Connect
To Top

Downside of 10-year challenge

 

 

 

Technology consultant Kate O’Neill, last week cast fear among Facebook users with her suggestion that the data mined from the 10-Year Challenge could be used against us. She said its possible age progression recognition technology would be used in health care and health insurance assessments. “For example, if you seem to be aging faster than your cohorts, perhaps you’re not a very good insurance risk. You may pay more or be denied coverage.” She argued that the negative ramifications of sharing our data is a very real possibility, pointing to past incidents — such as when data for as many as 87 million Facebook users was “improperly shared” with Cambridge Analytica, a data analytics firm used by the Trump campaign in 2016. Some have dismissed O’Neill’s warnings, she said, arguing that many of the photos posted in the challenge were already available online anyway. But, O’Neill pushed back on this dismissal, pointing out that participating in the challenge helps to verify and curate the data.

What can go wrong
Businge Gerald, Digital Security expert, Ultimate Multimedia Consult says depending on which information is shared, the individual becomes a product whom sellers target with any message or take advantage of. In the worst-case scenario, the shared information can lead to one losing their privacy and getting disadvantaged on based on say their beliefs, status, interests, habits or location.

Penelope Sanyu, team leader Femme Forte Uganda, says she is usually reluctant to join such challanges because of the far reaching effects of sharing such information online.
“I am not one to quickly jump at challenges and this particular one was so inviting. The images were funny and of course brought back very fond memories. However, I am very skeptical about the internet because as much as we try to act like it is okay to upload everything and anything, tech is not really our friend. So I chose not to participate not out of fear but rather out of precaution,” she shares.

Yusuf Opad, a software developer at True African, emphasises that the victim is exposed to identity theft; if one gets hold of your credit card, they can authorise payment especially if you are reckless enough to disclose your bank details.

How to protect information
“It is advisable to resist sharing personal information; if you do not want to be figured out on your social networks. It is vital to carefully select your privacy settings in ways that will protect you. One also has to be careful and avoid signing up for applications that ask for access to their account information,” Businge advises.
Opad advises on some of the ways to execute cyber protection by constantly changing security authentication codes like passwords, Personal Identification Numbers (PINs), changing the reset and security questions and answers used to open on your emails.

Other digital security measures to jot down include encrypting phone conversations with end-to-end user via Whatsapp, avoiding using public WiFi while accessing the Internet, be cautious to limit what your Apps can have access to by managing your applications permissions; to areas of camera, gallery, contacts, location and messages.
Also limit usage of easy to find passwords such as your names or children or dates of birth, and always delete history from the browsers settings, especially while using public computers. Lastly always use protected URL links: hyper texted transfer server (https) and not http for any website.

To retrieve information
“In case there has been a breach in terms of sharing someone’s personal information that should not be shared, the party trusted with the information must do all possible ways to restore integrity and protection of an individual’s information. All personal information shared with your social media accounts is visible as per your account settings on what should be visible to whom. The challenge is that many people do not take time to change their privacy settings to ensure your desired level of protection is key,” notes Opad. He believes once information is shared, it cannot be retrieved, since the victim has no authority to do that.

 

Leave a comment

More in Features

  • Kulumba: A man of many talents

    The Lockdown Life: Kulumba taught himself to be a flexible, multi-talented, adaptable, multi tasker, who gained discipline and learnt how to...

    sqoopadminSeptember 17, 2021
  • CELEBRITY STYLE: GNL Zamba, HipHop Artiste

    When choosing what to wear in the morning, I put into consideration… My mood dictates what I wear, I am quite...

    sqoopadminSeptember 17, 2021
  • Y+ beauty pageant returns

    By David S Mukooza Young people living with HIV under their umbrella organisation, Uganda Network of Young People Living with HIV/Aids...

    sqoopadminSeptember 13, 2021
  • First Hit experience

    Masters of their musical fate:  Every artiste’s dream is to get a hit. Some come sooner than others in the course...

    Isaac SsejjombweSeptember 10, 2021
  • Danny Kay, the lyrical doctor from Mubende

    REPRESENTING: We don’t have many artistes from Mubende but Daniel Karumuna commonly known as Danny Kay says he’s the best there...

    Isaac SsejjombweSeptember 10, 2021
  • Every day is a bad hair day – Tendo

      It has always been music. She announced her arrival with “Hajjati wa Hajji” and in a very short time, had...

    sqoopadminSeptember 5, 2021
  • I have got the sound of legends in my head- Axon

    Master craft:  Producer Axon is the mastermind behind club bangers such as John Blaq’s Tip, Sheebah’s Boy fire and Fik Fameica’s...

    sqoopadminSeptember 3, 2021
  • Celebrity style: Irene Ntale, Artiste

    When choosing what to wear in the morning, I put into consideration… The weather and my mood that morning. The item...

    sqoopadminSeptember 3, 2021
  • There is a ray of hope for fashion – Joram Muzira

    The entertainment industry is one of the sectors that has suffered more because of this lockdown. At least some sectors have...

    Isaac SsejjombweSeptember 1, 2021