April 25, 2025
Trending News

ToonMe, Laika, ToonArt and other photo editing apps that threaten data security

  • January 4, 2023
  • 0

The Lensa app uses artificial intelligence from Stable Diffusion to create virtual avatars in an artistic style. (briefly technical) Edit apps photosEspecially those that offer AI-related features have

ToonMe, Laika, ToonArt and other photo editing apps that threaten data security
The Lensa app uses artificial intelligence from Stable Diffusion to create virtual avatars in an artistic style.  (briefly technical)
The Lensa app uses artificial intelligence from Stable Diffusion to create virtual avatars in an artistic style. (briefly technical)

Edit apps photosEspecially those that offer AI-related features have become popular in recent months, and each one is free to use or I payrequires not only its installation devices of the people, but from the permission Photo gallery or on camera from smartphone.

However, although these permissions are required, applications They can not only access data devicesBut more information associated with the user and, sometimes, this data is used for other purposes.

Infobae analyzed nine random apps to understand what type of data is being shared and what it’s being used for, to determine whether that data could ultimately pose a threat. Cyber ​​protection.

These are: “Voi – AI Avatar App by Wonder”, “Laika – AI Photo Editor”, “ToonArt Cartoon Photos”, “Lensa: Photo Editor”, “Wonder – AI Art”, “Anime Style Photo Effect”, “ToonMe” . Self Caricatures’, ‘Editor Voilà AI Artist’ and ‘AI Photo Enhancer’.

AI-powered photo editing apps have access to user information.  (Table: Infobae)
AI-powered photo editing apps have access to user information. (Table: Infobae)

Difference between collected data and shared data

One of the characteristics of the applications that were analyzed infobae The thing is Play Store Differentiates the data collected by the application to provide better service and data shared with third parties for commercial purposes or other type.

“Laika – AI Photo Editor” is an example of an application that does not provide direct access data A device to be able to share them with third parties. It does not collect information related to device performance and data.

As can be seen in the analysis table applications Applications created by Infobae can access data related to: locationIdentification (mail, name or ID), purchase history, Photos and videosIn-app interaction or search, performance application and other data ID (device type, camera data, etc.).

Google Play has a section where you can access the app's privacy policy.  (shooting)
Google Play has a section where you can access the app’s privacy policy. (shooting)

Information collected by applications, according to policy Use of data i Privacy Each of them and which can be accessed at the bottom of the store page Play StoreIt says it’s used so that the app “communicates with you by sending you announcements, updates, and security messages that may be sent to you message Push and respond to your requests, questions and comments” as indicated Toon Art.

In other cases, among other functions specified by the ToonMe Platform, it is to “improve the service, customize the services and/or products we offer, help develop our products and services.”

In all cases, or at least in most cases, this information is encrypted, which means that it is protected secure connection At the time of sending, in addition, each person has the right to send a request for deletion information which has been collected or stored by the developers who provide some safety on the data.

However, the case of “Wonder – Arte IA” is the most alarming because, in addition to collecting in its systems, almost all the data specified in the analysis table. infobaeAll of these categories are shared with third parties, do not offer encrypted data transmission, and do not allow users to request deletion of their data, so there is nothing you can do to prevent it from being used for commercial purposes, including photos which are uploaded to their systems.

AI photo editing apps Wonder store user information "to perform activities that ensure business continuity."  (shooting)
AI photo editing apps Wonder store user information “to perform activities that ensure business continuity.” (shooting)

According to the information available in their policy Data Use and PrivacyWonder processes this information for the purpose of “carrying out activities that ensure business continuity”, although it does not mention what type of activities they relate to, but they are related to “records Visual and audio”, which together with the impossibility of removal information About the app, it may not create trust among users.

Biometric data can be hacked

Although Codeway, the company that created the applicationaffirms that it “undertakes to take all necessary technical and administrative measures and to pay due attention to guaranteeing the confidentiality, integrity and security of personal data” and includes processes such as anti virusVPN, encrypted storage inside the company, among others, collected images and videos, this information can be targeted cyber attacks.

In this case, facial security biometric data may be compromised and, therefore, users who store data in systems that require access to this type of service may be affected. Cyber ​​protection. According to cyber security expert Domenic Molinaro, “in some countries, biometric security systems are used to protect objects. Other countries use these systems in security cameras and video surveillance, which are the most widespread applications.”

“However Security systems “Biometrics are hard to crack because of their complexity and they can’t be deciphered like a password, but they can be compromised,” says Molinaro. “Biometrics attract hackers who are dedicated and experienced (…) once compromised, stolen or lost, users can be permanently at risk.

The most effective security measures to avoid being a victim of someone else’s use Biometric data There are two-step authentication processes configured on devices that are used. In addition, it is possible to reduce the risk of data breaches by using the latest software and ensuring the presence of antivirus.

Continue reading:



Source: Info Bae

Leave a Reply

Your email address will not be published. Required fields are marked *