How a ‘robot lawyer’ could help you get unbanned from social media

https://www.engadget.com/do-not-pay-unban-social-media-194515590.html?src=rss

Just weeks after Facebook rebranded itself to “Meta,” the longtime owner of @metaverse Instagram suddenly found herself locked out of the account she had run for years. A message told Thea-Mai Baumann she was suspended for impersonation, though she had never pretended to be anyone else. Her account was returned after The New York Timeswrote a story about the ordeal, but the company never offered an explanation for how the mistake was made.

While what happened to her was unusual, one aspect of Baumann’s story is more common: that people who are wrongfully suspended from their social media accounts often have little or no recourse for getting them back (at least, not without media attention).

Now that group may have another option. The “robot lawyer” company DoNotPay, which offers automated legal services, has a new offering: getting social media accounts unbanned.

The new service, which is included with DoNotPay’s $36 monthly subscription, offers users an alternative to emailing companies’ help center bots or wiring appeals that may never get answered. Instead, DoNotPay asks users for information about what happened to them, and sends a letter to the relevant company’s legal department on their behalf.

the service can help get banned accounts back online.
DoNotPay

“These platforms prioritize legal cases,” DoNotPay CEO Joshua Browder tells Engadget. “When you’re just writing into customer service, they don’t really take it seriously.” Legal departments, on the other hand, are much more likely to respond, he says.

In the appeal, the company also tries to “match” your appeal with a “legal reason why they can’t ban you,” using state and federal laws that may apply. The letter also includes a deadline for the company to respond. He says that so far PayPal and Instagram have been among the most-requested services for unbanning. But the service will work with other platforms as well, including Twitter, Snapchat, Uber, Tinder, YouTube, Twitch and others.

Crucially, Browder points out that the service is not intended for people who were banned from a platform for legitimate reasons, like violating its terms of service. And even for those who were wrongly suspended, he estimates the odds of actually getting an account back as the result of this process are around 20 percent.

But even if the appeal isn’t ultimately successful, Browder says there are other benefits to the process. For one, companies are required to turn over users’ data regardless of whether their account was suspended. So even if you are unable to, say, regain access to your Instagram account, DoNotPay can ensure the company hands over your account details. There’s also the fact that sending a legal demand letter can cause a much bigger headache for a company than ranting to customer service agents.

“In general in America, they do have the right to ban you,” Browder says. “We don’t overstate that we can make miracles happen, but we can punish them a lot and get your data.”

via Engadget http://www.engadget.com

December 22, 2021 at 02:00PM

Walk-Through Metal Detectors Can Be Hacked, New Research Finds

https://gizmodo.com/walk-through-metal-detectors-can-be-hacked-new-researc-1848255555


Photo: VALERY HACHE/AFP (Getty Images)

Researchers have discovered a total of nine software vulnerabilities in a commonly used metal detector. If exploited, the security flaws could allow a hacker to take detectors offline, read or alter their data, or just generally mess with their functionality, the research reveals.

The product in question is produced by Garrett , a well-known U.S.-based metal detector manufacturer that sells its product to schools, court houses, prisons, airports, sports and entertainment venues, and an assortment of government buildings, according to its website and other sites. In other words, their products are pretty much everywhere.

Unfortunately, according to researchers with Cisco Talos, Garrett’s widely used iC module is in trouble. The product, which provides network connectivity to two of the company’s popular walk-through detectors (the Garrett PD 6500i and the Garrett MZ 6100), basically acts as a control center for the detector’s human operator: using a laptop or other interface, an operator can use the module to remotely control a detector, as well as engage in “real-time monitoring and diagnostics,” according to a website selling the product.

In a blog post published Tuesday, Talos researchers said that the vulnerabilities in iC, which are officially being tracked as a bevy of CVEs, could allow for somebody to hack into specific metal detectors, knock them offline, execute arbitrary code, and generally just make a real mess of things.

“An attacker could manipulate this module to remotely monitor statistics on the metal detector, such as whether the alarm has been triggered or how many visitors have walked through,” researchers write. “They could also make configuration changes, such as altering the sensitivity level of a device, which potentially poses a security risk to users who rely on these metal detectors.”

In short: This is bad news. Generally speaking, nobody really wants to walk through a metal detector. But, if you’re going to walk through one, it might as well work, right? While the scenarios in which an attacker would actually go to the trouble to hack into these systems seem slim to probably fantastical, having functional security systems at important locations like airports and government agencies seems like a good idea.

Fortunately, Talos says that users of these devices can mitigate the security flaws by updating their iC modules to the latest version of its firmware. Cisco apparently disclosed the vulnerabilities to Garrett in August and the vendor just fixed the flaws on Dec. 13, Talos writes.

We reached out to Garrett’s security division for comment and will update this story if they respond.

via Gizmodo https://gizmodo.com

December 21, 2021 at 07:45PM