Posted on Feb 5, 2020
3
3
0
Its seems that the Iowa caucus was hampered by the app created by tech company Shadow Inc. There were inconsistencies in the reporting of three sets of results yet all involved are claiming all is good. So far no evidence of a hack or other intrusion was found however curious what data was collected by the app other than voting results. One can't help to wonder if the app is capable of data mining like that of the Facebook's Cambridge Analytica scandal. Just feel if a for profit is collecting data seem possible such data could as well be sold to the highest bidder or even giving to political parties. This data then could be used to target individuals with political ad campaigns with the intent to persuade voters to vote for a particular candidate. While voters would still be the one voting, who they vote for could possibly be manipulated. One has to look no further than Cambridge Analytica to understand the ramifications in alloying private companies access to data points and attempts of social engineering via political ad campaigns and the ability to influence elections.
https://en.wikipedia.org/wiki/Cambridge_Analytica
https://www.lifehack.org/articles/technology/are-your-apps-collecting-your-personal-data.html
https://www.symantec.com/blogs/threat-intelligence/mobile-privacy-apps
https://en.wikipedia.org/wiki/Cambridge_Analytica
https://www.lifehack.org/articles/technology/are-your-apps-collecting-your-personal-data.html
https://www.symantec.com/blogs/threat-intelligence/mobile-privacy-apps
Edited 5 y ago
Posted 5 y ago
Responses: 4
There are lots of apps that come out every day that work well world wide. What worries me is a major political party that has 4 years to put it together, can't get it anywhere right. Oh, and the fact the #1 winner in the caucus' campaign paid the firm that made the app is very concerning...
(2)
(0)
There is a saying out there, I don't care how you vote, I care who counts the vote.
(1)
(0)
SPC David S. I think all technology has proven to be a world threat. Some of our most secure technologies are struggling to fight technical assaults.
(1)
(0)
Read This Next