1. Political Manipulation (aka Election Interference)
2. Dopamine Addiction
3. Incorrect use of AI
4. Identity Theft through Deepfake
5. Financial and other Fraud
This blog started out to list my research on Indian Wealth Practices.But then I realised that my years of work on toolbox.com may have been archived by the site or is not readily available. So now this is my consolidated blog. Some day, of course, I plan to take this content to my own website with Data localisation.
1. Political Manipulation (aka Election Interference)
2. Dopamine Addiction
3. Incorrect use of AI
4. Identity Theft through Deepfake
5. Financial and other Fraud
Grok is already paid, Chat GPT has a pro version, and Gemini is considering a premium version.
But none of these Big Tech companies is willing to assume any liability for anything incorrect - even blatant lying - churned out by their pro versions.
I think it is wayyy too premature to monetise Gen AI.
Here are three major things that need to be resolved before Gen AI can be monetised:
1. Big Tech has not yet addressed the issue of compensating creators for using their work to train AI. While C2PA now makes it possible for all creators to forever mark their work, Big Tech is not likely to volunteer that it is using any of this work for its personal, commercial use. And copyrighted content they have already used remains unpaid as on date.
2. They have also not addressed another major issue - who owns the copyright to work generated using AI? If the watermarks are anything to go by, Big Tech might start to copyright content generated through its engines.
3. The third thing they have not addressed is liability for abuse - we are aware of deepfakes and their use in crime, of course. But there are other ways to abuse Gen AI. We obviously cannot expect Big Tech to take any responsibility, but then, who does?
Until these issues are resolved, imho, regulators should expressly prohibit monetisation of Gen AI.
There is a concept called "fit for human consumption" - it is a state that a product has to reach before it can be given to humans. Gen AI, imho, has not reached that state yet.
I have a strange problem.
My hostmonster account was compromised and 25 domain names were bought between Dec 31 and Jan 17. The billing amount varied from 14.15 to 70.75 USD.
Different credit cards were used for each purchase.
I got no email notification for ANY of these purchases and no receipts were emailed to me.
I accidently found out when one of the credit card holders noticed a fraudulent charge and raised a dispute and got a chargeback. My hosting account was suspended and i could not access it because of the chargeback. I was surprised because no renewal was due on any of my products and no chargeback had been initiated by me.
Hostmonster completely refused to do any analysis on how the emails were missed and instead mentioned that maybe my basic email id itself was compromised. EVEN IF that were so, it would be impossible to miss so many emails. All the same, I changed the password and took other security measures.
Now, some weeks ago, my core site - kidsnews.top itself was compromised. We found out that the cpanel password was changed and that is how the hacker took control of our sites. The hostmonster support team helped us reset the cpanel password and also told us how to restore our website.
However, they did no forensics to understand how the cpanel password was changed.
Yesterday, when I tried to change my Cpanel password again, I realised that the CPanel password is not what I had set last time. When I tried to reset password, the email did not come.
I confirmed the email id AND that I am supposed to get an email when the password changes (screenshot below).
I am now able to access CPanel from the hosting main login.
The issues are:
A. Each transaction of 70 USD was done on a different credit card, but hostmonster is not able to explain why no email came to me OR cancel the credit card transactions OR even share the credit card numbers that were used.
B. No idea how the CPanel password was changed with no notification to me.
C. I asked for ip addresses of logins to my account and that was also not available.
At this point, I am ok to shut down the entire hosting account and delete ALL our websites on Hostmonster. I also want to ensure that the credit card transactions that were fraudulently done are reversed and i m not listed as the owner of these domain names on the ICANN Registry.
Can you please help?
If a thief comes to you and asks for your jewelry, you will not take it out and give it to them, right?
Now, for decades, experts have been telling us that data is the new oil. So, why are we still giving our data away like its harmless? It's not. Data is called the new oil because it is a wealth generator.
Many people make the mistake of thinking that the only use of data is advertisement targeting. It is not. Data is used for many things, and targeted advertising is the LEAST important of those uses.
Data is used for:
A. Regime Change
B. Civil Unrest almost amounting to internal emergency (I think, in more than 10 countries in the last 3 years alone)
C. Financial Fraud
D. Physical Crime
E. Targeted spear phishing attacks on enterprises
F. Addiction algorithms in apps, websites, and games
G. Blackmail
H. And yes, getting a few dollars out of your pocket through targeted advertising.
You might have read many stories of cyber hack or cyber fraud. You may also have got such calls yourself. You might think that these are random incidents in which innocent civilians got victimised.
They are not. There is proper segmentation, targeting, and then attack. So, if you have been scammed or have received a scam call, a lot of homework has already been done. Much of that homework is now automated.
But, the average Indian is not tech savvy. So, how do we protect ourselves from this?
I have worked to create a list of simple things people can do to minimise their risk of being targeted. Each of these is a small, simple step that will take you one step towards safety.
Like good health practices, these are good cyber health practices.
1. Do not give your Adhar Card anywhere. If they ask for Adhar, ask them - "Do you need my Adhar, or do you need a photo ID/address proof?" For both these purposes, a Driving License works just as well.
2. When submitting your ID card anywhere, blacken a part of the ID number OR DoB so that the ID proof cannot be copied. Especially while checking into hotels and giving ID proof for forms where it will be handled by a call center.
3. Do not use runners or other facilitators who can get access to your ID documents. No one should see your ID document unless it is absolutely necessary.
4. Your phone no. and your email id are your identity. No phone no. at office gates, parking lots, and other random places. Keep two phones - one for all personal interactions and one for places where one has to give the phone no. Never share your personal phone no. or personal Whatsapp number randomly. Same for personal email id. Phone no. and email id are the foundation stones of identity theft. Identity theft is very difficult without them.
1. If something appears too good to be true, it is. This applies to things you are trying to sell, investment options, and everything else related to money. New asset classes are not bad, but ensure that you understand them well before investing.
2. Do not use the same signature for bank cheques and everyday activities. Have two signatures - the official one, and a short signature. When signing for a courier or at an entry gate, use your short signature. Only on official documents, use your official sign.
3. Do not keep money in current and savings accounts. Do not link Fixed Deposits to current and savings accounts. Budget for putting your cash requirements for a month or a fortnight, and put the rest away - even a short term FD will do. Just make sure that it is not linked to your main account.
4. If you are a senior citizen getting inbound transfers of money from your children, ensure that you receive the remittances in 2-3 different bank accounts, and use the non-linked FD principle to manage the cash. Senior citizens with significant inward remittances are specially targeted as they are easy.
5. Do not click on any link on Whatsapp or SMS. All links only on a large screen laptop, where it is easier to spot fake websites and check http and https: (among other things)
6. Do not save credit card information on any website. Most websites, especially Amazon, are sneakily designed to get you to store your credit card information. While tokenisation is supposed to make this safe, it is not foolproof. It only takes one extra minute to input your information manually each time. Do it.
7. Do not load apps on your phone except those that are absolutely necessary. Facebook, LI, Twitter are all available as mobile websites. Use that. Every app is a backdoor entry into your phone and any one of these apps can be compromised or hacked to get into multiple devices at one go.
8. If you have not used an app for more than 2 months, uninstall it. When you need it again, you can install it again.
9. To the extent possible, don't use free apps for things that should cost money - video editing, photo editing, scanning, are all backdoors into your data. Remember Camscanner? It was a popular scanning app that turned out to be .. well, not just a scanning app. It was subsequently banned in India.
10. In addition to 2FA, keep different security questions for each banking/ financial app.
11. Do NOT share your phone number while billing at retail outlets. They will customarily ask you for the phone number. Customarily say, 'Please bill without the phone no." - this one step will minimise the spam calls you get AND your potential for a bank fraud.
12. Do not use autofill and Save Password feature in any browser.
13. Always set your browser to delete all cookies when you close the browser.
14. Do NOT use Google to find service numbers for anything. The number of scams that have happened because Google does not control who can post as service agency for any brand, is crazy high. Google is not your directory. Make an effort to go to the website for the manufacturer or service provider, and ensure that the website is legit.
15. Don't contribute to crowdfunding campaigns for medical care if they ask for your email id and phone number. Just remember the days when you could leave the house, buy the stuff you needed, attend tuition classes, visit a doctor, and come home, without sharing information about yourself. At most, the doctor took your name, age, and gender. That was it. No email id, no phone no.
16. If you get a message that KYC is pending - Visit the Bank. This is for two reasons - One, you need to submit KYC documents physically, and two, the relevant person in the branch will do this. Do not respond to SMSs asking for KYC to be done online.
4. Even if you trust them implicitly and have worked with them for long, keep your personal financial information on a need-to-know basis only for everyone.
5. When sharing your home wi-fi with staff or guests, it is best to create a separate wi fi so that they are not on the same network as your home devices. You can just use a mobile hotspot to enable wi fi.
18. On Facebook, Google, and other platforms, go to your account and disable access to third party apps that you are no longer using. Do this at least once every 6 months.
19. When you are given a choice to login using Google or Login using Facebook, check carefully the data the site will get when you connect the two. Usually, its fine. But check. And if you are uncomfortable, use an email id you have exclusively for these websites.
20. There are no miracle cures. No soulmate is dying to talk to you online. You have not won any lottery. There is no limited time opportunity to invest or get a job. No one has selected you for a job without an interview. No friend of yours is stranded and needs your help. Tax officers are not going to fine you. That new website does not sell everything cheaper.
21. If you are meeting an online friend for the first time, meet in a public place. Not at either of the homes, even if they say it's a get together and many people are expected.
22. When giving out your data for "Registration" - ALWAYS ask:
a. Why is this being collected? (You don't need to give your email id and phone no. to enter an event, make a retail purchase at a retail store, meet a professional who does not need your personal data. In fact, the default state is to NOT share your data. So, always ask WHY they need to collect it. If the answer is - "We just need it", or "It's our process" - Exit. You are not missing anything in life.)
b. Where is this going to be stored? On the cloud? In your hard drive?
c. Who will have access to this information?
d. How will you protect it? What is the safety standard that you use to store your data? Who do you give APIs to?
Do NOT worry about looking awkward or odd. You need to be sure that they really need this info to complete your request, and that they are capable of safeguarding data that is owned by YOU.
23. Online shopping is great. 10-minute grocery delivery is also great. Ordering in food is also great. But if you are a senior citizen or a person with a little child at home, this introduces a vulnerability that you don't want. It is possible to plan your grocery and get it. If you order frequently from online shopping, quick delivery, or food delivery, it becomes possible for someone targeting you, to just don a uniform and approach your house. The security will not notice because these delivery professionals come to your house very often. This is not imagination. Many crimes have taken place in this way. A simple common-sense rule that this model violates is - Your doorbell is sacred. It should only be rung by people you want to invite into your home. Do you really want someone to get a layout of your approach, the entrance area, and the security arrangements, just by getting hired at a nearby delivery service? This is a completely avoidable risk.
24. Before you rush to control everything in the house with an app - ask about how the data is shared, whether it is stored on the company's servers, and who in the company has access to it. Many people were shocked to learn that Amazon uses human listeners to listen to their voice commands. But if they had asked this question earlier, they would know and then take a conscious decision. If the device needs bluetooth to communicate with your phone, that leaves your phone vulnerable to other bluetooth devices, but ensures that the data does not reach the company's servers. Especially if you are a child enabling gadgets for your parents' home, the responsibility of cyber security rests with you.