Apple Intelligence Is Gambling on Privacy as a Killer Feature
Last month, ahead of the launch of the Switch 2 and its GameChat communication features, Nintendo updated its privacy policy to note that the company "may also monitor and record your video and audio interactions with other users." Now that the Switch 2 has officially launched, we have a clearer understanding of how the console handles audio and video recorded during GameChat sessions, as well as when that footage may be sent to Nintendo or shared with partners, including law enforcement.
Before using GameChat on Switch 2 for the first time, you must consent to a set of GameChat Terms displayed on the system itself. These terms warn that chat content is "recorded and stored temporarily" both on your system and the system of those you chat with. But those stored recordings are only shared with Nintendo if a user reports a violation of Nintendo's Community Guidelines, the company writes.
That reporting feature lets a user "review a recording of the last three minutes of the latest three GameChat sessions" to highlight a particular section for review, suggesting that chat sessions are not being captured and stored in full. The terms also lay out that "these recordings are available only if the report is submitted within 24 hours," suggesting that recordings are deleted from local storage after a full day.
© Aurich Lawson | Nintendo
Tracking code that Meta and Russia-based Yandex embed into millions of websites is de-anonymizing visitors by abusing legitimate Internet protocols, causing Chrome and other browsers to surreptitiously send unique identifiers to native apps installed on a device, researchers have discovered. Google says it's investigating the abuse, which allows Meta and Yandex to convert ephemeral web identifiers into persistent mobile app user identities.
The covert tracking—implemented in the Meta Pixel and Yandex Metrica trackers—allows Meta and Yandex to bypass core security and privacy protections provided by both the Android operating system and browsers that run on it. Android sandboxing, for instance, isolates processes to prevent them from interacting with the OS and any other app installed on the device, cutting off access to sensitive data or privileged system resources. Defenses such as state partitioning and storage partitioning, which are built into all major browsers, store site cookies and other data associated with a website in containers that are unique to every top-level website domain to ensure they're off-limits for every other site.
“One of the fundamental security principles that exists in the web, as well as the mobile system, is called sandboxing,” Narseo Vallina-Rodriguez, one of the researchers behind the discovery, said in an interview. “You run everything in a sandbox, and there is no interaction within different elements running on it. What this attack vector allows is to break the sandbox that exists between the mobile context and the web context. The channel that exists allowed the Android system to communicate what happens in the browser with the identity running in the mobile app.”
© Aurich Lawson | Getty Images
Every time I write an article about the escalating advertising and tracking on today's TVs, someone brings up Apple TV boxes. Among smart TVs, streaming sticks, and other streaming devices, Apple TVs are largely viewed as a safe haven.
"Just disconnect your TV from the Internet and use an Apple TV box."
That's the common guidance you'll hear from Ars readers for those seeking the joys of streaming without giving up too much privacy. Based on our research and the experts we've consulted, that advice is pretty solid, as Apple TVs offer significantly more privacy than other streaming hardware providers.
© Aurich Lawson | Getty Images
Signal is taking proactive steps to ensure Microsoft’s Recall feature can’t screen capture your secured chats, by rolling out a new version of the Signal for Windows 11 client that enables screen security by default. This is the same DRM that blocks users from easily screenshotting a Netflix show on their computer or phone, and using it here could cause problems for people who use accessibility features like screen readers.
While Signal says it’s made the feature easy to disable, under Signal Settings > Privacy > Screen Security, it never should’ve come to this. Developer Joshua Lund writes that operating system vendors like Microsoft “need to ensure that the developers of apps like Signal always have the necessary tools and options at their disposal to reject granting OS-level AI systems access to any sensitive information within their apps.”
Despite delaying Recall twice before finally launching it last month, the “photographic memory” feature doesn’t yet have an API for app developers to opt their users’ sensitive content out of its AI-powered archives. It could be useful for finding emails or chats (including ones in Signal) using whatever you can remember, like a description of a picture you’ve received or a broad conversation topic, but it could also be a massive security and privacy problem.
Lund notes that Microsoft already filters out private or incognito browser window activity by default, and users who have a Copilot Plus PC with Recall can filter out certain apps under the settings, but only if they know how to do that. For now, Lund says that “Signal is using the tools that are available to us even though we recognize that there are many legitimate use cases where someone might need to take a screenshot.”
Apple is known for prioritizing privacy and security, but there are additional measures you can turn to if you feel you need them. iPhones, iPads, and Macs have what's known as a Lockdown Mode that takes protecting your data to a whole new level.
It's clear that this isn't for everyone: Apple describes it as being for those who feel they might be attacked by "the most sophisticated threats." Think journalists working in dangerous regions, activists under threat from surveillance or censorship, or politicians with access to top secret information.
Anyone can turn it on and off as needed - you don't need any special status or any particular kind of Apple account. It only takes a few taps or clicks, and you'll have the highest level of security protection that Apple offers.
It's worth bearing in mind that there are some tradeoffs when using Lockdown Mode. The software you use will be limited in some of its functionality to give would-be hackers fewer ways to get at you and your data.
You'll find most attachments in Messages blocked, while FaceTime calls are only permitted with people you've had contact with in the last month. In Photos, you can't c …