7 Expert Tips for Safeguarding Your Personal Data

VPN providers are experiencing significant growth, offering virtual private networks that create encrypted paths for Internet data, effectively masking a user’s location.

Previously, VPNs were of interest mainly to a niche audience. Nowadays, they are increasingly utilized by individuals frustrated with the age verification requirements imposed by the Online Safety Act.

Since the law became effective on July 25th, VPNs have surged to prominence in UK app stores, as users seek to safeguard their identities.

It’s understandable that users overwhelmed by the demand for personal information turn to VPNs, though there are other ways to maintain safety online.

Want to go incognito?

Many users instinctively turn to the “Incognito” or “Private Browsing” mode available in their browsers. However, be cautious of misleading terminology.

“Private browsing isn’t as private as it seems,” warns Jake Moore, a cybersecurity expert at ESET. “It merely prevents your browser from saving your search history, cookies, and autofill information on your device.”

This feature is handy for avoiding traces on shared computers (e.g., when purchasing gifts online) but does little to conceal your identity from external parties.

“Your identity remains visible to websites, ISPs, and advertisers,” Moore emphasizes. “They can still see your IP address and track you if desired.”

read more:

Steer clear of major players

Search engines are the primary doorway to countless websites, yet many users are uneasy about the extensive data tech companies gather about them for advertising purposes.

“Google collects vast amounts of user data for profiling and targeted advertising, which is their main revenue source,” says Moore.

“This level of data analysis can be very invasive, and many users are unaware of it. [Tech companies] track their online behavior extensively.”

As an alternative, consider privacy-focused search engines like DuckDuckGo. “I always recommend DuckDuckGo,” says Alan Woodward, a Professor of Cybersecurity at the University of Surrey.

Beyond being a search engine, DuckDuckGo also features a web browser as an alternative to Google Chrome, Microsoft Edge, or Apple’s Safari, both of which are endorsed by Moore and Woodward.

Email also plays a crucial role in our online lives.

While “Big Tech” isn’t scrutinizing every detail of your holiday emails, it does analyze your data for advertising purposes—something they’ve been doing for years, Moore notes.

This data analysis allows Gmail, Outlook, Yahoo, and others to provide free services.

For many, myself included, the balance between cost and convenience seems acceptable. However, alternatives exist.

ProtonMail, a well-known option available for over ten years, features end-to-end encryption and built-in anonymity.

With 1 GB of free storage and an additional 5 GB from their Proton Drive cloud service, users get ample space, even if it’s less than what Google offers.

Increased social media usage compromises your identity security – Image courtesy of Alamy

Many web users have concerns about online payments, yet they are becoming increasingly unavoidable. PayPal is a reliable option.

“PayPal offers great convenience, and I’ve never encountered issues with them selling my data,” says Woodward.

Moore adds that PayPal can be a safer choice than directly entering your credit card information on websites.

For those apprehensive about credit card details being stolen, many banks provide virtual cards that can be utilized for one-time or occasional use through their apps.

Apple vs. Android

The debate between Apple and Android enthusiasts is as intense as sports rivalries, leading to divided opinions among experts.

Apps in the Apple App Store undergo more rigorous vetting, making them a potentially safer choice.

Nonetheless, “Both Apple and Android are vying to gather information on their users,” Moore points out. “Both seek user data, which translates to power.”

Avoid social media

The same applies to social media. Although it has become integral to modern life, there’s no perfect middle ground between engaging in online discussions and protecting your identity or controlling how platforms manage your data.

“For data-heavy social media, the best privacy strategy is simply to avoid it altogether,” Moore advises. “Keep in mind: If the service is free, you’re probably the product.”

read more:

Source: www.sciencefocus.com

Rapamycin May Extend Lifespan by Safeguarding Against DNA Damage

Illustration of rapamycin (red), a drug that inhibits proteins known as MTOR (blue)

Science Photo Library/Alamy

The anti-aging benefits of rapamycin may be related, at least in part, to its ability to prevent DNA damage in immune cells.

Initially created as an immunosuppressant for organ transplant patients, rapamycin blocks the function of the MTOR protein, which is crucial for cell growth and division. Studies suggest that low doses can extend the lifespan of various organisms, including the mouse, potentially by disrupting processes associated with aging, such as inflammation, intracellular breakdown, and decline in mitochondrial function.

Recent research by Lynn Cox and colleagues at Oxford University has demonstrated that rapamycin also appears to prevent DNA damage in certain types of immune cells. DNA damage is one of the key factors contributing to aging in our immune system, accelerating the aging process throughout the body.

The researchers conducted experiments with human T cells, a type of white blood cell responsible for fighting infections. When T cells were exposed to an antibiotic named zeocin alongside rapamycin, significant DNA damage occurred.

Results showed that rapamycin lowered DNA damage and tripled cell survival rates compared to T cells exposed to zeocin alone.

The researchers found no indication that the observed effects were due to other actions of rapamycin, such as preventing cell failure. “We consistently observe this effect regardless of whether rapamycin is administered prior to, during, or post-injury,” noted team member Ghada Arsare at Oxford University.

The rapid response suggests a direct impact. “The effect is very swift, indicating it influences the DNA damage response and accumulation. The lesions observed last about four hours, so it’s unlikely that there are downstream effects impacting other processes,” explained Cox.

According to Matt Kaeberlein from Washington University in Seattle, the findings support the notion that rapamycin can directly protect DNA, but “this is not the critical mechanism.” Researchers aim to explore rapamycin-induced alterations in RNA and proteins produced in immune cells.

In a separate part of the study, nine men aged 50 to 80 were assigned to receive either 1 milligram of rapamycin or a placebo daily. Blood tests conducted eight weeks later revealed that T cells from men taking rapamycin exhibited less DNA damage. Furthermore, neither group experienced a decrease in overall white blood cell counts, indicating that rapamycin does not negatively impact immune functionality. “Our findings confirm that low doses are safe, which is crucial,” stated Cox.

Mitigating DNA damage in the immune system may provide a pathway for reducing overall aging, according to Cox. Arsare highlighted the potential for rapamycin to be used preventively, such as for astronauts exposed to cosmic radiation.

“Rapamycin is particularly promising in addressing aging-related issues where DNA damage is a significant factor, such as skin aging,” noted Kaeberlein. Referring to a study, he added that local use of rapamycin reduces aging markers in human skin. However, he cautioned against generalizing results to other types of damage, such as radiation, given that Cox’s team used antibiotics to create DNA damage.

Zahida Sultanova from the University of East Anglia emphasized the necessity for trials involving women and individuals across various age groups, as the placebo-controlled experiments were limited to older men. Evidence from non-human animal studies indicates that rapamycin may have sex-specific and age-specific effects.

topic:

Source: www.newscientist.com

A Study of 10,000 Individuals Reveals Strategies for Safeguarding Memory in Middle Age

A favorable perspective on life may safeguard against memory loss during middle age, as indicated by a recent 16-year study conducted by researchers from the UK, the US, and Spain.

Published in Aging and Mental Health, this study posits that a sense of happiness—which encompasses joy, confidence, purpose, and control over one’s life—is closely linked to improved memory recall.

Participants who rated their happiness levels higher tended to excel in memory assessments, regardless of whether they reported experiencing symptoms of depression.

“This study marks a vital advance in comprehending the relationship between happiness and memory over time,” stated the co-authors. Professor Joshua Stott, a Professor of Aging and Clinical Psychology at University College London, added, “It sheds new light on how self-reported happiness correlates with memory and vice versa.”

Researchers monitored 10,760 men and women over the age of 50 in the UK. Beginning in 2002, participants convened with the research team every two years to undergo memory evaluations.

During each session, they also completed a well-being survey, responding to prompts such as “I can do what I want to do” and “I feel that life is filled with opportunities.”

After 16 years, this data was examined by a team of 15 specialists to establish connections between cognition and memory.

“In light of an aging population, it’s vital to understand the factors that may protect and sustain healthy cognitive functions for the betterment of public health and policy development,” said Dr. Amber John, a lecturer in psychology at the University of Liverpool.

She noted that the study implies that overall well-being is more beneficial than merely better memory. If future research can demonstrate that improved health leads to Enhanced Memory, then prioritizing health could shield the brain from future deterioration.

Dementia and anxiety are commonly considered to accelerate cognitive decline in individuals with dementia. – Credit: J Studio via Getty

This study received partial funding from Alzheimer’s Disease Research UK. “We’ve observed significant financial support,” stated Emma Taylor, information services manager for the charity.

“It’s never too late to take measures to maintain our brain health throughout our lives and mitigate the devastating impacts of dementia.”

The authors of the study suggested that a decrease in psychological well-being could serve as an early indicator of potential cognitive decline, recommending strategies such as mindfulness as interventions to avert this trajectory.

read more:

Source: www.sciencefocus.com

Tips for Safeguarding Your Mobile Phone While Traveling Internationally

This summer, while traveling to Asia, I have decided to leave my iPhone behind. Instead, I will be taking an alternate phone that doesn’t have essential apps like Instagram, Slack, Signal, and others. It won’t even access my work email.

To clarify, I’m not aiming for a digital detox. My personal device holds sensitive information that I prefer to keep private, particularly from entities like US border officials. Hence, I’ve opted for a burner phone for my travels.

For over ten years, the federal government has had the authority to conduct border searches on travelers’ personal electronic devices, including phones, laptops, and tablets. These searches have been on the rise, yet only a minor percentage of travelers experience them upon entering the US.

Last year, the US Customs and Border Protection Agency reported conducting roughly 43,000 electronic searches, which is an increase from about 38,000 earlier.

I may come off as particularly cautious due to my profession as a journalist, always striving to protect sensitive sources. Thus, the burner phone seems like an extreme but necessary measure for some.

Recently, travelers have faced denial of entry into the US due to data on their phones, including social media content. Posts related to protests have also been scrutinized.

“A significant concern is the government’s ability to select individuals for searches,” explained Esha Bandari, an attorney with the American Civil Liberties Union. “There are instances of more intense searches at the border, affecting not just ordinary travelers but also lawyers protecting client confidentiality and those perceived as dissenters.”

While the rules for entering the US remain unchanged, the enforcement frequency may be increasing. Both leisure and business travelers need to be mindful of the data on their devices.

There’s no universal solution; the best strategy is contingent on your lifestyle and profession. Here’s how to navigate this.

Cybersecurity expert Jeremiah Grossman suggests starting by evaluating who you are, your professional role, and how you use your devices.

For instance, if you’re a retired US citizen with holiday pictures or casual texts with friends, your data might not pose a significant concern. However, if you’re a visa student involved in government protests, your phone might contain information that could lead to complications.

“If law enforcement has full access to your phone’s contents, is it detrimental to you?” Grossman questioned.

From there, judge whether the risk is high or low to determine your strategy.

If you’re slightly apprehensive about data searches, disable biometrics like fingerprints and facial recognition and rely solely on your passcode for unlocking your device.

For iPhones, go to the Settings app, tap Face ID & PassCode, enter your passcode, and turn off Unlock iPhone.

For Android devices, the steps may vary by model, but generally, you can find the option to turn off face unlock and fingerprints in the Settings menu.

Using only a passcode is a smart strategy for US citizens, as it can make it legally more challenging for officials to compel you to unlock your phone, Bandari noted.

While citizens can refuse to share a passcode, visa holders and tourists could face entry denial if they refuse compliance, so it’s wise to uninstall apps with sensitive information, like Instagram, Signal, and others.

If you suspect a moderate likelihood of a government search, consider backing up all your data and cleaning your device before heading back to the US, Grossman advises.

For convenience, back up your data to an online service, like iCloud for iPhones or Google Drive for Android devices. This ensures that you can easily restore your data later by logging in to your account.

To back up your iPhone data to iCloud, go to the Settings app, tap on your name, then iCloud, select iCloud Backup. Enable Back up this iPhone and then tap Back up now. To erase iPhone data, use the Settings app, tap General, select Transfer or Reset iPhone, and tap Erase All Content and Settings, then follow the prompts.

For backing up your Android device to Google, go to the Settings app, tap on Google, and then select Backup. To purge data from Android, the steps will vary based on your phone model, but you can typically find the option for Factory Reset in the Settings.

After erasing the device and crossing the border, you’ll be able to restore the device from your backup during setup by entering your account credentials. (Make sure to note your password securely.)

If you believe there’s a significant chance that US border officials will request to see your phone, the safest route is to leave your personal device at home and travel with a burner phone designated solely for your trip.

Here’s my plan:

  • I will bring an inexpensive Android smartphone loaded only with travel-related apps, such as navigation and transportation apps.

  • I’ll log into a separate email account created specifically for the trip to keep my itinerary and other travel information.

  • Upon arrival, I’ll use eSIM technology to connect to a temporary mobile plan on a local network, which can be set up via apps like Nomad, Airalo, or Gigsky. (I’ve previously written a guide on using eSIM technology.)

After returning home, I’ll transfer all my vacation photos from the burner phone to my iPhone and stash the burner away until my next journey.

Source: www.nytimes.com

Musicians such as Billie Eilish, Nicki Minaj, Stevie Wonder call for safeguarding against AI advancements

More than 200 prominent musicians have joined in signing an open letter to advocate for protections against the predatory use of artificial intelligence to mimic human artists’ likeness, voice, and sound. The signatories come from various musical genres and eras, including popular stars like Billie Eilish, J Balvin, and Nicki Minaj, as well as icons like Stevie Wonder and REM from the Rock and Roll Hall of Fame. The estates of Frank Sinatra and Bob Marley have also signed the letter.

The letter was published by Artist Rights Alliance. Advocacy groups have urged technology companies to commit to not developing AI tools that undermine or replace human songwriters and artists.


The letter emphasizes the need to protect human creativity from being exploited by AI, stating, “We need to stop the predation of AI to steal the voices and likenesses of professional artists, violate the rights of creators, and disrupt the music ecosystem.”

While the letter does not advocate for a complete ban on AI in music and production, it acknowledges that responsible use of the technology can benefit the industry. Music producers have been utilizing AI tools in various ways, including isolating vocals from old demo tracks, as seen in a project creating a new Beatles song from John Lennon’s vocals.

The Artist Rights Alliance’s letter is part of a larger industry-wide response to the ethical and legal implications of generative AI technologies, especially in relation to copyright infringement and workers’ rights. Artist unions, advocacy groups, and studios are actively working to regulate the use of AI in music and production.

Concerns have been raised about AI being used to create songs, scripts, images, and videos, including deepfake pornographic content of artists like Taylor Swift. Lawmakers are introducing legislation to address the misuse of AI, with recent laws criminalizing non-consensual AI creations of sexual images. Companies using artists’ work to train AI models without permission are also under scrutiny.

In response, Tennessee enacted the Portrait, Voice, and Image Security Act, known as the “Elvis Act”, to protect musicians from unauthorized use of AI-generated vocal likenesses for commercial purposes. The debate extends to posthumous use of artists’ likenesses, as AI tools are capable of creating realistic representations based on old footage.

As AI tools become more ubiquitous, musicians are taking a stand on acceptable uses of artificial intelligence. Some artists see generative AI as a tool for experimentation, while others express concerns about imitations of their musical styles.

The Artist Rights Alliance, led by music industry veterans like director Roseanne Cash, has garnered support from a wide range of artists, including country stars, rappers, and indie pop musicians. Estate organizations representing deceased artists have also signed the letter, reflecting the ongoing debate in the entertainment industry about posthumous use of artists’ likenesses through AI.

The intersection of AI and music continues to raise complex ethical and legal questions, with artists and industry stakeholders advocating for responsible use of technology to protect artistic integrity and creativity.

Source: www.theguardian.com

Safeguarding Poison Dart Frogs from Their Lethal Toxins

Scientists have discovered a “toxin sponge” protein in poison dart frogs that safely stores dangerous alkaloids, offering the possibility of a new approach to treating poisoning in humans. (Artist’s concept) Credit: SciTechDaily.com

The newly identified protein helps poison dart frogs accumulate and store powerful toxins in their skin that they use in self-defense against predators.

Scientists announced that they have identified a protein that helps poison dart frogs safely accumulate their namesake toxin, according to a study published Dec. 19 in the journal Nature. e-life.

The discovery solves a long-standing scientific mystery and could suggest potential therapeutic strategies to treat humans addicted to similar molecules.

Alkaloids: from coffee to frog skin

Alkaloid compounds such as caffeine make coffee, tea, and chocolate delicious and comforting, but they can be harmful if consumed in large amounts. In humans, the liver can safely metabolize moderate amounts of these compounds. Small poison dart frogs ingest far more toxic alkaloids in their diet, but instead of breaking them down, they accumulate them in their skin as a defense mechanism against predators.

“It has long been a mystery how poison dart frogs are able to transport highly toxic alkaloids into their bodies without being poisonous themselves,” said lead author and doctoral student in the Department of Biology at Stanford University in California, USA. Aurora Álvarez Buira says. “We aimed to answer this question by searching for proteins that could bind and safely transport alkaloids in poison dart frog blood.”

Diablito poison dart frog, Uofaga Silvatica, native to Colombia and Ecuador. Credit: Marie-Therese Fischer (CC BY 4.0)

Uncover the secrets of frogs

Alvarez-Buylla and colleagues used compounds similar to poison dart frog alkaloids as a kind of “molecular fishing hook” to attract and bind proteins in blood samples taken from poison dart frogs. The alkaloid-like compounds were bioengineered to glow under fluorescent lights, allowing the researchers to watch proteins bind to the decoys.

They then separated the proteins to see how each protein interacted with the alkaloids in solution. They discovered that a protein called alkaloid-binding globulin (ABG) acts like a “toxin sponge” that collects alkaloids. They also identified how proteins bind to alkaloids by systematically testing which parts of the protein are needed to successfully bind the alkaloids.

Impact on humans and future research

“The way that ABG binds to alkaloids is similar to the way that proteins that transport hormones in human blood bind to their targets,” Álvarez Buira explains. “This finding may suggest that hormone-processing proteins in frogs have evolved the ability to manage alkaloid toxins.”

The authors say the similarities with human hormone transport proteins could be a starting point for scientists to try bioengineering human proteins that “sponge” with toxins. “If successful, these efforts could provide new ways to treat certain addictions,” said lead author Lauren O’Connell, an assistant professor of biology at Stanford University and a member of the Wu Tsai Institute for Neuroscience. he says.

“Beyond potential medical relevance, we have achieved a molecular understanding of a fundamental part of poison dart frog biology, which will inform future research on biodiversity and the evolution of natural chemical defenses.” “This will be important for research,” concludes O’Connell.

Reference: “Binding and isolation of poison dart frog alkaloids” plasma Aurora Alvarez Buira, Marie Therese Fisher, Maria Dolores Moya Garzon, Alexandra E. Rangel, Elisio E. Tapia, Julia T. Tanzo, H. Tom So, Luis A. Coloma, Written by Jonathan Z. Long and Lauren A. O’Connell, December 19, 2023. e-life.
DOI: doi:10.7554/eLife.85096

Funding: National Science Foundation, New York Stem Cell Foundation, National Science Foundation Graduate Research Fellowship Program, Howard Hughes Medical Institute, Alfonso Martín Escudero Foundation, Wu Tsai Human Performance Alliance.

Source: scitechdaily.com