Artificial intelligence (AI) continues to integrate into daily life, with advancements ranging from voice assistants to smart appliances. However, the advancement of AI technology has raised concerns about privacy and data protection in recent years.
Also Read: Apple will not pay OpenAI for ChatGPT integration in iOS18
Recently, Apple introduced new AI features on its iPhones, and Elon Musk condemned this by referring to it as an โunacceptable security breach.โ This has sparked debates on the use of AI features in smartphones and the question of privacy. Likewise, Microsoft faced backlash over the recently disclosed feature that takes pictures of the userโs laptop regularly.ย
Addressing privacy concerns as AI integrates into daily life
The recent events with Apple and Microsoft, coupled with the fast pace at which AI systems are being integrated into homes and personal accessories have brought back the issue of how data is collected and used. According to Vonny Gamot, the head of EMEA at cybersecurity firm McAfee, the focus should be on trust in technology.
Also Read: US considering more regulations to limit Chinaโs access to AI chips
โTechnology is great. You need to trust the technology, right?โ She says equating technology to other colossal feats, such as sending people to space. She notes that AI can be used by fraudsters to design scams or collect information without permission.
This concern is not limited to scammers but also includes advertisers and corporations who use AI to collect and analyze the clientsโ data for various aims, such as selling goods and services.
Implementing steps to safeguard personal data
To protect personal information, there are several steps that can be taken by individuals. According to Gamot, users should be wary of their phone settings, especially the app permissions.ย โGo to your settings and click โmicโ and see all the apps that are using the mic. Why does your map need a mic? You donโt need that,โ she explains.
It is essential to check app permissions when it comes to camera, microphone, files, and location. Gamot pointed out that even a short recording is sufficient for malicious individuals to mimic a personโs voice.
Also Read: Adobe clarifies terms of use update amid AI concerns
Another important action is to read the terms and conditions stated before agreeing to them. Conor McCaffrey from Securiti Sciences Limited also underlines the necessity to know what data an organization stores and how it utilizes it. He also warns people against just clicking โI agreeโ on cookies and other similar pop-ups and instead set their permissions to ensure their data is safe.
When posting pictures on websites, individuals should be alerted that they may be surrendering ownership of their photos. It is advisable to check what one is agreeing to in order to prevent the sharing of information that one may not intend to.
Corporations monetize user data as a business model
Thus, Gamot again informs users that data gathering is a business model for many corporations.ย โWhen signing up to a website or service, consider how much information you actually should need to give,โ she says. Some details like the address to which delivery is to be done are important but some other details may not be required.ย
โWhen signing up for a website or service, consider how much information you actually need to give.โ
Another important factor is the decision of whether an application is worth the risk of data privacy. Free apps and especially games are known to gather a lot of information about the users. McCaffrey warns against downloading random apps because while they may be fun, they are usually only free in exchange for usersโ information.
Cryptopolitan Reporting by Brenda Kanana
A Step-By-Step System To Launching Your Web3 Career and Landing High-Paying Crypto Jobs in 90 Days.