Last month, the popular social video app TikTok finalized a deal with investors, including Oracle, to appease a bipartisan bill that called on the app’s Chinese owner, ByteDance, to divest — or be banned in the United States.

The deal launched a frenzy among its US-based users over possible censorship, with some accusing it of taking down footage of ICE agents or restricting searches for words, such as “Epstein.” While TikTok denied these claims, pointing to a “data center power outage,” the app also changed its privacy policy at the time — now allowing it to collect more detailed data on its users, including their precise locations.

That sparked new fears. As The New Republic argues, TikTok’s deal means that agents at Immigration and Customs Enforcement (ICE), whose deportation efforts have been supercharged under the Trump administration, could skip tedious court-ordered data requests and monitor users by buying their data from private data brokers that obtain the info from TikTok directly — a “highly ironic” development, the magazine writes, considering the ByteDance deal was motivated in the first place by fears over Chinese state-sponsored surveillance.

  • sunbytes@lemmy.world
    link
    fedilink
    English
    arrow-up
    1
    ·
    5 hours ago

    “Hey officer. This guy understands videos in Spanish and seems really interested in Latina content creators. Go grab him”

  • themurphy@lemmy.ml
    link
    fedilink
    English
    arrow-up
    37
    ·
    23 hours ago

    Guys ffs. The US Cloud act dictates that every SINGLE US based company has to hand over all data when requested to the government.

    They took over TikTok. Now the data flows.

    It’s not even speculation. Why ask them?

    The US government made this into law. You can just read it, if you want. Masks off.

    • tempest@lemmy.ca
      link
      fedilink
      English
      arrow-up
      12
      ·
      22 hours ago

      You ask so they have to say yes even if it’s a non answer because a lot of people don’t know or don’t pay attention.

  • Kindness is Punk@lemmy.ca
    link
    fedilink
    English
    arrow-up
    20
    ·
    21 hours ago

    I can only assume since Oracle is in charge of the US operations now the entire purpose of that was to get access to user data for ShadowDragon

  • katy ✨@piefed.blahaj.zone
    link
    fedilink
    English
    arrow-up
    30
    arrow-down
    1
    ·
    1 day ago

    pretty sure tiktok is an interdepartmental agency of the us government so ice can just ask whenever they want under the patriot act

        • Bazoogle@lemmy.world
          link
          fedilink
          English
          arrow-up
          6
          ·
          20 hours ago

          They have a page dedicated to everything they have given over to the US government: https://signal.org/bigbrother/

          Signal themselves cannot decrypt the messages, so they are literally not able to provide any substantial information to the government. They can literally only provide two timestamps, when the user registered and the last time they connected to the server.

          the only information we can produce in response to a request like this is the date and time a user registered with Signal and the last date of a user’s connectivity to the Signal service.

          source

        • AlecSadler@lemmy.dbzer0.com
          link
          fedilink
          English
          arrow-up
          11
          arrow-down
          1
          ·
          23 hours ago

          If/when Signal has complied historically, they hand over what they have…which is to say, pretty much nothing.

          I’ll take Signal any day over private Facebook chat, Whatsapp, or even telegram.

            • Bazoogle@lemmy.world
              link
              fedilink
              English
              arrow-up
              4
              ·
              20 hours ago

              The attack chain is as follows: the threat actors masquerade as “Signal Support” or a support chatbot named “Signal Security ChatBot” to initiate direct contact with prospective targets, urging them to provide a PIN or verification code received via SMS, or risk facing data loss.

              Should the victim comply, the attackers can register the account and gain access to the victim’s profile, settings, contacts, and block list through a device and mobile phone number under their control. While the stolen PIN does not enable access to the victim’s past conversations, a threat actor can use it to capture incoming messages and send messages posing as the victim.

              That target user, who has by now lost access to their account, is then instructed by the threat actor disguised as the support chatbot to register for a new account.

              Don’t give your signal PIN to someone via text? And even if you did, they still don’t have your message history.

        • scytale@piefed.zip
          link
          fedilink
          English
          arrow-up
          4
          ·
          22 hours ago

          If it’s truly E2EE, then it doesn’t matter if they’re forced to hand over the data.

  • Red Pandar@lemmy.world
    link
    fedilink
    English
    arrow-up
    8
    ·
    22 hours ago

    TikTok’s parent company ByteDance sold the app to a mostly American group of investors, including the software business giant Oracle (founded by Trump ally Larry Ellison), MGX (an Abu Dhabi-based company also involved in Trump crypto ventures) and the private equity firm Silver Lake.