#ccpa
Explore tagged Tumblr posts
Text
Has anyone managed to use the CCPA (or GDPR?) to force Mailchimp to cough up a list of all the mailing lists you've been nonconsensually added to?
55 notes
·
View notes
Text
[Podfic Link] | Length: 7 minutes, 9 seconds
Original Work: as if he has saved all mankind by suzukiblu
DPxDC: Danny Fenton/Duke Thomas | Rating: General Audiences
Summary:
Duke found something weird on patrol today. He’s day shift, obviously, but near the end of his shift . . . Well, something weird happened. Or he saw something weird, more like.
Notes: my first Ghostlights podfic!
Recorded for the Chromatic Characters Podfic Anthology V with the theme of "family."
& I know that any of my podfics for the anthology could fit the "character of color" slot for my podfic bingo but I love this one so much that I wanted to highlight it! You can find my bingo card here ⋆˙⟡♡
#ghostlights#dpxdc#dp x dc#dp x dc crossover#danny fenton#duke thomas#danny phantom podfic#dpxdc podfic#dc podfic#batfam podfic#ccpa#ccpa 2024#chromatic characters#chromatic characters podfic anthology#chromatic characters podfic anthology V#kbirb pods#suzukiblu
23 notes
·
View notes
Text
Indigestion written by TerresDeBrume | @terresdebrume
A Dead Boy Detectives Podfic read by mistbornhero for CCPA
Crystal is still trying to deal with her recovered memories. Tonight, she gets unexpected help.
Podfic Length: 06:31 minutes
#Dead Boy Detectives#Podfic#Length: 5 - 10 minutes#CCPA#CCPA 2024#Edwin Payne & Crystal Palace#Crystal Palace
8 notes
·
View notes
Text
[Full Text] Emerging Media Companies, Tracking Cookies, and Data Privacy -- An open letter to Critical Role, Dropout, and fellow audience members
Summary / TL;DR
Both Critical Role (CR) and Dropout have begun exclusively using links provided by third-party digital marketing solution companies in their email newsletters.
Every link in each of the newsletters (even the unsubscribe link) goes through a third-party domain which is flagged as a tracking server by the uBlock Origin browser extension.
Third-party tracking cookies are strictly unnecessary and come with a wide array of risks, including non-consensual targeted advertising, targeted misinformation, doxxing, and the potential for abuse by law enforcement.
You are potentially putting your privacy at risk every time you click on any of the links in either of these newsletters.
IMO these advertising companies (and perhaps CR/Dropout by proxy) are likely breaking the law in the EU and California by violating the GDPR and CCPA respectively.
Even if Critical Role and Dropout are not directly selling or exploiting your personal data, they are still profiting off of it by contracting with, and receiving services from, companies who almost certainly are. The value of your personal data is priced into the cost of these services.
They should stop, and can do so without any loss of web functionality.
1/7. What is happening?
Critical Role and Dropout have begun exclusively using links provided by third-party digital marketing solution companies in their email newsletters.
[ID: A screenshot of the Dropout newsletter alongside the page’s HTML source which shows that the target destination for an anchor element in the email leads to d2xR2K04.na1.hubspotlinks.com. End ID.]
[ID: A screenshot of the CR newsletter alongside the page’s HTML source which shows that the target destination for an anchor element in the email leads to trk.klclick.com. End ID.]
The domains attached to these links are flagged as advertising trackers by the uBlock Origin browser extension.
[ID: Screenshot of a Firefox web browser. The page displays a large warning icon and reads “uBlock Origin has prevented the following page from loading [...] because of the following filter: `||hubspotlinks.com` found in Peter Lowe’s Ad and tracking server list. End ID.]
[ID: Screenshot of a Firefox web browser. The page displays a large warning icon and reads “uBlock Origin has prevented the following page from loading [...] because of the following filter: `||klclick1.com` found in Peter Lowe’s Ad and tracking server list. End ID.]
In both cases, every link in the newsletter goes through the flagged third-party domain, and the intended endpoint (Twitter, their store page, etc.) is completely obscured and inaccessible from within the email itself. Even the unsubscribe links feed through the tracking service.
You can test this yourself in your own email client by hovering your cursor over a link in the email without clicking it and watching to see what URL pops up. You may have noticed this yourself if you use uBlock Origin as an ad-blocker.
I don’t know for certain when this first started. It’s possible that this has been going on for a year or more at this point, or it may have started just a few months ago. Either way: it ought to stop.
2/7. What is a tracking cookie?
A tracking cookie is a unique, universally identifiable value placed on your machine by somebody with the intention of checking for that value later to identify you (or at least to identify your machine).
Tracking cookies are used by companies to create advertising behaviour profiles. These profiles are supposedly anonymous, but even if the marketing companies creating them are not lying about that (a tough sell for me personally, but your mileage may vary when it comes to corporations with 9-figure annual incomes), the data can often be de-anonymized.
If this happens, the data can be used to identify the associated user, potentially including their full name, email address, phone number, and physical address—all of which may then be associated with things like their shopping habits, hobbies, preferences, the identities of their friends and family, gender, political opinions, job history, credit score, sexuality, and even when they ovulate.
Now, it is important to note that not all cookies are tracking cookies. A cookie is just some data from a web page that persists on your machine and gets sent back to the server that put it there. Cookies in general are not necessarily malicious or harmful, and are often essential to certain web features functioning correctly (e.g. keeping the user logged in on their web browser after they close the tab). But the thing to keep in mind is that a domain has absolute control over the information that has been stored on your computer by that domain, so allowing cookies is a matter of trusting the specific domain that wants to put them there. You can look at the outgoing information being sent from your machine, but its purpose cannot be determined without knowing what is being done with it on the other side, and these marketing companies ought not to have the benefit of your doubt when they have already been flagged by privacy watchdogs.
3/7. What’s the harm?
Most urgently, as I touched on above: The main source of harm is from corporations profiting off of your private data without your informed consent. However, targeted advertising is actually the least potentially harmful outcome of tracking cookies.
1/6. Data brokers
A data broker is an individual or company that specializes in collecting personal data (such as personal income, ethnicity, political beliefs, geolocation data, etc.) and selling or licensing such information to third parties for a variety of uses, such as background checks conducted by employers and landlords, two universally benevolent groups of people.
There are varying regulations around the world limiting the collection of information on individuals, and the State of California passed a law attempting to address this problem in 2018, following in the footsteps of the EU’s GDPR, but in the jurisdiction of the United States there is no federal regulation protecting consumers from data brokers. In fact, due to the rising interest in federal regulation, data broker firms lobbied to the tune of $29 million in the year 2020 alone.
2/6. De-anonymization techniques
Data re-identification or de-anonymization is the practice of combining datasets (such as advertising profiles) and publicly available information (such as scraped data from social media profiles) in order to discover patterns that may reveal the identities of some or all members of a dataset otherwise intended to be anonymous.
Using the 1990 census, Professor Latanya Sweeney of the Practice of Government and Technology at the Harvard Kennedy School found that up to 87% of the U.S. population can be identified using a combination of their 5-digit zip code, gender, and date of birth. [Link to the paper.]
Individuals whose datasets are re-identified are at risk of having their private information sold to organizations without their knowledge or consent. Once an individual’s privacy has been breached as a result of re-identification, future breaches become much easier: as soon as a link is made between one piece of data and a person’s real identity, that person is no longer anonymous and is at far greater risk of having their data from other sources similarly compromised.
3/6. Doxxing
Once your data has been de-anonymized, you are significantly more vulnerable to all manner of malicious activity: from scam calls and emails to identity theft to doxxing. This is of particular concern for members of minority groups who may be targeted by hate-motivated attacks.
4/6. Potential for abuse by government and law enforcement
Excerpt from “How period tracking apps and data privacy fit into a post-Roe v. Wade climate” by Rina Torchinsky for NPR:
Millions of people use apps to help track their menstrual cycles. Flo, which bills itself as the most popular period and cycle tracking app, has amassed 43 million active users. Another app, Clue, claims 12 million monthly active users. The personal health data stored in these apps is among the most intimate types of information a person can share. And it can also be telling. The apps can show when their period stops and starts and when a pregnancy stops and starts. That has privacy experts on edge because this data—whether subpoenaed or sold to a third party—could be used to suggest that someone has had or is considering an abortion. ‘We're very concerned in a lot of advocacy spaces about what happens when private corporations or the government can gain access to deeply sensitive data about people’s lives and activities,’ says Lydia X. Z. Brown, a policy counsel with the Privacy and Data Project at the Center for Democracy and Technology. ‘Especially when that data could put people in vulnerable and marginalized communities at risk for actual harm.’
Obviously Critical Role and Dropout are not collecting any sort of data related to their users’ menstrual cycles, but the thing to keep in mind is that any data that is exposed to third parties can be sold and distributed without your knowledge or consent and then be used by disinterested—or outright malicious—actors to de-anonymize your data from other sources, included potentially highly compromising data such as that collected by these period-tracking apps. Data privacy violations have compounding dangers, and should be proactively addressed wherever possible. The more of your personal data exists in the hands of third parties, the more it is to be de-anonymized.
5/6. Targeted misinformation
Data brokers are often incredibly unscrupulous actors, and will sell your data to whomever can afford to buy it, no questions asked. The most high-profile case of the consequences of this is the Facebook—Cambridge Analytica data scandal, wherein the personal data of Facebook users were acquired by Cambridge Analytica Ltd. and compiled alongside information collected from other data brokers. By giving this third-party app permission to acquire their data back in 2015, Meta (then Facebook) also gave the app access to information on their users’ friend networks: this resulted in the data of some 87 million users being collected and exploited.
The data collected by Cambridge Analytica was widely used by political strategists to influence elections and, by and large, undermine democracy around the world: While its parent company SCL had been influencing elections in developing countries for decades, Cambridge Analytica focused more on the United Kingdom and the United States. CEO Alexander Nix said the organization was involved in 44 American political races in 2014. In 2016, they worked for Donald Trump’s presidential campaign as well as for Leave.EU, one of the organisations campaigning for the United Kingdom to leave the European Union.
6/6. The Crux: Right to Privacy Violations
Even if all of the above were not concerns, every internet user should object to being arbitrarily tracked on the basis of their right to privacy. Companies should not be entitled to create and profit from personality profiles about you just because you purchased unrelated products or services from them. This right to user privacy is the central motivation behind laws like the EU’s GDPR and California’s CCPA (see Section 6).
4/7. Refuting Common Responses
1/3. “Why are you so upset? This isn’t a big deal.”
Commenter: Oh, if you’re just talking about third party cookies, that’s not a big deal … Adding a cookie to store that ‘this user clicked on a marketing email from critical role’ is hardly [worth worrying about].
Me: I don’t think you understand what tracking cookies are. They are the digital equivalent of you going to a drive through and someone from the restaurant running out of the store and sticking a GPS monitor onto your car.
Commenter: Kind of. It’s more like slapping a bumper sticker on that says, in restaurant-ese, ‘Hi I’m [name] and I went to [restaurant] once!’
This is actually an accurate correction. My metaphor was admittedly overly simplistic, but the correction specifies only so far as is comfortable for the commenter. If we want to construct a metaphor that is as accurate as possible, it would go something like this:
You drive into the McDonald’s parking lot. As you are pulling in, unbeknownst to you, a Strange Man pops out of a nearby bush (that McDonald’s has allowed him to place here deliberately for this express purpose), and sticks an invisible bumper sticker onto the back of your car. The bumper sticker is a tracker that tells the Strange Man which road you took to drive to McDonald’s, what kind of car you drive, and what (if anything) you ordered from McDonald’s while you were inside. It might also tell him where you parked in the parking lot, what music you were listening to in your car on the way in, which items you looked at on the menu and for how long, if you went to the washroom, which washroom you went into, how long you were in the washroom, and the exact location of every step you took inside the building.
Now, as soon as you leave the McDonald’s, the bumper sticker goes silent and stops being able to report information. But, let’s say next week you decide to go to the Grocery Store, and (again, unbeknownst to you), the Strange Man also has a deal with the Grocery Store. So as you’re driving into the grocery store’s parking lot, he pops out of another bush and goes to put another bumper sticker onto your car. But as he’s doing so, he notices the bumper sticker he’s already placed there a week ago that only he can see (unless you’ve done the car-equivalent of clearing your browser cache), and goes “ah, it’s Consumer #1287499290! I’ll make sure to file all of this new data under my records for Consumer #1287499290!”
You get out of your car and start to walk into the Grocery Store, but before you open the door, the Strange Man whispers to the Grocery Store: “Hey, I know you’re really trying to push your cereal right now, want me to make it more likely that this person buys some cereal from you?” and of course the Grocery Store agrees—this was the whole reason they let him set up that weird parking lot bush in the first place.
So the Strange Man runs around the store rearranging shelves. He doesn’t know your name (all the data he collects is strictly anonymous after all!) but he does know that you chose the cutesy toy for your happy meal at McDonald’s, so he changes all of the cereal packaging labels in the store to be pastel-coloured and covered in fluffy bears and unicorns. And maybe you were already going to the Grocery Store to buy cereal, and maybe you’re actually very happy to buy some cereal in a package that seems to cater specifically to your interests, but wouldn’t you feel at least a little violated if you found out that this whole process occurred without your knowledge? Especially if you felt like you could trust the people who owned the Grocery Store? They’re not really your friend or anything, but maybe you thought that they were compassionate and responsible members of the community, and part of the reason that you shopped at their store was to support that kind of business.
2/3. “Everyone does it, get over it.”
Commenter: [The marketing company working with CR] is an industry standard at this point, particularly for small businesses. Major partner of Shopify, a fairly big player. If you don't have a software development team, using industry standard solutions like these is the easy, safe option.
This sounds reasonable, but it actually makes it worse, not better, that Critical Role and Dropout are doing this. All this excuse tells me is that most businesses using Shopify (or at least the majority of those that use its recommended newsletter service) have a bush for the Strange Man set up in their parking lot.
Contracting with these businesses is certainly the easy option, but it is decidedly not the safe one.
3/3. “They need to do it for marketing reasons.”
Commenter 1: Email marketing tools like [this] use tracking to measure open and click rates. I get why you don’t want to be tracked, but it’s very hard to run a sizeable email newsletter without any user data.
Commenter 2: I work in digital marketing … every single email you get from a company has something similar to this. Guaranteed. This looks totally standard.
I am a web programmer by trade. It is my full time job. Tracking the metrics that Critical Role and Dropout are most likely interested in does not require embedding third-party tracking cookies in their fans’ web browsers. If you feel comfortable taking my word on that, feel free to skip the next section. If you’re skeptical (or if you just want to learn a little bit about how the internet works) please read on.
5/7. Tracking cookies are never necessary
We live in a technocracy. We live in a world in which technology design dictates the rules we live by. We don’t know these people, we didn’t vote for them in office, there was no debate about their design. But yet, the rules that they determine by the design decisions they make—many of them somewhat arbitrary—end up dictating how we will live our lives. —Latanya Sweeney
1/3. Definitions
A website is a combination of 2 computer programs. One of the two programs runs on your computer (laptop/desktop/phone/etc.) and the other runs on another computer somewhere in the world. The program running on your computer is the client program. The program running on the other computer is the server program.
A message sent from the client to the server is a request. A message sent from the server to the client is a response.
Cookies are bits of data that the server sends to the client in a response that the client then sends back to the server as an attachment to its subsequent requests.
A session is a series of sequential interactions between a client and server. When either of the two programs stops running (e.g. when you close a browser tab), the session is ended and any future interactions will take place in a new session.
A URL is a Uniform Resource Locator. You may also sometimes see the initialism URI—in which the ‘I’ stands for Identifier—but they effectively refer to the same thing, which is the place to find a specific thing on the internet. For our purposes, a “link” and a URL mean the same thing.
2/3. What do Critical Role and Dropout want?
These media companies (in my best estimation) are contracting with the digital advertising companies in order to get one or more of the following things:
Customer identity verification (between sessions)
Marketing campaign analytics
Customer preference profiles
Customer behaviour profiles
3/3. How can they get these things without tracking cookies?
Accounts. Dropout has an account system already. As Beacon is a thing now I have to assume Critical Role does as well, therefore this is literally already something they can do without any additional parties getting involved.
URL Query Parameters. So you want to know which of your social media feeds is driving the most traffic to your storefront. You could contract a third-party advertising company to do this for you, but as we have seen this might not be the ideal option. Instead, when posting your links to said feeds, attach a little bit of extra text to the end of the URL link so: becomes or or even These extra bits of information at the end of a URL are query parameters, and act as a way for the client to specify some instructions for the server when sending a request. In effect, a URL with query parameters allows the client to say to the server “I want this thing under these conditions”. The benefit of this approach is, of course, that you actually know precisely what information is being collected (the stuff in the parameters) and precisely what is being done with it, and you’ve avoided exposing any of your user data to third parties.
Internal data collection. Optionally associate a user’s email address with their preferences on the site. Prompt them to do this whenever they purchase anything or do any action that might benefit from having some saved preference, informing them explicitly when you do so and giving them the opportunity to opt-out.
Internal data collection. The same as above, but let the user know you are also tracking their movements while on your site. You can directly track user behaviour down to every single mouse movement if you really want to—again, no need to get an outside party involved to snoop on your fans. But you shouldn’t do that because it’s a little creepy!
At the end of the day, it will of course be more work to set up and maintain these things, and thus it will inevitably be more expensive—but that discrepancy in expense represents profit that these companies are currently making on the basis of violating their fans’ right to privacy.
6/7. Breaking the Law
The data subject shall have the right to object, on grounds relating to his or her particular situation, at any time to processing of personal data concerning him or her [...] The controller shall no longer process the personal data unless the controller demonstrates compelling legitimate grounds for the processing which override the interests, rights and freedoms of the data subject or for the establishment, exercise or defence of legal claims. Where personal data are processed for direct marketing purposes, the data subject shall have the right to object at any time to processing of personal data concerning him or her for such marketing, which includes profiling to the extent that it is related to such direct marketing. Where the data subject objects to processing for direct marketing purposes, the personal data shall no longer be processed for such purposes. At the latest at the time of the first communication with the data subject, the right referred to in paragraphs 1 and 2 shall be explicitly brought to the attention of the data subject and shall be presented clearly and separately from any other information. — General Data Protection Regulation, Art. 21
Nobody wants to break the law and be caught. I am not accusing anyone of anything and this is just my personal speculation on publicly-available information. I am not a lawyer; I merely make computer go beep-boop. If you have any factual corrections for this or any other section in this document please leave a comment and I will update the text with a revision note. Before I try my hand at the legal-adjacent stuff, allow me to wade in with the tech stuff.
Cookies are sometimes good and sometimes bad. Cookies from someone you trust are usually good. Cookies from someone you don’t know are occasionally bad. But you can take proactive measures against bad cookies. You should always default to denying any cookies that go beyond the “essential” or “functional” categorizations on any website of which you are remotely suspicious. Deny as many cookies as possible. Pay attention to what the cookie pop-ups actually say and don’t just click on the highlighted button: it is usually “Accept All”, which means that tracking and advertising cookies are fair game from the moment you click that button onward. It is illegal for companies to arbitrarily provide you a worse service for opting out of being tracked (at least it is in the EU and California).
It is my opinion (and again, I am not a legal professional, just a web developer, so take this with a grain of salt) that the links included in the newsletter emails violate both of these laws. If a user of the email newsletter residing in California or the EU wishes to visit any of the links included in said email without being tracked, they have no way of doing so. None of the actual endpoints are available in the email, effectively forcing the user to go through the third-party domain and submit themselves to being tracked in order to utilize the service they have signed up for. Furthermore, it is impossible to unsubscribe directly from within the email without also submitting to the third-party tracking.
[ID: A screenshot of the unsubscribe button in the CR newsletter alongside the page HTML which shows that the target destination for the anchor element is a trk.klclick.com page. End ID.]
As a brief aside: Opening the links in a private/incognito window is a good idea, but will not completely prevent your actions from being tracked by the advertiser. My recommendation: install uBlock Origin to warn you of tracking domains (it is a completely free and open-source project available on most major web browsers), and do not click on any links in either of these newsletters until they change their practices.
Now, it may be the case that the newsletters are shipped differently to those residing in California or the EU (if you are from either of these regions please feel free to leave a comment on whether or not this is the case), but ask yourself: does that make this any better? Sure, maybe then Critical Role and Dropout (or rather, the advertising companies they contract with) aren’t technically breaking the law, but it shows that the only thing stopping them from exploiting your personal data is potential legal repercussions, rather than any sort of commitment to your right to privacy. But I expect that the emails are not, in fact, shipping any differently in jurisdictions with more advanced privacy legislation—it wouldn’t be the first time a major tech giant blatantly flaunted EU regulations.
Without an additional browser extension such as uBlock Origin, a user clicking on the links in these emails may not even be aware that they have interacted with the advertising agency at all, let alone what sort of information that agency now has pertaining to them, nor do they have any ability to opt out of this data collection.
For more information about your right to privacy—something that only those living in the EU or California currently have—you can read explanations of the legislations at the following links (take note that these links, and all of the links embedded in this paper, are anchored directly to the destinations they purport to be, and do not sneakily pass through an additional domain before redirecting you):
7/7. Conclusion
Never attribute to malice that which can be adequately explained by neglect, ignorance or incompetence. —Hanlon’s Razor
The important thing to make clear here is this: Even if Critical Role and Dropout are not directly selling or exploiting your personal data, they are still profiting off of it by contracting with, and receiving services from, companies whom I believe are. You may not believe me.
I do not believe that the management teams at Critical Role and Dropout are evil or malicious. Ignorance seems to be the most likely cause of this situation. Someone at some marketing company told them that this type of thing was helpful, necessary, and an industry standard, and they had no reason to doubt that person’s word. Maybe that person had no reason to doubt the word of the person who told them. Maybe there are a few people in that chain, maybe quite a few. I do not expect everyone running a company to be an expert in this stuff (hell, I’m nowhere close to being an expert in this stuff myself—I only happened to notice this at all because of a browser extension I just happened to have installed to block ads), but what I do expect is that they change their behaviour when the potential harms of their actions have been pointed out to them, which is why I have taken the time to write this.
PS. To the employees of Critical Role and Dropout
It is my understanding that these corporations were both founded with the intention of being socially responsible alongside turning a profit. By using services like the ones described above, you are, however unintentionally, profiting off of the personal datasets of your fans that are being compiled and exploited without their informed consent. You cannot say, implicitly or explicitly, “We’re not like those other evil companies! We care about more than just extracting as much money from our customers as possible!” while at the same time utilizing these services, and it is my hope that after reading this you will make the responsible choice and stop doing so.
Thank you for reading,
era
Originally Published: 23 May 2024
Last Updated: 28 May 2024
#critical role#dimension 20#dropout#dropout tv#brennan lee mulligan#sam reich#critical role campaign 3#cr3#midst podcast#candela obscura#make some noise#game changer#smarty pants#very important people#web security#data privacy#gdpr#ccpa#open letter
10 notes
·
View notes
Text
Federal public sector workers’ wages, adjusted for inflation, are no better than they were in 2007, a new report from the Canadian Centre for Policy Alternatives shows.
“The average federal public sector worker’s wages only buy the same today as they did in October 2007,” the CCPA report states. “No other industry—none—has seen average inflation adjusted wages pushed back as far as federal public sector workers.”
Over 100,000 federal public workers hit the picket lines across the country on Wednesday with a two-year expired contract and no wage offers that kept up with the rising cost of living.
Even if the union wins its current wage demands of 4.5% increases each year for three years, “those average federal worker wages would still be 4.8 per cent below the industrial average,” the report notes.
Full article
Tagging: @politicsofcanada
#cdnpoli#canadian politics#canadian news#canada#canadian#workers rights#wages#federal public workers#federal public sector#federal employees#unions#strikes#strike action#CCPA#canadian centre for policy alternatives
88 notes
·
View notes
Text
Choosing the right CMP ensures seamless compliance, enhances user experience, and protects your business from legal risks. Prioritise a solution that balances regulatory coverage, technical integration, and user-friendly design.
#ConsentManagement#PrivacyCompliance#DataProtection#UserExperience#DigitalTrust#GDPR#CCPA#LegalTech#BusinessSecurity#MarketingCompliance#seersai#businesscompliance#dataprivacy
0 notes
Text
How Data Privacy Regulations Affect Businesses Today
In the digital age, data serves as a valuable asset for businesses, but growing privacy concerns and regulations require careful navigation. Major laws like GDPR and CCPA enforce data protection measures such as data minimization, purpose limitation, and security requirements. Compliance incurs costs, disrupts operations, poses reputational risks, and may stifle innovation. To adapt, businesses should appoint Data Protection Officers, conduct audits, implement strong security, and train staff. Read more:-
#commercestheories#business#Privacy#Data Privacy#DataPrivacy#BusinessRegulations#PrivacyCompliance#DataProtection#GDPR#CCPA#CyberSecurity#BusinessStrategy#DigitalPrivacy#RegulatoryImpact
0 notes
Text
youtube
Today, we dispel the myth that artificial intelligence (AI) is overhyped by showing how it is revolutionizing eCommerce. The movie demonstrates how AI-powered systems like Buyist Pro can quickly analyze difficult circumstances, give actionable insights, and ease problem-solving for non-technical people. It uses the scenario of a small business owner dealing with a customer's allegation of a data breach. Artificial intelligence (AI) can interpret natural language questions and provide pertinent, context-aware answers, improving the usability and efficiency of eCommerce systems.
#AI#data_breach#customer_service#artificial_intelligence#generative_AI#small_business#problem_solving#natural_language_processing#technology#online_retail#data_analysis#user_experience#CCPA#GDPR#Shopify#direct_to_consumer#cybersecurity#ecommerce#ai_in_ecommerce#ai_tools#ai_ecommerce_business#ai_chatbot#ecommerce_business#online_business#artificial_intelligence_ecommerce#buyist_pro#AI_news#Youtube
0 notes
Text
[Podfic Link] | Length: 29 minutes, 16 seconds
Original Work: a modern fairy tale (dragons and all) by @luxaofhesperides [aryelee]
DPxDC: Danny Fenton/Duke Thomas | Rating: Teen & Up
Summary:
Danny gets cursed into being a dragon and promptly makes it the Signal's problem.
Notes: This fits perfectly into the rare pairing spot on my podfic bingo card, was recorded for the CCPA V extras collection on ao3, and is definitely in my top 5 DPxDC fics now!
#ghostlights#danny fenton#duke thomas#dragon au#dragons#podfic#ccpa#ccpa 2024#chromatic characters#chromatic characters podfic anthology#dpxdc#dp x dc#dp x dc crossover#dpxdc podfic#kbirb pods#aryelee#luxaofhesperides
9 notes
·
View notes
Text
Codes and Bots written by ziazippy5379 | @theredshirtsarecoming
A Leverage Podfic read by mistbornhero for CCPA
Alec teaches Breanna her first bit of coding.
Podfic Length: 10:43 minutes
3 notes
·
View notes
Text
Emerging Media Companies, Tracking Cookies, and Data Privacy (An Open Letter to Dropout and Critical Role)
Read the open letter here.
TL;DR:
Both Critical Role (CR) and Dropout are exclusively using links provided by third-party digital marketing solution companies in their email newsletters.
Every link in each of the newsletters (even the unsubscribe link) goes through a third-party domain which is flagged as a tracking server by the uBlock Origin browser extension.
Third-party tracking cookies are strictly unnecessary and come with a wide array of risks, including non-consensual targeted advertising, targeted misinformation, doxxing, and the potential for abuse by law enforcement.
IMO these advertising companies (and perhaps CR/Dropout by proxy) might be breaking the law in the EU and California by violating the GDPR and CCPA respectively.
Even if Critical Role and Dropout are not directly selling or exploiting your personal data, they are still profiting off of it by contracting with, and receiving services from, companies who almost certainly are.
They should stop.
9 notes
·
View notes
Text
Today, privacy laws are the regulations that must be followed. An organisation failing to comply with privacy regulations on consent management will face the following consequences:
Large fines for not following the rules.
Loss of user trust due to imprecise or disturbing data practices.
Messy operational working with consent based on different jurisdictions.
The CMP is not just a regulatory box-ticking exercise; it is becoming increasingly vital for business survival. These are the reasons your businesses need a cmp.
#PrivacyLaws#DataProtection#GDPR#CCPA#ConsentManagement#UserTrust#ComplianceMatters#BusinessEthics#DataPrivacy#RegulatoryCompliance#seersai#businesscompliance#cookieconsent#financial protection#customer trust
0 notes
Text
EdTech meets edge AI: Scalable, privacy-first ecosystems
New Post has been published on https://thedigitalinsider.com/edtech-meets-edge-ai-scalable-privacy-first-ecosystems/
EdTech meets edge AI: Scalable, privacy-first ecosystems
Numbers that speak louder
Think about the modern classroom. Each pupil receives a unique lesson plan courtesy of generative AI.
Every single plan is flawlessly customized and catered for – even in remote schools with unstable internet. Now consider this projection from MarketResearch: the generative AI in the EdTech sector is anticipated to increase to $5.26 billion by 2033 from $191 million in 2023, which comes with a CAGR of 40.5%.
Or take the National Education Policy Center figure: classroom districts spent $41 million on adaptive learning for personalized education in just two years.
But here’s an astounding statistic – currently, cyberattacks on educational institutions have compromised the information of more than 2.5 million users (eSchool News).
Moreover, over 1,300 schools have been victims of cyberattacks which include data breaches, ransomware, and phishing email scams since 2016 according to a report by Cybersecurity and Infrastructure Security Agency in January 2023. In Sophos’ most recent survey, 80% of schools were reported as a target for a cyber assault in 2022, which is an increase from 56% in 2021.
In fact, schools have now become the predominant targets for cybercriminals according to The74. The increase in attacks on the education sector shows that it has one of the highest rates of ransom payment, where 47% of K-12 organizations admitted they paid an average of $2.18 million in recovery attacks.
These numbers indicate there is a glaring problem: security and privacy have not been more important as EdTech continues transforming the learning experience. There is robust security software that is manageable and economical, but gives schools deep financial challenges.
Here is where Edge AI comes in: this advanced technology not only promises scalable, personalized learning experiences, but it also delivers a privacy-first approach by keeping sensitive information protected through local on-device processing rather than cloud systems. Let’s explore how EdTech and Edge AI merging can solve these nagging problems and reshape the future of education.
Edge AI vs Cloud AI — which one’s better for business?
The differences between Edge AI and Cloud AI come into play primarily for machine learning and deep learning use cases.
The innovative integration of edge AI with educational technologies
For years now, Education Technology (EdTech) has been ‘revolutionizing’ the world of learning by turning simple textbooks into complex adaptive systems that strive to meet the requirements of individual students.
This transformation is driven by adaptive learning algorithms infused with AI, which processes student data and modifies lessons in real-time. However, one flaw exists: The more traditional systems of AI tend to rely favorably on cloud processing. This form of computing has its drawbacks with regard to bandwidth, peak latency periods, real-time responsiveness lag, or even more concerning leakage of sensitive student data.
Enter Edge AI, an AI system that resides within smartphones, laptops, smart gadgets…you name it. Whereas systems dependent on the cloud would struggle with latency and privacy concerns, Edge AI can process data locally, resulting in an increased absence of risk.
The crossroads where Edge AI meets EdTech is more than just a technological improvement: It serves as a scalability and privacy solution, two crucial components needed in education today. This is how education ecosystems stand to be revamped considerably.
Technical overview: The role of edge AI in adaptive learning algorithms
What is edge AI?
In its most basic form, Edge AI is the placement of an AI “brain” on the very “edge” of a network – where data is produced.
As an example, instead of sending every byte of information to a faraway cloud server, algorithms execute on-device using available hardware such as microcontrollers or GPUs. A student’s tablet can evaluate quiz performance, adjust subsequent lessons, and provide feedback, all in real-time, without having to contact a centralized data hub.
Scalability with low latency
The benefits of edge AI are its speed and ability to scale. Adaptive learning requires real time feedback, like increasing the difficulty of math problems for a student who has already mastered the basics. In most cases, cloud-enabled systems tend to falter in this area due to latency as data is sent and received.
Edge AI, on the other hand, does not have this issue as processing is done locally, meaning feedback is instantaneous. According to a 2023 survey by ACM computing surveys, edge computing lagging by as much as 80% when compared with the cloud, makes it best suited for time-sensitive EdTech applications.
Take AI-enabled tutoring platforms for instance: they can not only analyse a learner’s mastery of algebra, but also switch to geometry mid-session without buffering. This kind of immediacy enhances engagement as learners remain submerged in the flow of the moment, not waiting or idling for the next chore.
Energy efficiency
Edge AI is not only swift, but also efficient. It reduces energy use by cutting down data transfers to the cloud. Edge-cloud systems as outlined in ScienceDirect demonstrate local processing can reduce energy usage by 30-50%. This is beneficial for the battery life of devices and the emissions from data centers. In EdTech, this translates to affordable and eco-friendly tools that do not burden school budgets.
5 use cases of artificial intelligence in education
Although the presence of teachers is believed to be irreplaceable, AI is starting to change education tools, with institutions adapting specialized technology.
Data protection and a privacy-focused strategy
Student data protection
With GDPR, FERPA, and CCPA components intensely scrutinizing student data, it has become a liability. Edge AI keeps it on-device, eliminating the need to transmit sensitive information such as a child’s reading preferences or test scores over the internet.
This, of course, dovetails with privacy regulations: Learnosity reported that GDPR fines exceeded €1 billion in 2023 alone, demonstrating the regulators’ no-tolerance policy regarding data mismanagement.
Reduction of breach opportunities
Hackers have a field day with cloud servers. Edge AI flips the script; there is no single centralized honeypot to crack. On-device processing reduces the opportunity for exposure. According to Parachute, in Q1 2024, the education sector experienced an average of 2,507 cyber attacks per week, indicating a significant rise in targeted attacks on educational institutions.
Ethical issues
There are a lot more issues than compliance when it comes to Edge AI in education technology, surveillance is creepy and data faces constructively exploitation. With capitalist motives milking every click of profit, honed by centralised AI, it’s understandable to feel like Big Brother was tracking you. Users gain back control with decentralized Edge AI. That changes everything. Now, it’s education, not espionage.
Examples of privacy-focused EdTech
The mobile app from Duolingo incorporates some local processing for various language exercises and minimizes reliance on the cloud. On the other hand, some startups like Century Tech use Edge AI to tailor the learning experience while also branding themselves as compliant with GDPR, earning accolades from privacy-sensitive parents.
Case study: ASU’s secure federated learning platform
Together with ATTO Research, Arizona State University is building an edge device secure federated learning platform with a focus on privacy (ASU AI Edge Project).
Under the guidance of Assistant Professor Hokeun Kim, the project develops middleware for edge developers – facilitating collaborative learning without sharing raw data amongst devices. “Historically, edge devices were fairly secure,” says Kim, a faculty member in the School of Computing and Augmented Intelligence, part of the Fulton Schools.
“The devices were performing basic functions and transmitting information to data centers where most of the real work was being done. These centers are managed by experts who provide multiple layers of data protection.”
Use case scenarios range from medical education to smart campus initiatives, improving scalability and privacy. The outcomes are yet to be achieved, but the emphasis on secure, on-device AI is a primary concern for EdTech, especially in remote learning situations.
Limitations and bias: A multi-faceted spectrum
There are some flaws with Edge AI. Devices such as inexpensive tablets have hardware limits, which pose a bottleneck for complicated models; imagine the neural networks needing more power than a microcontroller can provide. As the 2025 Edge AI survey on arXiv mentions, developers have to optimize algorithms, pruning and quantizing to mechanical limits.
Bias is problematic regardless of the form of AI being used: If there’s a skew in data sets that are used for training, all outcomes will be biased. This can be a cause for exacerbating the education gap.
There’s a need for transparency: algorithms need to be made available for examination, something EdTech companies are obligated to provide. While it improves privacy, Edge AI increases the demand for strong security on the device. Take over the tablet, and you have control.
Generative AI and education: The bigger picture
Ana Simion shares insight into how generative AI is paving the way in the education sector and explores challenges and opportunities.
Collaboration between AI tech giants And EdTech
Open-source edge AI frameworks
The future is based on teamwork. AI Giants like Google and NVIDIA can partner with EdTech players such as Pearson or Coursera to develop open-source Edge AI frameworks. These toolkits would allow smaller companies to develop privacy-first, scalable solutions without reinventing the wheel. There is already a glimpse of this in TensorFlow Lite’s focus on the edge; Imagine it’s curriculum specific.
Lowering the barriers
Cooperative effort lowers expenses and technical sophistication. Custom-tailored AI systems are financially unfeasible for rural school districts or lean startup EdTech companies; open frameworks level the playing field. This allows innovation as per Forbes’ reporting on technology inclusivity.
Futuristic-proofing education
AI tech companies are yet to focus on securable scalable tools for EdTech – for example, plug-and-play adaptive learning systems that automatically comply with GDPR and FERPA. Suggestion? Annual AI-EdTech joint conference or interdisciplinary laboratories that combine AI brawn and educational expertise for innovative development.
Final thoughts
The combination of Edge AI and EdTech seems to create the perfect learning environment. By merging expansion and privacy, they’re creating systems for learning that are quick, equitable, and ready for the future.
From distant communities to expansive educational institutions, this unification aims to deliver personalized, safeguarded, and robust educational experiences. In reality, the numbers speak for themselves: With climbing adoption levels and growing concerns over cyberattacks, Edge AI is not an option – it is a necessity for future schools. Let’s embrace the change.
#2022#2023#2024#2025#adoption#ai#AI and cloud#AI in education#AI systems#Algorithms#app#applications#approach#Articles#artificial#Artificial Intelligence#battery#battery life#Bias#billion#Brain#Branding#breach#budgets#Building#Business#Byte#Case Study#ccpa#change
0 notes
Text
youtube
Today, we dispel the myth that artificial intelligence (AI) is overhyped by showing how it is revolutionizing eCommerce. The movie demonstrates how AI-powered systems like Buyist Pro can quickly analyze difficult circumstances, give actionable insights, and ease problem-solving for non-technical people. It uses the scenario of a small business owner dealing with a customer's allegation of a data breach. Artificial intelligence (AI) can interpret natural language questions and provide pertinent, context-aware answers, improving the usability and efficiency of eCommerce systems.
#AI#data_breach#customer_service#artificial_intelligence#generative_AI#small_business#problem_solving#natural_language_processing#technology#online_retail#data_analysis#user_experience#CCPA#GDPR#Shopify#direct_to_consumer#cybersecurity#ecommerce#ai_in_ecommerce#ai_tools#ai_ecommerce_business#ai_chatbot#ecommerce_business#online_business#artificial_intelligence_ecommerce#buyist_pro#AI_news#Youtube
0 notes
Text
youtube
Today, we dispel the myth that artificial intelligence (AI) is overhyped by showing how it is revolutionizing eCommerce. The movie demonstrates how AI-powered systems like Buyist Pro can quickly analyze difficult circumstances, give actionable insights, and ease problem-solving for non-technical people. It uses the scenario of a small business owner dealing with a customer's allegation of a data breach. Artificial intelligence (AI) can interpret natural language questions and provide pertinent, context-aware answers, improving the usability and efficiency of eCommerce systems.
#AI#data_breach#customer_service#artificial_intelligence#generative_AI#small_business#problem_solving#natural_language_processing#technology#online_retail#data_analysis#user_experience#CCPA#GDPR#Shopify#direct_to_consumer#cybersecurity#ecommerce#ai_in_ecommerce#ai_tools#ai_ecommerce_business#ai_chatbot#ecommerce_business#online_business#artificial_intelligence_ecommerce#buyist_pro#AI_news#Youtube
0 notes
Text
[Podfic Link] | Length: 1 minutes, 53 seconds
Original Work: Suspicions by @theredshirtsarecoming [ziazippy5379]
DPxDC: Tucker Foley/Damian Wayne | Rating: G
Summary:
Damian is following one of his new classmates
Notes: Tucker read by @flowerparrish, Damian read by @kbirbpods
Recorded for the Chromatic Characters Podfic Anthology V
#flowerparrish#flowerparrish pods#ccpa#ccpa 2024#Chromatic Characters Podfic Anthology#Chromatic Characters Podfic Anthology V#dp x dc#dpxdc#dp x dc crossover#tucker foley#damian wayne#dpxdc podfic#ziazippy5379#theredshirtsarecoming#multivoice podfic#multivoice#podfic#kbirb pods
5 notes
·
View notes