Vue normale

Il y a de nouveaux articles disponibles, cliquez pour rafraîchir la page.
Hier — 27 janvier 2026techdirt.com

TikTok Already Getting Shittier Under The Ownership Of Trump’s Billionaire Buddies

Par : Karl Bode
27 janvier 2026 à 21:44

You might recall how Republicans (with help from Democrats) suffered a three year embolism over the national security, privacy, and propaganda problems inherent with TikTok — only to turn around and let Trump sell the platform to his technofascist billionaire friends. Who are now already hard at work preparing to do all of the stuff they claimed the Chinese were doing. And probably worse.

The deal, finalized last December, involves offloading a large chunk of TikTok to billionaire right wing Trump ally Larry Ellison (fresh off his acquisition of CBS), the private equity firm Silver Lake (which has broad global investments in Chinese and Israeli hyper-surveillance), anti-democratic zealot Mark Andreessen, and MGX (Abu Dhabi’s state investment firm).

With the paperwork on the “new U.S. TikTok” barely even dry, the company is already informing users that it will be collecting more location data than ever:

“Before this update, the app did not collect the precise, GPS-derived location data of US users. Now, if you give TikTok permission to use your phone’s location services, then the app may collect granular information about your exact whereabouts.”

That’s not great in a country that’s too corrupt to pass even a baseline privacy law, or to regulate dodgy data brokers that hoover up this sensitive location data and then share it with pretty much any nitwit with two nickels to rub together (including domestic and foreign intelligence agencies).

The “new U.S. TikTok” is already seeing a bunch of weird technical problems. And there are already influencers saying that their criticism of ICE is more frequently running afoul of “community standards guidelines,” though I’ve yet to see a good report fleshing these claims out yet.

As we noted last December, this latest TikTok deal is kind of the worst of all worlds. The Chinese still have an ownership stake in the app, and the companies and individual investors who’ve taken over the app have a long, rich history of supporting authoritarianism and widespread privacy violations.

These Trump-linked billionaires clearly didn’t buy TikTok to protect national security, fix propaganda, or address consumer privacy. They clearly don’t support the kind of policies it would take to actually address those issues, like meaningful privacy laws, media consolidation limits, data broker regulation, media literacy education funding, or kicking corrupt authoritarians out of the White House.

And they didn’t just buy TikTok to make money or undermine a competitor they repeatedly failed to out-innovate in the short-form video space (though that’s certainly a lot of it). They did it to expand surveillance. And, as Musk did with Twitter, to control the modern information space in a way that will coddle their ideologies and marginalize or censor opposition voices they disagree with.

As men like Larry Ellison and Marc Andreessen have made abundantly clear to anyone paying attention, their ideologies are unchecked greed and far right wing anti-democratic extremism. Billionaires attempting to dominate media to confuse the public and protect their own, usually selfish best interests is a tale as old as time. And that is, contrary to their claims, the play here as well.

With a new board full of foundationally terrible people, it’s only a matter of time before they, like Elon Musk before them, inevitably start fiddling with the platform and its algorithms to shut down debate and ideology they don’t like. Larry Ellison in particular is clearly attempting to buy up what’s left of crumbling U.S. corporate media and turn it into a safe space for the planet’s unpopular autocrats.

It’s worth reiterating that this was all built on the back of four years of fear mongering about TikTok privacy, propaganda, and national security issues by Republicans who couldn’t actually give the slightest shit about any of those subjects. And aided by the bumbling Keystone Cops in the Democratic party, who actively helped Trump offload the platform to his billionaire buddies.

Then propped up by a lazy corporate press that’s increasingly incapable of explaining to the public what’s actually happening, especially if it involves rich right wingers trying to dominate media.

Most of the dim lawmakers who helped make this happen were kept completely in the dark while this deal was being hashed out by billionaire extremists. And bloviating weirdos like FCC boss Brendan Carr, who spent three years crying like a toddler on cable news about TikTok privacy, will likely never mention the app again now that it’s his extremist authoritarian zealot buddies calling the shots.

I suspect the company will try very hard for a year or so to insist that nothing whatsoever has changed to avoid a mass exodus of TikTok users. Especially in the wake of the promise of new, performative hearings by lawmakers who helped the whole mess happen in the first place.

But the ownership won’t be able to help themselves. Steadily and progressively things will get worse, driving users to another new pesky social media upstart, at which point the billionaire quest for total information control will start all over again.

Aujourd’hui — 28 janvier 2026techdirt.com

How Hackers Are Fighting Back Against ICE

27 janvier 2026 à 23:38

ICE has been invading U.S. cities, targeting, surveillingharassingassaultingdetaining, and torturing people who are undocumented immigrants. They also have targeted people with work permitsasylum seekerspermanent residents (people holding “green cards”), naturalized citizens, and even citizens by birth. ICE has spent hundreds of millions of dollars on surveillance technology to spy on anyone—and potentially everyone—in the United States. It can be hard to imagine how to defend oneself against such an overwhelming force. But a few enterprising hackers have started projects to do counter surveillance against ICE, and hopefully protect their communities through clever use of technology. 

Let’s start with Flock, the company behind a number of automated license plate reader (ALPR) and other camera technologies. You might be surprised at how many Flock cameras there are in your community. Many large and small municipalities around the country have signed deals with Flock for license plate readers to track the movement of all cars in their city. Even though these deals are signed by local police departments, oftentimes ICE also gains access

Because of their ubiquity, people are interested in finding out where and how many Flock cameras are in their community. One project that can help with this is the OUI-SPY, a small piece of open source hardware. The OUI-SPY runs on a cheap Arduino compatible chip called an ESP-32. There are multiple programs available for loading on the chip, such as “Flock You,” which allows people to detect Flock cameras and “Sky-Spy” to detect overhead drones. There’s also “BLE Detect,” which detects various Bluetooth signals including ones from Axon, Meta’s Ray-Bans that secretly record you, and more. It also has a mode commonly known as “fox hunting” to track down a specific device. Activists and researchers can use this tool to map out different technologies and quantify the spread of surveillance. 

There’s also the open source Wigle app which is primarily designed for mapping out Wi-Fi, but also has the ability to make an audio alert when a specific Wi-Fi or Bluetooth identifier is detected. This means you can set it up to get a notification when it detects products from Flock, Axon, or other nasties in their vicinity. 

One enterprising YouTuber, Benn Jordan, figured out a way to fool Flock cameras into not recording his license plate simply by painting some minor visual noise on his license plate. This is innocuous enough that any human will still be able to read his license plate, but it completely prevented Flock devices from recognizing his license plate as a license plate at the time. Some states have outlawed drivers obscuring their license plates, so taking such action is not recommended. 

Jordan later went on to discover hundreds of misconfigured Flock cameras that were exposing their administrator interface without a password on the public internet. This would allow anyone with an internet connection to view a live surveillance feed, download 30 days of video, view logs, and more. The cameras pointed at parks, public trails, busy intersections, and even a playground. This was a massive breach of public trust and a huge mistake for a company that claims to be working for public safety.

Other hackers have taken on the task of open-source intelligence and community reporting. One interesting example is deflock.me and alpr.watch, which are crowdsourced maps of ALPR cameras. Much like the OUI-SPY project, this allows activists to map out and expose Flock surveillance cameras in their community. 

There have also been several ICE reporting apps released, including apps to report ICE sightings in your area such Stop ICE AlertsICEOUT.org, and ICE Block. ICEBlock was delisted by Apple at the request of Attorney General Pam Bondi, a fact we are suing over. There is also Eyes Up, an app to securely record and archive ICE raids, which was taken down by Apple earlier this year. 

Another interesting project documenting ICE and creating a trove of open-source intelligence is ICE List Wiki which contains info on companies that have contracts with ICE, incidents and encounters with ICE, and vehicles ICE uses. 

People without programming knowledge can also get involved. In Chicago, people used whistles to warn their neighbors that ICE was present or in the area. Many people 3D-printed whistles along with instructional booklets to hand out to their communities, allowing a wider distribution of whistles and consequently earlier warnings for their neighbors. 

Many hackers have started hosting digital security trainings for their communities or building web sites with security advice, including how to remove your data from the watchful eyes of the surveillance industry. To reach a broader community, trainers have even started hosting trainings on how to defend their communities and what to do in an ICE raid in video games, such as Fortnight

There is also EFF’s own Rayhunter project for detecting cell-site simulators, about which we have written extensively. Rayhunter runs on a cheap mobile hotspot and doesn’t require deep technical knowledge to use.

It’s important to remember that we are not powerless. Even in the face of a domestic law enforcement presence with massive surveillance capabilities and military-esque technologies, there are still ways to engage in surveillance self-defense. We cannot give into nihilism and fear. We must continue to find small ways to protect ourselves and our communities, and when we can, fight back. 

EFF is not affiliated with any of these projects (other than Rayhunter) and does not endorse them. We don’t make any statements about the legality of using any of these projects. Please consult with an attorney to determine what risks there may be. 

Republished from the EFF’s Deeplinks blog.

❌
❌