Few years ago, some online loan apps that claimed to offer loans have stolen personal data from customers and began blackmailing them. When users download these apps, they are often prompted to grant permissions, including access to their contact lists, photo galleries, files, and documents. Many people assume that granting these permissions is harmless.
However, there is a possibility that these apps store personal information without the users’ knowledge. This means someone could be accessing our data without our consent. This information may include passwords, bank account details, and usernames. In some cases, it may even contain secret codes that allow for remote access. As a result, unethical hackers could take control of our devices and monitor our every move.
These incidents are not merely the work of “dark web” masterminds or cyber terrorists; sometimes, even large corporations adopt similar tactics to gain a foothold in the market. New app products are frequently introduced with the primary goal of collecting personal information. This includes online shopping apps, UPI apps, dating apps, betting apps, and now modern apps that claim to utilize artificial intelligence.
Most people are unaware of cyber laws in our country. When downloading an app, many do not take the time to read the terms and conditions or privacy policy. Instead, they simply click “Agree” on the pop-up, which is interpreted as consent to the company’s rules and regulations. This effectively allows the company to use personal data however they see fit.
In the event of a legal dispute, this consent becomes the lifeline for these companies. Consumers find themselves at a disadvantage as companies can argue, “All the rules are already in our policy. Those who agree to them choose to download the app.”
The movie “Control” explores these issues in depth. Currently available on Netflix, the film highlights the risks faced by those who pursue careers as influencers in the cyber era. It illustrates how individuals affected by the dark web are impacted and showcases how corporate fraudsters use deepfake technology to manipulate others.