‘I don’t care’: young TikTokers unfazed by US furor over data collection | The Guardian

Trump has threatened to ban the app amid privacy concerns. But young people say they’re used to being trackedMauren Sparrow downloaded TikTok in March to pass the time during lockdown. Since then she’s posted tutorials on crafting and videos of her two cats, Calcifer and Jiji, some of which have accrued millions of views and likes. But with the Chinese-owned app now under fire over data privacy concerns, Sparrow, 29, and other young users have reacted with a resounding shrug.I’m so used to all social networks having my data that I feel it’s just the price I have to pay to connect with others Continue reading…

Trump has threatened to ban the app amid privacy concerns. But young people say they’re used to being tracked

Mauren Sparrow downloaded TikTok in March to pass the time during lockdown. Since then she’s posted tutorials on crafting and videos of her two cats, Calcifer and Jiji, some of which have accrued millions of views and likes.

But with the Chinese-owned app now under fire over data privacy concerns, Sparrow, 29, and other young users have reacted with a resounding shrug.

I’m so used to all social networks having my data that I feel it’s just the price I have to pay to connect with others

Continue reading…


Are you Citizen-Journalist Material?

Have a tip or scoop? Do you have info about corruption that needs to be investigated and responsibly exposed ? Get in touch securely via WhatsApp at +44 7771 927378 | Signal at +447766 098270


Receive Exclusives, Features & News Updates

Subscribe



What Are
Geo-Poli-
Cyber™ Risks?

What Is Geo-Poli-Cyber™?

MLi Group created the terms Poli-Cyber™ and Geo-Poli-Cyber™ (GPC™) in 2012 and 2013 based on the philosophy that if you cannot identify and name the threat, you cannot mitigate that threat.

Geo-Poli-Cyber™ attacks are political, ideological, terrorist, extremist, ‘religious’, and/or geo-politically motivated.

More Sinister Than Financial Motivations

Geo-Poli-Cyber™ attacks are significantly different from financially motivated cyber-attacks in damage, scale, magnitude as well as in risk mitigation strategies and solutions.

Click to read more