
BlackFog has introduced TikTok privacy prevention for all users of BlackFog Privacy. This new feature available in BlackFog 4.5 and above dynamically detects data exfiltration events from TikTok to remote servers to maintain user privacy.
TikTok, with over 1 billion users, has been seen as a large privacy risk in recent months as it has been exposed for using questionable data collection techniques such as clipboard sniffing and sending detailed user demographics and behavior to remote servers. Since TikTok is owned by a Beijing-based company called ByteDance, the suspicion is that this information is being sent to China. While there is currently no definitive proof of data exfiltration to China, the company is regulated under Chinese law and therefore must comply with any government data requests. To ensure data privacy BlackFog utilizes geofencing technology to ensure that no data is exfiltrated to China.
Is TikTok Spyware?
There are clear indications that the app contains embedded addresses that point to Chinese servers, and as recently as 2019 the app had embedded code from Chinese search engine Baidu and Igexin which has been linked to spying.
Several governments have called for or banned TikTok entirely. India recently banned TikTok over security concerns and the US government is still considering a ban on the software. BlackFog provides an additional layer of security specifically designed to prevent TikTok from profiling, collecting and exfiltrating data from personal or corporate devices.
Related Posts
Data Splicing vs. Traditional DLP: The New Threat for Enterprises
Explore how data splicing attacks bypass traditional DLP solutions and why ADX, with its real-time endpoint monitoring and AI based threat analysis, offers a powerful defense against advanced data exfiltration techniques.
Data Backup and Data Recovery: What Every Business Needs to Know
Understand these critical data backup and data recovery steps to reduce the risk of lengthy downtime following data loss.
DNS Exfiltration: How Hackers Use Your Network to Steal Data Without Detection
Learn how DNS exfiltration works and why this method of data theft often goes undetected.
How Do You Protect Yourself From Hackers? Proactive Strategies for Business Data Security
Follow these advanced data protection strategies to help protect your firm from hackers in an increasingly challenging environment.
5 Steps to a Disaster Recovery Plan That Protects Your Business
Follow these key steps to develop a data backup and recovery plan fit for the digital-first world.
Data Protection Management: Building a Resilient Data Security Framework
Keep these six key principles in mind to ensure your data protection management solutions are as effective as possible.