<category><![CDATA[Director]]></category>
		<category><![CDATA[Privacy]]></category>
		<category><![CDATA[reiterated]]></category>
		<category><![CDATA[sideloading]]></category>
		<category><![CDATA[stance]]></category>
		<guid isPermaLink="false">https://en.spress.net/apples-privacy-director-reiterated-its-anti-ios-app-sideloading-stance/</guid>

					<description><![CDATA[As part of Apple’s public relations activities on Wednesday morning, privacy director Erik Neuenschwander reiterated the company’s stance on iOS uploads. In addition to expressing his consistent opposition to surprises, he also believes that this actually reduces users’ choices. As Apple released a research report on how the App Store plans to protect users, the [&#8230;]]]></description>
										<content:encoded><![CDATA[<p>As part of Apple’s public relations activities on Wednesday morning, privacy director Erik Neuenschwander reiterated the company’s stance on iOS uploads. In addition to expressing his consistent opposition to surprises, he also believes that this actually reduces users’ choices.<strong> As Apple released a research report on how the App Store plans to protect users, the company&#8217;s privacy director has been explaining and defending this position to many parties.</strong> User privacy director Erik Neuenschwander said in an interview with &#8220;Fast Company&#8221; magazine that the existing form is a key part of protecting the security of iOS users.  &#8220;Today, we have our technical defense, we have our policy defense, and then we also have the user’s own ingenuity. In this case, Sideloading (that is, allowing users to download and install applications from third parties by themselves) is actually The above is to eliminate the choice, users who want to directly access the application without any censorship can get this sideloading feature on other platforms today. But on the iOS platform, users understand that they cannot be tricked into a dark alley. .&#8221; He pointed out that it is in the interests of bad actors to take advantage of opportunities, especially trying to fool users into downloading their applications. &#8220;Even users who consciously believe that they only download apps from the app store, the attacker knows this very well, so they will try to convince that user that they are downloading an app from a legitimate app store, even if it doesn’t Did not happen.&#8221; &#8220;Really, you have to think very creatively, very broadly as an attacker, trying to have such a wealth of data on the devices of so many users, so no matter whether users intend to browse app stores other than Apple, they will be attacked. .&#8221; There is a view that although Apple insists on providing a curated, walled garden for iOS apps, it has not done so with Macs. Earlier, Apple’s Craig Federighi (Craig Federighi) said that the Mac’s security is not good enough and that it &#8220;does not meet this standard today.&#8221; Neuenschwander believes that the iPhone must have greater security because the way people use iOS devices is different compared to Macs. &#8220;[iPhone是]The device you carry with you, so it knows your location. Therefore, those who can attack it will get details about your life style. It has a microphone, so this microphone may appear more around you than your Mac&#8217;s microphone. &#8220;therefore,[iPhone上的]Sensitive data is more tempting for attackers. &#8221; &#8220;We have all seen that mobile platforms, including the iPhone, are platforms where users continue to download applications,&#8221; Neuenschwander continued. &#8220;And this gives attackers more opportunities to enter and reach users. Therefore, the threat on the iOS side is much higher than the threat on the Mac side.&#8221; He concluded that Apple is &#8220;building a trusted ecosystem for millions of applications.&#8221;</p>
<p><span id="more-27413"></span></p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">27413</post-id>	</item>
		<item>
		<title>The era of my country&#8217;s space station is coming! How should the three astronauts take a bath, and how should they protect their privacy?</title>
		<link>https://en.spress.net/the-era-of-my-countrys-space-station-is-coming-how-should-the-three-astronauts-take-a-bath-and-how-should-they-protect-their-privacy/</link>
		
		<dc:creator><![CDATA[editor]]></dc:creator>
		<pubDate>Tue, 22 Jun 2021 02:24:09 +0000</pubDate>
				<category><![CDATA[Tech]]></category>
		<category><![CDATA[astronauts]]></category>
		<category><![CDATA[bath]]></category>
		<category><![CDATA[coming]]></category>
		<category><![CDATA[countrys]]></category>
		<category><![CDATA[era]]></category>
		<category><![CDATA[Privacy]]></category>
		<category><![CDATA[protect]]></category>
		<category><![CDATA[Space]]></category>
		<category><![CDATA[Space station]]></category>
		<category><![CDATA[station]]></category>
		<category><![CDATA[Take a bath]]></category>
		<guid isPermaLink="false">https://en.spress.net/the-era-of-my-countrys-space-station-is-coming-how-should-the-three-astronauts-take-a-bath-and-how-should-they-protect-their-privacy/</guid>

					<description><![CDATA[The era of my country&#8217;s space station has come! Three astronauts are working and living in my country&#8217;s space station for a three-month mission. In these three months, how should the astronauts solve personal cleaning problems such as bathing, and how should they protect their privacy? How to take a shower in the space station? [&#8230;]]]></description>
										<content:encoded><![CDATA[<p>The era of my country&#8217;s space station has come! Three astronauts are working and living in my country&#8217;s space station for a three-month mission. In these three months, how should the astronauts solve personal cleaning problems such as bathing, and how should they protect their privacy?  How to take a shower in the space station? Before understanding how Chinese astronauts take a bath, let’s start with how the astronauts of the International Space Station take a bath. Samantha, a female astronaut on the International Space Station, once showed how to take a bath in the space station. Samantha said that taking a bath in space cannot be like on Earth, standing under the shower head to take a shower. Because in a microgravity environment, water does not flow downwards, but floats in the space station.  When taking a shower in the space station, you can only wipe your body with a wet towel. When you want to wash your hair, squeeze water on the towel or the surface of your hair, and then moisten your hair. After that, the hair will be washed with a no-rinse shampoo, and then dried with a towel. Before the International Space Station, the US &#8220;Sky Lab&#8221; and the Soviet Union&#8217;s Mir space station had bathrooms. The bathroom is a cylindrical shower cover made of impermeable strong nylon cloth. After the cover is closed, the water cannot escape from the bathroom.  It&#8217;s just that the astronauts must wear respirators, earplugs, and goggles before taking a bath to avoid suffocation. In the microgravity environment of space, water cannot flow downwards. Scientists pressurize the water in the tank to make the water flow out through the sprinkler. After the bath, the waste water will be recycled. Only because of the limited water storage in the space capsule, astronauts rarely enjoy the shower, and most of the time they still use wet towels to wipe their bodies. Although our astronauts cannot take a shower on the space station, they can<strong> &#8220;Wrapped shower room&#8221;</strong> Inside, hold the spray gun to wipe yourself clean.  How do astronauts protect their privacy? How to protect privacy when bathing, going to the toilet, and sleeping on the space station? Designers have already thought of this. The first is the bathing area. Astronauts can spray in a wrapped shower bag to ensure their privacy. There are special toilets in the space station, just like the surface of the earth, you can also guarantee your privacy. Sleeping in space is a nuisance. In a microgravity environment, you may float to any place, and the quilt may separate from you. So in the space station, you need to enter the sleeping bag before going to sleep, and the sleeping bag is fixed to On the space station, ensure that you will not sleep in disorder.  In the past, astronauts slept in a &#8220;stand&#8221; position. After the astronaut entered the sleeping bag, they would hang on the wall to sleep. Of course, you could also sleep backwards.  Nowadays, in order to allow astronauts to rest more fully, our space station has specially arranged sleeping areas so that every astronaut can &#8220;lie down and sleep.&#8221;  More importantly, the designers of my country’s space station have also reserved one for the astronauts.<strong> Private voice channel</strong> , Astronauts can use this channel to talk privately with their family members and share what they have seen and heard in space. This private voice channel not only solves the astronaut’s suffering of missing relatives, but also protects their privacy as much as possible. The work of 3 astronauts It is that my country&#8217;s space station is currently in the construction phase, and the three astronauts have to perform a lot of work in the space station. It is understood that there are 1243 pieces of equipment in a single core module. Assembling and debugging of these equipment requires astronauts to complete in space.  In addition to work inside the cabin, astronauts have to carry out many activities outside the cabin. The environment outside the cabin is harsh, without the protection of the ozone layer and geomagnetic field. Astronauts are easily exposed to excessive radiation. In order to protect the lives and health of astronauts, they must Work in a space suit weighing up to 120 kilograms.  In addition to the assembly and debugging of the equipment, the astronauts have to carry out corresponding scientific experiments in space and routine maintenance of the space station. It can be said that the three astronauts are busy in space. In order to allow the three astronauts to get adequate rest, my country’s space station<strong> Synchronize world and earth at work and rest time</strong> , The working hours of ground and space station astronauts are the same; and<strong> No night shift is required.</strong> In the past, astronauts had to take turns in the night shift in space, but nowadays, a new type of sound and light alarm system can promptly notify the astronauts to deal with the situation quickly</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">26521</post-id>	</item>
		<item>
		<title>Digital consumer protection Security gaps in health apps In the corona pandemic, health apps have gained many users. For some, however, there is a lack of data protection. This was the result of a study by the Federal Office for Information Security.</title>
		<link>https://en.spress.net/digital-consumer-protection-security-gaps-in-health-apps-in-the-corona-pandemic-health-apps-have-gained-many-users-for-some-however-there-is-a-lack-of-data-protection-this-was-the-result-of-a-stu/</link>
		
		<dc:creator><![CDATA[editor]]></dc:creator>
		<pubDate>Mon, 21 Jun 2021 16:35:10 +0000</pubDate>
				<category><![CDATA[Business]]></category>
		<category><![CDATA[apps]]></category>
		<category><![CDATA[As the]]></category>
		<category><![CDATA[BSI]]></category>
		<category><![CDATA[Consumer]]></category>
		<category><![CDATA[Corona]]></category>
		<category><![CDATA[Corona pandemic]]></category>
		<category><![CDATA[data]]></category>
		<category><![CDATA[Digital]]></category>
		<category><![CDATA[Federal]]></category>
		<category><![CDATA[gained]]></category>
		<category><![CDATA[gaps]]></category>
		<category><![CDATA[German]]></category>
		<category><![CDATA[Germany]]></category>
		<category><![CDATA[health]]></category>
		<category><![CDATA[information]]></category>
		<category><![CDATA[lack]]></category>
		<category><![CDATA[Office]]></category>
		<category><![CDATA[Pandemic]]></category>
		<category><![CDATA[Privacy]]></category>
		<category><![CDATA[Protection]]></category>
		<category><![CDATA[result]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Study]]></category>
		<category><![CDATA[users]]></category>
		<guid isPermaLink="false">https://en.spress.net/?p=26336</guid>

					<description><![CDATA[Digital consumer protection Vulnerabilities in health apps As of: 16.06.2021 1:53 p.m. In the corona pandemic, health apps have gained many users. For some, however, there is a lack of data protection. This was the result of a study by the Federal Office for Information Security. The Federal Office for Information Security (BSI) found numerous [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><img decoding="async" class="ts-image" src="https://www.tagesschau.de/multimedia/bilder/smartphone-137https://www.tagesschau.de/https://www.tagesschau.de/~_v-videowebm.jpg" srcset="https://www.tagesschau.de/https://www.tagesschau.de/~_v-videowebm.jpg" alt="Man holds smartphone in his hands | AP" title="Man holds smartphone in his hands | AP"></p>
<h1> Digital consumer protection Vulnerabilities in health apps </h1>
<p>As of: 16.06.2021 1:53 p.m. </p>
<p> <strong> In the corona pandemic, health apps have gained many users. For some, however, there is a lack of data protection. This was the result of a study by the Federal Office for Information Security.</strong> The Federal Office for Information Security (BSI) found numerous security gaps in an investigation of health apps. According to a BSI report, six out of seven thoroughly tested apps transmitted passwords in clear text to authentication services. None of the apps fully met the security requirements of the BSI guidelines for health apps. The BSI did not provide the names of the apps examined.</p>
<p><a   class="teaser-absatz__link" href="https://en.spress.net/wp-content/plugins/wp-optimize-by-xtraffic/redirect/?gzv=H4sIAAAAAAACAxXGMQ7DIAwAwL-wg5s1b_HiUiu2QijCJgxV_p5mOOl-YYQ1iHuzFQFhzpmcNjbLQiN9GEHryea6keuJ8O6xcxbufwimT4XVrQzOO8fCvVJrkap_a1xeSxI_SrhuBAjeLGkAAAA." target="_blank" rel="nofollow noopener"> <img decoding="async" class="ts-image js-image" src="https://www.tagesschau.de/multimedia/bilder/lernapp-anton-101~_v-klein1x1.jpg" alt='The start screen of the learning app "Anton" is displayed on a tablet. ' title = 'The start screen of the learning app "Anton" is displayed on a tablet. '> <strong> Exclusive</strong> 03/10/2021</p>
<p>Learning app &#8220;Anton&#8221; Massive security breach with school app Outsiders could have read out data or pretended to be teachers.</p>
<p></a></p>
<h2> Personal data is not adequately protected</h2>
<p>&#8220;From the point of view of technical IT security, this result must at least be rated as critical, especially in view of the fact that a significant proportion of the apps process sensitive and particularly sensitive data&#8221;, criticized the office for taking care of the data security of the federal government. &#8220;Because, according to the findings of the study, this does not adequately protect user data against attacks.&#8221; The BSI checked the health apps as part of the first report on digital consumer protection 2020, which, due to the corona pandemic, focused on digital health offers.</p>
<p><a   class="teaser-absatz__link" href="https://en.spress.net/wp-content/plugins/wp-optimize-by-xtraffic/redirect/?gzv=H4sIAAAAAAACAw3KMQ6AIAwAwL-wQ2X1LV0aaQoJVgNFEo1_15vvccOtLpudfUVAmHMGI-Het0wjJEYoWkkTQipSjCr7i1s_mgwV_0e22-eixk3a0OTjEkO2vbr3A6XQ2a1cAAAA" target="_blank" rel="nofollow noopener"> <img decoding="async" class="ts-image js-image" src="https://www.tagesschau.de/multimedia/bilder/vivy-app-101~_v-klein1x1.jpg" alt="Vivy health app on smartphone | dpa" title="Vivy health app on smartphone | dpa"> <strong> background</strong> 07/11/2019</p>
<p>Digital Supply Act What changes for patients The Bundestag passed Minister Spahn&#8217;s Digital Supply Act.</p>
<p></a></p>
<h2> damage &#8220;first of all manageable&#8221;</h2>
<p>The BSI expert Nicolas Stöcker described the danger for users of the criticized apps when exploiting the identified loopholes as &#8220;first of all manageable&#8221;. If an attack took place, it would initially only affect a single person. &#8220;It would be worse if the backend, where the data is kept, were also insecure.&#8221; The authority has a corresponding further investigation for the future &#8220;on the screen&#8221;, says Stocker. However, BSI President Arne Schönbohm warned that the deficiencies found were also dangerous: &#8220;Every gap that is there, every weak point that is there has somehow been exploited at some point.&#8221; They are currently working with the app providers to close the gaps. &#8220;If we see that this is not fixed, then we reserve the right to issue a corresponding product warning&#8221;said Schönbohm.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">26336</post-id>	</item>
		<item>
		<title>Reaction to criticism WhatsApp plans one-time messages The WhatsApp chat service is reacting to the growing criticism of its market power. The fears of many users are to be allayed with new functions for the protection of privacy.</title>
		<link>https://en.spress.net/reaction-to-criticism-whatsapp-plans-one-time-messages-the-whatsapp-chat-service-is-reacting-to-the-growing-criticism-of-its-market-power-the-fears-of-many-users-are-to-be-allayed-with-new-functions/</link>
		
		<dc:creator><![CDATA[editor]]></dc:creator>
		<pubDate>Fri, 18 Jun 2021 00:53:19 +0000</pubDate>
				<category><![CDATA[Business]]></category>
		<category><![CDATA[allayed]]></category>
		<category><![CDATA[Chat]]></category>
		<category><![CDATA[Criticism]]></category>
		<category><![CDATA[Facebook]]></category>
		<category><![CDATA[Fears]]></category>
		<category><![CDATA[functions]]></category>
		<category><![CDATA[German]]></category>
		<category><![CDATA[Germany]]></category>
		<category><![CDATA[growing]]></category>
		<category><![CDATA[INSTAGRAM]]></category>
		<category><![CDATA[market]]></category>
		<category><![CDATA[Market power]]></category>
		<category><![CDATA[messages]]></category>
		<category><![CDATA[Monopoly]]></category>
		<category><![CDATA[More than]]></category>
		<category><![CDATA[onetime]]></category>
		<category><![CDATA[plans]]></category>
		<category><![CDATA[Power]]></category>
		<category><![CDATA[Privacy]]></category>
		<category><![CDATA[Protection]]></category>
		<category><![CDATA[reacting]]></category>
		<category><![CDATA[reaction]]></category>
		<category><![CDATA[service]]></category>
		<category><![CDATA[User data]]></category>
		<category><![CDATA[users]]></category>
		<category><![CDATA[WHATSAPP]]></category>
		<guid isPermaLink="false">https://en.spress.net/?p=24726</guid>

					<description><![CDATA[Responding to criticism WhatsApp plans one-time messages Status: 14.06.2021 11:19 a.m. The WhatsApp chat service is responding to the growing criticism of its market power. The fears of many users are to be allayed with new functions for the protection of privacy. The WhatsApp chat service wants to stick to the complete encryption and is [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><img decoding="async" class="ts-image" src="https://www.tagesschau.de/multimedia/bilder/whatsapp-155https://www.tagesschau.de/https://www.tagesschau.de/~_v-videowebm.jpg" alt="WhatsApp logo can be seen on a smartphone | dpa" title="WhatsApp logo can be seen on a smartphone | dpa"></p>
<h1> Responding to criticism WhatsApp plans one-time messages </h1>
<p>Status: 14.06.2021 11:19 a.m. </p>
<p> <strong> The WhatsApp chat service is responding to the growing criticism of its market power. The fears of many users are to be allayed with new functions for the protection of privacy. </strong> The WhatsApp chat service wants to stick to the complete encryption and is promising new functions to protect privacy. The company, which belongs to the US group Facebook, is launching an advertising campaign on data protection in Germany and Great Britain today. The countries are among their most important markets. Management&#8217;s ideas include the ability to send messages that the recipient can only view once. That could be useful, for example, if you have to send family members a password, said WhatsApp boss Will Cathcart.</p>
<p><a   class="teaser-absatz__link" href="https://en.spress.net/wp-content/plugins/wp-optimize-by-xtraffic/redirect/?gzv=H4sIAAAAAAACAxWMMQ6AIBTF7sIO6OpZWL7yFQICkUdINN5dnJp26COaWIQDSl2MNrr3rkAH17o5asrySP7CbzuM3mnjNecguyNUKkWmhpsvS-AkfbJ-IMQxkPM0K4czivcDJqhDPWQAAAA." target="_blank" rel="nofollow noopener"> <img fifu-featured="1" decoding="async" class="ts-image js-image" src="https://www.tagesschau.de/multimedia/bilder/internet-facebook-apps-101~_v-klein1x1.jpg" alt="" title="" title="The logos of the apps from Twitter (from left), Facebook and WhatsApp. | AP"> <strong> </strong> 06/02/2021</p>
<p>Dispute over user data WhatsApp is fighting against India According to the will of the Indian government, WhatsApp should reveal users&#8217; data if the state so requests.</p>
<p></a> Users also want to be able to set that chats disappear on their own after a certain period of time. &#8220;Overall, people don&#8217;t want their messages to last forever,&#8221; said Cathcart. &#8220;When we talk, we don&#8217;t have a recording device with us. So it&#8217;s strange that digital chat platforms save them forever.&#8221; The short promotional videos say that content sent on WhatsApp is basically only visible in clear text to the users involved thanks to the so-called end-to-end encryption.</p>
<h2> Privacy activists alerted </h2>
<p>WhatsApp has recently come under pressure for various reasons: On the one hand, the <a   href="https://en.spress.net/wp-content/plugins/wp-optimize-by-xtraffic/redirect/?gzv=H4sIAAAAAAACAxWLMQ7DIBAE_0IPxK3fQnPgsy9KwOhYgmQrfw8pd2b2Nt2sRoDa1uCDH2M40MGtJaHuNp7oqfivHcF_WKNST8I6hRAa1WrzzLkcrHanxPE8X3YjcJmvjssuj8UJ8tt8f76vQoxuAAAA" class="textlink" title="Link zu: WhatsApp setzt neue Datenschutz-Bestimmungen um" target="_blank" rel="nofollow noopener"> Announcement of the new usage rules</a> caused criticism. Data protectionists warned that WhatsApp could increase data exchange with third-party companies and, above all, that data would also be shared with the parent company Facebook. WhatsApp rejected this and emphasized several times that the end-to-end encryption, with which the service itself does not have access to content, will not be weakened. WhatsApp boss Cathcart admitted errors in the announcement of the new rules. WhatsApp has not made it clear enough what you are doing and why: &#8220;We only became clearer when we saw the confusion. That is our responsibility,&#8221; said Cathcart.</p>
<p><a   class="teaser-absatz__link" href="https://en.spress.net/wp-content/plugins/wp-optimize-by-xtraffic/redirect/?gzv=H4sIAAAAAAACAxWLMQ7DIBAE_0IPJEUav4XmjM8-ywGjYwlSovzduNyZ2Z9pZjIClDoFH3zv3YE2rjUKNbfwQLviXiuC_7DOSi0K6xBCqFSKTSPnvLHalSLP53nYhcB5vBq-9vl4OUF6m_8FRKEICG4AAAA." target="_blank" rel="nofollow noopener"> <img decoding="async" class="ts-image js-image" src="https://www.tagesschau.de/multimedia/bilder/whatsapp-protest-101~_v-klein1x1.jpg" alt="Models of smartphones with large WhatsApp logos are set up on a street during a protest | dpa" title="Models of smartphones with large WhatsApp logos are set up on a street during a protest | dpa"> <strong> </strong> 05/29/2021</p>
<p>WhatsApp privacy rules No consequences for no-sayers Those who do not agree to the new data protection rules of the messenger service should not have any disadvantages.</p>
<p></a></p>
<h2> More than two billion users </h2>
<p>In view of the criticism, many people have apparently looked around for alternatives to the chat service. The company currently has more than two billion users. It is not known how many actually migrated. A vast majority of users who have already been asked to agree to the new rules would have accepted them, said Cathcart. He did not give exact numbers. Originally, users who do not agree to the new rules should lose access to basic functions over time. Meanwhile <a   href="https://en.spress.net/wp-content/plugins/wp-optimize-by-xtraffic/redirect/?gzv=H4sIAAAAAAACAxWLMQ7DIBAE_0IPJEUav4XmjM8-ywGjYwlSovzduNyZ2Z9pZjIClDoFH3zv3YE2rjUKNbfwQLviXiuC_7DOSi0K6xBCqFSKTSPnvLHalSLP53nYhcB5vBq-9vl4OUF6m_8FRKEICG4AAAA." class="textlink" title="Link zu: WhatsApp-Datenschutzregeln: Keine Folgen für Nein-Sager" target="_blank" rel="nofollow noopener"> they no longer face any consequences</a> . Only the new functions for communication with companies will only be able to be used after approval of the update. According to WhatsApp, they were the main reason for changing the terms of use.</p>
<p><a   class="teaser-absatz__link" href="https://en.spress.net/wp-content/plugins/wp-optimize-by-xtraffic/redirect/?gzv=H4sIAAAAAAACAxWLMQ7DIBAE_0IPxK3fQnPgsy9KwOhYgmQrfw8pd2b2Nt2sRoDa1uCDH2M40MGtJaHuNp7oqfivHcF_WKNST8I6hRAa1WrzzLkcrHanxPE8X3YjcJmvjssuj8UJ8tt8f76vQoxuAAAA" target="_blank" rel="nofollow noopener"> <img decoding="async" class="ts-image js-image" src="https://www.tagesschau.de/multimedia/bilder/whatsapp-153~_v-klein1x1.jpg" alt="Man is standing with smartphone in hand in front of a large WhatsApp logo | picture alliance / dpa" title="Man is standing with smartphone in hand in front of a large WhatsApp logo | picture alliance / dpa"> <strong> </strong> 05/15/2021</p>
<p>Controversial update WhatsApp with new data protection rules Today WhatsApp implements its new data protection regulations. What exactly happens to the data is unclear.</p>
<p></a></p>
<h2> Attempt a charm offensive </h2>
<p>The company&#8217;s move could have another reason: <a   href="https://en.spress.net/wp-content/plugins/wp-optimize-by-xtraffic/redirect/?gzv=H4sIAAAAAAACAxXKMQ6AIAxA0bt0BzRunIWlQBGjgpE2DMa7i-N_-Q8IWMjMV7POONN714wrtRYyio40aLv5r8TOJAzka92VNOWlxPExIlNR87TozOcB7wdGe4wdUwAAAA.." class="textlink" title="Link zu: US-Bundesstaaten verklagen Facebook" target="_blank" rel="nofollow noopener"> The parent company Facebook is currently not only under close observation in the USA</a> . Last year, federal authorities and states filed lawsuits against the Internet giant Google and the online platform Facebook. They are accused of anti-competitive practices. The market power of the large technology groups is now seen as a problem by many governments around the world. Consumer advocates also warn: &#8220;The market power of the Facebook group forces users to communicate via WhatsApp,&#8221; says Lina Ehrig, the head of the digital and media team at the Federation of German Consumer Organizations. &#8220;From the consumer&#8217;s point of view, it would be ideal if messenger services are legally and technically designed in such a way that sustainable competition and the innovative strength of the market are promoted.&#8221; In order to promote competition, so-called interoperability would be a possible means from the point of view of consumer advocates: As a survey by the consumer advice center shows, around a third of users would be willing to switch messengers if messages could be shared between different providers.</p>
<h2> Encryption dispute </h2>
<p>For its part, Cathcart is targeting governments. They tried to soften the encryption in chat services. &#8220;I hope that, over time, governments will see that the most important role they can play is to keep people safe.&#8221; This could be done, for example, by setting standards for companies.</p>
<p><a   class="teaser-absatz__link" href="https://en.spress.net/wp-content/plugins/wp-optimize-by-xtraffic/redirect/?gzv=H4sIAAAAAAACA6tWKlWyUsooKSkotorRj9EvLy_XK0lMTy0uTs5ILNVLSQUKZRaVgHhpJTH6ZVVJZbrlGYklxYkFBbqGBoZ6GSW5OUq1AFnS6MdHAAAA" target="_blank" rel="nofollow noopener"> <img decoding="async" class="ts-image js-image" src="https://www.tagesschau.de/whatsapp-123~_v-klein1x1.jpg" alt="Whatsapp" title="Whatsapp"> <strong> </strong> 02/09/2020</p>
<p>Data transfer to Facebook Consumer advocates warn WhatsApp WhatsApp and Facebook should actually remain independent of each other.</p>
<p></a> WhatsApp argues with governments that end-to-end encryption helps protect the security of citizens. Facebook is still sticking to the plan to bring full encryption to its second chat service Messenger as the next step, said Cathcart. In several countries, governments and authorities are attempting the <a   href="https://en.spress.net/wp-content/plugins/wp-optimize-by-xtraffic/redirect/?gzv=H4sIAAAAAAACAxWMMQ6AIBTF7sIO6OpZWL7yFQICkUdINN5dnJp26COaWIQDSl2MNrr3rkAH17o5asrySP7CbzuM3mnjNecguyNUKkWmhpsvS-AkfbJ-IMQxkPM0K4czivcDJqhDPWQAAAA." class="textlink" title="Link zu: Schutz von Nutzerdaten: Indien im Streit mit Facebook und Twitter" target="_blank" rel="nofollow noopener"> Complete encryption in chat services like WhatsApp</a> . In Germany, too, there is a draft law with which the protection of the constitution is supposed to enable source telecommunications monitoring in encrypted chat services as well.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">24726</post-id>	</item>
		<item>
		<title>Many input methods such as Sogou have been removed from the shelves, who should I choose for input method privacy protection?</title>
		<link>https://en.spress.net/many-input-methods-such-as-sogou-have-been-removed-from-the-shelves-who-should-i-choose-for-input-method-privacy-protection/</link>
		
		<dc:creator><![CDATA[editor]]></dc:creator>
		<pubDate>Wed, 16 Jun 2021 03:05:08 +0000</pubDate>
				<category><![CDATA[World]]></category>
		<category><![CDATA[choose]]></category>
		<category><![CDATA[Input]]></category>
		<category><![CDATA[Method]]></category>
		<category><![CDATA[methods]]></category>
		<category><![CDATA[Privacy]]></category>
		<category><![CDATA[Protection]]></category>
		<category><![CDATA[Removed]]></category>
		<category><![CDATA[shelves]]></category>
		<category><![CDATA[Sogou]]></category>
		<guid isPermaLink="false">https://en.spress.net/many-input-methods-such-as-sogou-have-been-removed-from-the-shelves-who-should-i-choose-for-input-method-privacy-protection/</guid>

					<description><![CDATA[In daily work and life, the most inseparable thing is the use of mobile devices, so in the process of using it, you cannot do without searching to find some content. At this time, you need to use the input method. A smart and interesting input method can also be regarded as Can enhance the [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>In daily work and life, the most inseparable thing is the use of mobile devices, so in the process of using it, you cannot do without searching to find some content. At this time, you need to use the input method. A smart and interesting input method can also be regarded as Can enhance the user experience. I personally feel that an interesting input method experience is still necessary.</strong></p>
<p><span id="more-23327"></span> For a long time, Sogou Input Method and Xunfei Input Method have been loved and used by the majority of users as the two mainstream input methods. Now let&#8217;s talk about the most common Sogou input method. I feel that when I started to touch mobile phones and computers, I used the input method that comes with the device to call it awkward. It is really not smooth at all and it is too concise. Therefore, using Sogou input method has become a habit of many people. After all, Sogou can set the skin on its own and switch it at will, and the font can also be adjusted. The key point is that some backgrounds can also be set to dynamic, which will feel vivid when used.</p>
<p><img fifu-featured="1" decoding="async" src="https://p8.itc.cn/images01/20210615/85a9a3ea35594e88b280d8c6524fd326.jpeg" max-width="600"></p>
<p>However, recently several major input methods, including Sogou, have been removed from the app stores of Apple, Huawei and other manufacturers. The reason can be imagined. Although Sogou has a good experience in entertainment, it is undeniable that we are using it. In the process, for example, an item or key thing mentioned in WeChat chat will often appear. When you switch to the shopping platform to protect the interface of other websites, these records will automatically be clickable. This is actually a privacy leak. Through the search engine Obtain, and then push to the user.</p>
<p><img decoding="async" src="https://p0.itc.cn/images01/20210615/8006792c31c64b7ba1fc6028fb88b14e.png" max-width="600"></p>
<p>WeChat has also proposed to launch a specially customized input method that comes with WeChat, in response to the privacy leakage issues raised by many users, but it is only planned that it has not launched an adapted input method.</p>
<p>There are also other manufacturers that provide some privacy protection in terms of functionality in response to this situation. For example, Xiaomi MIUI12 launches the clipboard privacy protection function. If the user copies a piece of text and then jumps to another application interface, the other application interface detects that this piece of content wants to be accessed and read, and the user’s consent must be obtained. Otherwise, there is no permission, which on the one hand white tigers the user&#8217;s privacy and security.</p>
<p><img decoding="async" src="https://p0.itc.cn/images01/20210615/514c8ec82fe94f8386ef168c2a749b9a.jpeg" max-width="600"></p>
<p>However, it is true that the current mainstream input methods should standardize privacy protection functions, rather than deduct points in user experience.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">23327</post-id>	</item>
		<item>
		<title>Models are dating Euro 2020 players</title>
		<link>https://en.spress.net/models-are-dating-euro-2020-players-2/</link>
		
		<dc:creator><![CDATA[Dĩ An]]></dc:creator>
		<pubDate>Thu, 10 Jun 2021 19:22:07 +0000</pubDate>
				<category><![CDATA[Fashion]]></category>
		<category><![CDATA[Band]]></category>
		<category><![CDATA[Bolivia]]></category>
		<category><![CDATA[Carton]]></category>
		<category><![CDATA[Chlóe]]></category>
		<category><![CDATA[Chloe Wealleans Watts]]></category>
		<category><![CDATA[Dating]]></category>
		<category><![CDATA[euro]]></category>
		<category><![CDATA[Federico Chiesa]]></category>
		<category><![CDATA[Fiorentina]]></category>
		<category><![CDATA[Girl]]></category>
		<category><![CDATA[goal]]></category>
		<category><![CDATA[Great Hall]]></category>
		<category><![CDATA[I like]]></category>
		<category><![CDATA[Italy team]]></category>
		<category><![CDATA[Kalvin Phillips]]></category>
		<category><![CDATA[Mason Mount]]></category>
		<category><![CDATA[Model]]></category>
		<category><![CDATA[models]]></category>
		<category><![CDATA[Neutral]]></category>
		<category><![CDATA[players]]></category>
		<category><![CDATA[Privacy]]></category>
		<category><![CDATA[Quit]]></category>
		<category><![CDATA[Storm]]></category>
		<guid isPermaLink="false">https://en.spress.net/models-are-dating-euro-2020-players-2/</guid>

					<description><![CDATA[Despite having an unremarkable modeling career, these girls still attract a large number of fans by dating players. Benedetta Quagli: Federico Chiesa has won a place in the Italian team to attend Euro 2020 . Chiesa&#8217;s private life is rarely mentioned in the media. However, his relationship with his girlfriend Benedetta Quagli still cannot hide [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>Despite having an unremarkable modeling career, these girls still attract a large number of fans by dating players.</strong><br />
<span id="more-22485"></span> <img decoding="async" loading="lazy" src="https://photo-baomoi.zadn.vn/w700_r1/2021_06_10_119_39135812/749d0b6f062def73b63c.jpg" width="625" height="781"> </p>
<p> <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_06_10_119_39135812/685613a41ee6f7b8aef7.jpg" width="625" height="780"> <strong> Benedetta Quagli:</strong> Federico Chiesa has won a place in the Italian team to attend <em> Euro 2020</em> . Chiesa&#8217;s private life is rarely mentioned in the media. However, his relationship with his girlfriend Benedetta Quagli still cannot hide from fans. According to the <em> Inews</em> This girl is known for her role as a model. Image: <em> Benedetta Quagli. </em> <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_06_10_119_39135812/f65e82ac8fee66b03fff.jpg" width="625" height="781"> <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_06_10_119_39135812/ffb58f4782056b5b3214.jpg" width="625" height="705"> <em> Chiesa has been dating Quagli since he was with Fiorentina. The Italian winger is currently 23 years old, while Benedetta is 27 years old. Besides modeling, this girl also helps her family in the fashion business. Photo: Benedetta Quagli. </em> <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_06_10_119_39135812/bcb6cf44c2062b587217.jpg" width="625" height="719"> <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_06_10_119_39135812/542c26de2b9cc2c29b8d.jpg" width="625" height="625"> <strong> Chloe Wealleans-Watts</strong> is a member of girl band 303. She has been dating Chelsea&#8217;s Mason Mount for the past 4 years. Because she wanted to try different fields, she decided to sign with Storm modeling agency. According to the company representative, Chloe left a first impression with black hair and brown eyes. Image: <em> Chloe Wealleans-Watts. </em> <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_06_10_119_39135812/3c0851fa5cb8b5e6eca9.jpg" width="625" height="625"> <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_06_10_119_39135812/7d9511671c25f57bac34.jpg" width="625" height="624"> <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_06_10_119_39135812/c880a672ab30426e1b21.jpg" width="625" height="625"> <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_06_10_119_39135812/00b3694164038d5dd412.jpg" width="625" height="625"> <em> When there is no photo session, the female model from the UK prefers to wear clothes that show her personality and youthfulness at the age of 21. In addition to neutral clothes, Chloe also makes herself stand out more with brighter tones. like pink, blue or yellow. Photo: Chloe Welleans-Watts.</em> <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_06_10_119_39135812/651b0de900abe9f5b0ba.jpg" width="625" height="781"> <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_06_10_119_39135812/e87d838f8ecd67933edc.jpg" width="625" height="781"> <strong> Zulay Pogba: </strong> Paul Pogba is one of the pillars of the French team at <em> Euro 2020</em> . He is said to be married to a model born in 1996, from Bolivia. According to the <em> Goal</em> Initially, she studied Business Administration at the University of Bolivia but dropped out to emigrate to California (USA) as a real estate agent. She then quit her job to pursue a modeling career. Image: <em> Zulay Pogba.</em> <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_06_10_119_39135812/e5d98f2b82696b373278.jpg" width="625" height="717"> <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_06_10_119_39135812/5a0d3fff32bddbe382ac.jpg" width="625" height="759"> <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_06_10_119_39135812/725d16af1bedf2b3abfc.jpg" width="625" height="712"> <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_06_10_119_39135812/6c5b0ba906ebefb5b6fa.jpg" width="625" height="781"> <em> Zulay Pogba&#8217;s style is not fixed. She constantly changes from the image of personality, luxurious lady to gentle, feminine. Branded bags are always an accessory that helps her create accents for her look. Photo: Zulay Pogba.</em> <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_06_10_119_39135812/00d566276b65823bdb74.jpg" width="625" height="625"> <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_06_10_119_39135812/f399926b9f2976772f38.jpg" width="625" height="625"> <strong> Ashleigh Behan:</strong> Besides the model lineup, the player&#8217;s back <em> Euro 2020</em> There is also a make-up artist. Ashleigh (26 years old) met Kalvin Phillips at school and they have been dating since 2010. Photo: <em> Kalvin Phillips.</em> <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_06_10_119_39135812/8fe0ef12e2500b0e5241.jpg" width="625" height="781"> <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_06_10_119_39135812/307c538e5eccb792eedd.jpg" width="625" height="625"> <em> Ashleigh often focuses on expressing her sexy features through tight dresses or cut-outs. Photo: Kalvin Phillips.</em></p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">22485</post-id>	</item>
		<item>
		<title>5 ways to improve iPhone battery life</title>
		<link>https://en.spress.net/5-ways-to-improve-iphone-battery-life/</link>
		
		<dc:creator><![CDATA[CTV Kiến An/VOV.VN (biên dịch) Theo Itechpost]]></dc:creator>
		<pubDate>Thu, 03 Jun 2021 17:30:09 +0000</pubDate>
				<category><![CDATA[Tech]]></category>
		<category><![CDATA[battery]]></category>
		<category><![CDATA[Brightness]]></category>
		<category><![CDATA[Control Center]]></category>
		<category><![CDATA[General]]></category>
		<category><![CDATA[Hao]]></category>
		<category><![CDATA[Improve]]></category>
		<category><![CDATA[iOS 9]]></category>
		<category><![CDATA[Iphone]]></category>
		<category><![CDATA[life]]></category>
		<category><![CDATA[location]]></category>
		<category><![CDATA[Lock Screen]]></category>
		<category><![CDATA[LOW]]></category>
		<category><![CDATA[LPM]]></category>
		<category><![CDATA[Maximum Capacity]]></category>
		<category><![CDATA[Optimized Battery Charging]]></category>
		<category><![CDATA[Power]]></category>
		<category><![CDATA[Privacy]]></category>
		<category><![CDATA[Refresh]]></category>
		<category><![CDATA[Size]]></category>
		<category><![CDATA[Software Update]]></category>
		<category><![CDATA[The battery]]></category>
		<category><![CDATA[time]]></category>
		<category><![CDATA[ways]]></category>
		<category><![CDATA[WIFI]]></category>
		<guid isPermaLink="false">https://en.spress.net/5-ways-to-improve-iphone-battery-life/</guid>

					<description><![CDATA[Using an iPhone with poor battery life is bound to be frustrating, while replacing the battery will cost you more. Fortunately, there are several solutions you can take to preserve battery life on your iPhone, and here are five ways to help you do just that. Software updates Usually, you should update your device to [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>Using an iPhone with poor battery life is bound to be frustrating, while replacing the battery will cost you more.</strong><br />
<span id="more-20350"></span> Fortunately, there are several solutions you can take to preserve battery life on your iPhone, and here are five ways to help you do just that.</p>
<p> <img fifu-featured="1" decoding="async" loading="lazy" src="https://photo-baomoi.zadn.vn/w700_r1/2021_06_01_65_39031790/3531908b80c9699730d8.jpg" width="625" height="426"> <strong> Software updates</strong> Usually, you should update your device to the latest software. Software updates allow more secure devices to be able to handle bugs or any malware. Software updates often include advanced power-saving technologies, which means less battery drain. To check if your iPhone has received any software updates you missed, go to Settings > General > Software Update. When updating, you should do it over Wi-Fi and plug it in to a power source to ensure everything goes smoothly and save mobile data. <strong> Optimize settings</strong> This is also a way to preserve battery life. Two settings you can control to help save power are screen brightness and Wi-Fi. You can adjust the screen brightness to a lower level as well as activate the auto-brightness feature so that the phone adjusts brightness depending on the surrounding environment to save power by Settings > Accessibility > Display &#038; Text Size and enable Auto-Brightness function. <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_06_01_65_39031790/03fcad46bd04545a0d15.jpg" width="625" height="468"> Using mobile data also consumes more power than Wi-Fi, so remember to take advantage of the Wi-Fi network when you need to connect to the internet. <strong> Enable Low Power Mode</strong> LPM has been around since iOS 9 as an easy way to extend iPhone battery life when it reaches 20% or less. To enable it, go to Settings > Battery. In the Control Center, you can also customize the controls for accessing LPM on/off by pressing a simple toggle. To customize the controls in the Control Center, simply go to Settings > Control Center. <strong> Check battery usage</strong> In Settings > Battery, you can also check the battery usage of each app you use and the health of your device&#8217;s battery. The battery usage settings that you need to care about in this section include Background Activity (background activity) under the path Settings > General > Background App Refresh; Location and Background Location under Settings > Privacy > Location Services; Home &#038; Lock Screen (Home screen and lock screen) follow the path Settings > Notifications to turn off unnecessary notifications; and No Mobile Coverage and Low Signal (the device will look for a better signal when in poor coverage). <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_06_01_65_39031790/b9ac0a161a54f30aaa45.jpg" width="625" height="416"> Besides, you can also use airplane mode when the battery life is about to run out, as well as check the Maximum Capacity feature to see how much battery is left and activate Optimized Battery Charging to reduce battery aging. <strong> Plug and power on the computer to charge the device</strong> Apple recommends that when you&#8217;re charging your device via USB on your computer, make sure your computer is plugged in and powered on. Otherwise, your battery may be drained if the computer is turned off, in sleep or standby mode. <strong> Additional tips</strong> Removing certain device covers during charging may create excess heat that can affect battery capacity. Be aware that ambient temperatures that are too high may be too cold or too hot for the device which may affect battery integrity. If storing devices for a long time, store them in a state of halfway charge and power off. If the devices are stored for longer than 6 months, charge them 50% every 6 months.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">20350</post-id>	</item>
		<item>
		<title>Don&#8217;t play with customer data</title>
		<link>https://en.spress.net/dont-play-with-customer-data/</link>
		
		<dc:creator><![CDATA[editor]]></dc:creator>
		<pubDate>Thu, 03 Jun 2021 01:10:09 +0000</pubDate>
				<category><![CDATA[Tech]]></category>
		<category><![CDATA[administration]]></category>
		<category><![CDATA[Bank]]></category>
		<category><![CDATA[Customer]]></category>
		<category><![CDATA[data]]></category>
		<category><![CDATA[Debt]]></category>
		<category><![CDATA[dont]]></category>
		<category><![CDATA[GDPR]]></category>
		<category><![CDATA[Incident]]></category>
		<category><![CDATA[Information system]]></category>
		<category><![CDATA[Institutions]]></category>
		<category><![CDATA[Joke]]></category>
		<category><![CDATA[KYC]]></category>
		<category><![CDATA[mind]]></category>
		<category><![CDATA[Operational]]></category>
		<category><![CDATA[Personal information]]></category>
		<category><![CDATA[play]]></category>
		<category><![CDATA[Privacy]]></category>
		<category><![CDATA[Resources]]></category>
		<category><![CDATA[safe]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Warning]]></category>
		<guid isPermaLink="false">https://en.spress.net/dont-play-with-customer-data/</guid>

					<description><![CDATA[Data is an extremely valuable economic resource, many businesses and fields depend on it. In the banking sector (NH), customer data is many times more important, because it is not only basic personal information, but also the status of customers&#8217; assets, balances, and cash flows. . Security so that customer data is not exposed (breach) [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>Data is an extremely valuable economic resource, many businesses and fields depend on it. In the banking sector (NH), customer data is many times more important, because it is not only basic personal information, but also the status of customers&#8217; assets, balances, and cash flows. . Security so that customer data is not exposed (breach) is one of the top concerns of these financial institutions, so banks have to invest a lot of effort and money.</strong><br />
<span id="more-20177"></span> <img fifu-featured="1" decoding="async" loading="lazy" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_31_318_39021011/cbfbeec36e8087dede91.jpg" width="625" height="886"> </p>
<p> <strong> A wake-up call about SMALL governance</strong> Recently, on social networks in Vietnam, a computer screen shot of a famous artist&#8217;s NH account statement related to the incident has attracted a lot of public opinion. Although NH has admitted that its employees spread the word, this is a wake-up call for those working in the banking sector, as well as the leaders of these organizations. In the era of information technology, customer data security can be said to be the most important for banks. Previously, the prestige of the banks was in the solidity of the safes, which were dug deep in the tunnels, through many layers of thick steel doors, resistant to fire and explosion and even earthquakes. Today it is the NH&#8217;s security system. Because most assets and liabilities are stored in the form of numbers, lines of data. The disclosure of customer data is often considered an accident of the security system, due to unintentional human error, or due to an external attack. But security risks do not only come from information technology systems. There are three places where security risks arise, that is from a governance perspective in relation to processes, monitoring, information systems, and operations. The above incident shows an error in the operation of the staff, related to the management of the bank. Normally, when signing a work contract, in the contract terms, of course, there must be things that employees must not do, not to mention the business ethics of the industry. And so this is not entirely the fault of the staff, NH is also responsible for regular training, as well as supervision. The consequences of customer data being disclosed are serious on several levels. For example, the bank must be responsible for the damages incurred because the customer account is attacked individually, or the entire information system of the bank is the prey of hackers. Equally important damage is the reputation of NH. As a customer, no one wants to send money or do business with NH but &#8220;house&#8221; is loose. The more important partners are not. <strong> NH is also confused</strong> Customer data in banks is the survival of banks. Security is the new generation of &#8220;safes&#8221;, and the prestige lies in the system, as well as the consciousness and skills of the key holders. In the matter of customer data, banks also have a big confusion between needing a lot of customer data (KYC), security and customer privacy (privacy). Banks themselves also need a lot of KYC, not only to manage risks, but also to develop services to provide to customers, especially cross-selling and value-added services. State regulatory agencies also require banks to perform KYC, mainly for the purpose of anti-money laundering and illegal activities. But when customer data increases, integration from many sources, many systems with heterogeneous standards or formats, is a huge challenge for NH&#8217;s information system. Because the more sources, the more &#8220;entrances&#8221; there are more exposed points, many places can be hacked. The collection of customer data is also met with a certain reaction from them because of privacy. In many developed countries, such as Europe with the General Data Protection Regulation 2016/679 aka GDPR, there is a huge shift from service providers in general and the sector. NH in particular. There are data, currently NH wants to collect the consent of customers. In short, customer data in banks is the survival of banks. The security is a new generation &#8220;safe&#8221; form, and the prestige lies in the system, as well as the consciousness and skills of the key holders. <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_31_318_39021011/e43dcc34db7632286b67.jpg" width="625" height="468"> <strong> Domestic banks need to pay attention</strong> In terms of customer data security risks, domestic banks compete with each other in technology and there is almost no big difference between banks in the same group, for example, large banks have enough resources to Get the best system. Even later banks have an advantage because technology costs decrease over time. The problem for data security, therefore, mainly lies in the management system of the bank, as well as in the daily operation. In administration, besides processes and monitoring systems, leaders&#8217; awareness of security issues is extremely important. Not only investing properly for the information technology system, leaders must always closely monitor this issue, considering this as their important task. Therefore, there is a need for consistent direction and coordination between the banks&#8217; departments, considering this as the core activity of the bank. In the course of daily operations, it is the awareness and skills of the employees. Periodic and continuous training is absolutely necessary for all employees, especially functions and positions of authority. If the employee is aware of the seriousness of the disclosure of the customer&#8217;s account, no employee would dare to act so impulsively, not to mention, besides internal handling, it may also be involved in legal regulations .</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">20177</post-id>	</item>
		<item>
		<title>Facebook disregards the privacy of Vietnamese users</title>
		<link>https://en.spress.net/facebook-disregards-the-privacy-of-vietnamese-users/</link>
		
		<dc:creator><![CDATA[Điệp Lưu]]></dc:creator>
		<pubDate>Thu, 20 May 2021 02:40:16 +0000</pubDate>
				<category><![CDATA[Tech]]></category>
		<category><![CDATA[account]]></category>
		<category><![CDATA[advertisement]]></category>
		<category><![CDATA[Aim]]></category>
		<category><![CDATA[BAD]]></category>
		<category><![CDATA[Cambridge Analytica]]></category>
		<category><![CDATA[case]]></category>
		<category><![CDATA[clearly]]></category>
		<category><![CDATA[Collect]]></category>
		<category><![CDATA[data]]></category>
		<category><![CDATA[disregards]]></category>
		<category><![CDATA[Facebook]]></category>
		<category><![CDATA[Forum]]></category>
		<category><![CDATA[hackers]]></category>
		<category><![CDATA[information]]></category>
		<category><![CDATA[Leakage]]></category>
		<category><![CDATA[Philippines]]></category>
		<category><![CDATA[phone number]]></category>
		<category><![CDATA[Privacy]]></category>
		<category><![CDATA[Private]]></category>
		<category><![CDATA[Scandal]]></category>
		<category><![CDATA[Social Network]]></category>
		<category><![CDATA[User]]></category>
		<category><![CDATA[users]]></category>
		<category><![CDATA[Vietnamese]]></category>
		<guid isPermaLink="false">https://en.spress.net/facebook-disregards-the-privacy-of-vietnamese-users/</guid>

					<description><![CDATA[The case that the information of 533 million Facebook accounts has just been released by hackers has brought the issue of user privacy back into focus. The case that the information of 533 million Facebook accounts has just been released by hackers has made the issue of user privacy once again the focus of all [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>The case that the information of 533 million Facebook accounts has just been released by hackers has brought the issue of user privacy back into focus.</strong><br />
<span id="more-16406"></span> <img fifu-featured="1" decoding="async" loading="lazy" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_11_23_38796906/ee2a50c34e81a7dffe90.jpg" width="625" height="296"> </p>
<p> <strong> <em> The case that the information of 533 million Facebook accounts has just been released by hackers has made the issue of user privacy once again the focus of all attention. </em> </strong> Agreeing on the fee of 5 million dong to regain the account after clicking on a strange link sent by a friend thanks to a vote on Facebook, Ms. LA, the owner of a famous beauty spa in Hanoi, spent 2 more days considering the proposal. about identity verification. Due to the characteristics of her job and the desire to create credibility with her partner, Ms. LA accepts to spend an additional 50 million to ask an intermediary to register for a green certificate. People who need to authenticate their Facebook accounts and other social networks like LA are not rare, especially business people, or celebrities. They are willing to spend a small amount of money to assert something that is their own property. While some platforms allow for free and simple identity verification, with Facebook it is both a difficult challenge and an intermediary fee is an option that is almost mandatory. That seemingly absurd thing is still happening every day, every hour, but no one is sure whether those verified accounts are guaranteed forever or not, because of the status of blue-tick accounts being occupied. becoming an online sales channel in recent times is easy to find. Especially when information about the data of 533 million Facebook users has just been released, many people cannot help but worry. The above data source is being sold by hackers on a hacker forum last week, including information such as phone number, login ID, full name, home address, date of birth, profile and email address &#8230; Which involves users in 106 countries, with 32 million Americans, 11 million British and 6 million Indians. In this regard, Facebook said the stolen data did not include users&#8217; financial, health and password information. However, these data can provide valuable information for hackers and other breaches. More importantly, this is not the first time Facebook&#8217;s user data has been exposed on a large scale. <strong> Facebook user data is regularly leaked</strong> The 2015 cult case involving the British consulting firm Cambridge Analytica illegally used the personal data of more than 87 million Facebook users to target political ads. This is a scandal that caused Facebook to accept a settlement of up to $ 5 billion, and also caused founder Mark Zuckerberg to testify before the US Congress. Then in September 2019, a database of more than 400 million phone numbers related to Facebook accounts was released, including about 50 million Vietnamese users. Just 3 months later, the information of 267 million users including login IDs, names and phone numbers continued to fall into the hands of hackers. At the same time, the data leak in Belgium and Luxembourg, including that of European Justice Didier Reynders, many EU cabinet members and diplomats, has caused Facebook to suffer for a while. long time. However, Facebook explained that these data leaks were not caused by hackers breaking into the system, but rather by a vulnerability in the sync communication tool that was exploited by vandals in 2019. Facebook later The company has discovered the vulnerability and fixed it, and confirmed that similar incidents will not happen again in the future. Meanwhile, Mike Clark, Facebook&#8217;s director of product management, is constantly moving to try to downplay the impact of this large-scale leak. <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_11_23_38796906/d9c2662b78699137c878.jpg" width="625" height="393"> By March 2021, netizens were again shocked by the information that the data of 41 million Facebook users in Vietnam was distributed by hackers. Talking to a VietNamNet reporter at the time, a Facebook representative acknowledged that the leaked data was from users of this social network, but said &#8220;this may be information obtained before we (Facebook &#8211; PV) made changes over the past few years to protect users&#8217; information. However, whether Facebook really protects users&#8217; information according to what the head of this platform often says, that is another story. Judging by the recent situation, it seems that the problem of leaking Facebook user information is difficult to completely solve and needs to be looked at in detail. The spread of user information may first be because Facebook did not pay attention to this aspect, nor did it establish a complete and strict system to protect user information. At the same time, after a data breach, Facebook did not thoroughly summarize the problem, how to fix loopholes and prevent new problems from appearing. Not only that, a Facebook spokesperson said it is not clear which users should be notified in the recent incident. Because users cannot patch the vulnerabilities themselves and their personal data has been spread on the Internet, Facebook will not specifically notify the users involved. As a result, Facebook&#8217;s performance in this area is relatively poor, and user data leaks are frequent. After all, compared to other social software, users&#8217; dependence on Facebook is still very high. If it leaks many times, I am afraid that it will easily cause irreparable losses and bad consequences. <strong> Legal privacy of Facebook users</strong> With the data of 87 million users exposed in the Cambridge Analytica scandal, the 10 countries with the most Facebook accounts being collected are the US, Philippines, Indonesia, UK, Mexico, Canada, India, Brazil, Vietnam and Australia. Vietnam has 427,446 user accounts whose data has been collected. CEO Mark Zuckerberg admitted that Facebook made mistakes and that his company failed to protect customer data, losing users&#8217; trust. &#8220;We have a responsibility to protect your data, and if we can&#8217;t do that, we don&#8217;t deserve to serve you,&#8221; Zuckerberg wrote in a post on his personal Facebook page after the scandal. In addition to the $5 billion settlement with the US Federal Trade Commission (FTC) at the time, the two sides reached a landmark settlement against allegations of misuse of user data. . According to the settlement reached by the FTC, when more than 500 user information is illegally stolen, Facebook is required to report it within 30 days. In connection with this case, Facebook also had to pay £500,000 (about $ 649,000) after a fine from the UK Information Commissioner&#8217;s Office (ICO). By October last year, a user group called Facebook You Owe Us in the United Kingdom, led by the law firm Milberg London and supported by former CEO Richard Lloyd, continued to sue Facebook and seek compensation. another large sum. Meanwhile, most of Facebook&#8217;s data disclosure scandals have a direct impact on users of this social network in Vietnam. No one has been able to determine how many of the 427,446 Vietnamese user accounts in the Cambridge Analytica incident, or the 41 million accounts in the newly announced case in March 2021, were affected, even appropriated and had to be stolen. spend a small amount of money to get your account back like LA One thing is for sure, users are solely responsible for the security of personal account information in accordance with the general provisions of most platforms, including Facebook. However, if personal information on platforms like Facebook is leaked without subjective reasons from the user, on the contrary due to a security incident from the platform, who will be responsible for this? Since Facebook is obligated to compensate users in the US or EU affected by security incidents on the platform, why are 69,280,000 users using this social network in Vietnam, accounting for 70 .1% of the entire population (statistics as of June 2020), of which many are victims of Facebook incidents, are automatically responsible? This question, the writer would like to leave the answer open, because currently Vietnam does not have specific regulations and sanctions that apply specifically to social networking platforms, or the object of application in this case is outside of Vietnam. the scope of control under applicable law due to not having a home office. However, it is a problem that needs to be solved in the near future…</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">16406</post-id>	</item>
		<item>
		<title>The issue of privacy protection is &#8216;hot&#8217; in the Canadian parliament</title>
		<link>https://en.spress.net/the-issue-of-privacy-protection-is-hot-in-the-canadian-parliament/</link>
		
		<dc:creator><![CDATA[Hương Giang (P/v TTXVN tại Ottawa)]]></dc:creator>
		<pubDate>Tue, 18 May 2021 13:55:08 +0000</pubDate>
				<category><![CDATA[Tech]]></category>
		<category><![CDATA[Administrative fines]]></category>
		<category><![CDATA[Canada]]></category>
		<category><![CDATA[Canadian]]></category>
		<category><![CDATA[Commissioner]]></category>
		<category><![CDATA[Draft]]></category>
		<category><![CDATA[Erotic]]></category>
		<category><![CDATA[Face recognition]]></category>
		<category><![CDATA[Fine]]></category>
		<category><![CDATA[G7]]></category>
		<category><![CDATA[He is]]></category>
		<category><![CDATA[hot]]></category>
		<category><![CDATA[issue]]></category>
		<category><![CDATA[Montreal]]></category>
		<category><![CDATA[Ottawa]]></category>
		<category><![CDATA[Parliament]]></category>
		<category><![CDATA[Privacy]]></category>
		<category><![CDATA[Private]]></category>
		<category><![CDATA[protect]]></category>
		<category><![CDATA[Protection]]></category>
		<category><![CDATA[Put into]]></category>
		<category><![CDATA[Recommendations]]></category>
		<category><![CDATA[Revision]]></category>
		<category><![CDATA[Social media]]></category>
		<guid isPermaLink="false">https://en.spress.net/the-issue-of-privacy-protection-is-hot-in-the-canadian-parliament/</guid>

					<description><![CDATA[Canada&#8217;s Privacy Commissioner Daniel Therrien said bill C-11 is not enough to protect people from facial recognition technology and needs to include &#8220;significant amendments&#8221;. Facial recognition technology. Photo: https://towardsdatascience.com/ According to the Vietnam News Agency correspondent in Ottawa, in a recent speech to the Canadian House of Representatives, Daniel Therrien, Canada&#8217;s Privacy Commissioner, said that [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>Canada&#8217;s Privacy Commissioner Daniel Therrien said bill C-11 is not enough to protect people from facial recognition technology and needs to include &#8220;significant amendments&#8221;.</strong><br />
<span id="more-15850"></span> <img decoding="async" loading="lazy" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_11_324_38806565/35dc0958171afe44a70b.jpg" width="625" height="350"> </p>
<p> <em> Facial recognition technology. Photo: https://towardsdatascience.com/</em> According to the Vietnam News Agency correspondent in Ottawa, in a recent speech to the Canadian House of Representatives, Daniel Therrien, Canada&#8217;s Privacy Commissioner, said that bill C-11 is not enough to protect people from identity technology. face and need to include “significant modifications”. This measure proposes to amend private sector privacy laws. Regarding facial recognition technology, Mr. Therrien mentioned US technology company Clearview AI. In February 2021, Daniel Therrien&#8217;s office, along with three provincial privacy commissioners, concluded that Clearview AI violated Canadian privacy laws by providing facial recognition software. for the police. What&#8217;s interesting is that Clearview AI&#8217;s (New York-based) software works by comparing photos with a massive stockpile of billions of photos the company has amassed, collected from various sources. popular social media sites without the consent of individuals. &#8220;While we found that Clearview&#8217;s practices violated Canadian privacy laws, the company refused to follow our recommendations, such as removing photos of Canadians,&#8221; said Mr Therrien. Meanwhile, the new administrative penalty regime in C-11 is not applied to such violations of the law. Therrien noted that the Office of the Privacy Commissioner of Canada is investigating whether online website Pornhub and its parent company MindGeek (based in Montreal) violated Canadians&#8217; privacy rights. MindGeek is accused of regularly sharing videos of child pornography and sexual assault, as well as content that was filmed/or posted without the subject&#8217;s consent. Within the framework of the bill, for the most serious violations, fines could be up to 5% of revenue or CAD 25 million (whichever is greater). These measures have been assessed by Canada&#8217;s Department of Innovation, Science and Economic Development as the strongest penalty framework among the world&#8217;s Group of Seven (G7) privacy laws. Therrien recommends that when there is a conflict between commercial goals and protecting privacy, the privacy of Canadians should take precedence.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">15850</post-id>	</item>
		<item>
		<title>Tesla releases driving data, female car owner husband: infringement of personal privacy</title>
		<link>https://en.spress.net/tesla-releases-driving-data-female-car-owner-husband-infringement-of-personal-privacy/</link>
		
		<dc:creator><![CDATA[editor]]></dc:creator>
		<pubDate>Tue, 11 May 2021 21:33:08 +0000</pubDate>
				<category><![CDATA[Tech]]></category>
		<category><![CDATA[car]]></category>
		<category><![CDATA[Car owner]]></category>
		<category><![CDATA[data]]></category>
		<category><![CDATA[driving]]></category>
		<category><![CDATA[female]]></category>
		<category><![CDATA[Husband]]></category>
		<category><![CDATA[infringement]]></category>
		<category><![CDATA[owner]]></category>
		<category><![CDATA[Personal]]></category>
		<category><![CDATA[Privacy]]></category>
		<category><![CDATA[releases]]></category>
		<category><![CDATA[Tesla]]></category>
		<guid isPermaLink="false">https://en.spress.net/tesla-releases-driving-data-female-car-owner-husband-infringement-of-personal-privacy/</guid>

					<description><![CDATA[@China News Network Mr. Li, the husband of the female rights defender, believes that the driving data is personal property and personal privacy, and Tesla has disclosed it to the media and the public without the owner’s permission, which he cannot accept. On April 22, Tesla disclosed to the media the driving data one minute [&#8230;]]]></description>
										<content:encoded><![CDATA[<p>@China News Network</p>
<p> Mr. Li, the husband of the female rights defender, believes that the driving data is personal property and personal privacy, and Tesla has disclosed it to the media and the public without the owner’s permission, which he cannot accept. On April 22, Tesla disclosed to the media the driving data one minute before the accident and made a text explanation. Subsequently, Mr. Li, the husband of the female car owner, responded late at night that he violated the owner&#8217;s personal privacy and consumer rights and would immediately file a complaint with the Zhengzhou City Market Supervision Department. Video source: Elephant News Tesla’s person responsible for handling the accident stated that the data had been sent to the customer by email. Since the customer’s phone number has not been answered, Tesla sent it to the customer’s mailbox when they bought the car through the company’s mailbox. &#8220;My wife is still in the detention center and the mobile phone is in the hands of the police. How can I receive a call?&#8221; Mr. Li said that before Tesla released the data one minute before the vehicle accident to the public, he had never obtained it with Zhang&#8217;s family. Over contact. Mr. Li only talked to the relevant person in charge of the Zhengdong New District Market Supervision and Administration Bureau of Zhengzhou City on the afternoon of the 22nd. The person in charge only told Mr. Li that Tesla had been ordered to provide data to the car owner and did not mention driving data. Released through the media. Tesla released the driving data without any communication with the car owner. After seeing the news, Mr. Li was very surprised, &#8220;This has violated our personal privacy and consumer rights.&#8221; Mr. Li was first right. The driving data presented by Tesla expressed disapproval. At the same time, he believed that the driving data belonged to personal property and personal privacy, and Tesla disclosed it to the media and the public without the owner&#8217;s permission, which he could not accept. In the next step, Mr. Li will file a complaint with the Zhengzhou Municipal Market Supervision Administration, and at the same time ask Tesla to apologize publicly and revoke the driving data. Previously reported Recently, Tesla owners&#8217; rights protection at the Shanghai Auto Show continued to ferment. On the 19th, at the 2021 Shanghai Auto Show, a Tesla car advocated that a woman wearing a T-shirt with the words &#8220;brake failure&#8221; stood on the roof of a Tesla to defend her rights, and then was taken away. Ms. Zhang said that her father had a traffic accident due to a brake failure while driving a Tesla. She said that her father had slammed on the brakes, but to no avail. <img fifu-featured="1" decoding="async" class="content-picture" src="https://inews.gtimg.com/newsapp_bt/0/13428618958/1000"> Video screenshot Therefore, before, Ms. Zhang also carried out rights protection at the Zhengzhou Auto Show. On the 20th, the relevant person in charge of the Press and Publicity Department of the Zhengzhou Market Supervision Bureau responded that the Zhengdong New Area Market Supervision Bureau organized the complainant and Tesla car sales services three times on March 15, March 18, and March 24 ( Zhengzhou) Co., Ltd. conducted mediation. The complainant disagrees with a third party’s technical appraisal and requested “to provide complete driving data half an hour before the accident occurred. Tesla Motors Sales Service (Zhengzhou) Co., Ltd. refused to provide relevant data because of concerns that the data would be used by the parties for hype and publicity. Due to the large differences between the two parties, they could not reach an agreement. Subsequently, on the 21st, the Zhengdong New District Market Supervision and Administration Bureau of Zhengzhou City responded again and stated that it ordered Tesla Motors Sales Service (Zhengzhou) Co., Ltd. to unconditionally provide Ms. Zhang with complete driving data half an hour before the accident. In the evening of the same day, Tesla expressed its willingness to cooperate fully and provide raw data of the vehicle half an hour before the incident to a third-party appraisal agency or government-designated technical supervision department or consumers. <img decoding="async" class="content-picture" src="https://inews.gtimg.com/newsapp_bt/0/13428618954/1000"> Image source: Upstream News Tesla releases raw vehicle data On the 22nd, Tesla officially announced the original vehicle data half an hour before the incident. Tesla said that data showed that in the 30 minutes before the accident, the vehicle had more than 40 records of depressing the brake pedal. At the same time, the vehicle has repeatedly exceeded 100 kilometers per hour, and multiple brakes have occurred. When the driver stepped on the brake pedal for the last time, the data showed that the speed of the vehicle was 118.5 kilometers per hour. Within 2.7 seconds after the driver stepped on the brake pedal, the maximum brake master cylinder pressure was only 45.9 bar. After that, the driver increased the stepping on the brake pedal, and the brake master cylinder pressure reached 92.7 bar. The front collision warning and automatic emergency braking function were activated (the maximum brake master cylinder pressure reached 140.7bar) and played a role, reducing the amplitude of the collision. 1.8 seconds after the ABS was applied, the system recorded the occurrence of the collision. After the driver stepped on the brake pedal, the vehicle speed continued to decrease, and before the collision, the vehicle speed was reduced to 48.5 kilometers per hour. Tesla said that, in summary, the vehicle is driving at a higher speed, and the driver starts to depress the brake pedal lightly. After that, the automatic emergency braking function is activated and has a function, which improves the braking force and reduces The impact force of the collision, the brake system are normally involved in the work and reduce the speed of the car. <img decoding="async" class="content-picture" src="https://inews.gtimg.com/newsapp_bt/0/13444641439/1000"> Tesla speaks again: Will cooperate with investigation without reservation On the evening of the 22nd, Tesla’s official Weibo issued a statement stating that it fully accepts the decisions of the State Administration of Market Supervision and Zhengzhou Municipal Market Supervision Administration, and does its best to actively cooperate with all relevant investigations to effectively fulfill the main responsibility of quality and safety. , Provide consumers with high-quality and safe products and services. Tesla said that as of April 21, it has provided complete driving data half an hour before the accident, and has proactively contacted and communicated with relevant parties and reported relevant situations on many occasions. <img decoding="async" class="content-picture" src="https://inews.gtimg.com/newsapp_match/0/13444641440/0"> Source: China News Network</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">13205</post-id>	</item>
		<item>
		<title>How to block Google tracking on Android smartphones everyone should know</title>
		<link>https://en.spress.net/how-to-block-google-tracking-on-android-smartphones-everyone-should-know/</link>
		
		<dc:creator><![CDATA[Thái Sơn - CTV]]></dc:creator>
		<pubDate>Mon, 10 May 2021 00:40:07 +0000</pubDate>
				<category><![CDATA[Tech]]></category>
		<category><![CDATA[Android]]></category>
		<category><![CDATA[Appear]]></category>
		<category><![CDATA[Ash]]></category>
		<category><![CDATA[block]]></category>
		<category><![CDATA[Block out]]></category>
		<category><![CDATA[data]]></category>
		<category><![CDATA[Destroy]]></category>
		<category><![CDATA[Do not want]]></category>
		<category><![CDATA[Feature]]></category>
		<category><![CDATA[Follow]]></category>
		<category><![CDATA[Google]]></category>
		<category><![CDATA[Google Android]]></category>
		<category><![CDATA[history]]></category>
		<category><![CDATA[location]]></category>
		<category><![CDATA[Location History]]></category>
		<category><![CDATA[Off]]></category>
		<category><![CDATA[One move]]></category>
		<category><![CDATA[Option]]></category>
		<category><![CDATA[Privacy]]></category>
		<category><![CDATA[Send]]></category>
		<category><![CDATA[Smartphone]]></category>
		<category><![CDATA[smartphones]]></category>
		<category><![CDATA[Tracking]]></category>
		<category><![CDATA[User]]></category>
		<guid isPermaLink="false">https://en.spress.net/how-to-block-google-tracking-on-android-smartphones-everyone-should-know/</guid>

					<description><![CDATA[Google lives off user data, but users don&#8217;t want this. Google uses user location data to improve service quality. But if you do not want to be tracked by Google every move, you absolutely can perform the simple steps below. Photo: BI How to block Google from tracking your Android phone by disabling all location [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>Google lives off user data, but users don&#8217;t want this.</strong><br />
<span id="more-12789"></span> Google uses user location data to improve service quality. But if you do not want to be tracked by Google every move, you absolutely can perform the simple steps below.</p>
<p> <img fifu-featured="1" decoding="async" loading="lazy" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_09_329_38777748/71b8567d4b3fa261fb2e.jpg" width="625" height="312"> <em> Photo: BI</em> <strong> How to block Google from tracking your Android phone by disabling all location tracking features</strong> If you want to completely block Google from tracking, you have two options. <strong> Turn off Android phone&#8217;s location tracking</strong> This is a &#8220;destructive&#8221; plan because once activated it will block all applications on your phone from sending or receiving location and location data. 1. Open the Settings app on your Android phone. 2. Select “Location”. <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_09_329_38777748/6e0f52ca4f88a6d6ff99.jpg" width="625" height="1319"> 3. Turn off mode at the top of screen by swiping left hand. This will change the word On to Off. <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_09_329_38777748/4b3672f36fb186efdfa0.jpg" width="625" height="1319"> <strong> Turn off Google&#8217;s &#8220;Location History&#8221; setting</strong> You can also turn off Location History mode in Google account. This will turn off location tracking of all Google apps and services with a single swipe. 1. In the Settings app, select Google. 2. Select &#8220;Manage your Google Account.&#8221; <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_09_329_38777748/c22df8e8e5aa0cf455bb.jpg" width="625" height="1319"> 3. On the account page, select &#8220;Privacy &#038; personalization.&#8221; 4. For Activity controls, select &#8220;Location History.&#8221; <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_09_329_38777748/c8cfc50ad84831166859.jpg" width="625" height="1319"> 5. Turn off Location History by bringing the option to the left. <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_09_329_38777748/91339af687b46eea37a5.jpg" width="625" height="1319"> 6. At this point, the user will see the Pause Location History page. This page explains that the user will lose some features by pressing continue. Select “Pause” at the bottom of the page. (This button will appear after scrolling to the bottom of the page). <strong> How to block Google from tracking Android phone by disabling location tracking features of a particular Google app</strong> If you want some apps not to track your location while you want to allow others, you can do this through the Settings app on your Android phone. 1. Select the Settings app. 2. Select &#8220;Location&#8221; 3. Make sure the Location option on your device is turned on to On. 4. Select &#8220;App permissions.&#8221; 5. For the application you want to block tracking, tap Deny and click confirm to block tracking. <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_09_329_38777748/6a7e6dbb70f999a7c0e8.jpg" width="625" height="1319"></p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">12789</post-id>	</item>
		<item>
		<title>A polished image at the expense of others?</title>
		<link>https://en.spress.net/a-polished-image-at-the-expense-of-others/</link>
		
		<dc:creator><![CDATA[editor]]></dc:creator>
		<pubDate>Fri, 30 Apr 2021 08:49:08 +0000</pubDate>
				<category><![CDATA[Business]]></category>
		<category><![CDATA[5]]></category>
		<category><![CDATA[Apple]]></category>
		<category><![CDATA[Expense]]></category>
		<category><![CDATA[German]]></category>
		<category><![CDATA[Germany]]></category>
		<category><![CDATA[Image]]></category>
		<category><![CDATA[iOS 14]]></category>
		<category><![CDATA[Polished]]></category>
		<category><![CDATA[Privacy]]></category>
		<category><![CDATA[Tracking Transparency]]></category>
		<guid isPermaLink="false">https://en.spress.net/?p=10537</guid>

					<description><![CDATA[Apple customers who have installed the latest iOS operating system can decide for themselves whether they want to be &#8220;tracked&#8221; by apps for advertising purposes or not &#8211; much to the annoyance of Facebook &#38; Co. Since April 26th, Apple has been encouraging users of its iPhones and tablets to use data more sparingly &#8211; [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong> Apple customers who have installed the latest iOS operating system can decide for themselves whether they want to be &#8220;tracked&#8221; by apps for advertising purposes or not &#8211; much to the annoyance of Facebook &amp; Co.</strong> </p>
<p> Since April 26th, Apple has been encouraging users of its iPhones and tablets to use data more sparingly &#8211; regardless of opposition from other online companies. After upgrading to the latest iOS 14.5 operating system, customers can decide for themselves whether or not apps can be used for advertising purposes. This tracking makes it possible to create an individual profile of users because every iPhone has its own number. Advertising groups can use these to display personalized ads across websites and apps. This is why advertisements for goods that have been searched for appear again and again on various apps. With the new iOS system, users of new apps are now automatically asked whether they want to allow advertising tracking. Industry observers assume that many users will reject tracking for advertising purposes.</p>
<h2> Allegations from Facebook &amp; Co.</h2>
<p>Apple is acting as a privacy advocate &#8211; and angered social network providers like Facebook, who generate a large part of their income through advertising. Facebook boss Mark Zuckerberg accuses Apple of only pursuing its own business goals with the &#8220;App Tracking Transparency&#8221; (ATT) that has now been introduced. The iPhone manufacturer wants to ditch free apps that are financed by advertising in order to be able to earn money on paid apps and paid software subscriptions in the App Store. Shortly before the update was published, eight associations from the media and advertising industry submitted a complaint about abuse to the Federal Cartel Office. &#8220;We&#8217;ll take a look at them now,&#8221; said a spokesman for the agency. Apple responded to the complaint: &#8220;We believe that privacy is a fundamental human right.&#8221; The data belonged to the users &#8220;and they should be able to choose how their data is used and by whom&#8221;. You got support from authorities and data protection officers for the function.</p>
<h2> Consumer advocates advocate innovation</h2>
<p>There is praise from consumer advocates. &#8220;For consumers, it is gratifying that Apple will make personalized advertising tracking on its devices more difficult in the future and thus strengthen data protection,&#8221; said the team leader for digital and media at the German Consumer Association, Lina Ehrig, of the Reuters news agency. Of course, Apple must respect competition law and not disadvantage third parties in an inadmissible manner.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">10537</post-id>	</item>
		<item>
		<title>Husband of Shanghai Rights Defending Female Car Owner Doesn&#8217;t Approve Driving Data, Says Tesla Infringes Personal Privacy</title>
		<link>https://en.spress.net/husband-of-shanghai-rights-defending-female-car-owner-doesnt-approve-driving-data-says-tesla-infringes-personal-privacy/</link>
		
		<dc:creator><![CDATA[editor]]></dc:creator>
		<pubDate>Thu, 29 Apr 2021 05:39:06 +0000</pubDate>
				<category><![CDATA[World]]></category>
		<category><![CDATA[Approve]]></category>
		<category><![CDATA[car]]></category>
		<category><![CDATA[data]]></category>
		<category><![CDATA[defending]]></category>
		<category><![CDATA[doesnt]]></category>
		<category><![CDATA[driving]]></category>
		<category><![CDATA[female]]></category>
		<category><![CDATA[Husband]]></category>
		<category><![CDATA[Infringes]]></category>
		<category><![CDATA[owner]]></category>
		<category><![CDATA[Personal]]></category>
		<category><![CDATA[Privacy]]></category>
		<category><![CDATA[rights]]></category>
		<category><![CDATA[Shanghai]]></category>
		<category><![CDATA[Tesla]]></category>
		<guid isPermaLink="false">https://en.spress.net/husband-of-shanghai-rights-defending-female-car-owner-doesnt-approve-driving-data-says-tesla-infringes-personal-privacy/</guid>

					<description><![CDATA[What happened 1 minute before the incident?Tesla releases data On April 22, the continued fermentation of Tesla&#8217;s brake failure incident made the latest progress as Tesla provided the data before the accident for the first time. The husband of a female human rights activist in Shanghai reiterated late at night: Tesla has violated personal privacy [&#8230;]]]></description>
										<content:encoded><![CDATA[<p>What happened 1 minute before the incident?Tesla releases data </p>
<p> On April 22, the continued fermentation of Tesla&#8217;s brake failure incident made the latest progress as Tesla provided the data before the accident for the first time. <strong> The husband of a female human rights activist in Shanghai reiterated late at night: Tesla has violated personal privacy rights, requesting data withdrawal and an apology</strong> <img fifu-featured="1" decoding="async" loading="lazy" src="https://p6.itc.cn/q_70/images03/20210423/a92b8a9f230947b792de14dbf8815e7e.png" width="680" height="391"> The husband of the female car owner, Mr. Li, responded to the Elephant News reporter late at night that he violated the owner&#8217;s personal privacy and consumer rights and will immediately file a complaint with the Zhengzhou City Market Supervision Department. Tesla’s person responsible for handling the accident stated that the data had been sent to the customer by email. Since the customer’s phone number has not been answered, Tesla sent it to the customer’s mailbox when they bought the car through the company’s mailbox. &#8220;My wife is still in the detention center and the mobile phone is in the hands of the police. How can I receive a call?&#8221; Mr. Li said that before Tesla released the data one minute before the vehicle accident to the public, he had never obtained it with Zhang&#8217;s family. Over contact. Mr. Li only talked to the relevant person in charge of the Zhengdong New District Market Supervision and Administration Bureau of Zhengzhou City on the afternoon of the 22nd. The person in charge only told Mr. Li that Tesla had been ordered to provide data to the car owner and did not mention driving data. Released through the media. Tesla released the driving data without any communication with the car owner. After seeing the news, Mr. Li was very surprised, &#8220;This has violated our personal privacy and consumer rights.&#8221; Mr. Li was first right. The driving data presented by Tesla expressed disapproval. At the same time, he believed that the driving data belonged to personal property and personal privacy, and Tesla disclosed it to the media and the public without the owner&#8217;s permission, which he could not accept. In the next step, Mr. Li will file a complaint with the Zhengzhou Municipal Market Supervision Administration, and at the same time ask Tesla to apologize publicly and revoke the driving data. <strong> Tesla once again speaks out late at night: will unreservedly cooperate with the investigation</strong> <img decoding="async" loading="lazy" src="https://p5.itc.cn/q_70/images03/20210423/0b652cd087874ed9b97e288104878e44.jpeg" width="440" height="1693"> Tesla re-issued a document on the 22nd night, saying that it fully accepts the decisions of the State Administration of Market Supervision and the Zhengzhou City Market Supervision Administration, and does its best to actively cooperate with all related investigations, effectively fulfill the main responsibility of quality and safety, and provide consumers with High-quality and safe products and services. Tesla said that as of April 21, it has provided complete driving data half an hour before the accident, and has proactively contacted and communicated with relevant parties and reported relevant situations on many occasions.</p>
<p><strong> Further reading</strong></p>
<p><strong> Another Tesla Rights Defender Owner Says: Detection Cannot Keep Up with Technological Development</strong></p>
<p>Soon after Tesla announced the situation one minute before the data restoration accident, another car owner, An Baojia, who participated in the rights protection, uttered a voice on Weibo, responding to why he did not perform a third-party appraisal. He said that “testing cannot keep up with technology” and it is difficult for authoritative appraisal agencies to be the dilemma faced by car owners after the current smart car controversy.</p>
<p>On Weibo, Anbaojia first expressed joy that Tesla started to provide data. He expressed his gratitude to the motherland and human rights defenders. &#8220;There was no clear relevant legal basis before. (Background data) Tesla did not give it, and consumers had nothing to do. Consumers found the Consumers Association, and the Consumers Association had nothing to do. In the past few days, they have just received approval from their superiors for pure electric vehicles. Consumers have the right to know the traffic data generated during use and driving, and companies need to provide them unconditionally. With this provision, there will be disputes in the future, and it will be much easier for everyone to get the data.&#8221;</p>
<p><img decoding="async" src="https://p9.itc.cn/q_70/images03/20210423/53861771d19b4627bdd67c6159708e96.png"></p>
<p>It&#8217;s not easy to get the data, but Anbaojia raised a second question: &#8220;I don&#8217;t understand, and I can&#8217;t analyze the specific causes of the accident.&#8221;</p>
<p>Anbaojia said: &#8220;There is a car friend who does related work, but he can&#8217;t analyze it. I don&#8217;t know which organization can interpret this data.&#8221;</p>
<p><img decoding="async" src="https://p0.itc.cn/q_70/images03/20210423/e63a7c1fc8f844988bb26f9a38481d1d.png"></p>
<p>The reporter&#8217;s inquiry found that most of the vehicle identification agencies recognized by the relevant judicial departments were established earlier. Previously, they basically conducted accident identification for fuel vehicles. Through consultation with several automobile testing agencies, the other party stated that they can perform hardware testing for vehicles, but if there are problems with software or systems, the existing technology of the agency cannot guarantee the detection.</p>
<p>An industry insider who did not want to be named told reporters that in the past, agencies that conducted accident appraisal for fuel vehicles may not be able to adapt to the needs of smart cars. The reason is that smart cars are built on the basis of computer technology, so the effect of car owners stepping on the brakes in the event of an accident is likely to be affected by system calculations. Therefore, traditional appraisal agencies can only appraise whether the brakes in the current situation are normal, and cannot appraise the brakes of the vehicle when an accident occurs. To completely restore the truth of the accident, car companies also need to provide background data.</p>
<p>But even if car companies provide back-end data, whether the back-end data is complete and whether it is modified has become a point of contention. In addition, a service staff member of a testing agency also said that, like many of Tesla’s emerging technologies, testing agencies now do not have equipment testing software. The most &#8220;authoritative&#8221; may be the manufacturer&#8217;s own analysis.</p>
<p>This has caused the smart car accident to return to the embarrassing situation of the manufacturer&#8217;s &#8220;speaking of one family&#8221; without a third-party authoritative corroboration.</p>
<p>In this regard, Anbaojia said that it is an inevitable phenomenon that detection cannot keep up with the development of technology. At present, there are no relevant standards for new energy vehicle controller software testing, and the relevant standards of the computer industry cannot be fully applied to automotive controller software testing, nor can they guide automotive industry engineers to carry out software testing in a comprehensive manner.</p>
<p>It is reported that under the leadership of the National Automobile Standards Committee, the development of large-scale intelligent network car safety standards is currently in full swing.</p>
<p>It is understood that Anbaojia is different from the Henan Car Advocate woman who defends rights on the roof of the car. The reason for defending rights is not the brake failure, but the loss of power of the vehicle. He also said on Weibo: &#8220;After Ms. Zhang came out, she must have something to say about Tesla&#8217;s data. I can&#8217;t speak for her. Each of us has different problems. Regarding the problem of my car, I have just released it recently. Video. Before Ms. Zhang comes out, listen to the professional interpretation.&#8221;</p>
<p><img decoding="async" loading="lazy" src="https://p7.itc.cn/q_70/images03/20210423/2e227021e8eb492d9f1aaf598395d7bf.png" width="680" height="378"></p>
<p>According to his account, in March this year, when he was driving a Model S from Nanjing to Shanghai, the vehicle suddenly alarmed: &#8220;The power has been reduced and the vehicle is shutting down.&#8221; Then, the vehicle stepped on the pedal without any response. He contacted Tesla after-sales service to send the vehicle to the service center, but the customer service staff first stated that the vehicle lost power due to a motor failure, and then believed that the motor problem was caused by Mr. An’s vehicle wading in the water. Anbaojia believed that Tesla was &#8220;throwing the pot&#8221; and disapproved of the accident.</p>
<p><strong> Original title: Tesla&#8217;s new voice of rights defenders: detection can not keep up with technological development</strong></p>
<p>Source: Comprehensive Elephant News Beijing Daily Client @安保佳@ Tesla Process Editor: tf004</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">10115</post-id>	</item>
		<item>
		<title>up to date!The husband of a rights-defending female car owner claimed that Tesla violated privacy: she had never contacted her family before releasing the data, demanding to withdraw the data and apologize</title>
		<link>https://en.spress.net/up-to-datethe-husband-of-a-rights-defending-female-car-owner-claimed-that-tesla-violated-privacy-she-had-never-contacted-her-family-before-releasing-the-data-demanding-to-withdraw-the-data-and-apol/</link>
		
		<dc:creator><![CDATA[editor]]></dc:creator>
		<pubDate>Tue, 27 Apr 2021 16:20:10 +0000</pubDate>
				<category><![CDATA[Business]]></category>
		<category><![CDATA[apologize]]></category>
		<category><![CDATA[car]]></category>
		<category><![CDATA[claimed]]></category>
		<category><![CDATA[contacted]]></category>
		<category><![CDATA[data]]></category>
		<category><![CDATA[dateThe]]></category>
		<category><![CDATA[demanding]]></category>
		<category><![CDATA[Family]]></category>
		<category><![CDATA[female]]></category>
		<category><![CDATA[Husband]]></category>
		<category><![CDATA[owner]]></category>
		<category><![CDATA[Privacy]]></category>
		<category><![CDATA[releasing]]></category>
		<category><![CDATA[rightsdefending]]></category>
		<category><![CDATA[Tesla]]></category>
		<category><![CDATA[violated]]></category>
		<category><![CDATA[withdraw]]></category>
		<guid isPermaLink="false">https://en.spress.net/up-to-datethe-husband-of-a-rights-defending-female-car-owner-claimed-that-tesla-violated-privacy-she-had-never-contacted-her-family-before-releasing-the-data-demanding-to-withdraw-the-data-and-apol/</guid>

					<description><![CDATA[Family members of Tesla rights defending female car owners speak out: Tesla&#8217;s public data violates privacy Every edit: Wang Xin Elephant News reported on the 23rd that on the afternoon of April 22nd, Tesla disclosed to the media the driving data one minute before the accident and made a text explanation. Subsequently,The husband of the [&#8230;]]]></description>
										<content:encoded><![CDATA[<p>Family members of Tesla rights defending female car owners speak out: Tesla&#8217;s public data violates privacy </p>
<p> Every edit: Wang Xin Elephant News reported on the 23rd that on the afternoon of April 22nd, Tesla disclosed to the media the driving data one minute before the accident and made a text explanation. Subsequently,The husband of the female human rights defender, Mr. Li, responded to the Elephant News reporter late at night that he violated the owner’s personal privacy and consumer rights and will immediately file a complaint with the Zhengzhou City Market Supervision Department. Tesla’s person responsible for handling the accident stated that the data has been sent to the customer by email. Since the customer’s phone has not been answered, Tesla sent it through the company’s mailbox to the mailbox that the customer filled in when they bought the car. &#8220;My wife is still in the detention center, and the mobile phone is in the hands of the police, how could I receive a call?&#8221; Mr. Li saidBefore Tesla released the data one minute before the vehicle accident to the public, he had never contacted Zhang&#8217;s family.. <img fifu-featured="1" decoding="async" src="https://p5.itc.cn/q_70/images03/20210423/11b90e8e8f0c4d328af494e05a27c042.png" width="630"> Image source: Elephant News video screenshot Mr. Li only talked to the relevant person in charge of the Zhengdong New District Market Supervision and Administration Bureau of Zhengzhou City on the afternoon of the 22nd. The person in charge only told Mr. Li that Tesla had been ordered to provide data to the car owner, but did not mention driving data. Released through the media. Tesla released the driving data without any communication with the car owner. After seeing the news, Mr. Li was very surprised.&#8221;This has violated our personal privacy and consumer rights.&#8221; Mr. Li first expressed his disapproval of the driving data presented by TeslaAt the same time, he believes that driving data belongs to personal property and personal privacy, and that Tesla publishes it to the media and the public without the owner&#8217;s permission, which he cannot accept. In the next step, Mr. Li will file a complaint with the Zhengzhou Municipal Market Supervision Administration.At the same time, Tesla is required to apologize publicly and revoke the driving data. <strong> Announcement of the situation 1 minute before the accident and 30 minutes before the accident</strong> According to a report from the China Market Supervision News, headed by the State Administration of Market Supervision, on the afternoon of the 22nd, Tesla provided data from one minute before the vehicle accident and made a textual explanation. Tesla said that the braking system is normally involved in the work and reduced the speed of the car. The full text of this text description is as follows: When the driver stepped on the brake pedal for the last time, the data showed that the speed of the vehicle was 118.5 kilometers per hour. Within 2.7 seconds after the driver stepped on the brake pedal, the maximum brake master cylinder pressure was only 45.9 bar. After that, the driver increased the stepping on the brake pedal, and the brake master cylinder pressure reached 92.7 bar. The front collision warning and automatic emergency braking function were activated (the maximum brake master cylinder pressure reached 140.7bar) and played a role, reducing the amplitude of the collision. 1.8 seconds after the ABS was applied, the system recorded the occurrence of the collision. After the driver stepped on the brake pedal, the vehicle speed continued to decrease, and before the collision, the vehicle speed decreased to 48.5 kilometers per hour. <img decoding="async" src="https://p6.itc.cn/q_70/images03/20210423/45f0d3c44d7b42f8a14535660b70eda8.png" width="630"></p>
<p>Image source: China Market Supervision News</p>
<p>In summary, the vehicle is running at a higher speed, and the driver starts to depress the brake pedal with a lighter force. After that, the automatic emergency braking function is activated and has a function, which improves the braking force and reduces the impact of the collision. The driving system is normally involved in the work and reduces the speed of the car.</p>
<p>In addition, with regard to the condition of the vehicle 30 minutes before the accident, Tesla stated this: In the 30 minutes before the accident, the driver drove the vehicle normally and had more than 40 records of depressing the brake pedal. The vehicle has repeatedly stopped more than 100 kilometers per hour and stopped repeatedly.</p>
<p>On the evening of April 22, Tesla once again announced the progress of the &#8220;car roof rights protection&#8221; incident through its official Weibo, saying that on the afternoon of April 22, the sealed paper version of the data had been sent to Zhang via express mail. The contact address registered by the lady in our company, a total of 48 pages, 6697 entries.</p>
<p>Tesla also stated that it will unreservedly cooperate with the regulatory authorities to conduct in-depth investigations and openly accept social supervision. With the consent of the customer, government designation or supervision, the three parties will jointly witness and conduct testing at any qualified and authoritative testing organization across the country.</p>
<p>Source: Daily Economic News Comprehensive Elephant News, China Market Supervision News, Tesla Weibo</p>
<p>Daily economic news</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">9472</post-id>	</item>
		<item>
		<title>The clubhouse hype continues</title>
		<link>https://en.spress.net/the-clubhouse-hype-continues/</link>
		
		<dc:creator><![CDATA[editor]]></dc:creator>
		<pubDate>Fri, 23 Apr 2021 22:06:10 +0000</pubDate>
				<category><![CDATA[Business]]></category>
		<category><![CDATA[Capital]]></category>
		<category><![CDATA[CLUBHOUSE]]></category>
		<category><![CDATA[continues]]></category>
		<category><![CDATA[German]]></category>
		<category><![CDATA[Germany]]></category>
		<category><![CDATA[Hacker]]></category>
		<category><![CDATA[Hacker attacks]]></category>
		<category><![CDATA[hype]]></category>
		<category><![CDATA[investors]]></category>
		<category><![CDATA[Privacy]]></category>
		<category><![CDATA[Value]]></category>
		<guid isPermaLink="false">https://en.spress.net/?p=7152</guid>

					<description><![CDATA[Investors have provided the audio app Clubhouse with fresh money, and growth continues. There have recently been new problems with data protection. Does the company have speed under control? The management of the audio app Clubhouse has raised fresh money from investors. On the one hand, this is intended to cope with the rush of [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong> Investors have provided the audio app Clubhouse with fresh money, and growth continues. There have recently been new problems with data protection. Does the company have speed under control?</strong> </p>
<p> The management of the audio app Clubhouse has raised fresh money from investors. On the one hand, this is intended to cope with the rush of users over the past few months. Clubhouse wants to &#8220;welcome more users&#8221;, strengthen its infrastructure and &#8220;support&#8221; the providers of the discussions. The rapid growth meant that the servers were overloaded, and the algorithms were not designed for the high number of users. According to the company, around ten million users are currently on the platform every week. On the other hand, the capital injection should also serve to drive the growth course further. So far, Clubhouse has been above target in this regard: Clubhouse has &#8220;grown faster than expected,&#8221; the company said.</p>
<h2> Success arouses desire</h2>
<p>The audio-based social network app had already completed a financing round in January. As reported by financial news agency Bloomberg, Clubhouse is now worth around four billion dollars. That corresponds to around 3.3 billion euros and is four times as much as in January. The success of the app developed by Alpha Explorations in the USA last spring arouses desires and imitators. According to media reports, the news service Twitter is said to have recently been interested in a purchase, and Facebook is said to be working on a clubhouse clone. Facebook boss Mark Zuckerberg recently had a look in the virtual salon himself, and Tesla boss Elon Musk was also a guest &#8211; this of course increases the attractiveness of the audio offering. Listen to important people once: Many clubhouse users are likely to know these or similar wishes.</p>
<h2> Privacy advocates warn</h2>
<p>But the success story also has its downsides. Data protection advocates repeatedly express serious concerns. A relevant incident occurred only recently. In a hacker forum, data from 1.3 million clubhouse users emerged. Clubhouse denied being hacked. The data is publicly visible in the profile information that has been tapped in bulk, including name, user name, user ID, profile photos and contact lists. Sensitive data such as credit card information were not included. Such information could be used for targeted phishing attacks, warns the consumer advice center. The data can also be used to create fake accounts in social networks and practically carry out identity theft. The consumer association also criticizes the fact that conversations are recorded and evaluated on the servers in the USA. In addition, the app would have access to all saved contacts in the phone book.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">7152</post-id>	</item>
		<item>
		<title>How to limit losing money when using iPhone</title>
		<link>https://en.spress.net/how-to-limit-losing-money-when-using-iphone/</link>
		
		<dc:creator><![CDATA[MINH HOÀNG]]></dc:creator>
		<pubDate>Thu, 22 Apr 2021 07:20:07 +0000</pubDate>
				<category><![CDATA[Tech]]></category>
		<category><![CDATA[App store]]></category>
		<category><![CDATA[App Store Purchases]]></category>
		<category><![CDATA[Apple ID]]></category>
		<category><![CDATA[ARE]]></category>
		<category><![CDATA[AVAST]]></category>
		<category><![CDATA[Code]]></category>
		<category><![CDATA[Credit]]></category>
		<category><![CDATA[DISABLE]]></category>
		<category><![CDATA[Iphone]]></category>
		<category><![CDATA[ITunes]]></category>
		<category><![CDATA[Limit]]></category>
		<category><![CDATA[losing]]></category>
		<category><![CDATA[Lost money]]></category>
		<category><![CDATA[manipulation]]></category>
		<category><![CDATA[Miscarriage of justice]]></category>
		<category><![CDATA[money]]></category>
		<category><![CDATA[NOT]]></category>
		<category><![CDATA[Privacy]]></category>
		<category><![CDATA[Privacy Restrictions]]></category>
		<category><![CDATA[Screen Time]]></category>
		<category><![CDATA[Spend]]></category>
		<category><![CDATA[TIẾP TỤC]]></category>
		<category><![CDATA[Used Time]]></category>
		<guid isPermaLink="false">https://en.spress.net/how-to-limit-losing-money-when-using-iphone/</guid>

					<description><![CDATA[With just a few simple steps, you can completely limit the situation of losing money when using iPhone. What is Fleeceware? Fleeceware is a term used to refer to applications that trick users into trying it out for free within 3-7 days, after which time the application will automatically register (pay a fee) and charge [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>With just a few simple steps, you can completely limit the situation of losing money when using iPhone.</strong><br />
<span id="more-5874"></span> <strong> What is Fleeceware?</strong> </p>
<p> Fleeceware is a term used to refer to applications that trick users into trying it out for free within 3-7 days, after which time the application will automatically register (pay a fee) and charge the credit card. Many people believe that uninstalling the app before the trial period expires will not be charged, but this is completely wrong. In order not to be charged from the card, you need to unsubscribe from the app. However, many developers have intentionally failed to inform users about this. According to Avast statistics, 204 Fleeceware applications have been downloaded more than 1 billion times, earning $ 400 million in revenue through the App Store and Google Play. The purpose of these applications is to get users to try it for free for 3-7 days, after which time the app will automatically register (paid) for sometimes up to $ 3,432 / year. . To limit the loss of money, you just need to disable purchases on the App Store by going to Settings (settings) &#8211; Screen Time (time use) &#8211; Turn on Screen Time (turn on time usage) &#8211; Continue &#8211; Content &#038; Privacy Restrictions (restrictions enabled). <img fifu-featured="1" decoding="async" loading="lazy" src="https://photo-baomoi.zadn.vn/w700_r1/2021_04_19_331_38570708/fe5b95f0b1b258ec01a3.jpg" width="625" height="555"> <em> How to enable screen time feature on iPhone. Photo: MINH HOANG</em> Next, users need to enable the Content &#038; Privacy Restrictions option &#8211; iTunes &#038; App Store Purchases &#8211; In-app Purchases (in-app purchases), then set it to Don&#8217;t allow. <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_04_19_331_38570708/4593db39ff7b16254f6a.jpg" width="625" height="555"> <em> Turn off purchases on the App Store. Photo: MINH HOANG</em> From now on, every time a child or Fleeceware apps automatically subscribe to a premium, the iPhone will immediately show In-app purchases are not allowed. <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_04_19_331_38570708/a5863e2c1a6ef330aa7f.jpg" width="625" height="676"> To increase security, you should set a time passcode by going to Settings (settings) &#8211; Screen Time (usage time) &#8211; Use Screen Time Passcode (use time passcode), next According to the user just set a passcode (different from the iPhone passcode). Finally, the iPhone will ask you to enter the Apple ID used to recover the passcode if you forget it.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">5874</post-id>	</item>
		<item>
		<title>How to turn off updates from friends on Facebook</title>
		<link>https://en.spress.net/how-to-turn-off-updates-from-friends-on-facebook/</link>
		
		<dc:creator><![CDATA[Phạm Trần]]></dc:creator>
		<pubDate>Wed, 21 Apr 2021 06:40:06 +0000</pubDate>
				<category><![CDATA[Tech]]></category>
		<category><![CDATA[Annoying]]></category>
		<category><![CDATA[Arrow]]></category>
		<category><![CDATA[Change your mind]]></category>
		<category><![CDATA[DISABLE]]></category>
		<category><![CDATA[Facebook]]></category>
		<category><![CDATA[Feature]]></category>
		<category><![CDATA[Friend]]></category>
		<category><![CDATA[friends]]></category>
		<category><![CDATA[IOS]]></category>
		<category><![CDATA[MACOS]]></category>
		<category><![CDATA[Menu]]></category>
		<category><![CDATA[On face]]></category>
		<category><![CDATA[Option]]></category>
		<category><![CDATA[Privacy]]></category>
		<category><![CDATA[Right corner]]></category>
		<category><![CDATA[setting]]></category>
		<category><![CDATA[Sms]]></category>
		<category><![CDATA[Status]]></category>
		<category><![CDATA[Tips]]></category>
		<category><![CDATA[turn]]></category>
		<category><![CDATA[update]]></category>
		<category><![CDATA[updates]]></category>
		<category><![CDATA[Windows]]></category>
		<guid isPermaLink="false">https://en.spress.net/how-to-turn-off-updates-from-friends-on-facebook/</guid>

					<description><![CDATA[Please apply the &#8216;tips&#8217; after feeling annoyed because Facebook keeps sending notifications from friends who have updated new statuses, post photos, comments &#8230; On the plus side, the fact that Facebook constantly sends notifications every time your friends post a new photo, comment or status update will keep you from missing important information from your [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>Please apply the &#8216;tips&#8217; after feeling annoyed because Facebook keeps sending notifications from friends who have updated new statuses, post photos, comments &#8230;</strong><br />
<span id="more-5541"></span> On the plus side, the fact that Facebook constantly sends notifications every time your friends post a new photo, comment or status update will keep you from missing important information from your loved ones. However, sometimes it will also cause some unnecessary annoyance. So here are two simple ways to turn off annoying notifications from your computer or tablet / phone. If you change your mind, you can correct it.</p>
<p> <img fifu-featured="1" decoding="async" loading="lazy" src="https://photo-baomoi.zadn.vn/w700_r1/2021_04_18_280_38562132/3f619e50b5125c4c0503.jpg" width="625" height="408"> <strong> Windows and macOS</strong> First of all, open any browser and log in with the respective Facebook account. Next, simply click on the arrow icon in the upper right corner and select Settings &#038; Privacy -> Settings -> Notifications. Here, go to Updates from friends, then turn off the Allow notifications on Facebook option. At this time, automatic entries such as SMS, Email and Push will be disabled. <strong> Android and iOS</strong> First, open the Facebook app, click the Menu icon in the right corner and select Settings &#038; Privacy -> Settings. Next, simply scroll down and navigate to Notifications -> Notifications settings -> Updates from friends, then disable the Allow option. notifications on Facebook (allow notifications on Facebook). <em> synthetic</em></p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">5541</post-id>	</item>
		<item>
		<title>Privacy is most important</title>
		<link>https://en.spress.net/privacy-is-most-important/</link>
		
		<dc:creator><![CDATA[editor]]></dc:creator>
		<pubDate>Sat, 17 Apr 2021 05:28:07 +0000</pubDate>
				<category><![CDATA[Business]]></category>
		<category><![CDATA[Digital currency]]></category>
		<category><![CDATA[ECB]]></category>
		<category><![CDATA[Euro Finance Minister]]></category>
		<category><![CDATA[German]]></category>
		<category><![CDATA[Germany]]></category>
		<category><![CDATA[important]]></category>
		<category><![CDATA[Privacy]]></category>
		<guid isPermaLink="false">https://en.spress.net/?p=3626</guid>

					<description><![CDATA[When the digital euro arrives, what is most important to consumers and experts? The ECB asked citizens and associations, but also experts, about this. The clear answer: data protection. The protection of privacy when a digital currency is introduced by the European Central Bank is a top priority for consumers and professionals. That was the [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>When the digital euro arrives, what is most important to consumers and experts? The ECB asked citizens and associations, but also experts, about this. The clear answer: data protection.</strong> </p>
<p> The protection of privacy when a digital currency is introduced by the European Central Bank is a top priority for consumers and professionals. That was the result of a survey by the ECB. The monetary authorities are considering introducing the much-discussed digital version of the euro in the coming years. Data protection is right at the top of the wish lists of citizens and experts. 43 percent of around 8,200 respondents named the protection of privacy as the most important concern. This is followed by security (18 percent), the option of processing payments in the entire currency area (eleven percent), the cost factor (nine percent) and the option of offline use independently of the Internet (eight percent).</p>
<h2>Interviewed private individuals and experts</h2>
<p>The results of the survey were published by the ECB in Frankfurt on Wednesday. 94 percent of the respondents were private individuals, the remaining participants were experts from sectors such as banks, including payment service providers, merchants and technology companies. Almost half of the answers came from Germany, 15 percent from Italy and 11 percent from France. &#8220;A digital euro can only be successful if it meets the needs of Europeans,&#8221; said ECB Director Fabio Panetta about the results. &#8220;We will do our best to ensure that a digital euro meets the expectations of citizens highlighted in the public consultation.&#8221;</p>
<h2>Virtual wallet for quick payments</h2>
<p>The digital euro should be kept in a kind of virtual wallet. In the case of purchases, for example, the money will be transferred to the seller&#8217;s cash register using a simple process, for example an app or a QR code. This should be possible both online and offline, without the Internet, for example through Bluetooth or other technical solutions. E-Euros should be able to be booked on a separate account, i.e. separately from the deposits on a normal current account. In fact, this account is supposed to be held by the ECB, but managed by the commercial banks. As with cash and book money, the normal consumer will not have direct access to the ECB.</p>
<h2>Data protection versus illegal activities</h2>
<p>Most of the respondents in the ECB survey support requirements to avoid illegal activities. Far fewer respondents value complete anonymity. In their opinion, new, innovative services should be integrated into existing banking and payment systems. Around a quarter of those surveyed want a digital euro to make cross-border payments faster and cheaper. The digital euro should also &#8211; with restrictions &#8211; also be usable outside the euro area. The ECB survey was conducted from mid-October to mid-January. It is part of the central bank&#8217;s deliberations on introducing a digital version of the euro. The background to this is the rapid rise of other digital currencies such as Bitcoin or Ether. In contrast to such private-sector cryptocurrencies, a digital euro would be issued by the ECB. The central bank wants to decide in mid-2021 whether the project should be pursued further.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">3626</post-id>	</item>
	</channel>
</rss>