We’ve all accessed a public Wi-Fi network without thinking, whether it was while waiting in line for coffee and reading our emails, getting on the public network to check the weather, or connecting to the library’s Wi-Fi. When it comes to digital security, however, viewing the web on public Wi-Fi networks is not the smartest practice. It really makes it effortless for hackers to gain access to our devices, potentially exposing personal data such as usernames, passwords, bank account information, and so much more. VPNs, on the other hand, encrypt our online traffic and substitute our IP address, making it secure to connect to public Wi-Fi networks.
The most trusted VPNs in the market are ExpressVPN, NordVPN, VyperVPN, SurfShark etc. However, ExpressVPN is considered the most secure out of the multitude of VPNs available in the market today. ExpressVPN’s commitment to offering a fantastic user experience is admirable. The company’s exceptional 24/7 live chat service, sincere no-fuss 30-day money-back guarantee, and simple-to-use apps for all major platforms are at the heart of this. What are the features that make ExpressVPN a fan favourite?
1. Strong Privacy Features
First and foremost, ExpressVPN has passed an objective security audit, proving its no-logging guarantees. And, perhaps more impressively, this has held up in practice: officials confiscated a Turkish ExpressVPN server in 2017, but no data was retained on the server or turned over by ExpressVPN. That’s what’s referred to as a successful track record. ExpressVPN doesn’t keep track of the websites you visit, it has its own DNS, and it allows P2P traffic.
2. Unbreakable Encryption
ExpressVPN provides extremely exceptional technical security that sets it apart from other secure VPNs. With an RSA-4096 handshake and SHA-512 keyed-hash message authentication code, it implements the AES-256 cypher for OpenVPN (HMAC). Elliptic Curve Diffie–Hellman (ECDH) key exchanges give perfect forward secrecy for data channel encryption. Different kinds of encryption methods followed are:
a popular VPN protocol that automatically reconnects you to your VPN after you’ve been removed from the Internet. It’s especially useful for anyone who frequently switches between Wi-Fi and mobile hotspots, which is a common occurrence whilst using the Internet in public.
IP Security establishes safe Internet access and is frequently used in conjunction with other protocols to boost security.
3. Secure Apps for All Devices
ExpressVPN offers OpenVPN on all of its apps. It runs for all OS such as iOS and even Linux.
Naturally, joining a VPN ensures that your data is safe from hackers, but ExpressVPN recognizes that you don’t want them to have access to your personal information either. One of the most essential features of ExpressVPN is that it does not log your files, which means it will not monitor or save any of your sensitive information.
4. Trusted Server
TrustedServer is yet another wonderful asset to Express’s security armoury. In other words, all ExpressVPN servers run on RAM rather than traditional hard discs. Every reboot wipes all data, and information is not kept by design. Hard-drive-based servers can be difficult to completely wipe, posing a security risk.
5. The Kill Switch
Let’s say you’re using ExpressVPN and your connection goes down. Is it possible that your privacy will be jeopardised? The kill switch, often known as a network lock function, is the reason behind this. If your network connection is lost, the kill switch will turn off whatever software or websites you were using, protecting your privacy.
6. Split Tunnelling
Split tunnelling allows you to use a VPN and a local area network at the same time, which is a terrific method to save bandwidth. The way it works is that some of your traffic will transit through the ExpressVPN tunnel, while the rest will access directly the Internet. If you require access to both a public and a private network at the same time, this is phenomenal. ExpressVPN offers its customers flexibility through this feature.
7. ExpressVPN Protocols
How data packets are delivered across a network is determined by Internet protocols. A VPN server with secure protocols is a VPN server that is safe. The following VPN protocols are used by ExpressVPN:
The Secure Socket Tunneling Protocol is noted for its power and speed, and it is compatible with all Windows devices. It’s well-known for being able to quickly get around firewalls and for establishing a very secure network.
- L2TP/ IPsec
Layer 2 Tunneling Protocol and IPsec combine to offer a highly secure Vpn connection. While L2TP establishes the tunnel, IPSec is in charge of encryption and channel security. It also ensures that the data’s integrity is not jeopardized.
the Point-to-Point Tunneling Protocol generates tunnels in which the data packets are encapsulated. If you truly want to stay under the radar, ExpressVPN also works with TOR.
User Datagram Protocol, or UDP, transfers datagrams that do not require virtual networks to convey data. UDP has the advantage of requiring less bandwidth, resulting in less delay.
The Transmission Control Protocol is made up of seven levels that break down data into smaller units and transport it to the correct location. It’s a great pairing with UDP since it ensures that the data is reassembled in the correct sequence.
However, the nicest part about ExpressVPN is that, while having cutting-edge security safeguards, it is as straightforward as picking a server and hitting ‘connect’ for the user. While you can modify a lot of things behind the scenes, you can also feel secure by sticking to the established defaults. As a whole, ExpressVPN is the simplest and most effective approach to stay safe online. It’s suitable for both beginners and experts, which is why it’s one of the top recommendations for the most secure VPN.
Kamikaze Drones – Latest from Russia Ukraine War Front
Drones or unmanned aerial vehicles (UAVs) are aircraft that do not require a human pilot onboard. They can perform various functions such as reconnaissance, surveillance, communication, or combat support. However, there is a special type of drone that is designed to be used as a weapon itself. These are called Kamikaze drones or loitering munitions.
Kamikaze drones are aerial weapon systems that can loiter around the target area passively for a while before striking once a target is found. They explode when they contact the target and are loaded with explosives. Because their wings fold out as they are launched, they are also known as switchblades or suicide drones.
Various nations and actors have utilised kamikaze drones in an array of wars and crises. They have benefits like stealth, accuracy, cost-effectiveness, and drawbacks including vulnerability, moral dilemmas, and a finite range. They differ from UAVs in their use, functionality, and design. We shall examine the development, characteristics, uses, and implications of kamikaze drones in contemporary warfare in this article.
Evolution of Kamikaze Drones
The concept of kamikaze drones is not new. It dates back to World War II when Japan used manned aircraft loaded with explosives to conduct suicide attacks against Allied ships. These were called kamikaze (divine wind) missions, and they caused significant damage and casualties to the enemy. However, the modern version of kamikaze drones emerged in the late 20th century, with the advancement of technology and miniaturization.
The US was one of the first countries to develop and deploy loitering munitions, such as the Harpy anti-radar drone developed by Israel Aerospace Industries (IAI) in the 1980s. The Harpy could detect and destroy enemy radar emitters autonomously. Since then, several countries have developed and acquired their versions of kamikaze drones, such as Israel’s Harop and Hero series, Turkey’s Kargu and Alpagu series, China’s CH-901 and WS-43 series, Iran’s Raad-85 and Ababil-3 series, etc. Some of these drones can be launched from ground vehicles, aircraft, ships, or even soldiers’ backpacks.
Kamikazes in the Russia-Ukraine War
In the Russia-Ukraine war, both sides have been using various types of drones and UAVs for surveillance, reconnaissance, communication, and combat support. However, since autumn 2022, Russia has been using a new type of drone that has caused significant damage and casualties to the Ukrainian forces. These are the Iranian-made Shahed-136 kamikaze drones.
What are Shahed-136 Kamikaze Drones?
The Shahed-136 kamikaze drones are loitering weapons that could fly independently or remotely to a target location and then detonate upon collision, destroying both the target and themselves. Russia refers to them as Geranium-2. They contain explosives in a warhead on their nose and are programmed to hover over a target until told to attack. The Shahed-136 has a wingspan of around 2.5m (8.2ft) and is difficult to detect on radar. It has a range of about 2,000 kilometres (1,240 miles) and an endurance of up to ten hours. It has a cargo capacity of up to 50kg (110lb) and a top speed of 250km/h (155mph). It can direct itself to its target using GPS or inertial navigation technologies.
How are Shahed-136 Kamikaze Drones Used by Russia?
Since October 2022, Russia has started utilising Shahed-136 kamikaze drones to target Ukrainian forces along the Donbas front line. Since then, Russia has launched over 300 drone strikes, killing over 200 soldiers and wounding over 500 more, according to Ukrainian sources. Russia has also targeted civilian infrastructure, including power plants, bridges, railroads, and factories. Russia frequently employs swarms of drones to overpower Ukrainian air defences and cause confusion and panic among troops. Drones are also used by Russia to offer real-time intelligence and guidance for artillery and missile attacks. Russia maintains that the drone operations are in response to provocations and violations of ceasefire agreements by Ukraine.
How is Ukraine Trying to Combat Shahed-136 Kamikaze Drones?
Ukraine has been trying to counter the drone threat by using various means such as small arms fire, heavy machine guns, portable anti-air missiles, electronic jamming devices, and counter-drones. However, these methods have proven to be ineffective or insufficient when faced with large numbers or high speeds of drones. Ukraine has also sought international assistance and support to enhance its air defence capabilities and acquire more advanced drones and UAVs. The US has said it is supplying Ukraine with 700 of its Switchblade kamikaze drones, but it is unknown whether any have been used. The US has also provided Ukraine with Javelin anti-tank missiles, radars, communications equipment, and training. Ukraine has also used its kamikaze drones to attack Russian targets in Crimea and inside Russian territory. In autumn 2022, Ukraine used kamikaze drones of some sort to attack a Russian military base in western Crimea, an airbase near Sevastopol, and ships in Sevastopol harbour. In December 2022, Ukraine used kamikaze drones for three separate attacks on airbases at Saratov and Ryazan – both hundreds of miles inside Russian territory.
Development of UAVs and Drones in the India-Pakistan Equation
India and Pakistan are two rival neighbours in South Asia who have been engaged in several wars and conflicts over the years. Both countries have been developing and acquiring UAVs and drone technologies for military and civilian purposes. However, there are some differences in their approaches and achievements in this domain. The following table summarizes the comparison of India and Pakistan in UAV and drone technology:
|Market size||Smaller and more focused on military applications||Larger and more diverse with potential use cases in various sectors|
|Talent pool||Smaller and more dependent on foreign partners||Larger and more independent with domestic innovation and development|
|Policy framework||Supportive but less transparent and consistent||Supportive and more liberal and progressive|
|Ecosystem||Vibrant but less mature and competitive||Vibrant and more mature and competitive|
|Strategic advantage||Higher due to geopolitical location and security interests||Lower due to geopolitical location and security interests|
|Import dependence||Higher for high-endurance and combat-capable platforms||Lower for high-endurance and combat-capable platforms|
|Cybersecurity threats||Higher due to hostile actors and weak systems||Lower due to hostile actors and strong systems|
|Ethical and legal issues||Higher due to autonomous targeting and accountability concerns||Lower due to autonomous targeting and accountability concerns|
India has a growing UAV and drone technology industry that is diverse and innovative in various domains and a supportive policy framework and a vibrant ecosystem of drone startups and companies. But with rapidly failing nations as neighbours, India must ensure all border security organizations are adept and capable of utilising these drones to maximum capability.
Swarm Drones – A Weapon India Needs Immediately & Abundantly
The nation was in awe when 1,000 swarm drones performed a breathtaking display during the Beating Retreat Ceremony in New Delhi on January 29, 2022. Botlab Dynamics produced the programme domestically as part of the Make in India initiative. India became the fourth country to accomplish this achievement with a display of 1,000 locally made swarm drones, giving it a significant foundation in the drone technology industry. We, Russia, and China have also performed swarm drone shows.
What are Swarm Drones, and How do they work?
To achieve their assigned goal or other specific missions, such as targeted strikes or supporting tactical operations, swarm drones are uncrewed aerial vehicles (UAVs) flown in large clusters (or many clusters) in contested, hostile, or hostile airspace. These drones cooperate and are either remote-controlled or driven by onboard processors independently. They could be used effectively for various tasks, including disguising assets on enemy radar, locating enemy radar sites, destroying enemy air defences, and performing simultaneous Suppression/Destruction of Enemy Air Defences (SEAD/DEAD) roles.
A swarm of drones can execute various objectives, including attacks on tanks, infantry fighting vehicles, ammo storage facilities, fuel depots, and terror launch pads.
The speed of life in this era is relatively rapid. Several well-known swarm technologies exist today, including:
- The French Icarus project
- The Russian Lightning
- The Spanish RAPAZ
- The UK’s Blue Bearswarm
- The UAE/South African N-Raven
- Israel is working on numerous projects, such as Sky Striker. The Israel Defence Forces used a drone swarm in warfare for the first time in May 2021 while battling Hamas.
- The Army, Air Force, Navy, and DARPA are exploring different swarm initiatives, with several services working on numerous projects, while the Marine Corps is making headway with kamikaze drone swarms.
- China has several swarm programmes.
Swarm Drones: China and India
Chinese swarm drone technology has already advanced quickly. The nation published a video depicting a truck-mounted system firing a volley of swarms in 2021. It was the first time a system of this size had ever been used in actual practice anyplace in the globe. The test proved that the entire procedure, including the quick deployment of vehicles, intensive launching, hovering and launching in the air, exact formation, formation change, ground inspection and attack, and precision strike, was capable.
Regarding India, the Indian Army showcased its drone capabilities on January 15 with the 73rd Army Day, including Kamikaze attacks and strikes using a mothership. In this first-ever demonstration, 75 drones were released from different heights, including smaller quadcopters and larger hexacopters. 13 targets were hit throughout the show, including mock mortar positions, artificial army concentrations, fuel dumps, radar sites, terrorist hideouts, and helipads. The drones were coordinated using area correlation technologies and satellite feeds. With high-impact warheads, these completely autonomous drones can launch missions targeting pre-specified hostile assets up to 50 km inside enemy territory. In a self-destructive attack, drones can hit objects at a distance of 100 miles. The drones were produced in association with a start-up with headquarters in Bengaluru. The skills they brought to the service were much more than what they demonstrated.
However, it will take time for the new technology to be correctly assimilated and to develop local strategies. Although several drones are currently used for border monitoring and anti-terrorist operations, the drones on show during the Army Day ceremony were highly advanced, autonomous, and armed UAVs.
In November 2021, the Defence Research and Development Organisation (DRDO) demonstrated a homegrown capability to carry out offensive missions in enemy territory with swarms of drones working in different formations to identify, encircle, and strike targets. The loitering munitions were developed to meet crucial military requirements and keep soldiers safe. The capability display took place on the first day of a three-day defence event in Jhansi related to the ongoing nationwide celebrations of the nation’s 75th anniversary of independence.
Swarm Drones – Future Military Applications
There are numerous potential military uses for a drone swarm, even if drone technology has largely moved away from human-crewed operations for commercial use. They can conduct reconnaissance missions, surveillance, or target hostile personnel or facilities. A drone swarm might also deter an armed conflict by scanning an area for covert weaponry to build barriers or bar entry to specific locations. A group of networked drones might perform better than separately managed drones in several situations.
One of the most revolutionary inventions of the modern period is still drones. Drone technology is still developing and demonstrating its value in many fields. This technology is expected to remain at the forefront for the foreseeable future thanks to advances in battery performance, better sensors, payloads with extended capabilities, and more perceptive artificial intelligence. But what significant development in UAV technology will come next? Many think that drone swarm technology is the subsequent considerable development for drones. Military leaders worldwide are already interested in technology, and business interest is rising. Swarms are being observed by the advertising and entertainment industries as well. One outstanding example is the record-breaking 3,281 drone display Genesis used to introduce itself to China on April 5, 2021.
Which is the future of movies: OTT platforms or theaters?
Looking back over the last few years in India, we can see that OTT providers have been able to deliver high-quality content to our adjacent screens over the Internet, and that the platform subscriber growth rate is now moving toward high levels despite the COVID-19 epidemic lockdown. In addition to using its collection, OTT businesses invest a lot of money in producing their content. Several causes include new technology, declining data costs, and quicker Internet at home and online. The ease of watching video from OTT sources has been made possible by the entertainment oriented design of today’s smartphones, tablets, laptops, and smart TVs.
In India, there has been a steady increase in movie consumption. There is more than enough entertainment to view, and there are people who are passionate about movies. Going to the film has been a terrific way to pass the time. The rivalry is becoming more intense due to the changing times and the rise of OTT platforms and streaming applications in India. The OTT platforms vs. theaters competition are taking place in the race to offer viewers excellent content. The future of movie streaming applications, OTT platforms, and theaters appears bright due to the rise in movie viewers. Users can create a wide range of multimedia content using over-the-top platforms, streaming apps, and streaming media services. It provides broadcast, Internet, cable, and satellite television programming. OTT platforms are becoming increasingly popular due to changing lifestyles and a growth in smartphone usage with low-cost internet connections.
India has one of the highest rates of growth in the world, according to my research. Movies, in particular, are a huge source of enjoyment for Indians. A family outing where they may spend time together is what theater-going represents for Indian families. The future of movies, movie theaters, and OTT platforms is now looking much better with the launch of numerous new movie streaming apps in India.
OTT platforms and streaming apps have tried to expand their following and user base in India. Numerous streaming apps are setting up studios to create more content. Original content is an essential factor that attracts viewers and aids the growth of OTT Platforms in India. Awide range of original web series and films in many genres are available on all streaming apps. Many streaming services also provide programs and movies in regional languages. They collaborate with regional production businesses to create their films and television shows. Many telecom firms have also launched their OTT platforms and streaming apps to provide users with content.
Over the past three years, India has seen a double-digit surge in streaming apps. As a result, OTT platforms are competingagainst one another. With so many options available across different apps, viewers may find deciding which one to utilize challenging. Find out which of these two well-liked streaming apps is superior by reading our comparison between them.
There are benefits and drawbacks to the battle betweenmovie theaters and streaming apps. While watching a movie in a theater is a beautiful cinematic experience, OTT platforms allow you to enjoy entertainment in the comfort of your own home. They both provide excellent viewing experiences and material.
People used to get excited about watching new movies on the big screen. They still are, but they are now prepared to wait until they are made available on or bought by the OTT platforms. More than ever, several well-known streaming services like Netflix and Amazon Primeare purchasing the digital rights to the highest-grossing movies. Children are crucial to the success of streaming apps. They need relatable, exciting content, which OTT platforms can offer. In contrast to movie theaters, consumers can select to view anything at any time and from any location.
Many producers now opt to broadcast their low-budget movies directly on OTT platforms. Getting movies with a small budget and unknown actors out there can be challenging. Due to India’s lack of theaters, it can sometimes take time to determine a film’s release date. It is better to put them on streaming apps to reduce the expense of printing and advertising and prevent the conflict of release dates. Still, a significant portion of a movie’s earnings come from its theatrical premiere. Nonetheless, it now works to their mutual advantage that movies are released on OTT platforms after they have been seen in theaters. Both producers and OTT media can increase their revenue.
In India’s streaming market, movie theaters and OTT platforms offer unique USPs. On the one hand, movie theaters provide the chance to enjoy 3D films with excellent sound and visuals. The language barrier does not exist on OTT platforms, though. The option of subtitles in several languages, including regional ones, is available onstreaming apps in addition to the choice of material in other languages. Also, we can watch tailored content on OTT platforms, whichprovide recommendations based on our viewing preferences.
Movie theaters have a fee depending on the film, the time of the performance, and the seats. In contrast, OTT platforms bill customers monthly and annually according to their chosen plans, which offer various features and content. The fact that streaming apps provide a variety of content for users who do not pay for their premium services is an advantage. Thus, OTT platforms are less expensive in terms ofcost. There are more pauses and brseaks when watching movies at home because it is more comfortable. In contrast, there won’t be any interruptions when you watch a movie in a theater.
It is encouraging to see how the Indian public perceives the developments in the media and entertainment sectors. According to the Indian market, these applications are revolutionizing the country’s media and entertainment industries. These advancements include accessibility, content effectiveness, affordable media, and creative initiatives. In India, over-the-top applications have a bright future, according to my research. The ease of use and mobility, the variety of content, the prevalence of smartphones, and the cost-effectiveness of the applications are factors that Indian users believe will contribute to their success in this nation. However, OTT services must replicate several aspects of theaters, such as screen size, sound quality, the theatrical experience, and ambiance.
I Tried ChatGPT, & Its Okay
As of November 30, 2022, anyone can use ChatGPT (Chat Generative Pre-Trained Transformer). A chatbot prototype named ChatGPT was made available by OpenAI. The AI-powered chatbot, which can produce code and handle various other sophisticated questions and requests, is gaining more appeal than earlier chatbots.
I wanted to investigate the security implications of the most recent newsworthy development and how it can affect privacy, data, and threat actors because the societal ramifications of AI will continue to evolve as the technology is employed more widely.
Over the years, many of my co-workers have predicted that something will fundamentally alter the security landscape and significantly impact the cyber security business. The likelihood that AI advancements will lead to anything is growing.
Cutting-edge technological advancements frequently make headlines for a short while before fading into academic or commercial applications, but AI is increasingly becoming a normal part of life. Through chatbots, online commerce, fraud detection, and voice assistants, we frequently interact with AI without realizing it. Although security research in this field is expanding, implementing the best practices suggested in that research may need to catch up with current technological advancements.
Despite the fact that ChatGPT, a favorite on the Internet, has grown in popularity over time! But, I have also discovered certain flaws in ChatGPT, a recent creation from OpenAI. ChatGPT content is the issue.
There are various Flaws of ChatGPT that you could have missed.
Older design: Based on online-accessible training data from 2021, ChatGPT is currently available. There may be slight differences in the outcomes it gives because it is already two years old, and the SAP ecosystem has changed significantly since then. Even more sophisticated ChatGPT-4 is expected to debut in 2023. What enhancements will it make to ABAP writing? Wait and see, then.
Response quality: ChatGPT will inevitably give incorrect responses because it is “simply” a language model. In light of this, it might be wise to rely only partially on its production. I suggest verifying the solutions it offers using one of two trustworthy sources.
There is only text: ChatGPT provides text-based findings. This means that we still require someone to handle non-code setups, fill out customized tables, transport changes, put code into an ABAP editor, and possibly debug to identify issues.
Provide Inaccurate Information: I noticed a couple of situations where ChatGPT’s use was constrained because it couldn’t provide precise answers to the questions. It provides inaccurate and irrelevant text since it is unable to understand and adapt to specific inquiries. This AI model cannot always be relied upon to produce correct results, making its usage or trust risky at times.
Extremely Formal: The bias in ChatGPT’s output prevents it from unwinding and behaving naturally. Instead, it typically gives formal responses. Humans, on the other hand, frequently reply to questions in a less official, more casual manner using everyday language and slang. The answers also lack humor, analogies, and sarcasm, which can make ChatGPT content too formal for a variety of content.
Provides summaries: I feel that ChatGPT’s academic works lacked depth on the subject. ChatGPT summarises the topic without offering any unique viewpoints. People create using knowledge, but they also include their own opinions and experiences.
The inability of language models: to comprehend or interpret word and phrase meaning in the same way that people do is another drawback. They can simply produce text using the patterns and connections they have discovered from training data. This implies that they might not always be able to respond to more complicated or abstract topics in a nuanced or intelligent manner.
What could go wrong with this technology?
Keeping tabs on the enormous number of code vulnerabilities is already a burden for the cybersecurity community. Because AI is quicker and more intelligent than humans at identifying weaknesses, these numbers will rise much further. We could witness the weaponization of freshly discovered vulnerabilities in minutes rather than days if AI coders were combined with them. The impact of this discovery on the development of technology may equal, for example, that of the invention of the iPhone or the widespread use of the Internet. Will a service like ChatGPT have a comparable influence on the kind of inflection they brought about in the years to come? Perhaps even more? ChatGPT’s future success or failure will only become apparent with time.
AI is not yet better or faster, but we anticipate it will be. One day, AI will be able to identify weaknesses, turn them into weapons, and create payloads, all without the help of humans.
Chat-GPT is an excellent first step; it is not a panacea for search or chat. Rather, it is a very significant improvement. Using ensemble methods to go from text to multimodal input and output is what I think the next step will do to really alter the game. Moreover, it should be emphasized that Chat-GPT appears to be getting better as we use it, so many of the points I made above might not be relevant even in a week, based on how quickly I am observing things getting better right now.
“Chat-GPT is a subset of OpenAI’s GPT (Generative Pre-trained Transformer) language model. Like other language models, Chat-GPT is intended to produce text that closely resembles human speech based on the input it gets. It can produce a variety of responses to different prompts and questions because it was trained on a sizable text dataset.
My Honest Verdict
To sum up, Chat GPT is a potent natural language processing technology with a variety of uses. It also has certain drawbacks, such as a limited comprehension of context and background information, a hard time recognizing irony and sarcasm, a lack of common sense and general knowledge, and a restricted capacity to comprehend and react to complex inquiries. Moreover, ethical issues such as bias in training data, misuse and abuse of technology, influence on job displacement, and loss of human interaction, privacy, and security must be taken into account.
Considering what I’ve said thus far, I can categorically state that this software is among the most creative real-world chatbot instances and has a wide range of potential applications. However, I recommend that you consider it as a fantastic and extremely valuable tool that can greatly improve your performance in this area rather than a solution to completely automate your content creation.
In the end, Chat-GPT is a brilliant model that has the potential to generate chaos.
TikTok- an Intelligence Gathering App?
In recent years, TikTok has become a global sensation, with millions of users creating and sharing short-form videos on the platform. However, as the app’s popularity has grown, so too have concerns about its privacy and security. With reports of data breaches and potential links to the Chinese government, many are questioning whether TikTok is more than just a harmless entertainment app, but rather an intelligence gathering tool for foreign powers. In this article, we’ll explore the evidence behind these claims and examine the potential risks associated with using TikTok.
Technology advancements have fueled previously unheard-of social and economic growth. However, advanced technology development has also been a part of the fourth industrial revolution. It is causing disruption, new points of vulnerability, and adverse side effects that still need to be fully understood, much less managed. Cybersecurity is a challenge in a digitalized society as global threats increase. Rising dangers include identity theft and fraud, cyberattacks, and intrusions of vital infrastructure, electrical networks, and financial markets. Our lives are now more than ever dominated by communication technologies. It offers countless advantages but also new risks. For instance, the phenomenon of fake news is similar. But digital technology, which has led to the multiplication of information outlets and the growth of social media, is primarily to blame for its pervasiveness today.
The Rise of TikTok
Zhang Yiming created Musical.ly in September 2016, and in November 2017, Beijing’s Bytedance Technology purchased the app musical.ly and changed the name to TikTok. This app quickly rose to the top spot among Chinese-developed apps in worldwide distribution. 800 million monthly users were reported as on November 2020, while 738 million first-time installs were anticipated in 2019.
It is also essential to comprehend why people use TikTok and related subjects. Such comprehension is also necessary in light of recent research findings that TikTok is an effective medium for educating young people about such issues as their health, government information releases, political debates, travel-related information, live online sales, and even educational material. Even video posts have been examined in a radiology-related academic publication.
What Makes TikTok so Compelling?
First off, unlike other social media, the app’s algorithm offers material to users based on their behavior and data signals rather than on who they choose to follow. This implies that users can skip any other accounts to view a personalized feed of videos based on their interests and behavior each time they log in. Most of the app’s content is short-form video, with the typical video lasting between 21 and 34 seconds and offering regular bursts of excitement. The software also automatically starts playing the following video, so users are repeatedly “pushed” to watch one video after another.
Is TikTok a Terrifying App?
It is no surprise that TikTok, the immensely well-liked entertainment app, has generated some controversy. If you’ve ever used TikTok, you know that it’s a platform for quick, amateur videos, typically featuring young adults lip-syncing to songs or imitating their favorite memes, along with the typical dog and cat videos that are all over the internet.
Can you guess the minimum age to access TikTok? It is just 13 years!! However parents of young teens can take solace in the fact that at least the minimum age to send direct messages to other users may be 16 years.
What claims have been made against TikTok? There are mainly four charges put up against TikTok:
- The personal information TikTok obtains when registering an account can be (mis)used by the Chinese state.
- Downloading the app provides you access to Chinese malware.
- TikTok is a platform for Chinese influence operations.
- Chinese intelligence services use TikTok to gather vital information.
It’s excellent that Chinese spying and cybersecurity are now important public debate points still; occasionally, it feels more like a robotic repetition of accusations without regard to likelihood rather than thoughtful analysis. If you’ve watched TikTok, you could find it addictive, but there isn’t anything insightful. If the Chinese intelligence agencies were compelled to look for intelligence value in 15-second films of kids lip-syncing, they would be in a terrible position.
TikTok as an OSINT (Open Source Intelligence) Tool
Since most TikTok users are members of Gen Z, who make up the largest generation on the planet right now, they frequently post pictures and videos of what they do and see on social media. Over 83% of all users of the app have created and shared videos on TikTok, making it possible for anyone to become a content creator. The platform is a wealth of data from the OSINT point of view. OSINT ensures that users constantly obtain the most accurate and trustworthy information accessibly.
TikTok and Russia- Ukraine War
Since the Russia-Ukraine battle, which is being called the “first TikTok war,” social media has been crucial in helping millions of people stay aware of their surroundings. While social media has long been a place for conflict and unrest to play out, new capabilities like live streaming and the fact that over 61% of Ukrainians own smartphones make it easier than ever to get first-hand accounts of what is happening on the front lines.
Even before the invasion, TikTok was part of a more significant effort to monitor the army buildup near the Ukrainian border, which regular Ukrainian residents shared. Videos on TikTok with the hashtag “#Ukraine” had amassed more than 26.8 billion views as of March 9th, 2022, less than two weeks after the war started. On TikTok, more than any other platform, the conflict had the highest level of engagement with the content.
The Negative Aspect For OSINT Investors
The inability to precisely geolocate videos is one of the problems with using TikTok for intelligence gathering. However, there are still ways for analysts to figure out where the video was shot without location tagging. First, you can narrow your search by looking at the hashtags used in the video title, which occasionally contain identifying information like a city, town, or region. You can find more information by simply reading the comments; there might be other people who are familiar with the location and have left comments on the video.
TikTok as a Source of Information
The Wall Street Journal reports that 40% of people between the ages of 18 and 24 now use TikTok to look for information, which is concerning considering the app’s illustrious history as a disinformation factory. The audience of TikTok is attracted by the fact that anyone may become popular on the app, regardless of the number of followers; therefore, users are encouraged to keep their accounts public. This indicates that there is a tonne of publicly accessible content; still, people continue tremendous favor the usage of pseudonyms, especially when posting about current events like the conflict between Russia and Ukraine.
“The Web as I envisaged it, we have not seen it yet. The future is still so much bigger than the past.”
– Tim Berners-Lee, Inventor of the World Wide Web.
Despite the controversies surrounding the platform, security professionals who disregard TikTok as a significant OSINT source run the danger of failing to detect severe risks to their personnel, property, and reputation. Everything depends on the user’s proper intervention in the application usage that comes into question.
Technology1 year ago
Climate Crisis; Cries Asia
Archives2 years ago
Ramappa Temple: India’s 39th World Heritage Site
Defence11 months ago
The UAV Boom in India
Polity1 year ago
Is China Africa’s New Colonial Overlord
Defence10 months ago
Defense Cess – The Need or The Want of Need
Book Review1 year ago
A cruel birth of Bangladesh by Archer K Blood: Book Review
Archives2 years ago
5 reasons why Bollywood has a monopoly over the Indian Music Industry
Polity2 years ago
Spotify announces the launch of HiFi audio streaming feature in India: Here’s all you need to know