Not all screen reader users are blind

There’s a common misconception that everyone who uses screen reader software is blind. That’s mostly the case, but not always.

According to the most recent WebAIM Screen Reader User Survey (from 2021), 79.5% of screen reader users are blind. The remaining 20.5% who are not blind may have low or impaired vision, but some may have perfect vision. Let me explain…

According to the British Dyslexia Association:

Dyslexia is a specific learning difficulty which primarily affects reading and writing skills … Dyslexia is actually about information processing

I know a lot of dyslexic people (around 1 in 10 people is dyslexic) and many of them use:

This is because listening to content can make it much easier to digest than reading it on the screen; from dyslexic.com:

Those with dyslexia often find that text-to-speech software provides significant support if they struggle with reading or digesting text on the computer screen.

So there you have it! Some screen reader users can see the screen perfectly well; instead of using the software to access content, they use it to process and understand.

https://www.tempertemper.net/blog/not-all-screen-reader-users-are-blind

 

https://finance.yahoo.com/news/hackers-using-ai-steal-bank-230018917.html

How Hackers Are Using AI To Steal Your Bank Account Password
Thu, November 23, 2023 at 6:00 PM EST

dem10 / iStock.com
Information theft is far from a novel issue. Since the internet exploded in the early 2000s, hackers have taken advantage of security loopholes to infiltrate devices and siphon vital information that puts your finances and safety at risk.

I’m a Financial Advisor: 7 Ways People Become Poor in Their Later Years
Find: What To Do If You Owe Back Taxes to the IRS

But a recent study released in August highlights a chilling new way hackers use AI to steal your bank account password: it listens to you typing. And it’s over 95% accurate.

Sponsored: Open a new checking account and earn early paycheck access; up to 2 days early with Discover® Cashback Debit with Early Pay

How Hackers Steal Your Passwords

Cyberattacks happen once every 39 seconds and cost Americans $6.9 billion annually. However, the problem is growing with AI technology’s rapid development and widespread use.

Although Americans are more wary of scams and suspicious links that allow hackers to access their devices, AI is making it harder to avoid identity theft because compromising your device is no longer required.

According to the study, hackers now use acoustic Side Channel Attacks, or SCAs, to interpret sound signals from your keyboard strokes to get your password. They used MacBook Pro 16-inch laptops to conduct their study and successfully gathered this data using a smartphone, a Zoom call, and deep learning technology.

SCAs collect and interpret signals emitted by devices, including electromagnetic waves, electricity consumption, and the sounds from your keyboard. It then analyzes them and can infer the correct keys you are using.

More Technology, More Problems

There are many ways to “hear” the strokes coming from your keyboard. Examples from the study include microphones, Voice Over Internet Protocol (VoIP) calls, and smartwatches. If you are on a Zoom call with multiple people, you may not be aware that someone is using deep learning tech to analyze your keystrokes and gather information.

With all the benefits of new technology and society’s heavy reliance on WFH meetings after the pandemic, this study highlights the dark side of the AI coin, potentially placing millions of people at risk.

And because people are less aware of how their keyboard strokes may leak their information, they may be more prone to hide their screens instead of reducing the noise from their keyboards to stay safe.

Buying a new, quieter keyboard won’t do the trick either, as the program could still detect even barely audible typing sounds with 90% accuracy.

The research study, while alarming, gives cybersecurity experts greater insight into how hackers use burgeoning technological developments to use information.

Armed with these findings, they can assess how they work, what the source of the problem is, and develop counter strategies to prevent them from wreaking havoc with people’s data.

In the meantime, you can still take several steps to protect your bank account information and devices to decrease the likelihood of hackers stealing your information.

One of the ways you can prevent issues from happening is to make sure your device is secure – including your microphone. Hackers can install malware on your laptop or smartphone that activates your microphone without your consent or knowledge.

To prevent this from happening, always make sure that you report suspicious links that you receive, whether they are text messages, links in your DMs, or email phishing scams.

A strong password significantly decreases the likelihood of becoming a hacker’s next victim. It should look like “ejYB%7&^4@0*52@N4Hqm#” instead of “happyjoy111.”

But it is not just the strong password that does the trick. If you want to stay on top of your digital security, change your password every three months or less if you manage multiple accounts, work in finance, or are a victim of identity theft.

Two-factor authorization reduces the chances of a random hacker accessing your information because the platform uses multiple ways to verify that the right person is trying to log into your account.

You need to enter the correct password and receive a code or link through email or text that adds an extra layer of protection when you sign in.

Companies often lock your account if the hacker makes multiple attempts to get your information and send you an alert. If you receive one, immediately decline any request to access your account and contact your bank or financial institution.

Online banking allows you to turn on alerts on your phone or email when a transaction happens with one of your cards. Some people do not want the constant alerts every time they purchase, but disabling them is an expensive mistake.

Turn on email and text alerts for your accounts and monitor them frequently. Hackers sometimes start with a microtransaction that you may overlook to test the waters. Once they know there is money in the account, they may move on to larger purchases, exposing you to credit issues or troubles with your bank.

Updates are essential to stay on top of your device’s security. These updates may be inconvenient during work hours, but you can schedule them without using your device.

Whether you use a smartphone or a desktop/laptop, these updates contain security patches that reduce the likelihood of phishing and malware.

Multiple platforms nowadays allow you to see the most recent logins to your accounts and where they come from. Sometimes, websites may also email you if a new browser and IP address accesses your account.

These invaluable features help decrease the chances of a hacker stealing your information. If you notice a suspicious login, you can block that IP or browser by clicking “log off on all devices” if that option is available.

If you see logins from one or multiple locations you never visited, that is an immediate red flag that someone successfully guessed your password. Once you see this activity, report it and change your credentials on the spot.

When it comes to your information, remember that hackers can work with very little to take a whole lot. Keep your information private and avoid using public networks to engage in banking activities. Don’t put your personal information online, and avoid social media posts that ask what your mother’s name is, what year you were born, and your favorite color.

While they may seem benign, hackers use this information to guess passwords, and they ask these questions in ways that people may not guess is a loophole to getting information.

The world of AI is indeed ushering in unprecedented advancements in virtually every sector. But it is simultaneously posing significant risks, like being able to guess your password by listening to your keyboard strokes.

Although banks and other financial institutions are working hard to ensure that your information and money stay safe, your actions can also help decrease the likelihood of a hacker using AI to steal your bank account password.

With a little common sense and much vigilance, you can keep your information safe and avoid the risks of emerging technologies.

More From GOBankingRates

This article originally appeared on :

AI is going great for the blind.

As I was looking at the amount of times platforms died on the web I began thinking about the slow death of AI enthusiasm and what that will do to the Blind community.
It really is a bizarre feeling when you’re the only detractor of a thing within your own community. My first post about AI has gained some attention, as well as the follow up post about this topic. AI is taking the blind community by storm. Be my Eyes has added it into their product to describe pictures, Let’s not mention the fact the particular large language model, LLM they chose, was never designed to do that. Blind podcasters are praising LLMs and saying they’re more accurate than human descriptions, and, well, blind voiceover artists are more than willing to give places like ElevenLabs their voices so they can, well, I don’t even know yet. I guess attempt to make audiobooks.

I’m of two minds about this whole thing. While the stuff LLMs is giving us is incorrect information, it’s still information that the sighted world won’t or refuses to give us. While I absolutely hate the hype and even AI nonsense in general, and don’t use any LLM on any of my content, blind and visually impaired people can become audio book narrators if their Braille skills aren’t that great with ElevenLabs.

Even though I’ll never hire a blind narrator that uses ElevenLabs to generate an audio book, am I practicing discrimination by doing this? Someone will say yes. I don’t know what will come of this wave in LLMs and dependance on AI, but I predict that once the hype dies down, well, blind and even legally blind people are probably going to be advocating for more accessibility measures but in a different way.

AI accessibility will have its own challenges. In fact, we’re already witnessing instances of AI developers forgetting disabled people exist so I fully predict that blind people will be advocating to make actual LLM platforms accessible. While that’s a fight that won’t happen for a while, I also predict that the actual text output of some of these generators will be inaccessible, prompting another push to make these interfaces usable by everyone. I also predict web accessibility will actually get worse, not better, as coding models will spit out inaccessible code that developers won’t check or won’t even care to check. But I’m the only one within the community that’s unenthusiastic about the benefits of AI within our community.

I’m old enough to remember when OCR became a huge hit to play video games, scan inaccessible documents, and otherwise. While I also use OCR for speed and efficiency, or just even to get halfway there, I still use a human to read stuff because, even today, OCR isn’t where I thought it was going to be. Same for self-driving cars. Now that AI is a thing now, I doubt OCR and even self-driving cars will get any significant advancements.

About usage, well, that’s what blind people are using LLMs for at this very moment. They’re using it to describe characters from TV shows and movies in great detail. they’re using it to incorrectly describe music videos, but to the blind and visually impaired people that use these tools, they aren’t so much caring about the accuracy of the information. It’s information they’ve never had previously. Accuracy is an afterthought. The only thing that matters is having information that they never had previously. Then again, these are the very same blind and visually impaired people that say that self-descriptions are a complete waste of time and that’s why we shouldn’t do all this woke PC nonsense, so it’s no surprise that the community as a whole would jump on the LLM hype. The blind and visually impaired people advocating for this have been conditioned to believe that technology will solve all accessibility problems because, simply put, humans won’t do it. Humans won’t care. Humans are inefficient squishy things that live in a completely different, subjective, world. Blind and visually impaired people don’t want to wade through a subjective landscape. Objectivity matters to our community, no matter the cost of accuracy.

Another reason the Blind community is enthusiastic about AI is simply because, to other blind people, it makes them feel like less of a burden on society. With an LLM, it will never get annoyed, aggravated, think less of the person, or similar. Humans have been conditioned to think we are useless because we are blind so any help we ask for is viewed as a job or a chore rather than a chance to make someone’s life easier.

Also, most blind people don’t have a sighted person around because sighted people never willingly talk to a blind person just because. An LLM will always be there, well, until the servers go down, but this isn’t even a concern yet within the community and I don’t think it will be a thought until an AI server goes down.

Even though I don’t use AI or LLMs and even though I do have in person and remote friends I can get assistance from without feeling as if I’m wasting their life, I’m also thinking about how our community has just replaced being dependent on humans with being dependent on tech and technology. I wonder, though, what will be the next technology thing our community clings to because humans fail us again, and again, and again, and again. Humans still continuously actually say no to accessibility when designing websites, so it’s also no wonder why some blind and visually impaired people are championing AI accessibility toolbars like AccessiBe. The web is inaccessible, and, with every refusal of our basic access needs, it’s no wonder the community has given up on humans and dove headfirst into putting faith in another algorithm.

My stance is very unique within the community. Have I used these tools to describe a picture when no human was around? Of course. It’s the same with OCR. Even though I’ve used these tools, I just don’t think they are even worth half the hype. In fact, even today, there are incidences happening where AI is starting to look like Web3 hype nonsense. The Facebook thing got rid of their responsible AI team, search engines are useless because AI junk is flooding results now, small search engines are becoming very popular, indicating people are tired of this new wave of content, content, content! OpenAI can’t decide if it wants to fire people or bring them back because of ethics over growth, and more people are trying to block their blogs from being scraped.

There are many more examples of AI going very wrong and basically even making people very angry that big tech is stealing their labor, but I’ll leave you with the best podcast to debunk all the AI hype and nonsense. Well, okay, two podcasts. Tech Won’t Save Us, which is basically a podcast that detests tech and tech culture in general, and my personal favorite, Mystery AI Hype Theater 3000, a podcast that debunks all the AI hype.

Meanwhile, I’ll be reading personal blogs and the small web because the indieweb is cozy and because personal websites won’t die as often nor as quickly as the rest of the web. Tootles!

https://robertkingett.com/aigreat/

Accelerating math accessibility with the use of AI

A year ago, NWEA, now part of HMH, shared their innovative approach to make math more accessible for students. The aim was to identify the biggest challenges and gaps in mathematics for students who use screen readers and refreshable braille devices, because classroom materials are not always adapted to formats such as braille or large print, and materials are not always suitable for a screen-reader navigation, voice input, or a combination of these designs. NWEA developed prototypes that enabled screen readers to interact with equations in a more intuitive way, based on a method called process driven math (PDM). 

NWEA continued to innovate and build on their previous research to create different ways of presenting complex math, especially for math taught in grades six to nine. They also worked on different ways of outputting math that included screen-reader functionality and refreshable braille devices in both UEB (Unified English Braille) and Nemeth formats. Moreover, they developed a prototype for a voice-activated chatbot.  

To account for the accessibility of math equations, they used two markup languages, HTML and ARIA, to split equations into parts or regions. Each region, as well as the whole equation, had a hidden label that a screen reader would say to users as they explored the equation or expression. When students moved from one region to another, they would hear a word that described the kind of math in that region (for example, “term” or “constant”). Students could then decide to go into the region and hear the exact math, or they could just skip to the next region.
 

The use of generative AI  

By using AI, specifically GPT-4, the team was able to improve both the quality of the math as well as the time required to convert the equations to HTML, and to use code generation to write the code for the first prototype. The model only needed a few examples to learn how to change the initial test set of equations from MathML to the HTML structure that was the most accessible. From there, the model required context to ensure that responses were formatted in the best way for the app.  

Demo of using the equations with a screen reader:

Accelerating math accessibility with the use of AI

Accessible QR Codes: More Than Dots and Dashes

QR codes are ubiquitous in today’s world. From stickers and posters to TV advertisements and billboards, these quick-scan options have been around for nearly 30 years and are used by almost every company to get people to learn more about a product or service.

Companies like Unilever and Coca-Cola are starting to put QR codes at the center of their connected pack strategies. A QR code turns passive product packaging into an always-on digital and direct conversational channel with their end customers both at point of sale and point of use.

But not all QR codes are created equal.

The Power of Accessible QR

According to the World Health Organization, an estimated 2.2 billion people have near or distance vision impairment, and 284 million people are partially sighted, making finding relevant product information in store and at home a significant and everyday challenge.

Accessible QR codes can help people who are blind and partially sighted better access product information. By simply adding a series of dots and dashes around one corner of one side of a standard QR code, it gives people who are visually impaired the ability to tap into apps such as VoiceOver assistance or others that help people better understand the product or service.

An accessible QR code also houses the ability for apps featuring an SDK called Zapvision to recognize these same codes from greater distances and use the accessibility features on the device.

One Code, Accessible to Everyone

According to a recent article on Zappar.com, accessible QR codes benefit brands by:

Being cost effective: Minimizing production costs is crucial, and accessible QR codes use only two colors for printing — reducing overall costs significantly.
Ease of implementation: Accessible QR codes can be rolled out without any additional effort or space because it is already part of digitized packaging.
Little disruption to current brand real estate: Using an accessible QR code keeps packaging simple, streamlined and fully branded — for sighted individuals as well as those who are blind and partially sighted.
How do accessible QR codes work? Here’s a short video from Zappar that shows how an accessible QR code and a simple iPhone app can help those with visual impairments gain valuable product information.

This is a win not only for consumers with sight loss but for the brand as well.

Accessible QR Codes: More Than Dots and Dashes

The iPhone 15 Pro brings tangible accessibility benefits

What makes an iPhone accessible? Mostly, it’s the software: the operating system and apps that follow guidelines Apple has set for that purpose. If new hardware plays a role, it’s often in the opposite direction. For some with hearing or vision disabilities, the loss of the Home button has made hanging onto an iPhone SE feel worth the struggle.

But this year, there’s another hardware story (and I’m mighty surprised to be writing this): What’s inside Apple’s Pro iPhones is giving an important boost to usability for people with disabilities.

The number and breadth of accessibility features you can quickly enable with the action button are significant, as are the brief descriptions of each.
The Action Button

Turning the tactile, easy-to-use ring/silent switch into a multifunction button you can use to launch a shortcut, open the camera, or fire up Voice Memos is a fair way of giving back where something’s been taken away. There’s also a whole screen full of accessibility features you can choose to assign to the Action button: everything from turning on the VoiceOver screen reader or Live Captions to adding a color filter or starting AssistiveTouch.

Quick access to most of these options isn’t new: you can use Back Tap or Accessibility Shortcut (a triple-click of the Side button) to summon a lot of them. But particularly if you have a motor disability, the choice between invoking your preferred feature by tapping, triple-clicking, or a press and hold of the Action Button is just one more level of flexibility, not to mention the chance to program quick access to various tools at the same time.

Since you can launch a shortcut with the Action Button (also available via Back Tap), there’s no end to the ways you can customize your own accessibility by doing things more quickly. I have a blind friend who’s using the Action Button to quickly toggle the speed of podcast playback between two favorite settings. Using a shortcut means she need not open Overcast using VoiceOver and then swipe to the speed slider every time she wants to make a change. Sometimes, accessibility means saving steps.

The accessibility options available for the Action Button also come with brief descriptions that could introduce or explain these features to people who have never dived levels deep into Accessibility settings.

Wideband and Precision Finding

Precision finding is great for anyone who’s looking for their phone or for a friend in a crowd. But how great is it when one or more of the parties doing the looking is blind?

Find My was never precise enough to lead anyone to the exact restaurant table or funnel cake booth. But precision finding, powered by the second-generation Ultra Wideband chip, gives guidance with sound and VoiceOver speech.

Intelligent Portrait Mode and Other Photo Magic

If taking photos isn’t a big part of the way you use your phone, an iPhone 15 Pro or Pro Max could seem like overkill. For accessibility-related uses of the camera, like magnification, scanning text, and using AI or human assistants to describe or analyze a scene, an older camera system works just as well as this year’s best. But as cameras get better, so do the machine-learning tools these phones offer to improve your photos.

A visually impaired photographer can use any of the iPhone 15 cameras with more confidence, knowing that after-the-fact portrait mode (and other enhancements to an image he or she has already taken) are available. That’s a kind of accessibility of opportunity masquerading as a mainstream camera feature.

LIDAR

The Magnifier app shows the various detection modes available, on the left. With Door Detection enabled, there’s visual and spoken access to information about what the camera and LIDAR sensor find.
Pro phones have included a LIDAR sensor since the iPhone 12 range. It’s a camera system thing. But like the Ultra Wideband chip, LIDAR can help detect what’s in your environment.

In each generation of the Pro phones since the 12, LIDAR has given Pro users access to new detection features. First, you could have what the camera saw described to you: a red car on a dirt road, a wooden table with keys, and a pair of glasses. Then came People Detection, just in time for the mid-pandemic. LIDAR and the Magnifier app let you identify the presence of a person and how far that person is from you. Door Detection was next. Aim your phone at a building or down a hallway and find out not only where doors are located but whether they’re open or closed, wood or glass, have signage or not, and what that signage says.

This year, we got the unfortunately named Point and Speak. It’s not a child’s toy but a tool for reading text labels. Hold your phone up to a microwave, washing machine, or other gadget, and point to where you think a label is located. The phone helps you aim and reads text it finds over or under (you choose) your pointing finger. Great for a microwave, dishwasher, or any device with buttons to be pressed.

None of the detection features is perfect. Point and Speak, in particular, could use some seasoning. But these features give some insight into how Apple teams working on accessibility have been able to weave interesting features with relatively small potential user bases into the ways iPhone hardware uses develop over time.

Is it also proof of concept for greater things to come? You bet. But for at least a few people where accessibility is a main requirement, it’s also reason enough to splurge on an iPhone 15 Pro or Pro Max right now.

[Shelly Brisbin is a radio producer, host of the Parallel podcast, and author of the book iOS Access for All. She’s the host of Lions, Towers & Shields, a podcast about classic movies, on The Incomparable network.]

If you appreciate articles like this one, support us by becoming a Six Colors subscriber. Subscribers get access to an exclusive podcast, members-only stories, and a special community.

The iPhone 15 Pro brings tangible accessibility benefits

link

Wellness Wednesday: Being Perfect, Don’t Make mistakes, and Proving Yourself is exhausting – A General Look at Blindness Awareness, Interdependence, Grieving and Rebuilding


media
https://traffic.libsyn.com/secure/blindabilities/22_WellnessWednesday.mp3?dest-id=254899
In this 22nd  episode of Wellness Wednesday, Beth Gustin, LPC and Robin Ennis, LCSW, CPC, have a general discussion about blindness awareness. October has a variety of Blindness related awareness campaigns bringing about awareness to the public with White Cane Day, Disability Employment and Blindness Awareness Month all happening in the month of October. Beth and robin talk about the exhaustion of constantly feeling the need to advocate, prove and being the perfect ambassador for the entire community all the time. How the battle of grieving and rebuilding can play out on one’s journey and why asking for help can be  a form of independence.
 

Check out all the Wellness Wednesday episodes.

 

Show Hosts:

            Robin Ennis on the web at http://www.robinennislcsw.com

            Beth Gustin, LPC, NCC, EMDRIA Approved Consultant, CAGCS, PLGS

            Www.transitioningthroughchange.com

 

You can message Beth and Robin by calling 612-367-6093 or by email. They are looking forward to hearing from you!

 

https://www.consumerreports.org/electronics-computers/tvs/watching-tv-while-blind-a3393572533/

Watching TV While Blind
Making television accessible to people with vision impairments requires technical and regulatory advances and collaboration to ensure the visual media remains open to all

By Brian VinesOctober 19, 2023
Illustration: Lacey Browne/Consumer Reports
In 1985, there was not a 7-year-old on the planet with a better working knowledge of the goings on in Genoa City, the fictional setting of “The Young and the Restless,” than me.

The daytime drama was my grandmother’s favorite. It was my job to watch with her and provide visual commentary, because my grandmother was blind. When the words weren’t enough, I helped her set the scene in her mind by answering her questions. “Were his eyes opened when they kissed?” she’d want to know. “Can anyone in the courtroom tell she’s lying?” We played this game of TV Show and Tell whenever the set was on.

Back then, no one thought much about how to make TV accessible to visually impaired people, or really even considered that it might be an important thing to do. Today the landscape is vastly different. Newer TVs have settings and features designed to help people with limited vision enjoy the boob tube like the rest of us. Still, disability advocates say these assistive technologies leave room for improvement and that laws surrounding their implementation are not keeping pace. At the same time, they say, the need to make devices even better and easier to use by the visually disabled is more pressing than ever. 

More on TVs and Assisted Tech

For starters, public health officials say the number of Americans with uncorrectable vision impairment is expected to double by 2050, due to chronic diseases like diabetes and the rapidly aging population. Today, 4 million Americans over 40 have a vision impairment. Of those, 1 million are blind and 3 million have uncorrectable central or peripheral vision loss. 

Also a major issue: how screen-centered our world has become. “We live in a visual society,” says Clark Rachfal, director of advocacy and governmental affairs at the American Council of the Blind, an organization made up of blind and visually impaired people. “If you want to be part of your community, if you want to be part of the conversation, you have to have access to the visual media everyone else is using.”

“We’ve got to get over the idea that blind people don’t watch television,” says Chris Danielsen, who in addition to being blind is the director of public relations for the National Federation of the Blind, the nation’s oldest and largest organization of blind Americans. “We do and always have.”

Matthew and Paul Castle, an inter-abled couple living in Seattle, can attest to that. Matthew is sighted while Paul has retinitis pigmentosa, a progressive eye disease that over the years has reduced his vision by more than 90 percent. On their “matthewandpaul” TikTok account, the couple chronicles their life as “Two Guys and a Guide Dog,” sharing everything from pranks to “blind life-hacks” for their 1.5 million followers. In a TikTok video, they share how accessibility tools help them navigate watching TV.

One thing they have yet to share online is their odyssey trying to buy a TV set. The pair bought and returned four until they found an OLED model by LG that had contrast and brightness settings and adjustable onscreen fonts good enough to compensate for Paul’s diminished vision. Their new device is a godsend. “I always breathe a sigh of relief when we get to the end of the day,” says Paul. “We get to just escape and watch something on TV together.” 

Regulating Accessibility

That a person like Paul Castle with low or no vision can enjoy television today has been a project decades in the making. 

In 1990, the pioneering Americans with Disabilities Act prohibited discrimination on the basis of disability, with a suite of laws covering everything from employment to public accommodations.

But it wasn’t until 2010 that the 21st Century Communications and Video Accessibility Act mandated that telecommunications companies and video programmers ensure that new digital, broadband, and mobile innovations adhered to accessibility laws. Among other things, the CVAA required that emergency information be conveyed in a manner accessible to people who are blind or visually impaired and that TVs and other video devices have a button for activating audio descriptions. And yet, more than a decade after that law’s passage, only the largest 90 of the 210 broadcast market areas presently provide audio-described content and emergency notices. 

And it wasn’t until 2012 that the Federal Communications Commission required all local broadcasting services in the U.S. to offer a minimum of 4 hours of secondary audio programming (SAP) for visually impaired viewers every week. SAP is an auxiliary audio channel that, in addition to having different languages, provides descriptive audio narration of visual information that can be broadcast or transmitted both over-the-air and by cable television. 

Furthermore, the requirements do not apply to video streaming applications, meaning platforms like Hulu or Netflix, both of which do provide accessibility tools by choice, are not bound by regulation to adhere to accessibility requirements. In July, Sen. Ed Markey (D-Mass.), the author of the original CVAA, along with Rep. Anna G. Eshoo (D-Calif.), introduced the Communications, Video, and Technology Accessibility (CVTA) Act, as an effort to update existing accessibility regulations and make them inclusive of technology not conceived of more than a decade ago.

Jeff Wissel, chief accessibility officer at Disability:IN, a nonprofit resource for disability inclusion, is happy to see accessibility requirements continue to advance. “When all these aspects come together, it enhances the experience for those of us with disabilities to fully participate,” he says.

Roadblocks Remain

One barrier to participation expressed by many in the visual disability community is the lack of default accessibility settings for new devices. Rather, most have accessibility settings that must be opted in to, posing a significant challenge to individuals who can’t read a manual or navigate through settings onscreen. A more frictionless option for the visually impaired would be accessibility settings as the default users could choose to disable. 

Nearly a decade ago when Danielsen, at the National Federation of the Blind, found himself unable to independently set up his new television, he had to call for backup. “My friend had to come over and help me install it and set it up because I couldn’t walk through the screens,” he says. 

Disability:IN’s Wissel says that even today TV manufacturers, as well as content creators, need to do better. “There are many companies that have yet to fully embrace the requirements to ensure their products and services meet the accessibility requirements,” he says.

Still, no one doubts that members of the visually impaired community are reaping huge benefits from the advancements in television technology and content creation we’ve seen. Today, most smart TVs—essentially traditional sets that connect to the internet—allow access to multiple streaming video services, such as Amazon Prime, Netflix, and Hulu, which all have accessibility features like closed captioning and audio description. And many new smart TVs have the added benefit of being voice-enabled, allowing for operation and navigation independent of onscreen menus. 

It is important to note that people with visual impairments are not a monolith, and there is no universal solution for how a television may best work for everyone. Whether their disability stems from genetics, age, or incident, an individual’s unique circumstance will define what option is best for them.

But there are certain products that do provide an accessibility edge, and there are things to know about how to use the settings in the TV you presently own—or a new one you plan to buy—to make it work optimally for you. “Fortunately, we’re seeing more TVs that have accessibility settings, and some companies seem genuinely interested in moving beyond what is simply required by law,” says Jim Willcox, CR’s senior electronics editor.

Brian Vines

Brian Vines has been a member of the special projects team at Consumer Reports since 2020, focusing on marketplace inequities. Prior to joining CR, he spent a decade covering public affairs in community media. A Chicago native, he has a passion for social justice and deal hunting. Follow him on Twitter @bvines78.

https://www.zdnet.com/article/online-security-101-how-to-protect-your-privacy-from-hackers-spies-and-the-government/

Cybersecurity 101: Protect your privacy from hackers, spies, and the government
Simple steps can make the difference between losing your online accounts or maintaining what is now a precious commodity: Your privacy.

Jan. 21, 2022

“I have nothing to hide” was once the standard response to surveillance programs utilizing cameras, border checks, and casual questioning by law enforcement.

Privacy used to be considered a concept generally respected in many countries with a few changes to rules and regulations here and there often made only in the name of the common good.

SEE: Meet the hackers who earn millions for saving the web, one bug at a time (cover story PDF) (TechRepublic)

Things have changed, and not for the better.

China’s Great Firewall, the UK’s Snooper’s Charter, the US’ mass surveillance and bulk data collection — compliments of the National Security Agency (NSA) and Edward Snowden’s whistleblowing — Russia’s insidious election meddling, and countless censorship and communication blackout schemes across the Middle East are all contributing to a global surveillance state in which privacy is a luxury of the few and not a right of the many.

As surveillance becomes a common factor of our daily lives, privacy is in danger of no longer being considered an intrinsic right — and it seems we, too, are adopting our own personal forms of online digital stalking and spying. 

Everything from our web browsing to mobile devices and the Internet of Things (IoT) products installed in our homes has the potential to erode our privacy and personal security, and you cannot depend on vendors or ever-changing surveillance rules to keep them intact.

Having “nothing to hide” doesn’t cut it anymore. We must all do whatever we can to safeguard our personal privacy not only from agencies and companies but also from each other. Taking the steps outlined below can not only give you some sanctuary from spreading surveillance tactics but also help keep you safe from cyberattackers, scam artists, and a new, emerging issue: technological stalking.

See also: Best browser for privacy: Secure web browsing | Navigating data privacy | Gartner predicts privacy law changes, consolidation of cybersecurity services and ransomware laws for next 4 years

Data management is at the heart of privacy

Data is a vague concept and can encompass such a wide range of information that it is worth breaking down different collections before examining how each area is relevant to your privacy and security.

Personally Identifiable Information (PII)

Known as PII, this can include your name, physical home address, email address, telephone numbers, date of birth, marital status, Social Security numbers (US)/National Insurance numbers (UK), and other information relating to your medical status, family members, employment, and education.

Why does it matter? All this data, whether lost in different data breaches or stolen piecemeal through phishing campaigns, can provide attackers with enough information to conduct identity theft, take out loans using your name, and potentially compromise online accounts that rely on security questions being answered correctly. In the wrong hands, this information can also prove to be a gold mine for advertisers lacking a moral backbone.

Read on: The biggest data breaches, hacks

Browsing habits and website visits

Internet activity is monitored by an Internet Service Provider (ISP) and can be hijacked. While there is little consumers can do about attacks at the ISP level, the web pages you visit can also be tracked by cookies, which are small bits of text that are downloaded and stored by your browser. Browser plugins may also track your activity across multiple websites.

Why does it matter? Cookies are used to personalize internet experiences and this can include tailored advertising. However, such tracking can go too far, as shown when the unique identifiers added to a cookie are then used across different services and on various marketing platforms. Such practices are often considered intrusive.

Also: ‘Carpet-bombing’ DDoS attack takes down South African ISP for an entire day | Hackers breached A1 Telekom, Austria’s largest ISP | Here’s how to enable DoH in each browser, ISPs be damned

Message and email content

Our email accounts are often the pathway that can provide a link to all our other valuable accounts, as well as a record of our communication with friends, families, and colleagues. As central hubs to other online services, hackers may try to obtain our passwords through credential stuffing, social engineering, or phishing scams in order to jump to other services. 

Why does it matter? If an email account acts as a singular hub for other services, a single compromise can snowball into the hijack of many accounts and services.

Phone numbers

In targeted attacks, fraudsters are using social engineering techniques to impersonate their victims in calls to telephone service providers. They do this in order to transfer a number away from a handset — even if only for a short period of time — and then ‘own’ the number for the time it takes to grab two-factor authentication (2FA) sent to the phone number and to access a target account, whether this is banking, email, or a cryptocurrency wallet.

Why does it matter? If your phone number ends up outside of your control, this means that 2FA codes can be stolen and any online account linked to this number is at risk of being hijacked. 

Online purchases, financial information

When you conduct a transaction online, this information may include credentials for financial services such as PayPal, or credit card information including card numbers, expiry dates, and security codes.

Magecart campaigns are not possible to avoid by the average consumer as they take place on vulnerable e-commerce websites, with code injected into payment portals to skim and steal card data input by customers. Past victims of Magecart groups include Ticketmaster, Boom! Mobile, and British Airways.

Why does it matter? Cybercriminals who steal financial services credentials through phishing and fraudulent websites, who eavesdrop on your transactions through Man-in-The-Middle (MiTM) attacks, or who utilize card-skimming malware, can steal these details when they are not secured.

Once this information has been obtained, unauthorized transactions can be made, clone cards may be created, or this data may also be sold on to others in the Dark Web.

A basic guide to diving in to the dark web

Medical records and DNA profiles

Another entrant to the mix, hospitals are now transitioning to electronic records and home DNA services store genetic information belonging to their users, submitted in the quest for health-related queries or tracing family histories.

Why does it matter? The loss of medical information, which is deeply personal, can be upsetting and result in disastrous consequences for everyone involved. 

When it comes to DNA, however, the choice is ours whether to release this information — outside of law enforcement demands — and it is often the use of ancestry services that release this data in the first place. Privacy concerns relating to DNA searches have been cited for sales downturns with some popular home ancestry kits.

Also: On the dangers of DNA data: Genealogy tests, Elizabeth Warren, and the end of privacy | Before taking that DNA test: Six things you need to know

What is being done to protect this information?

Businesses that handle data belonging to their customers are being scrutinized more and more with the arrival of regulatory changes such as the EU’s General Data Protection Regulation, designed to create a level playing field and stipulate adequate security measures to protect consumer privacy and data.

Companies will often encrypt your information as part of the process, which is a way to encode information to make it unreadable by unauthorized parties.

One way this is achieved is by using SSL and TLS certificates that support encryption on website domains. Let’s Encrypt offers free SSL/TLS certificates to webmasters who wish to improve their websites’ security. Unfortunately, this has also led to the adoption of SSL by fraudsters.

Apple, Google, and Mozilla have forced TLS certificate lifespans to reduce, with roughly a year becoming an acceptable lifespan for certificates.

End-to-end encryption is also becoming more popular. This form of encryption prevents anyone except those communicating from accessing or reading the content of messages, including vendors themselves.

Following Snowden’s disclosure of the NSA’s mass surveillance activities, end-to-end encryption has been widely adopted by many online communication services — much to the chagrin of government and law enforcement agencies. With a recent shift to working from home practices prompted by COVID-19, this has expanded to include video conferencing tools such as Zoom.

See also: Zoom backtracks and plans to offer end-to-end encryption to all users | Google is adding end-to-end encryption to its Android Messages app | Facebook and Google refuse 1 in 5 Australian law enforcement data access requests

Privacy advocates may cheer, but governments and law enforcement agencies have not rejoiced at the trend — and a political battlefield has emerged between tech vendors and governments that are attempting to enforce the inclusion of deliberate backdoors into encrypted systems.

It is up to us to make use of any privacy-enabling technology we have at hand. Below are some guides with simple steps to get you started.

Also: FBI warning: Crooks are using fake QR codes to steal your passwords and money | Meta and Twitter want a review of Australian government’s social media laws next year | Microsoft: This new browser feature is ‘huge step forward’ against zero-day threats | UK government announces crackdown on cryptocurrency adverts

Browser basics and Tor

Searching the web is a daily activity for many of us, and as such, it is also a hotbed for tracking and potential cyberattacks.

The most commonly used browsers are Google Chrome, Apple Safari, Microsoft Edge, Opera, and Mozilla Firefox. However, you should consider using Tor if you want to truly keep your browsing as private as possible.

The Tor Project is an open-source browser that is privacy-focused. The software creates tunnels rather than establishing direct connections to websites, which prevents users from being tracked through traffic analysis or IP addresses.

Not to be confused with the Dark Web — although required to access it and .onion domains in general — Tor is legal and is often used by the privacy-conscious, including journalists, activists, civil rights groups, and NGOs.

The Tor browser can be slower than traditional browsers, but it is still the best choice for secure browsing. The non-profit has launched a membership program to secure funding and boost integration in third-party products.

Desktop and mobile versions of the Tor browser are also available: desktop (Windows, macOS, Linux), the iOS Onion Browser, and Orbot proxy: Tor for Android.

Also: Best browser for privacy: Secure web browsing | The good and the bad with Chrome web browser’s new security defaults

Secure other browsers

If you are more comfortable using Chrome, Safari, Firefox, Microsoft Edge, or another browser, there are still ways to improve your security without implementing major changes to your surfing habits.

Cookies: Clearing out your cookie caches and browser histories can prevent ad networks from collecting too much information about you. The easiest way to do so is to clear the cache (Firefox, Chrome, Opera, Safari, Edge).

You can also set your preferences to prevent websites from storing cookies at all. In order to do so, check out these guides for Firefox, Chrome, Opera, Safari, and Edge.

HTTP v. HTTPS: When you visit a website address, you will be met with either Hypertext Transfer Protocol (HTTP) or Hypertext Transfer Protocol Secure (HTTPS). The latter option uses a layer of encryption to enable secure communication between a browser and a server.

The most important thing to remember is while HTTPS is best used by default in general browsing, when it comes to online purchases, it is crucial for protecting your payment details from eavesdropping and theft.

It is still possible for payment details to be stolen on the vendor’s side, but to reduce the risk of theft as much as possible you should not hand over any important information to websites without HTTPS enabled. (It is estimated that shopping cart conversion rates increase by 13 percent with HTTPS enabled, which should encourage webmasters to use the protocol, too.) 

To find out whether HTTPS is enabled, look in the address bar for “https://.” Many browsers also show a closed padlock.

Search engines

Google’s search engine, alongside other major options such as Yahoo! and Bing, make use of algorithms based on your data to provide “personalized” experiences. However, browsing histories and search queries can be used to create crossover user profiles detailing our histories, clicks, interests, and more, and may become invasive over time. (Ever purchased a toaster and then see ads for toasters frequently? There’s a reason for that.)

To prevent such data from being logged, consider using an alternative that does not record your search history and blocks advertising trackers. These options include DuckDuckGo, Qwant, Startpage, and the open source Searx engine.

If you wish to stay with your current browser you can also use software that bolts-on to your browser to enhance the privacy and security of your surfing activities.

Browser plugins

HTTPS Everywhere: Available for Firefox, Chrome, and Opera, HTTPS Everywhere is a plugin created by the Tor Project and Electronic Frontier Foundation (EFF) to expand HTTPS encryption to many websites, improving the security of your communication with them.

NoScript Security Suite: Endorsed by Edward Snowden as a means to combat government surveillance, this plugin has been built for Firefox and other Mozilla-based browsers for the purposes of disabling active content including JavaScript, which may be used to track your online activity. Users can also choose which domains to trust and whitelist.

Disconnect: Another worthy addition to the list, Disconnect provides a visual guide to websites that are tracking your activity. Invisible trackers that monitor you and may also expose you to malicious content can be blocked. Disconnect is available for Chrome, Firefox, Safari, and Opera.

Facebook Container: In a time where Facebook has come under fire for its data collection and sharing practices time after time, Mozilla’s Facebook Container application is a worthwhile plugin to download if you are worried about the social media network tracking your visits to other websites. The plugin isolates your Facebook profile and creates a form of browser-based container to prevent third-party advertisers and Facebook tracking outside of the network. While not bulletproof, this add-on is worth considering if you want to separate Facebook from the rest of your browsing activities.

Privacy Badger: Last but certainly not least, the EFF’s Opera, Firefox, and Chrome-supporting plugin Privacy Badger is focused on preventing ad networks from tracking you. The software monitors third parties that attempt to track users through cookies and digital fingerprinting and will automatically block those which use multiple tracking techniques. The plugin also includes color-coded indicators of domain tracking scripts.

You should also monitor your extensions and plugins lists. Check them often to make sure there is nothing installed you were previously unaware of — any suspicious software could be a sign of a malware infection.

Public Wi-Fi: A security risk?

There is no denying that public Wi-Fi hotspots are convenient, especially in a time when many of us are working outside of the office. However, you may be placing your privacy and security at risk if you choose to use one while on the move without the right precautions.

The problem with them is simple: You have access to them, and so do cyberattackers — and this gives them the opportunity to perform what is known as Man-in-The-Middle (MiTM) attacks in order to eavesdrop on your activities and potentially steal your information, as well as manipulate traffic in a way to send you to malicious websites.

Hackers may be able to access the information you are sending through the Wi-Fi hotspot, including but not limited to emails, financial information, and account credentials. Hackers may also set up their own rogue honeypot Wi-Fi points that appear legitimate whilst only being interested in stealing the data of those who connect to it.

It is best not to use a public, unsecured Wi-Fi connection at all. An alternative and far more secure method is always to use a mobile 4G/5G connection through your own mobile device when possible. 

If you need an internet connection for a device other than your smartphone, an easy way to accomplish this is to set up your mobile device as a mobile Wi-Fi hotspot itself. You can usually find this option in your main scroller menu, or under Wi-Fi settings.

There are other precautions you can take to make a public Wi-Fi hotspot safer — but it’s never devoid of risk.

When you connect to a new Wi-Fi hotspot on Windows machines, make sure that you select “Public” when the option appears, as this will enable the operating system to turn off sharing; turn off the Wi-Fi connection when you do not need it, enable firewalls, and try to only visit websites with HTTPS enabled. 

In addition, do not use the Wi-Fi hotspot to access anything valuable, such as an online banking service — save that for use with a mobile connection and dedicated mobile applications. 

Top tips to stay safe on public Wi-Fi networks

One of the most important layers of security to implement is the use of a virtual private network (VPN) if accessing a public Wi-Fi hotspot — and the use of a trustworthy VPN should be implemented across all your devices, no matter your connection type.

Also: How to fix coffee-shop Wi-Fi | How to set up a satellite Wi-Fi hotspot

VPNs: Why, when, and where?

A virtual private network is a way to create a secure tunnel between browsers and web servers. Data packets are encrypted before they are sent to a destination server, which also results in IP addresses and your location becoming hidden. Many VPNs will also include a ‘kill switch’ that cuts off your internet access temporarily if a connection drops in order to keep your online activity secure.

VPNs have now entered the mainstream. Many users only adopt these services to access geolocation-blocked content — such as websites and apps banned in select countries — for example, a user in the United States could make themselves appear to be located in the United Kingdom, and vice versa.

However, VPNs have also surged in popularity in response to increased surveillance, making their use a popular option for activists or those in countries ruled by censorship. In addition, some organizations will require their employees to now use a VPN when accessing corporate resources remotely, a demand which may now be more common due to employees forced to work from home due to COVID-19.

(For a more detailed look at how VPNs operate, check out our guide.)

VPNs are not a silver bullet for security; far from it, but they can help mask your online presence. It is worth noting, however, that VPN usage is banned in some countries.

Free vs. premium VPNs

Premium, paid services are often more trustworthy. Free options are often slower and will offer limited bandwidth capacity. VPNs cost money to run and so providers will also require users of free services to agree to alternative means for them to turn a profit — and this may include tracking and selling your data.

Remember, when you are using a free service, whether it’s a VPN or Facebook, you are the product and not the customer.

Read on: Why even the best free VPNs are not a risk worth taking | How to find the best VPN service: Your guide to staying safe on the internet | Cybersecurity: Do these things to keep your business safe from hackers, retailers told

(If you’re technically able, you could also set up your own private VPN. A handy set of instructions can be found here.)

Which VPN should I use?

The most important element to consider when deciding on a VPN is trust. Using a VPN requires all your traffic to go through a third-party. If this third-party VPN is unsecured or uses this information for nefarious reasons, then the whole point of using a VPN for additional privacy is negated.

Conflicts of interest, VPN providers being hosted in countries of which governments can demand their data, and sometimes less-than-transparent business practices can all make finding a trustworthy option a complex and convoluted journey.

However, to make this trip easier, see Our top picks: 5 Best VPN Services: Tried-and-true picks for your online privacy

Also: VPN services: The ultimate guide | With everyone working from home, VPN security is now paramount | Best VPN services for your home office: ExpressVPN, NordVPN, and more

Passwords and vaults

This kind of advice is repeated ad nauseam but it is worth saying again: using complex passwords is the first line of defense you have to secure your online accounts.

Many vendors now actively prevent you from using simple combinations that are easy to break, such as QWERTY12345 or PASSWORD123, with dictionary-based and brute-force attacks. 

However, we are still making terrible choices when it comes to our passwords. Researchers found in November 2021 that the most common passwords worldwide include 123456, qwerty, password, 1234567890, and local popular names including Liverpool and Tiffany.

It can be difficult to remember complicated password credentials when you are using multiple online services, and this is where password vaults come in.

Password managers are specialized pieces of software used to securely record the credentials required to access your online services. Rather than being required to remember each set of credentials, these systems keep everything in one place, accessed through one master password, and they will use security measures such as AES-256 encryption to prevent exposure.

Read on: Protect your passwords and more on all of your devices for under $2 a month | Forgot password? Five reasons why you need a password manager

Vaults may also generate strong and complex passwords on your behalf, as well as proactively change old and weak ones.

It is true that password managers and vaults may have vulnerable design elements that can be exploited on already-compromised machines, but when you balance risk, it is still recommended to use such software. 

Read on: Best password manager: Business & personal use

Enable Two-factor authentication (2FA)

Two-factor authentication (2FA), also known as two-step verification, is a widely-implemented method of adding an extra layer of security to your accounts and services after you have submitted a password.

The most common methods are via an SMS message, a biometric marker such as a fingerprint or iris scan, a PIN number, pattern, or physical fob. Using 2FA creates an additional step to access your accounts and data, and while not foolproof, can help protect your accounts — and password vaults, too.

How to enable 2FA: Facebook | Twitter | Instagram | Snapchat | Apple | Google | Microsoft 

For an in-depth guide to implementing 2FA, check out ZDNet’s Ed Bott’s explainer. 

SIM hijacking:

2FA is a strong security standard, but if you are unlucky enough to become a victim of SIM hijacking, this layer of security means very little. SIM-wapping occurs when a cybercriminal poses as you to a service provider, such as AT&T, using social engineering techniques and information gathered about you to fool employees into transferring ownership of your mobile number. 

Once they have secured your phone number, they have a small window of time to hijack online accounts — such as emails, bank accounts, or cryptocurrency wallets — before you notice your service has ended. In this time, attackers may be able to access 2FA codes. 

AT&T has become the subject of multiple lawsuits centered around customers who allegedly lost millions in cryptocurrency due to SIM-swap attacks.

This type of fraud is difficult to protect against. However, one way to do so is to connect 2FA telephone numbers to a secondary number that is not publicly known and so could only become subject to a SIM-swap if leaked elsewhere. 

Read on: Here’s how I survived a SIM swap attack after T-Mobile failed me – twice

Secure your mobile devices

Mobile devices can act as a secondary means of protection for your online accounts via 2FA, but these endpoints can also be the weak link that completely breaks down your privacy and security.

Both Apple iPhones and mobile devices based on Google’s Android operating system have sold by the millions. Android has maintained the lion’s share of the global smartphone and tablet market for years, but due to its popularity, the majority of mobile malware samples are geared toward this OS.

To combat this, Google runs a bug bounty program and a consistent security patch cycle for vendors.

iOS, in contrast, is a proprietary operating system and iPhones are generally considered more secure. Frequent security updates are issued to users.

Patch, patch, patch

The first and easiest way to keep mobile devices on either platform secure is to accept security updates when they appear over the air. These patches resolve new bugs and security flaws, as well as sometimes provide performance fixes, and can keep your device from being exploited by attackers. The same should also be applied to your browser software.

To check your device is up to date on iOS, go to Settings > General > Software Update. On Android, go to Settings > Software Update.

Lock it down

It sounds simple, but many of us don’t do it — make sure your mobile device is locked in some way to prevent physical compromise.

You can turn on your iPhone or iPad’s Passcode feature to enter a four or six-digit passcode, as well as select the ‘custom’ option to set either a numeric or alphanumeric code. On iPhone X and later, go to Settings > Face ID & Passcode, while on earlier iPhone devices, go to Settings > Touch ID & Passcode. If TouchID is not a feature on your iPhone, the menu option will simply show Passcode.

On Android, you can choose to set a pattern, PIN number, or password with a minimum of four digits. You can choose by tapping Settings > Security & location/Security > Lock Screen.

Biometrics

Face recognition, iris scanning, and fingerprints are biometric authentication options found on modern iPhones and Android devices. These services can be convenient, although it is worth noting that in the US, law enforcement may be able to force you to unlock your devices as biometrics are under question when it comes to the Fifth Amendment.

Find your phone

We want to stop ourselves from being monitored without consent, but some technologies can be beneficial for tracking down our own lost or stolen property.

Find my iPhone is a security feature for iOS devices that you can enable to allow you to track your device through iCloud. The system also includes a remote lock to prevent others from using your iPhone, iPad, or iPod Touch in the case of theft.

In order to enable Find my iPhone, go to Settings > [your name] > iCloud. Scroll to the bottom to tap Find my iPhone, and slide to turn on.

Google’s Find My Device can be used to ring a missing device, remotely secure your smartphone, and also wipe all content on your stolen property. The service is automatically made available by default once a Google account is connected to your device but it does require the device to be turned on, to have an active internet connection, and to have both location and the Find My Device feature enabled.

In order to do so, open Settings > Security & Location/Security > Find My Device.

Other privacy settings

For the iPhone

USB Restricted Mode: A handy security feature introduced in iOS 11.4.1, USB Restricted Mode prevents USB accessories from automatically being able to connect to an iPhone if an hour has elapsed since the last time it was unlocked. In order to enable, go to Settings > Touch ID/Face ID > USB Accessories.

Android

Disable the option to enable unknown developers/apps: If there have been apps you simply had to install outside of Google Play, make sure the “Unknown Sources” or “Install Unknown Apps” option is not left open afterward. Sideloading isn’t necessarily a problem on occasion but leaving this avenue open could result in malicious .APKs making their way onto your smartphone.

To disable it, select Settings > Security > Unknown Sources. On the later Android models, the option is usually found in Settings > Apps > Top-right corner > Special access.

Encryption: Depending on your smartphone’s model, you may have to enable device encryption, or some will be encrypted by default once a password, PIN, or lock screen option is in place. If you have such a device you can generally encrypt your smartphone through Settings > Security > Encrypt Device.

Some smartphone models do not have this option as encryption is enabled by default but you can choose to encrypt accompanying SD cards by going to Settings > Security > Encrypt SD card.

You can also choose to enable the Secure Folder option in the same settings area to protect individual folders and files.

Also: The 10 best ways to secure your Android phone

Jailbreaking

Rooting your device to allow the installation of software that has not been verified by vendors or made available in official app stores has security ramifications. You may not only invalidate your warranty but also open up your device to malware, malicious apps, and data theft.

An example of this is KeyRaider, a malicious campaign uncovered by Palo Alto Networks in 2015. The malware specifically targeted jailbroken iOS devices, leading to the theft of 225,000 Apple accounts and their passwords. A new iOS jailbreak method was released in May.

Also: iOS 15.2’s App Privacy Report: How to turn it on, and what it all means

Encrypt your messages

There was once a time when Pretty Good Privacy (PGP) was one of only a handful of options available to secure and encrypt your online communication that existed. PGP is a program that can be used for cryptographic protection, however, PGP is complicated to set up and use and there are other options out there that are more palatable to the average user.

If you still wish to use PGP, the Electronic Frontier Foundation has useful guides on its implementation for Windows, macOS, and Linux. 

Keybase.io, an open-source app built based on PGP for mobile and desktop systems available for macOS/iOS, Android, Linux, and Windows, is another option for making use of PGP and end-to-end encryption without the technical difficulties usually involved.

There are a number of encrypted messaging applications:

Signal

Signal is widely regarded as the most accessible, secure messaging service in existence today. Available for Android, iOS, macOS, and Windows, the free app — developed by Open Whisper Systems — implements end-to-end encryption and no data is stored by the company’s servers, which means that none of your conversations can be seized or read by law enforcement or hackers.

In order to use the service, you will need to tie a phone number to the app. You can also use Signal to replace traditional SMS messaging, but the same encryption and protections do not apply unless both recipients are using the app.

WhatsApp

WhatsApp is a messaging app that completed a rollout of end-to-end encryption across all compatible devices in 2016.

Available for Android, iOS, Windows Phone, macOS, Windows, and desktop, the messaging app is a simple and secure means to conduct chats between either a single recipient or a group. To tighten things up, make sure you visit the Chat Backup option in “Chats” and turn it off.

iMessage

Apple’s iMessage, a communications platform that comes with Mac and iOS products, is another option if you want to secure and protect your digital communications.

Messages are encrypted on your devices via a private key and cannot be accessed without a passcode. However, if you choose to back up your data to iCloud, a copy of the key protecting these conversations is also stored.

In order to keep your messages truly private, turn off the backup option. Apple will then generate an on-device key to protect your messages and this is not stored by the company.

In addition, only conversations taking place between iPhones — rather than an iPhone and Android device, for example — are encrypted. 2FA must be implemented to use end-to-end encryption.

Facebook Messenger

Facebook Messenger is not encrypted by default, and the social media giant says rolling out encryption could take years. The chat service does, however, have a feature called “Secret Conversations” on iOS and Android — but not the standard web domain — which is end-to-end encrypted.

In order to start a secret conversation, go to the chat bubble, tap the “write” icon, tap “Secret,” and select who you want to message. You can also choose to set a timer for messages to vanish.

Telegram

Telegram is another popular chat application. Available for Android, iOS, Windows Phone, macOS, Linux, Windows, and desktop, Telegram has a “Secret Chat” option that is end-to-end encrypted and kept away from the Telegram cloud. These particular chats are device-specific and include a self-destruct option.

Also: Why social media fatigue is spreading | The hacker’s paradise: Social networks

Mobile application sources and permissions

No matter which mobile operating system you have adopted, downloading apps from verified, trusted sources such as Google Play and Apple’s App store is always the best option to maintain your security and privacy.

However, the permissions you give an installed app are also important.

Apps can request a variety of permissions including sensor data, call logs, camera and microphone access, location, storage, and contact lists. While many legitimate apps do require access to certain features, you should always make sure you are aware of what apps can access what data to prevent unnecessary security risks or information leaks.

Research published in January 2020 suggests that 14% of all Android apps contain contradictions in-app data collection policies.

To be on the safe side, any time you no longer need an application, you should simply uninstall it.

Mobile malware

Mobile malware is far from as popular as malicious software that targets desktop machines but with these variants infecting Android, iOS, and sometimes make their way into official app repositories. A common technique used by malware developers is to submit a mobile application that appears to be legitimate, and then upload malicious functions after a user base has been established, such as in the case of an Android app containing the Cerberus Trojan infiltrating Google Play.

The types of malware that can hit your mobile device are varied, from Trojans and backdoors to malicious code that focuses on the theft of valuable information, such as online banking credentials.

The most common way that such malware can infiltrate your smartphone is through the installation of malicious apps, which may actually be malware, spyware, or adware in disguise. 

It’s recommended that you download and install an antivirus software solution for your mobile device, however, you will probably be safe enough as long as you do not jailbreak your phone and you only download app .APKs from trusted sources, rather than third-party repositories.

Also: Android security: Malicious apps sneak back into Google Play | Are enterprise app users growing more security savvy? | Fleeceware apps discovered on the iOS App Store | 

How to discover and destroy spyware on your smartphone (in pictures)

Secure email

Many email providers now encrypt email in transit using TLS, but there are few email services, if any, which you can truly consider 100% “secure” due to government laws, law enforcement powers, and the difficulty of truly implementing strong encryption in email inboxes beyond using PGP to sign messages.

However, ProtonMail is worth considering. The open-source email system is based in Switzerland and therefore protected under the country’s strict data protection laws. Emails are end-to-end encrypted which prevents ProtonMail — or law enforcement — from reading them. In addition, no personal information is required to open an account.

Another way to send emails without tracking is to use a temporary, throwaway email address. These can be generated through services including Temp Mail and EmailOnDeck. 

Also: What is phishing? Everything you need to know to protect yourself from scam emails and more | Phishing scams: The new hotspots for fraud gangs | This worm phishing campaign is a game-changer in password theft, account takeovers

Reduce your online footprint

Now that you’ve begun to take control of your devices, it is time to consider what data is floating around the internet that belongs to you — and what you can do to prevent future leaks.

One of the first places to travel to is Troy Hunt’s Have I Been Pwned service. The free search engine (of sorts) can be used to check your email accounts and linked online services for the exposure of credentials caused by data leaks. If you find you have been ‘pwned,’ stop using all the password combinations involved immediately — not only in the case of the compromised account but across the board. 

Google privacy checks

If you are a user of Google services, the Privacy Check up function can be used to stop Google from saving your search results, YouTube histories, device information, location check-ins and for you to decide whether you are happy for the tech giant to tailor advertising based on your data.

Make sure you also take a look at your main Google Account to review security settings and privacy measures. The Security Check up page also shows which third-party apps have access to your account and you can revoke access as necessary.

An important feature on this page is activated if you are saving passwords in the Google Chrome browser. Google will check to see if these passwords have been compromised in a data breach, and if so, will alert you and urge you to change them immediately. To make this easier, each alert will link to the impacted domain or service so you can quickly log in and change your details. 

Social networks

Social networks can be valuable communication tools but they can also be major sources of data leaks. It is not just friends and family that might be stalking you across social media — prospective employers or shady characters may be doing so, too, and so it is important for you to lock down your accounts to make sure only the information you want to be public, is public.

Read on: Hook, line and sinker: How I fell victim to phishing attacks – again and again

Facebook

To begin locking down your account, go to the top-right corner, click the downward arrow, and choose “Settings,” which is where the majority of your options for privacy and account safety are based.

Security and login

Under this tab, you can choose to enable 2FA protection, view the devices in which your account is actively logged on, and choose whether to receive alerts relating to unrecognized attempts to log in. If you wish, you can also nominate three to five friends who can help if you are locked out of your account.

Your Facebook information

Review activities: Under Activity Log, you can review all your activity across the social network, including posts published, messages posted to other timelines, likes, and event management. You can use the “edit” button to allow something on a timeline, hide it, or delete it outright — a handy function for wiping clean your older timeline.

Download data: Under this tab, you can choose to download all the data Facebook holds on you.

Privacy Settings and Tools: Here, you can choose who can see your future posts. For the sake of privacy, it is best to set this to friends only, unless you are happy for such content to automatically be made public.

How people can find and contact you: You can tighten up your account by also limiting who can send you friend requests, who can see your friend lists, and whether people are able to use your provided email address or phone number to find your profile. A particular feature you may want to turn off is the ability for search engines outside of the network to link to your Facebook profile.

Location: Turn off this to prevent Facebook from gathering a log of your location history.

Face recognition: Another feature you should consider turning off — it’s unnecessary.

Apps and websites: Under this tab, you can see a list of third-party services that have been logged into using your Facebook credentials and whether they are active.

Ad Preferences, advertisers: A settings option that has been heavily expanded upon since the Cambridge Analytica scandal, in this section, you can review what Facebook believes are your interests, a list of advertisers that “are running ads using a contact list that they or their partner uploaded which includes information about you,” and you can manage personalized ad settings — at least, to a point.

Your interests: If you select this tab you will see topics, such as property, finance, food, and education, which are collated based on ads or promotional material you have previously clicked on. In order to remove a topic, hover over the option and select the “X” in the top right. The same principle applies to the “Advertisers” tab.

Your information: There are two tabs here that are both relevant to your online privacy and security. The first tab, “About you,” allows you to choose whether Facebook can use your relationship status, employer, job title, or education in targeted advertising. The second tab, “Your categories,” includes automatically generated lists of topics that the social network believes are relevant for ad placement — all of which can be hovered over and removed.

Ad Settings: To further thwart targeted ads, consider saying no to all the options below.

Another section to mention is under the “About Me” tab in Facebook’s main account menu. Here, you can choose whether to make information public (whether globally or to your friends), or only available to you. This information includes your date of birth, relationship status, contact information, and where you’ve lived.

Twitter

Under the “Settings and privacy” tab there is a variety of options and changes you should implement to improve the security of your account.

Login verification: After you log in, Twitter will ask you for additional information to confirm your identity to mitigate the risk of your account being compromised.

Password reset verification: For added security, this requires you to confirm your email or phone number while resetting your password.

Privacy and safety: You can deselect location tracking and stop your locations from being posted at the same time you send out a tweet, and there is also an option for removing all past location data from published tweets in your history.

In this section, you will also come across “Personalization and data,” which allows you to control — to an extent — how the social network personalizes content, collects data, and what information is shared with third parties. You have the option to choose not to view personalized adverts, but the main setting you need to be aware of is for sharing.

Apps and sessions: Under this tab, you can see what third-party services, if any, are connected to your account, as well as what devices your Twitter account is actively logged into.

There is also an interesting section under “Your Twitter data.” Once you have entered your password, you can see Twitter’s compiled collection of interests and advertising partners based on your activities.

It is also possible to request your full data archive under the main Settings tab.

Instagram

To give your Instagram account a privacy boost, there are a few changes you can implement.

By default, anyone can view the photos and videos on your Instagram account. By going to Settings and then Account Privacy, you can change this to ensure only those you approve of can see your content.

If your account is public, then anyone can view and comment on your images and videos. However, you can block people you would rather not interact with.

Also: Nonplussed: Why I’ll miss Google+ | Picture password: Are squiggles the future of security? | Facebook open-sources one of Instagram’s security tools

The Internet of Things

The Internet of Things (IoT) started off with mobile devices, including our smartphones, tablets, and smartwatches. Now, IoT encompasses everything from smart lights to voice-controlled smart speakers and home hubs, such as Google Home and the Amazon Echo.

Here are some tips to improve the security of your connected home and prevent your products from being compromised, your information stolen, or your IoT products from being added to botnets:

Keep IoT devices password protected. Default credentials — unfortunately often still in play when it comes to IoT vendors — are an easy way for hackers to compromise a device. The first and easiest way to protect your devices is to change these credentials ASAP.
Making sure your IoT device firmware, as well as your router software, is up-to-date is also a key factor.
Consider running all your IoT devices on a separate home network. Therefore, in the case of compromise, the damage can be limited.
If your IoT device does not require an internet connection to run, then disable it. (Unfortunately, this is rare nowadays)
If you no longer need an IoT device or have upgraded, perform a factory reset and remove older devices from your network.
Always check the default settings on new products. It may be that default options — such as the implied consent for usage data and metrics to be sent to the vendor — will benefit the vendor, but not your privacy.
Stalking through tracking devices

A new and potential threat to our privacy has now revealed itself in the form of tracker devices. Products such as Tile and Apple’s AirTag are convenient ways to monitor your pets, luggage, keys, and other belongings – but the Bluetooth technology and networks that facilitate this useful service can also be abused.

There have been reports potentially linking tracker devices to everything from stalking to car theft. As these products are small and can easily be slipped in a bag, clothing, or affixed to a vehicle, they may not be detected by a victim – and even if they are, if you can’t find the device, what can you do?

Solutions are still being tested and rolled out. Tile intends to launch a local scanner option in its app soon to detect any unknown Tiles in your immediate area, whereas Apple iOS users (14.5+) are already alerted to their presence via notifications and sound. You can also download the Tracker Detect app if you are an Android user. 

Read on: How tech is a weapon in modern domestic abuse — and how to protect yourself

Just do it

The threats to our privacy and security are ever-evolving and within a few short years, things can change for the better — or for the worse. It is a constant game of push-and-pull between governments and technology giants when the conversation turns to encryption; cyberattackers are evolving and inventing new ways to exploit us daily, some countries would rather suppress the idea of individual privacy than protect it; and now threat actors are taking advantage of the disruption caused by COVID-19 to launch salvos against corporations and individuals alike.

In a world where many of us have been asked to rapidly change our working practices and to do our jobs from home, research suggests cyber incidents are on the rise with many of us “oblivious” to security best practices, and if we don’t take basic precautions, we may be risking not only our personal devices but also company systems. 

Thankfully, the threat to our privacy has now been acknowledged by technology companies. Many organizations, both for- and non-profit, have taken it upon themselves to develop tools for users to improve our personal security — and it is now up to us to do so.

Dictation Not Working on iPhone/iPad? Try These 10 Fixes

Whether you’re jotting down notes, sending a message, or drafting an email, Dictation takes the tedium out of typing on the iPhone by converting speech to text in real-time. Starting iOS 16, it’s also faster, works for longer, and functions without an internet connection. However, the feature isn’t without issues.

If Dictation is missing on your keyboard, fails to activate, or refuses to recognize what you speak, this troubleshooting guide will show you how to fix that. The instructions below also apply to the iPad.

Table of Contents
1. Restart iPhone/iPad

If Dictation on your iPhone randomly stops working, consider giving your device a quick reboot. This simple action can resolve minor system hiccups that interfere with the feature. To do that:

Open the Settings app via the Home Screen or App Library.
Tap General and select Shutdown.
Drag the Power icon to the right.
Wait 30 seconds.
Press and hold the Side button until you see the Apple logo.
2. Use the Native Apple Keyboard

Dictation works with third-party keyboards like Gboard and SwiftKey, but it’s always best to switch back to the native Apple keyboard if the feature malfunctions despite restarting the iPhone.

To do that, tap the Globe icon, select English, and check if Dictation starts working correctly. If it does, consider updating the non-Apple keyboard apps via the App Store before using Dictation alongside them.

Note: If you see an Emoji icon on the lower right corner of the keyboard, your iPhone does not have any third-party keyboards installed.

3. Enable the Dictation Feature

If Dictation’s microphone icon is missing on the on-screen keyboard, you must check your keyboard settings and make sure that it’s enabled. Here’s how:

Open the iPhone Settings.
Go to General > Keyboard.
Enable the switch next to Enable Dictation if inactive.
4. Check for Screen Time Restrictions

Screen Time can block certain iPhone features, including Dictation. If the Enable Dictation option above is unavailable within your Keyboard settings, you must check and lift the restriction. To do that:

Open the Settings app and tap Screen Time.
Select Content & Privacy Restrictions.
Tap Allowed Apps.
Enter your Screen Time passcode. You can reset your Screen Time passcode with your Apple ID or iCloud account credentials if you’ve forgotten it.
Enable the switch next to Siri & Dictation.
5. Disable and Enable Siri

Dictation is interlinked with Siri, so another way to fix persistent Dictation issues is to disable and re-enable Siri. To do that:

Open Settings.
Tap Siri & Search.
Disable the switches next to Listen for “Hey Siri” and Press Side Button for Siri.
Restart your iPhone.
Return to Settings > Siri & Search, activate the switches next to Listen for “Hey Siri” and Press Side Button for Siri, and set up Siri from scratch.
6. Add Dictation Languages

Besides English, Dictation supports multiple other languages, such as French, Spanish, and German—check this feature availability page by Apple for a complete list of compatible languages.

However, before you can use Dictation in any other language, you must add the language as a keyboard and switch to it. Here’s how:

Go to Settings and tap General.
Go to Keyboard > Keyboards.
Select Add New Keyboard and select the language.
To use Dictation in the language, tap the Globe icon after invoking the on-screen keyboard, select the language, and tap the Microphone icon.

7. Clean the Microphone

If Dictation constantly converts voice to text inaccurately, it’s a good idea to inspect and clean your iPhone’s microphone. Dust, dirt, and grime can prevent it from picking up your voice.

You can test the microphone by attempting to compose a voice memo. If the recording isn’t clear, gently use a toothpick to pry out any stuck particles on the front-facing earpiece and the bottom right vent.

8. Disable Low Power Mode

Low Power Mode limits various features and functionalities to conserve battery life on the iPhone, which can adversely affect Dictation. To disable the feature:

Open the Settings app and tap Battery.
Toggle off the Low Power Mode switch if it’s active.
9. Install the Latest Version of iOS/iPadOS

Dictation issues can be specific to the system software version on your iPhone. Look for any pending iOS updates, install them, and check if that resolves the problem. Here’s how:

Open Settings.
Go to General > Software Update.
Select Download and Install to update to the latest iOS version.
Conversely, upgrading to a newer iteration of iOS—e.g., from iOS 16 to iOS 17—can introduce feature-breaking bugs and glitches. If the problem occurs immediately after a recent update, it’s possible to downgrade to the previous system software version.

10. Reset All Settings in iOS/iPadOS

Restoring your iPhone’s network, accessibility, and privacy preferences to their defaults is an excellent method to fix recurring problems with Dictation. Don’t worry—you won’t lose personal data or apps except for saved Wi-Fi networks and passwords by doing that.

If you’d like to go ahead with an all-settings reset:

Open Settings.
Go to General > Transfer or Reset iPhone.
Select Reset.
Choose Reset All Settings.
Enter your device passcode to authenticate the action.
Time to Dictate As Usual Again

Dictation makes routine activities like text messaging a breeze, and taking the time to sort out problems with the feature is worth the effort. If none of the fixes above help, reach out to Apple Support for assistance.

Dictation Not Working on iPhone/iPad? Try These 10 Fixes