{"id":37691,"date":"2020-10-16T15:00:13","date_gmt":"2020-10-16T15:00:13","guid":{"rendered":"https:\/\/www.threatshub.org\/blog\/to-stop-web-giants-abusing-privacy-they-must-be-prevented-from-respawning-ever\/"},"modified":"2020-10-16T15:00:13","modified_gmt":"2020-10-16T15:00:13","slug":"to-stop-web-giants-abusing-privacy-they-must-be-prevented-from-respawning-ever","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/to-stop-web-giants-abusing-privacy-they-must-be-prevented-from-respawning-ever\/","title":{"rendered":"To stop web giants abusing privacy, they must be prevented from respawning. Ever"},"content":{"rendered":"<div><img decoding=\"async\" src=\"https:\/\/regmedia.co.uk\/2018\/04\/18\/herculeshydra.jpg\" class=\"ff-og-image-inserted\"><\/div>\n<p><strong class=\"trailer\">Column<\/strong> Thriving amidst the pervasive chaos of 2020, the world\u2019s largest technology companies &#8211; the FAANGs*, as we\u2019ve come to know them &#8211; have managed to grow larger, richer and more powerful.<\/p>\n<p>That\u2019s wonderful for shareholders, but quite a problem when it comes to the relations between these new superpowers and the nations they operate within.<\/p>\n<p>Multinational entities always exploit their capacity to play nations off against one another in search of tax breaks or favourable regulatory environments. This zero-sum strategy means each FAANG win equals a loss for a national government &#8211; and governments tend to hold grudges. Tally up enough black marks, and even a trillion-dollar business might find itself in a fight for its life.<\/p>\n<p>It certainly seems as though the knives are out for two of the FAANGs &#8211; Facebook and Google. In the US, the Department of Justice and several States Attorneys General will <a href=\"https:\/\/www.theregister.com\/2019\/06\/03\/google_shares_take_a_dive_on_doj_reports\/\" target=\"_blank\" rel=\"noopener noreferrer\">soon file an antitrust lawsuit<\/a>; the <a href=\"https:\/\/www.theregister.com\/2020\/10\/01\/google_antitrust_us_china\/\" target=\"_blank\" rel=\"noopener noreferrer\">EU wants to rein in<\/a> the data gathering and coercive business practices of both; even plucky Australia has thrown its hat into the ring, <a href=\"https:\/\/www.theregister.com\/2020\/07\/31\/australian_draft_media_bargaining_code\/\" target=\"_blank\" rel=\"noopener noreferrer\">empowering its competition regulator<\/a> to claw back some of hundreds of billions of dollars a year in revenues hoovered by the pair. The FAANGs may be colossi, arrogantly striding the Earth, but the actions of scores of Lilliputian governments may yet bring Gulliver low.<\/p>\n<p>But <a href=\"https:\/\/www.theregister.com\/2020\/10\/06\/tech_giants_antitrust\/\" target=\"_blank\" rel=\"noopener noreferrer\">breaking up<\/a> is hard to do. IBM and Microsoft survived breakup attempts, while AT&amp;T actually grew far larger, post-breakup, than it ever could while operating as a government-sanctioned monopoly. So regulators face a dilemma: let these organisations run rampant, or turn them into modern-day Hydras &#8211; spawning a new head with every antitrust amputation.<\/p>\n<p>For any containment to be successful, regulators will first need to deprive these organisations of their respawn superpowers, generated by an unholy combination of &#8220;user profiling&#8221; and &#8220;engagement&#8221;.<\/p>\n<p>Both firms <a href=\"https:\/\/www.theregister.com\/2019\/09\/09\/google_addicted_to_data\/\" target=\"_blank\" rel=\"noopener noreferrer\">know their users<\/a> better than those users know themselves; observing trillions of interactions with digital intellects vast, cool and unsympathetic, applying these observations to build a predictive model used to direct and shape &#8220;engagement&#8221;. Continuous surveillance reveals our weaknesses, and those weaknesses are <a href=\"https:\/\/www.theregister.com\/2017\/05\/08\/facebook_is_abusive_its_time_to_divorce_it\/\" target=\"_blank\" rel=\"noopener noreferrer\">fed back to us<\/a> to exploit our credulity, our prejudices, and our expectations.<\/p>\n<p> <a href=\"https:\/\/www.youtube.com\/watch?v=uaaC57tcci0&amp;ab_channel=Netflix\" data-media=\"x-videoplayer\">Youtube Video<\/a>\n<\/p>\n<p>Despite repeated warnings, the public seems to have been happy to maintain its digital addictions &#8211; although some got a better view backstage last month, when Netflix released <i>The Social Dilemma<\/i>. Over the course of a few days, tens of millions got a look inside the belly of the beast, and understood &#8211; some for the first time &#8211; that they <i>aren&#8217;t the user, they&#8217;re the product<\/i>.<\/p>\n<p>From fifty-plus years of anti-smoking efforts, we know that getting people to stop using something that they know is bad for them won&#8217;t be easy. But we could at least level the playing field with a different kind of amputation: regulations blocking the utilisation of profiling data to increase engagement.<\/p>\n<h3 class=\"crosshead\"> <span>Engage brain<\/span><br \/>\n<\/h3>\n<p>Created to boost the &#8220;stickiness&#8221; of content, these machine-learning-driven systems create powerful feedback loops between users and these content providers. They&#8217;re the engine room that keeps billions scrolling, liking and posting. Cutting that loop breaks the spell that holds users in thrall. Those firms will not like it &#8211; reduced to slow, expensive, organic engagements &#8211; but users will gain a newfound agency; an ability to look away from the blinking lights of today&#8217;s shiniest outrage.<\/p>\n<p>Early in the 20th century, a series of food and drug laws in the United States regulated both the purity of and access to a range of substances that had proven to be addicting, toxic, or both. Now that we&#8217;ve learned how to replicate those sorts of psychic effects with digital equivalents, we need to look to regulate these digital systems &#8211; and not just the companies that peddle them to the public.<\/p>\n<p>They&#8217;re potent, potentially dangerous, and always come at a cost. Their use needs to be carefully regulated &#8211; just as we regulate addictive drugs. And just as we wouldn\u2019t prescribe addictive drugs to billions of people, <b>we have to ensure that these technologies are never deployed at scale again<\/b>.<\/p>\n<p>The crisis we face today most closely resembles that of China during the Opium Wars. Furiously trying to defend itself and its people from colonial powers using addictive drugs they illegally imported to gain a commercial foothold within the nation, the Chinese struck out &#8211; and lost. Today&#8217;s national governments, weakened by the very powers they seek to contain, face a similar threat. To contain these modern monsters, we&#8217;ll need to learn from history &#8211; and act quickly. \u00ae<\/p>\n<p>* Facebook, Amazon, Apple, Netflix and Google<\/p>\n<p> READ MORE <a href=\"https:\/\/go.theregister.com\/feed\/www.theregister.com\/2020\/10\/16\/web_giants_breakup\/\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>History tells us tech companies just get bigger, even after being broken up or battered Column\u00a0 Thriving amidst the pervasive chaos of 2020, the world\u2019s largest technology companies &#8211; the FAANGs*, as we\u2019ve come to know them &#8211; have managed to grow larger, richer and more powerful.\u2026 READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":37692,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[63],"tags":[],"class_list":["post-37691","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-the-register"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>To stop web giants abusing privacy, they must be prevented from respawning. Ever 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/to-stop-web-giants-abusing-privacy-they-must-be-prevented-from-respawning-ever\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"To stop web giants abusing privacy, they must be prevented from respawning. Ever 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/to-stop-web-giants-abusing-privacy-they-must-be-prevented-from-respawning-ever\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2020-10-16T15:00:13+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/10\/to-stop-web-giants-abusing-privacy-they-must-be-prevented-from-respawning-ever.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"648\" \/>\n\t<meta property=\"og:image:height\" content=\"432\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/to-stop-web-giants-abusing-privacy-they-must-be-prevented-from-respawning-ever\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/to-stop-web-giants-abusing-privacy-they-must-be-prevented-from-respawning-ever\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"To stop web giants abusing privacy, they must be prevented from respawning. Ever\",\"datePublished\":\"2020-10-16T15:00:13+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/to-stop-web-giants-abusing-privacy-they-must-be-prevented-from-respawning-ever\/\"},\"wordCount\":797,\"publisher\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/to-stop-web-giants-abusing-privacy-they-must-be-prevented-from-respawning-ever\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/10\/to-stop-web-giants-abusing-privacy-they-must-be-prevented-from-respawning-ever.jpg\",\"articleSection\":[\"The Register\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/to-stop-web-giants-abusing-privacy-they-must-be-prevented-from-respawning-ever\/\",\"url\":\"https:\/\/www.threatshub.org\/blog\/to-stop-web-giants-abusing-privacy-they-must-be-prevented-from-respawning-ever\/\",\"name\":\"To stop web giants abusing privacy, they must be prevented from respawning. Ever 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/to-stop-web-giants-abusing-privacy-they-must-be-prevented-from-respawning-ever\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/to-stop-web-giants-abusing-privacy-they-must-be-prevented-from-respawning-ever\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/10\/to-stop-web-giants-abusing-privacy-they-must-be-prevented-from-respawning-ever.jpg\",\"datePublished\":\"2020-10-16T15:00:13+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/to-stop-web-giants-abusing-privacy-they-must-be-prevented-from-respawning-ever\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.threatshub.org\/blog\/to-stop-web-giants-abusing-privacy-they-must-be-prevented-from-respawning-ever\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/to-stop-web-giants-abusing-privacy-they-must-be-prevented-from-respawning-ever\/#primaryimage\",\"url\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/10\/to-stop-web-giants-abusing-privacy-they-must-be-prevented-from-respawning-ever.jpg\",\"contentUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/10\/to-stop-web-giants-abusing-privacy-they-must-be-prevented-from-respawning-ever.jpg\",\"width\":648,\"height\":432},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/to-stop-web-giants-abusing-privacy-they-must-be-prevented-from-respawning-ever\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.threatshub.org\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"To stop web giants abusing privacy, they must be prevented from respawning. Ever\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#website\",\"url\":\"https:\/\/www.threatshub.org\/blog\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\/\/www.threatshub.org\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"To stop web giants abusing privacy, they must be prevented from respawning. Ever 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/to-stop-web-giants-abusing-privacy-they-must-be-prevented-from-respawning-ever\/","og_locale":"en_US","og_type":"article","og_title":"To stop web giants abusing privacy, they must be prevented from respawning. Ever 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/to-stop-web-giants-abusing-privacy-they-must-be-prevented-from-respawning-ever\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2020-10-16T15:00:13+00:00","og_image":[{"width":648,"height":432,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/10\/to-stop-web-giants-abusing-privacy-they-must-be-prevented-from-respawning-ever.jpg","type":"image\/jpeg"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/to-stop-web-giants-abusing-privacy-they-must-be-prevented-from-respawning-ever\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/to-stop-web-giants-abusing-privacy-they-must-be-prevented-from-respawning-ever\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"To stop web giants abusing privacy, they must be prevented from respawning. Ever","datePublished":"2020-10-16T15:00:13+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/to-stop-web-giants-abusing-privacy-they-must-be-prevented-from-respawning-ever\/"},"wordCount":797,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/to-stop-web-giants-abusing-privacy-they-must-be-prevented-from-respawning-ever\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/10\/to-stop-web-giants-abusing-privacy-they-must-be-prevented-from-respawning-ever.jpg","articleSection":["The Register"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/to-stop-web-giants-abusing-privacy-they-must-be-prevented-from-respawning-ever\/","url":"https:\/\/www.threatshub.org\/blog\/to-stop-web-giants-abusing-privacy-they-must-be-prevented-from-respawning-ever\/","name":"To stop web giants abusing privacy, they must be prevented from respawning. Ever 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/to-stop-web-giants-abusing-privacy-they-must-be-prevented-from-respawning-ever\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/to-stop-web-giants-abusing-privacy-they-must-be-prevented-from-respawning-ever\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/10\/to-stop-web-giants-abusing-privacy-they-must-be-prevented-from-respawning-ever.jpg","datePublished":"2020-10-16T15:00:13+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/to-stop-web-giants-abusing-privacy-they-must-be-prevented-from-respawning-ever\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/to-stop-web-giants-abusing-privacy-they-must-be-prevented-from-respawning-ever\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/to-stop-web-giants-abusing-privacy-they-must-be-prevented-from-respawning-ever\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/10\/to-stop-web-giants-abusing-privacy-they-must-be-prevented-from-respawning-ever.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/10\/to-stop-web-giants-abusing-privacy-they-must-be-prevented-from-respawning-ever.jpg","width":648,"height":432},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/to-stop-web-giants-abusing-privacy-they-must-be-prevented-from-respawning-ever\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"To stop web giants abusing privacy, they must be prevented from respawning. Ever"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/37691","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=37691"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/37691\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/37692"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=37691"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=37691"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=37691"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}