
BlackFog has introduced TikTok privacy prevention for all users of BlackFog Privacy. This new feature available in BlackFog 4.5 and above dynamically detects data exfiltration events from TikTok to remote servers to maintain user privacy.
TikTok, with over 1 billion users, has been seen as a large privacy risk in recent months as it has been exposed for using questionable data collection techniques such as clipboard sniffing and sending detailed user demographics and behavior to remote servers. Since TikTok is owned by a Beijing-based company called ByteDance, the suspicion is that this information is being sent to China. While there is currently no definitive proof of data exfiltration to China, the company is regulated under Chinese law and therefore must comply with any government data requests. To ensure data privacy BlackFog utilizes geofencing technology to ensure that no data is exfiltrated to China.
Is TikTok Spyware?
There are clear indications that the app contains embedded addresses that point to Chinese servers, and as recently as 2019 the app had embedded code from Chinese search engine Baidu and Igexin which has been linked to spying.
Several governments have called for or banned TikTok entirely. India recently banned TikTok over security concerns and the US government is still considering a ban on the software. BlackFog provides an additional layer of security specifically designed to prevent TikTok from profiling, collecting and exfiltrating data from personal or corporate devices.
Related Posts
Microsegmentation: Strengthening Network Security Against Zero Day Exploits
Find out why microsegmentation is an increasingly popular option for supporting zero trust networking approaches.
Patch Management: An Essential Part of Data Security
Ensuring you have a strong patch management strategy in place is essential in minimizing the risks posed by known vulnerabilities.
Layered Security – How a Defense-in-Depth Approach Guards Against Unknown Threats
Make sure your systems are fully protected from threats at every level by incorporating these six key layered security defense strategies.
Zero Trust Data Protection: Securing Your Data in a Perimeterless World
What should firms know about zero trust data protection and how can they ensure it is implemented effectively?
ZTNA vs VPN: Choosing the Right Secure Remote Access Solution
What are the pros and cons of ZTNA vs VPN remote access solutions and which should firms consider?
Zero Day Security Exploits: How They Work and How to Stay Safe
Learn about the risk posed by zero day security exploits and what firms can do to minimize their exposure to these issues.