What DeleteMe and Incogni aren't telling you
Zusammenfassung
TLDRVideoen dækker emnet datamæglere og deres behandling af personlige data, herunder hvordan tjenester som Delete Me og Incogn fungerer for at hjælpe individer med at kontrollere deres data. Datamæglere indsamler og sælger personlige oplysninger, ofte uden samtykke, inddelingerne som søgning af personer, marketingdata, finansiel og sundhedsdata. Mens nogle datamæglere kan slette oplysninger, er det ikke altid muligt. Dette rejser spørgsmål omkring værdien af tjenester som Delete Me, der mange gange kun rådgiver om, hvordan man gør det selv. En vigtig pointe er, at forbrugere skal kæmpe for et stærkere lovgivningsmæssigt miljø for at beskytte mod usædvanlig databehandling.
Mitbringsel
- 🔒 Tjenester som Delete Me hjælper med at kontrollere enkdata.
- 🔍 Databrokers samler og sælger ofte data uden samtykke.
- 📉 Det er vigtigt at forstå, hvilke data forskellige typer af databrokers indsamler.
- 📜 Brugere kan anmode om sletning af oplysninger, men succesraten kan variere.
- 🛡️ Der er behov for stærkere privatlivslove for at beskytte forbrugerne.
- 👥 Risikoafhjælpende databrokers bruges til baggrundstjek og identitetsverifikation.
- 📈 Forbrugere kan begrænse deres dataeksponering ved at skifte tjenester.
- 📝 Inferred data bruges fra brugeradfærd til målrettede annoncer.
- 🌐 De fleste datamæglere overholder sletningsanmodninger, selv uden lovpligt.
- 💡 At være opmærksom på datasikkerhed kan reducere risikoen for databrud.
Zeitleiste
- 00:00:00 - 00:05:00
I første segment præsenteres Agny, en tjeneste, der hjælper brugere med at få kontrol over deres personlige data ved at fjerne oplysninger fra datahandlere automatisk. Dette betyder, at Agny håndterer alle anmodninger om databeskyttelse på brugernes vegne, og hjælper dem med at undgå den besværlige proces med at kontakte hver enkelt datahandler individuelt. Brugeren får 60% rabat for at tilmelde sig.
- 00:05:00 - 00:10:00
I det andet segment diskuteres problematikken omkring datahandlere, der har til formål at indsamle og bevare personlige oplysninger. Det forklares, hvordan almindelige virksomheder, der ikke er datamæglere, ofte nægter at slette data ved forespørgsel. Dette leder til spørgsmål om, hvorvidt virksomheder er juridisk forpligtet til at opretholde data.
- 00:10:00 - 00:15:00
I det tredje segment præsenteres begrebet datamægler mere detaljeret, herunder de fem hovedkategorier: menneskeforskningsservices, marketingdatahandlere, finansielle informationsdatahandlere, risikomitigeringsdatahandlere og sundhedsdatahandlere. Målet er at give en forståelse for, hvordan disse datahandlere indsamler og deler data.
- 00:15:00 - 00:20:00
I det fjerde segment fokuseres der på sundhedsdatahandlere, der indsamler følsomme sundhedsoplysninger og ikke er underlagt HIPPA-reglerne. Eksempler gives på, hvordan data kan samles fra forskellige enheder og endda bruges af reklamefirmaer til at målrette annoncer baseret på brugeres sundhedsmønstre.
- 00:20:00 - 00:25:00
Det femte segment dækker risikomitigeringsdatahandlere og deres rolle i baggrundstjek for job- og lejeansøgninger. Det afsløres, hvilke typer oplysninger de indsamler, såsom kontaktinfo, beliggenhed og økonomijski oplysninger, der bruges til at vurdere en persons baggrund.
- 00:25:00 - 00:32:24
I sidste segment diskuteres datatjenester, der hjælper med at fjerne oplysninger fra databrokere, såsom Delete Me og Incogn. Selvom de teknisk set leverer en vigtig service, argumenteres der for, at de er dyre og ofte ikke leverer en signifikant bedre service end hvad brugere selv kunne gøre. Diskussionen drejer sig også om, hvad man kan gøre for at beskytte sine data og opfordring til at tale med lokale repræsentanter for bedre privacy-lovgivning.
Mind Map
Video-Fragen und Antworten
What is a data broker?
A data broker collects and sells personal information about individuals, often without their consent.
Why would data brokers delete your information?
Data brokers usually resist deleting personal information as their business model relies on collecting and retaining data.
Is Delete Me a scam?
While Delete Me offers legitimate services to delete your information from data brokers, its effectiveness and value compared to manual efforts are questioned.
What types of data do brokers collect?
Data brokers can collect personal data like addresses, employment history, health data, and online behavior.
What are inferred data and user personas?
Inferred data is based on observed online behavior to create profiles for advertising, without identifying individual users.
How can you protect your personal data?
You can block ads, avoid public-facing social media, and contact representatives to demand better privacy laws.
What are risk mitigation data brokers?
These brokers assess identities for fraud prevention, often used in job and apartment applications.
Why are personal health data brokers considered problematic?
They collect sensitive health data often with minimal regulations, leading to potential misuse.
How can you delete your information from data brokers?
You can manually request data deletion from brokers or use services like Delete Me.
What can consumers do about data collection?
Consumers can advocate for privacy laws, limit personal data sharing, and switch to more privacy-focused services.
Weitere Video-Zusammenfassungen anzeigen
- 00:00:01author and talking solution, the simple
- 00:00:04service that puts control of your
- 00:00:05personal data back to you. They
- 00:00:07intercept the data brokers on your
- 00:00:09behalf, requesting your data's removal
- 00:00:11and handle any resistance. But your data
- 00:00:14could leave your address, employment
- 00:00:16history, social media accounts,
- 00:00:18telephone numbers, and much more.
- 00:00:21Instead of you reaching out to data
- 00:00:22brokers one by one, Agny does it
- 00:00:25automatically on your behalf. See 60%
- 00:00:27off your plan. So take back control of
- 00:00:29your personal data today. To date, they
- 00:00:31have deleted my personal information
- 00:00:33from
- 00:00:35670 digital.
- 00:00:37[Music]
- 00:00:38Why would a data broker delete your
- 00:00:41information? Think about it. Isn't the
- 00:00:43entire point of a data broker to collect
- 00:00:45and retain your information? Like, isn't
- 00:00:48that their whole business model? When I
- 00:00:50requested Office Depot to delete my
- 00:00:52personal information that they had
- 00:00:53collected about me, like my name and
- 00:00:55purchase history, they refused to do so
- 00:00:57because of where I live. If I were
- 00:00:59nicely to ask General Motors to delete
- 00:01:01my data regarding what medications I
- 00:01:03take, yes, that is a real thing. They
- 00:01:05will also refuse for the same reason.
- 00:01:08Neither of these companies are
- 00:01:09considered data brokers, but what? They
- 00:01:11care more about retaining my data than
- 00:01:13an actual data broker? That doesn't make
- 00:01:15any sense to me. Is it because they're
- 00:01:17legally required to comply? Or do they
- 00:01:19simply comply out of the goodness of
- 00:01:21their own hearts? In this video, we're
- 00:01:23going to find out what a data broker is,
- 00:01:25how they collect your data, who they
- 00:01:27share it with, and whether companies
- 00:01:28like Incogn and Delete Me are a scam or
- 00:01:30not. This video is not sponsored by
- 00:01:32anyone. For full transparency, Delete Me
- 00:01:35has tried to sponsor this channel in the
- 00:01:36past, but I rejected their offer. That
- 00:01:38said, I don't know that I would have
- 00:01:40actually looked into making this video
- 00:01:41had they not emailed me, so you can
- 00:01:43thank them for that.
- 00:01:49A major selling point of services like
- 00:01:50Incogn and Delete Me is that these
- 00:01:52creepy data brokers collect your data
- 00:01:54and sell it off to the highest bidder.
- 00:01:56In fact, their entire business relies on
- 00:01:59data brokers existing. So, let's find
- 00:02:00out what a data broker really is. It
- 00:02:03turns out, like with most things, it's
- 00:02:05more complicated than you'd probably
- 00:02:07expect. The term data broker itself is a
- 00:02:09pretty loose expression covering all
- 00:02:11kinds of different companies. I actually
- 00:02:13suspect the reason Incogn and Delete Me
- 00:02:16use the terminology data brokers is
- 00:02:18intentional as it's almost too broad to
- 00:02:20actually describe what's really going
- 00:02:21on. There are five major categories of
- 00:02:24data brokers. I'll quickly give you an
- 00:02:26idea of what they are and what they're
- 00:02:27collecting and then we will dive deeper
- 00:02:29into each category. The most common type
- 00:02:31of data broker that data deletion
- 00:02:33services work with are people search
- 00:02:35services. These are companies that act
- 00:02:37like modern-day phone books but online.
- 00:02:40Much like a physical phone book, they're
- 00:02:42available to pretty much anyone and
- 00:02:43often have a majority of the important
- 00:02:45information posted for free. Then there
- 00:02:48are marketing data brokers. These
- 00:02:50companies gather large amounts of
- 00:02:51information about your online activity
- 00:02:53and put it into pools of certain
- 00:02:54behaviors, otherwise known as inferred
- 00:02:57data. We'll dive into more detail as to
- 00:02:59what this looks like in a bit. If you've
- 00:03:02ever applied for a car loan or gotten a
- 00:03:03credit card, you'll be familiar with the
- 00:03:05next kind of broker, financial
- 00:03:07information data brokers, otherwise
- 00:03:09known as credit reporting bureaus. This
- 00:03:11category is dominated by three
- 00:03:13companies: Experian, Equifax, and
- 00:03:15TransUnion. They track financial things
- 00:03:18like payments to your phone bills,
- 00:03:19utilities, when you pay rent, payments
- 00:03:21to loans, when you apply to lines of
- 00:03:23credit, or even when you have your
- 00:03:24credit checked at all. In a similar
- 00:03:26vein, there are risk mitigation data
- 00:03:28brokers. These are companies that track
- 00:03:29your identity often for preventing
- 00:03:31fraud. When you apply for a job or even
- 00:03:34apply for an apartment, this is how they
- 00:03:36do background checks. They work with
- 00:03:37risk mitigation data brokers. The last
- 00:03:40on our list is personal health data
- 00:03:42brokers. By far the creepiest in my
- 00:03:44opinion. These companies track health
- 00:03:46related data like when you purchase an
- 00:03:48over-the-counter medication or even your
- 00:03:50search history of a health rellated
- 00:03:51topic. None of this data is protected
- 00:03:53under HIPPA. So, these companies go nuts
- 00:03:55in collecting and selling this data to
- 00:03:57pharmaceutical companies. Before we
- 00:03:59start diving into these categories, I
- 00:04:00want to call out the last four on this
- 00:04:02list are a vast majority of the data
- 00:04:04brokers that make up the term data
- 00:04:07brokers. Services like
- 00:04:09Incogn only scratch the surface when it
- 00:04:11comes to deleting your
- 00:04:17data. You know what? I want to mix it up
- 00:04:19today. We're going to start with a
- 00:04:20category that just gives me the creeps.
- 00:04:22Personal health data brokers are, in my
- 00:04:25opinion, the worst kind of data broker.
- 00:04:27They collect an obscene amount of highly
- 00:04:29sensitive information with almost no
- 00:04:31regulations at all. To help showcase
- 00:04:33what I mean, I'm going to use the
- 00:04:35privacy
- 00:04:36visualizer. First, they collect health
- 00:04:38data, which seems pretty obvious. This
- 00:04:40would be direct health data from
- 00:04:42something like a smartwatch or an app
- 00:04:44that tracks health metrics, but they opt
- 00:04:45to share that information for some
- 00:04:47reason. We'll explore an example of this
- 00:04:49in a moment. Usage data depends on the
- 00:04:51service or tool in question, but how you
- 00:04:54use it can sometimes qualify as health
- 00:04:55data. An example of this would be
- 00:04:57something like a smart toothbrush. The
- 00:04:59usage of these tools can indicate
- 00:05:01certain health patterns, hence the
- 00:05:02category of usage data. If you've ever
- 00:05:05searched for a health related product on
- 00:05:06Amazon, guess what? They will sell that
- 00:05:09information to a personal health data
- 00:05:10broker who will then sell it to
- 00:05:12advertisers. And would you believe it,
- 00:05:14we have a category for that. It's search
- 00:05:16history. Similarly, if you've read a few
- 00:05:18health related articles using Google
- 00:05:20Chrome, Google will sell that
- 00:05:21information as well. Though Google is
- 00:05:23sort of a data broker and all but name,
- 00:05:25but they're also one of the biggest
- 00:05:26advertising companies out there. So,
- 00:05:28this example is a bit more complicated
- 00:05:30than what we're going to actually look
- 00:05:31into for this video. But browsing
- 00:05:33history is a category, and we can count
- 00:05:35that. Last, we have purchase history. If
- 00:05:38you buy a health related item using
- 00:05:40PayPal as your purchase method, PayPal
- 00:05:42will happily sell that information to a
- 00:05:44personal health data broker. Let's look
- 00:05:46at a more complete example of how
- 00:05:47personal health data brokers might get
- 00:05:49this information. There's a sponsor here
- 00:05:51on YouTube that I've seen a few times
- 00:05:52before. Hate sleep. If you've never
- 00:05:55heard of them, they make an overpriced
- 00:05:56smart mattress that tracks your sleeping
- 00:05:58patterns and keeps you cool while you
- 00:05:59sleep. Great. That all sounds cool. How
- 00:06:02do they fit into this picture of
- 00:06:03personal health data brokers? Well, they
- 00:06:06clearly state in the privacy policy that
- 00:06:08they sell usage data to advertisers.
- 00:06:10This means that your usage of the
- 00:06:12mattress and the attached services are
- 00:06:14sold to companies who can use that
- 00:06:15information to show you health related
- 00:06:17ads. What does that look like? Well,
- 00:06:20let's say you've been having a hard time
- 00:06:21sleeping for a few nights. That data
- 00:06:23could be sold to a pharmaceutical
- 00:06:25company that makes sleeping pills and
- 00:06:26then you'll start seeing ads for said
- 00:06:28sleeping pills. Or let's say your heart
- 00:06:30rate is a little elevated while you
- 00:06:32sleep. They can now show you ads for
- 00:06:34heart medication. Heck, that heart rate
- 00:06:37tracking thing can be used for all kinds
- 00:06:38of weird things like understanding how
- 00:06:40you interact with other platforms like
- 00:06:42Facebook. If Facebook shows you an
- 00:06:44article while you're laying in bed and
- 00:06:46they know you've been looking at it for
- 00:06:47a while, they can combine that data with
- 00:06:49what eight collects and bammy wham, they
- 00:06:51now know that you had an elevated heart
- 00:06:53rate while reading it, implying that you
- 00:06:55were angry. They can use that data to
- 00:06:58show you more of those articles since it
- 00:06:59keeps you on the platform for longer. I
- 00:07:02know it sounds crazy, but it's clearly
- 00:07:03spelled out in their privacy policy that
- 00:07:05they share a lot of this information
- 00:07:07with Facebook. And we all know how
- 00:07:09Facebook is with data. Remember, none of
- 00:07:11this is regulated and doesn't fall under
- 00:07:13HIPPA guidelines at all. So, to them,
- 00:07:16it's all fair game. Also, eight charges
- 00:07:19you a monthly fee to see your health
- 00:07:21data and cooling and whatever. And if
- 00:07:22you stop paying, you can't use those
- 00:07:24features, but they still track all that
- 00:07:26precious data. Please do not buy one of
- 00:07:28these. They are a privacy nightmare.
- 00:07:30Let's move on to the next kind of data
- 00:07:36broker. Risk mitigation data brokers are
- 00:07:39probably one of the most overlooked
- 00:07:41kinds of data brokers out there. They
- 00:07:43are most commonly used in scenarios
- 00:07:44where your identity needs to be
- 00:07:45validated for, believe it or not,
- 00:07:48mitigating risk. Like I mentioned
- 00:07:50earlier, if you've ever applied for a
- 00:07:51job or sent in an application for an
- 00:07:53apartment, they often use risk
- 00:07:55mitigation data brokers to make sure you
- 00:07:57are who you say you are and you don't
- 00:07:58have a history of doing quote unquote
- 00:08:00unfavorable things. With a job
- 00:08:03application, that can be things like
- 00:08:04changing jobs rapidly or in some
- 00:08:07instances working multiple jobs. With an
- 00:08:09apartment, it can contain things like
- 00:08:11rental history, late payments, and other
- 00:08:13similar items. If we plug this into the
- 00:08:15privacy visualizer, here's what we get.
- 00:08:17First, they collect contact info, which
- 00:08:19would be things like your name, current
- 00:08:21and previous addresses, phone numbers,
- 00:08:23and email addresses. This doesn't seem
- 00:08:25to be collected in all cases, but
- 00:08:27identifiers are still pretty common from
- 00:08:28what I found. This comes up when the
- 00:08:30data is aggregated to identify you under
- 00:08:32one unique identifier rather than your
- 00:08:35name. Though, this normally does come in
- 00:08:37addition to your name and other contact
- 00:08:39information, but it still counts. Next
- 00:08:42is location. No, they aren't tracking
- 00:08:44where you are all of the time, just
- 00:08:45things like your address and addresses
- 00:08:47related to you, like your work address.
- 00:08:49Lastly, there's financial information.
- 00:08:51This can sometimes contain things that
- 00:08:52would show up on a credit report, such
- 00:08:54as a list of debts, payment history, and
- 00:08:56other similar information, which leads
- 00:08:59us perfectly into our next data broker
- 00:09:04type. You may recognize this category by
- 00:09:07another name, credit reporting bureaus.
- 00:09:09If you live in the United States, this
- 00:09:12is data that you cannot opt out of or
- 00:09:14have deleted at all. This is all of the
- 00:09:16information that makes up your credit
- 00:09:18score, which is captured by the major
- 00:09:19companies, Equifax, Experian, and
- 00:09:21TransUnion. The information they have is
- 00:09:24used most often when dealing with
- 00:09:25creditors. If you want to get a loan for
- 00:09:28a house or a car, that's all tracked. If
- 00:09:30you get a credit card and pay it off
- 00:09:32every month, that information is
- 00:09:33reported to these companies. If you get
- 00:09:35a dozen credit cards and they're all
- 00:09:36maxed out and you're always late on
- 00:09:38payments, guess what? They track that,
- 00:09:39too. This data is considered highly
- 00:09:41sensitive as if it gets breached, you're
- 00:09:44at much higher risk of identity
- 00:09:48theft. What's that? Equifax had a data
- 00:09:51breach a while
- 00:09:53ago. 15 million users, you say?
- 00:09:57Oh, and what's that you say? They're not
- 00:09:58only still a wildly successful company,
- 00:10:01they have also wedged themselves so
- 00:10:02deeply into our economic system that
- 00:10:04you're not allowed to opt out of this
- 00:10:05data collection despite their very
- 00:10:07traceable history of mishandling it.
- 00:10:10Dang, that's pretty darn annoying.
- 00:10:12Anyways, here's what these look like on
- 00:10:14the visualizer. Financial information
- 00:10:16contains things like your credit score,
- 00:10:18the debt you're in, the creditors you've
- 00:10:19applied to, any late payments, and even
- 00:10:21how much money you make. Purchase
- 00:10:23history is generally limited to major
- 00:10:25purchases, but that still counts as
- 00:10:27purchase history. Location, once again,
- 00:10:29is mostly just your address. They don't
- 00:10:31really care where you currently are.
- 00:10:33Identifiers, as they have sort of a
- 00:10:35profile on you that can have an ID
- 00:10:37associated with it. Also, your social
- 00:10:39security number is technically an
- 00:10:41identifier. Contact info, including your
- 00:10:43name, address, phone number, and email
- 00:10:45address. And sensitive info, including
- 00:10:47things like your birth date, social
- 00:10:48security number. And I mean, your credit
- 00:10:50score is something I'd consider to be
- 00:10:51pretty sensitive
- 00:10:57information. Next up is marketing data
- 00:11:00brokers. This one is fun, I promise. The
- 00:11:02goal of a marketing data broker is to
- 00:11:04acquire vast amounts of indirect user
- 00:11:06data to sell to companies looking to
- 00:11:07advertise their products. Much of this
- 00:11:10is done with something called inferred
- 00:11:11data. Another common misnomer for this
- 00:11:14is user personas, but those are normally
- 00:11:16made up people that can guide what
- 00:11:18inferred data is actually sought after.
- 00:11:20To help show how this works, I'll need
- 00:11:22100 volunteers. Great. Hi,
- 00:11:25everybody. As it currently stands, I
- 00:11:27don't know anything about these 100
- 00:11:29people. So, to help me identify them,
- 00:11:31I'll ask a simple question that might
- 00:11:33describe something they do. To make it a
- 00:11:35little more clear, I'll highlight the
- 00:11:36tile they're standing on to represent if
- 00:11:38they do the thing in question. Let's
- 00:11:40start off with a pretty specific example
- 00:11:42of the people here who has shopped at
- 00:11:44Target within the last 6 months. Great.
- 00:11:47So, as you can see here, 54 people in
- 00:11:49this sample fall under this description.
- 00:11:52If you imagine the general scale of the
- 00:11:54amount of people who have shopped at
- 00:11:55Target within the last 6 months, you can
- 00:11:57imagine that the number is far too high
- 00:11:58to properly identify any one person.
- 00:12:02This sort of feels like it identifies
- 00:12:03you, but without actually identifying
- 00:12:05you. It's sort of like a giant game of
- 00:12:07Guess Who, but without names.
- 00:12:10Let's see what other groups we could
- 00:12:11apply here. So, we have our 54 people
- 00:12:13who shopped at Target. Let's highlight
- 00:12:15the people who live in Atlanta, Georgia.
- 00:12:17Okay, that's 20 people in our sample.
- 00:12:19What about people who drink coffee?
- 00:12:21People who listen to punk rock music?
- 00:12:23People who have a commute between 10 and
- 00:12:2515 miles to work? Who here owns a
- 00:12:27PlayStation? Anyone here love dogs? Who
- 00:12:30here has recently watched an educational
- 00:12:32video on YouTube? What about the people
- 00:12:34who are concerned about privacy? These
- 00:12:37groupings by themselves can't identify
- 00:12:39any one person. But if we add it all up
- 00:12:42with people who shop at Target that live
- 00:12:43in Atlanta, Georgia, who also drink
- 00:12:45coffee, listen to punk rock, have a 5 to
- 00:12:4710 mile commute, owns a PlayStation,
- 00:12:48loves dogs, and watched an educational
- 00:12:50video about privacy on YouTube. Well,
- 00:12:53that describes just one person from this
- 00:12:54sample. But here's the thing. I still
- 00:12:57can't identify who this person is. I
- 00:13:00certainly have enough details to know
- 00:13:01what I could advertise to this person,
- 00:13:03but I don't know their name, address, or
- 00:13:05any personally identifiable information.
- 00:13:07I can infer a lot about them without
- 00:13:09actually knowing them. These inferences
- 00:13:12are just aggregated groups of hundreds
- 00:13:14or thousands of people. This is the data
- 00:13:16that is most often used to show you
- 00:13:18personalized ads. Let's plug this all
- 00:13:20into the privacy visualizer. Purchases
- 00:13:22can describe the items that you buy.
- 00:13:24Going back to our list of examples, this
- 00:13:26would be people who drink coffee on a
- 00:13:28PlayStation or even the people who
- 00:13:29recently shopped at Target. Location
- 00:13:32information can be used as well, from
- 00:13:34something as broad as the people who
- 00:13:35live in Atlanta to using location
- 00:13:37services to determine the people who
- 00:13:39have a commute of 10 to 15 miles. Usage
- 00:13:42data is information how you use certain
- 00:13:44services. This would include people who
- 00:13:47recently watched an educational video on
- 00:13:48YouTube or even the people who listened
- 00:13:50to punk rock music. Search history can
- 00:13:53include things that you search for that
- 00:13:54can infer certain things. If you search
- 00:13:57for photos of dogs and puppies often,
- 00:13:59you're probably a person who loves dogs.
- 00:14:01If you searched for this video, you're
- 00:14:03probably a person concerned about
- 00:14:04privacy. In fact, the people who are
- 00:14:06most concerned about privacy are the
- 00:14:08people that incognate and delete me are
- 00:14:10aiming to show their ads to. They know
- 00:14:12through inferring what my channel is
- 00:14:14about that my viewers are likely
- 00:14:15concerned about privacy and they would
- 00:14:17be an easy sell to you. Do they know who
- 00:14:20any of you are? No. Of course not. But
- 00:14:22by watching my channel, they infer that
- 00:14:24a number of you do care about this
- 00:14:26stuff. This also contains things like
- 00:14:28browser history. So all of the websites
- 00:14:30you visit can be added to your inferred
- 00:14:32data. Here's the big question, though.
- 00:14:34If they collect the inferred data in the
- 00:14:36first place, and they know they can show
- 00:14:38you an ad, wouldn't they have to be able
- 00:14:40to identify you in some way? Well, they
- 00:14:43do. They normally tie your usage of the
- 00:14:45internet to something called an
- 00:14:46advertising ID. This is a randomized
- 00:14:48string of numbers that is assigned to
- 00:14:50your Google account or even your phone
- 00:14:51itself. Heck, even cookies can be sort
- 00:14:54of an identifier as we explored in my
- 00:14:56video about cookies. It's worth calling
- 00:14:58out that these methods of identifying
- 00:15:00you are rarely associated to your name
- 00:15:02or any other personally identifiable
- 00:15:04information. It's more of a this
- 00:15:06particular cell phone has a user that
- 00:15:08does these things. That said, there can
- 00:15:11be sensitive information attached to
- 00:15:12this too. Depending on what you look at
- 00:15:14online, it can be inferred if you are
- 00:15:17pregnant. If you have a disability, if
- 00:15:18you're religious, if you're part of a
- 00:15:20trade union, even your own political
- 00:15:22opinions can be inferred. What's weird
- 00:15:24here is that if you tried to request
- 00:15:26your information be deleted from these
- 00:15:28data brokers, well, what would they
- 00:15:30delete? I mean, if they have personally
- 00:15:33identifiable information, sure, some
- 00:15:35will delete that, but a majority of the
- 00:15:37data these companies have is
- 00:15:39nonidentifiable. So, they can't exactly
- 00:15:42delete it because they can't trace it
- 00:15:43back to you. the only identifier they
- 00:15:45get is that random string which can be
- 00:15:47changed or deleted by you. If you clear
- 00:15:50cookies, that can remove one of these
- 00:15:52links. If you delete or change your
- 00:15:54advertising ID, that also removes one of
- 00:15:57these links. So, while these companies
- 00:15:58can't really delete this data, you can
- 00:16:00at least obscure what data you're
- 00:16:02attached
- 00:16:07to. Okay, but on the surface, it seems
- 00:16:09like there's nothing wrong with this
- 00:16:10inferred data, right? I mean, it can't
- 00:16:13really easily be traced back to you.
- 00:16:15Well, as always, here's where data
- 00:16:17breaches come in to ruin the fun.
- 00:16:19Scammers could easily use this inferred
- 00:16:21data to target people that are more
- 00:16:22likely to fall for scams with shocking
- 00:16:24accuracy. This data could be cross
- 00:16:26referenced with public data. Let's look
- 00:16:28at one of our dudes here. This guy goes
- 00:16:30to coffee shops in the afternoon. He
- 00:16:32lives in Seattle, Washington. He is
- 00:16:34looking for a new job. He has a dog and
- 00:16:36travels once per year. Well, let's say
- 00:16:38that he also publicly posts to various
- 00:16:40social media platforms. He posts selfies
- 00:16:42of coffee shops some afternoons to
- 00:16:44Snapchat. On LinkedIn, it shows that he
- 00:16:47lives in Seattle and he's seeking a job.
- 00:16:49On top of that, he shows photos of his
- 00:16:51dogs and even his once per year travel
- 00:16:53event on Instagram. Sure, cross
- 00:16:56referencing that data could take a lot
- 00:16:57of time, but this is where spear fishing
- 00:17:00campaigns could come in. Scammers could
- 00:17:02just send in a bunch of automated texts
- 00:17:03and calls to a massive list of phone
- 00:17:05numbers that were in a data breach.
- 00:17:08If the data is attached to any inferred
- 00:17:10data like companies like Toyota or
- 00:17:12Facebook would have, they could make a
- 00:17:14very targeted kind of attack without
- 00:17:15knowing who they're hitting. The goal
- 00:17:17isn't to trick everyone. The goal is to
- 00:17:20effectively trick just a small group of
- 00:17:22people. Since they know what city he
- 00:17:23lives in, and they know that he's
- 00:17:25looking for a job, they'll send out
- 00:17:26texts to all the leaked numbers in that
- 00:17:28city and they'll say something like,
- 00:17:30"Hi, we were informed that you were
- 00:17:32looking for a job with 50% travel. We
- 00:17:34can offer such a position. If
- 00:17:36interested, please apply here. Shady
- 00:17:38link. Now, a majority of people would
- 00:17:40probably ignore this, but someone who is
- 00:17:42seeking a job who also loves to travel,
- 00:17:45well, it seems like a dream come true.
- 00:17:47Remember, the more data that scammers
- 00:17:49have, the easier it is for them to
- 00:17:50target you in a very specific
- 00:17:56way. This perfectly leads us into our
- 00:17:58last data broker category, people search
- 00:18:01services. These are simply the evolution
- 00:18:03of physical phone books being migrated
- 00:18:05to the digital realm. If you're too
- 00:18:07young to remember, there were these
- 00:18:09companies that would basically track
- 00:18:10everyone's name, phone number, and
- 00:18:12sometimes even their address, and they
- 00:18:13would print it out in a huge book that
- 00:18:15they would send to everyone in the mail.
- 00:18:17They'd even attach them to these things
- 00:18:18called phone booths. How fun. Anyways,
- 00:18:22all this information was moved online,
- 00:18:24and they obviously put that directly
- 00:18:25identifiable information like your name,
- 00:18:27phone number, and address in there. The
- 00:18:30thing about the online world is that you
- 00:18:31can also have an online presence. So,
- 00:18:34some of them started tracking things
- 00:18:35like social media profiles. Some of
- 00:18:38these companies took it in a weirder
- 00:18:39direction by adding other public records
- 00:18:41like arrest records, property records,
- 00:18:43and more. More specific information is
- 00:18:45normally behind a payw wall. But for
- 00:18:47everything else, like your name, phone
- 00:18:48number, address, and even social media
- 00:18:50profiles can all be seen for free by
- 00:18:53anyone. Who's looking? Sometimes it can
- 00:18:55be landlords who don't want to pay for
- 00:18:56those risk mitigation data brokers.
- 00:18:58Private investigators are probably
- 00:19:00pretty pleased with these kinds of
- 00:19:01services. Actually, any weirdo on the
- 00:19:04internet, which has been problematic for
- 00:19:06supporting things like doxing. And there
- 00:19:08was even a reality TV show that used
- 00:19:09these services. I think it was Catfish.
- 00:19:12Okay, so this can be pretty creepy. Now,
- 00:19:14we need to ask the scary question. Do
- 00:19:16people search services comply with data
- 00:19:18deletion requests? Weirdly enough, a
- 00:19:21vast majority of them do comply. And not
- 00:19:23all of them are even required to comply.
- 00:19:25Many of these companies are based out of
- 00:19:27states that are not required to comply,
- 00:19:29yet they comply anyways. From what I
- 00:19:31understand, they do this to avoid future
- 00:19:33regulation, legal pressure, and just bad
- 00:19:36press. Well, that's a good thing. You
- 00:19:39can delete information using the forms
- 00:19:40on the websites normally linked at the
- 00:19:42bottom. In the description, I've linked
- 00:19:44an amazing guide on how to delete your
- 00:19:46information from a bunch of these
- 00:19:48services for free. Actually, these are
- 00:19:50the most common types of data brokers
- 00:19:52that services like Incogn work with. So
- 00:19:55things are starting to make more sense.
- 00:19:57In fact, let's finally talk about data
- 00:19:59deletion
- 00:20:04services. These are companies like we've
- 00:20:06been talking about incognite me. Some
- 00:20:08other examples would be Mosilla Monitor,
- 00:20:10Aura, Opry, OneREP, and Atlas Privacy.
- 00:20:14I'm certainly there are more than that,
- 00:20:15but they all work in the same way. They
- 00:20:17offer to delete data that's been
- 00:20:18collected about you for mostly people
- 00:20:20search data brokers. Most of them use
- 00:20:22automated systems to make this possible.
- 00:20:24However, in the case of Delete Me, it
- 00:20:27doesn't really seem like it's that much
- 00:20:28faster than doing it yourself. Let's
- 00:20:30break down one of the sponsored spots
- 00:20:32for Delete Me. Just like my VPN video, I
- 00:20:35am not being critical of the creator
- 00:20:36shown in this video. I'm being critical
- 00:20:38of Delete Me and the script they provide
- 00:20:40to creators. That's it. It's been a
- 00:20:43little over 6 months since I first told
- 00:20:45you about Delete Me, the simple service
- 00:20:47that gives control of your personal data
- 00:20:49back to you. In that half a year, Delete
- 00:20:51Me has reviewed over 4,000 listings from
- 00:20:54data brokers across the web for me. This
- 00:20:57is sort of misleading in my opinion.
- 00:20:59That 4,000 number really makes it sound
- 00:21:01like it's from 4,000 data brokers or
- 00:21:03something, but it's actually 4,000
- 00:21:05individual items. So, let's say one data
- 00:21:08broker has your name, your personal
- 00:21:10email address, your work email address,
- 00:21:12your phone number, and your last four
- 00:21:14addresses. That's seven listings in this
- 00:21:16example, but just one data broker. They
- 00:21:19all do this, by the way. Here, I'll use
- 00:21:21myself as an example. Before researching
- 00:21:23this video, I used Mozilla Monitor. They
- 00:21:26showed that from one data broker, there
- 00:21:28were three email addresses, one phone
- 00:21:30number, nine addresses, and four family
- 00:21:32members. Of that information, only eight
- 00:21:35of the items were actually correct
- 00:21:37pieces of information. The others were
- 00:21:39incorrect emails. The phone number
- 00:21:40wasn't one that had ever been mine at
- 00:21:42any point in history. Some of the
- 00:21:44addresses were wrong, and even the list
- 00:21:46of family members contained people I
- 00:21:47have never heard of before. All of these
- 00:21:49data deletion services will count this
- 00:21:51as 17 removals, but it was all from a
- 00:21:54single source, half of which wasn't even
- 00:21:56my data. Do you see how these numbers
- 00:21:58feel bigger than they really are? And
- 00:22:00it's removed my personal information
- 00:22:02from almost 80 of them. Let's rewind for
- 00:22:05a moment back to that screenshot. There
- 00:22:07are 26 data brokers in this list. Of
- 00:22:10those, there are over
- 00:22:124,347 pieces of information. And of all
- 00:22:15of those, delete me has removed 38,
- 00:22:18which is very likely from a single data
- 00:22:19broker given how big that other number
- 00:22:21is. So, they're claiming to have spent 9
- 00:22:24hours contacting one data broker.
- 00:22:27Additionally, according to the voiceover
- 00:22:29itself from the first part, this was 6
- 00:22:31months of paying for Delete Me. I'll
- 00:22:33admit though, this isn't accounting for
- 00:22:35search time, but think about this. I
- 00:22:37don't know about you, but I'm fairly
- 00:22:38confident that I could send more than 26
- 00:22:40emails in a 6-month period. Heck, I know
- 00:22:43that's true. I regularly send more than
- 00:22:45that in a standard 8-hour workday. What
- 00:22:48kind of listings? Well, we're talking
- 00:22:50private information like my physical
- 00:22:52address history, my property and court
- 00:22:54records, even the names of my family
- 00:22:56members now scrubbed from nearly 80 data
- 00:22:59brokers archives without me having to do
- 00:23:02any work on my own. As we discussed,
- 00:23:04that is a tiny fraction of the actual
- 00:23:06amount of data brokers that are out
- 00:23:08there. Yes, removing this data is good,
- 00:23:10but you can do this for free. And as
- 00:23:12shown here, probably more efficiently
- 00:23:14than Delete Me. Now, this all begs the
- 00:23:17question, are these data deletion
- 00:23:19companies legit? Well, for the most
- 00:23:21part, yes. I'll admit though, I don't
- 00:23:24like that some of them mess around with
- 00:23:25dark patterns. Incogn, for example,
- 00:23:27forces users to contact support to
- 00:23:29cancel your subscription. They also post
- 00:23:32obviously fake reviews to Reddit, but
- 00:23:34overall they technically do what they
- 00:23:36say they do. Is it a scam? No. It is
- 00:23:39pretty clear to me that they do offer
- 00:23:40the service of deleting your data from a
- 00:23:42list of data brokers. A scam means to
- 00:23:45take money with malicious intent of
- 00:23:46offering nothing in return. That is
- 00:23:49obviously not the case here. A better
- 00:23:51question would be, is it a good deal? In
- 00:23:53my opinion, not really. No. Unless you
- 00:23:56live in a state with the right to delete
- 00:23:58law. If you live in one of these states,
- 00:24:00services like this could actually be
- 00:24:01helpful as they will often look into
- 00:24:03adding other data brokers for you if you
- 00:24:05ask them to, and that could make the
- 00:24:07process of cleaning up your online
- 00:24:08presence a bit easier. That all said
- 00:24:10though, a majority of the people in the
- 00:24:12United States wouldn't exactly benefit
- 00:24:14from this kind of service. Wait, I feel
- 00:24:16like we've heard this before. Look,
- 00:24:18everyone, it's friend of the channel,
- 00:24:19Luch. Hey, I just overheard what you've
- 00:24:22been talking about, and all of this
- 00:24:23sounds really similar to what you said
- 00:24:24about VPN companies. They kind of seem
- 00:24:27like the same thing. Do you mind
- 00:24:29elaborating? Well, both data deletion
- 00:24:31services and VPNs technically provide
- 00:24:33the services they claim to, and they do
- 00:24:35it at a very low cost to them, but
- 00:24:37charge a much higher price to you, the
- 00:24:39consumer. Most people also don't really
- 00:24:41need either service. VPNs provide a
- 00:24:43solution to a problem most people don't
- 00:24:45normally face. And in the case of data
- 00:24:47deletion companies, all of that
- 00:24:49information you're trying to have
- 00:24:50deleted will always be replaced unless
- 00:24:52you're a resident of a right to delete
- 00:24:54state. Even if you do live in one of
- 00:24:55these right to delete states, you would
- 00:24:57still have to manually request that your
- 00:24:59data be deleted by every other data
- 00:25:01broker in the country. And that is a
- 00:25:03timeconsuming task. There are over 1,700
- 00:25:07registered data brokers in the US, which
- 00:25:09is much higher than the 200 or so that
- 00:25:11these companies actually delete data
- 00:25:12from. But it's important to note that
- 00:25:14only a handful of states have laws
- 00:25:16requiring data brokers to actually be
- 00:25:17registered. So in reality, that number
- 00:25:19may be much higher when we take into
- 00:25:21account the unregistered brokers. It's
- 00:25:23estimated that worldwide there are over
- 00:25:255,000 data brokers. Oh, and as it turns
- 00:25:28out, Incogn is owned by Surf Shark and
- 00:25:30Surf Shark is owned by NordVPN. So, at
- 00:25:32the end of the day, it kind of is just
- 00:25:34the same thing. Funny how that works.
- 00:25:36Fantastic points. Thanks for the extra
- 00:25:38insight. Sure thing, man. I'll let you
- 00:25:40get back to it. Thanks for stopping by.
- 00:25:47This has me all thinking. Are we just
- 00:25:49looking for a new company to hate on?
- 00:25:51Hear me out. After the honey scandal,
- 00:25:54people started giving these services the
- 00:25:55stinky eye because it felt too good to
- 00:25:57be true. As we just learned, it's not as
- 00:26:00wonderful as they make it seem. They
- 00:26:02have good marketing, but it's just a
- 00:26:04simple tool that can only do so much
- 00:26:05about the actual problem. These
- 00:26:07companies are just taking advantage of
- 00:26:08the fact that data brokers run freely
- 00:26:10with no restrictions. It's an infinite
- 00:26:12money glitch that they're just jumping
- 00:26:13on before regulations eventually catch
- 00:26:16up. They're not the source of the
- 00:26:17problem, nor are they the solution to
- 00:26:19the problem. The actual problem is the
- 00:26:22data being collected in the first place.
- 00:26:24Companies like Meta, Google, and Amazon
- 00:26:25have been allowed to collect and sell
- 00:26:27this data with almost no oversight in
- 00:26:29the United States. Even now, 20 states
- 00:26:32have some sort of consumer privacy law,
- 00:26:34but to this day, there isn't a single
- 00:26:36law that prevents a company from
- 00:26:38collecting unnecessary data in the first
- 00:26:40place. The European Union has
- 00:26:42restrictions against these companies
- 00:26:43with their GDPR. They absolutely prevent
- 00:26:46companies from collecting certain types
- 00:26:48of data from the start. It's hard to
- 00:26:49imagine that there would be any kind of
- 00:26:51federal change anytime soon given the
- 00:26:53last three presidents have welcomed big
- 00:26:55tech with open arms. This is not a
- 00:26:57political jab at either side, but
- 00:26:59instead at both. Both Democrats and
- 00:27:02Republicans have enabled companies to
- 00:27:03have this kind of power. Both Democrats
- 00:27:06and Republicans have failed to protect
- 00:27:07the people they're supposed to
- 00:27:08represent. I mean, even the CEOs of
- 00:27:11these companies aren't protected by
- 00:27:12their own data collection. Mark
- 00:27:14Zuckerberg's personal information has
- 00:27:16been breached from Facebook data
- 00:27:17breaches in the past.
- 00:27:24Okay, so what can you do? It might feel
- 00:27:26a little counterintuitive to what I just
- 00:27:28said, but call your local representative
- 00:27:30and demand for better privacy laws. Even
- 00:27:32the states that have good privacy laws
- 00:27:34can be greatly improved. Be loud, be
- 00:27:37annoying. You have to pretend like these
- 00:27:39local representatives have never heard
- 00:27:41about what you're talking about before.
- 00:27:43Be loud, but be clear in your language.
- 00:27:46Be specific. For example, I don't like
- 00:27:48that companies are allowed to collect
- 00:27:50data that is solely used for targeted
- 00:27:52advertising. It is oftentimes greatly
- 00:27:54mishandled and results in getting leaked
- 00:27:56to scammers, which costs Americans
- 00:27:58hundreds of billions of dollars every
- 00:28:00year. If you want to learn more about
- 00:28:01how data breaches lead to scams, watch
- 00:28:03my video about that here. When talking
- 00:28:05to your local representative, give clear
- 00:28:07examples. Identify what companies are
- 00:28:09doing this and show it in their own
- 00:28:11privacy policies. Here's an example.
- 00:28:14Spotify shares data with these 94
- 00:28:16companies by default. And I think it's
- 00:28:18unnecessary for a company that streams
- 00:28:20music to have all of this inferred data.
- 00:28:22Data that is retained for any period of
- 00:28:24time is at risk of a data breach, which
- 00:28:26hurts consumers. When these 94 companies
- 00:28:28are also given access to this
- 00:28:30information, it stops being a question
- 00:28:32of if there will be a data breach.
- 00:28:34Rather, when will one of these 94
- 00:28:36companies get hit with a data breach? In
- 00:28:382024, nearly half of all companies in
- 00:28:41the United States experienced a data
- 00:28:43breach. Using that information, we can
- 00:28:45reasonably assume that 47 of these
- 00:28:47companies will experience a data breach.
- 00:28:50If there were regulations in place to
- 00:28:51prevent Spotify from collecting this
- 00:28:53information in the first place, the risk
- 00:28:54of a data breach would be greatly
- 00:28:56reduced as the unnecessary user data
- 00:28:58wouldn't be there to begin with. Hackers
- 00:29:00wouldn't have as much incentive to hack
- 00:29:02Spotify. Here's another example. General
- 00:29:05Motors knows what medications I take,
- 00:29:06and they infer my intelligence through
- 00:29:08various sources of data collection
- 00:29:10spelled out in their privacy policy.
- 00:29:12This is an inexcusable abuse of power,
- 00:29:14and they do not need to know any of that
- 00:29:16for me to be able to drive my car. In
- 00:29:19the European Union, General Motors sells
- 00:29:21vehicles that work exactly like they do
- 00:29:23here in the United States. But laws like
- 00:29:25the GDPR protect their citizens, and
- 00:29:28this kind of data isn't collected at
- 00:29:30all. Here's the EU version of the
- 00:29:32privacy policy for General Motors. And
- 00:29:34here's the US version. It's clear why
- 00:29:37they collect as much as they do here.
- 00:29:39There are no regulations to protect
- 00:29:40consumers. If you want something more
- 00:29:42actionable on your end, fight back with
- 00:29:44your wallet if you're able to. For
- 00:29:46example, stop using Gmail. For years
- 00:29:49now, they've read every single email
- 00:29:50that you get, which means that every
- 00:29:52purchase you make is now valuable data
- 00:29:54that they can sell to advertisers. I'll
- 00:29:56note that this can take a very long time
- 00:29:58to fully transition away, though. It
- 00:30:00took me an entire year to move from
- 00:30:01Gmail to Startmail, and even then I
- 00:30:03faced minor inconveniences with services
- 00:30:05that I forgot to move over. It takes
- 00:30:08time, so be patient. Another thing I'll
- 00:30:10always advocate for is to block all the
- 00:30:12ads. A big point of this data being
- 00:30:15collected is to sell to advertisers. So,
- 00:30:17start blocking them from making their
- 00:30:18money. Show that we don't want to be
- 00:30:20tracked like this. I've heard other
- 00:30:22creators compare this to piracy, but I
- 00:30:25disagree. Blocking ads is not piracy. I
- 00:30:28understand that it can hurt small
- 00:30:29creators in the crossfire. So, if you're
- 00:30:31able to support your favorite creators
- 00:30:33directly. Another thing that can help
- 00:30:35prevent cross referencing your data can
- 00:30:37be to avoid public-f facing social
- 00:30:38media, at least where your name is
- 00:30:40shown. This can range from things like
- 00:30:42Facebook, LinkedIn, and even Steam. Be
- 00:30:44cautious about where you publicly show
- 00:30:46your name. Most platforms have a privacy
- 00:30:49setting that you can use to hide some of
- 00:30:50this information. If you want more
- 00:30:52information on what you can do about
- 00:30:54feeling powerless to data collection, I
- 00:30:56highly suggest you watch my video on
- 00:30:57that here. Believe me, there is always
- 00:31:00an
- 00:31:01option. As always, thank you for
- 00:31:03watching. Please be kind and patient
- 00:31:04with each other. I want to give a
- 00:31:06special thanks to everyone supporting
- 00:31:07this channel through memberships and
- 00:31:09Patreon. Considering that a lot of my
- 00:31:11channel is about showing the truth
- 00:31:12behind a lot of common sponsors, it
- 00:31:13doesn't feel right for me to start
- 00:31:15taking them on like most growing
- 00:31:16YouTubers do. However, I would love to
- 00:31:18make these videos for you all full-time.
- 00:31:20So, if you have some money to spare and
- 00:31:22want to help make that dream become a
- 00:31:23reality, consider either becoming a
- 00:31:25member or subscribing to my Patreon
- 00:31:27page. By doing so, you'll get early
- 00:31:29access to videos, exclusive access to a
- 00:31:31supporters onlyly Discord server, and
- 00:31:33more. The link to Patreon is in the
- 00:31:35description or at
- 00:31:37patreon.com/rejectconvenience. Peace.
- 00:31:39Heads up, boss. Spider-Man's headed your
- 00:31:41way.
- 00:31:43[Laughter]
- 00:31:46Excellent. I'll get you this time,
- 00:31:49Spider-Man.
- 00:31:50Doc, you're looking more medicine than
- 00:31:52usual. Do something with your hair. Get
- 00:31:56over here, you
- 00:31:57pest.
- 00:32:00O, yoza, you got a punch there,
- 00:32:03Spider-Man. Thanks. I've been working on
- 00:32:05a new move. Want to
- 00:32:07see? Ah, you've defeated me once again.
- 00:32:12Better luck next time. Wow. Yeah,
- 00:32:15Spider-Man. Yeah.
- databrokers
- persondata
- privacy
- Delete Me
- Incogn
- data deletion
- information security
- ad targeting
- GDPR
- consumer rights