This International Women's Day, we shout out to the female pioneers fighting for a better internet. To celebrate and spotlight them, we share their inspiring quotes in the thread below.🧵 #IWD22
Meta AI in WhatsApp is now near-inescapable, with the feature rolling out to more devices.
Even users based in one of the 41 European countries should soon see it if they are using the messaging app.
This AI is a less-powerful version of Meta AI's web app.
1/5
Users should see an AI button above the one used to create a new chat, and prompt shortcuts in the search bar.
This AI can be used to create stickers, but not to transcribe audio or summarize the contents of group chats. It can also share Bing links and generate text.
2/5
Crucially, it is not possible to turn off Meta AI in WhatsApp.
Meta states that chats will not be used to train the AI models, but Meta AI conversations could be used to train future versions.
If you don't trust this statement from Meta, there are steps you can take.
3/5
How we use the internet is largely shaped by a handful of US-based tech giants.
US gov't surveillance laws allow them to demand access to your data without your knowledge or a warrant.
Read the thread below for the list of European alternatives that put your privacy 1st.
1/16
We founded Proton in 2014 specifically to resist mass surveillance and abuses by Big Tech.
Google’s Gmail, Drive, Docs, Password Manager and Calendar can now be replaced with @ProtonMail, @ProtonDrive, Proton Docs, @Proton_Pass and Proton Calendar.
2/16
🔍 When it comes to search engines there are:
🇫🇷 @Qwant_FR, a privacy-first search engine based on Bing;
🇩🇪 @ecosia, a search engine that funds planting trees with ad revenue; and
🇬🇧 @mojeek, an independent search engine with strict privacy policies.
While some don't have an issue sharing selfies on social media, the trend of creating a "Ghibli-style" image has seen many people feeding OpenAI photos of themselves and their families.
Here's why that's a problem:
1/4
Aside from the risks of data breaches, once you share personal photos with AI, you lose control over how they are used, since those photos are then used to train AI.
For instance, they could be used to generate content that may be defaming or used as harassment.
2/4
Many AI models, particularly those used in image generation, rely on large training datasets. In some cases, photos of you, or with your likeness, might be used without your consent.
Lastly, your data could be used for personalized ads and/or sold to third parties.
3/4
None of your business (noyb), a privacy non-profit based in Austria and Proton Lifetime Fundraiser beneficiary, is helping a Norwegian ChatGPT user in a complaint against OpenAI.
This complaint has come as a result of fake information being generated by their LLM.
1/6
The user tried to find out if OpenAI had information about him, and so asked it to tell him who he was, using his full name.
ChatGPT confidently made up a story where he was a convicted child murderer, citing the right city and correctly stating that he has three kids.
2/6
Noyb undertook research in order to try and understand why this fabricated information had made it into the output, but there was no explanation or similar stories which could've been mixed in.
LLMs work by predicting the next word in a sequence in response to user input.
3/6
Mark Klein, a former AT&T technician and whistleblower, passed away on March 8 2025.
Although not as well-known as figures such as Edward Snowden, he was responsible for uncovering a web of expansive government surveillance, publicizing this through whistleblowing. 🧵
1/6
Mark Klein always had a strong moral compass and a commitment to privacy.
When he saw coverage in the New York Times about increased surveillance brought in by President George W. Bush after 9/11, he realized that he had been a part of building out this infrastructure.
2/6
Mark linked this coverage to a secret & secure room that he had installed in AT&T's central San Francisco office - Room 641A.
He had been assigned to connect circuits carrying Internet data to optical "splitters" that sat just outside of this room & were hardwired into it.
3/6
This year, researchers from George Mason University published a paper on a way in which Apple's Find My network could be used to maliciously track Bluetooth devices without root access. This method works across multiple operating systems and device types.
1/6
When an AirTag goes missing, it sends out signals over Bluetooth Low Energy (BLE) to nearby iPhones. These in turn send the location of this AirTag back to Apple's cloud in order to help its owner find it again.
2/6
AirTags rely on these networks to locate lost devices rather than GPS. Apple’s Find My network is the largest, leveraging over a billion active iPhones and other Apple devices. This scale is also a weakness if someone has a way to exploit the network.
3/6