%PDF-1.3 1 0 obj << /Type /Catalog /Outlines 2 0 R /Pages 3 0 R >> endobj 2 0 obj << /Type /Outlines /Count 0 >> endobj 3 0 obj << /Type /Pages /Kids [6 0 R 16 0 R ] /Count 2 /Resources << /ProcSet 4 0 R /Font << /F1 8 0 R /F2 9 0 R /F3 10 0 R /F4 11 0 R >> >> /MediaBox [0.000 0.000 612.000 792.000] >> endobj 4 0 obj [/PDF /Text ] endobj 5 0 obj << /Creator (DOMPDF) /CreationDate (D:20250716152650+00'00') /ModDate (D:20250716152650+00'00') /Title (Report 07-2025) >> endobj 6 0 obj << /Type /Page /Parent 3 0 R /Annots [ 12 0 R 14 0 R ] /Contents 7 0 R >> endobj 7 0 obj << /Length 6822 >> stream 0.702 0.800 0.816 rg 34.016 34.016 543.969 723.969 re f 1.000 1.000 1.000 rg 45.266 82.346 521.469 664.388 re f 0.773 0.773 0.773 rg 0.773 0.773 0.773 RG 45.266 746.734 m 566.734 746.734 l 565.984 745.984 l 46.016 745.984 l f 566.734 746.734 m 566.734 82.346 l 565.984 82.346 l 565.984 745.984 l f 45.266 746.734 m 45.266 82.346 l 46.016 82.346 l 46.016 745.984 l f 0.200 0.200 0.200 rg BT 61.016 693.716 Td /F1 14.4 Tf [(E-MAILS WITH A HIDDEN AGENDA)] TJ ET 0.400 0.400 0.400 rg BT 61.016 664.909 Td /F2 9.0 Tf [(Posted on )] TJ ET BT 104.045 664.909 Td /F3 9.0 Tf [(January 01,1970)] TJ ET BT 173.588 664.909 Td /F2 9.0 Tf [( by )] TJ ET BT 188.096 664.909 Td /F3 9.0 Tf [(IT Communications)] TJ ET 0.153 0.153 0.153 rg BT 61.016 637.420 Td /F4 9.0 Tf [(Two e-mails trying to scam staff out of their information, and potentially money, materialised in our mailboxes last week.)] TJ ET BT 61.016 617.431 Td /F4 9.0 Tf [(The first is a familiar one attempting to get you to)] TJ ET BT 258.107 617.431 Td /F2 9.0 Tf [(reactivate)] TJ ET BT 297.122 617.431 Td /F4 9.0 Tf [( to increase your webmail quota.)] TJ ET BT 61.016 597.442 Td /F4 9.0 Tf [(The source of the scam is Russia, and it uses a man-in-the-middle method to send out the mail. This method takes the e-)] TJ ET BT 61.016 586.453 Td /F4 9.0 Tf [(mail credentials from a staff member who has inadvertently given their e-mail details to the scammers. It typically occurs )] TJ ET BT 61.016 575.464 Td /F4 9.0 Tf [(when you respond to a you have won/inherited X-amount of money in a lucky draw/online survey/death of a unknown )] TJ ET BT 61.016 564.475 Td /F4 9.0 Tf [(relative/government official e-mail or click on an advert on a compromised website.)] TJ ET BT 61.016 544.486 Td /F4 9.0 Tf [(The scammers use your e-mail addressand, if it is also infected with malware or a virus, your PC, to send an e-mail to all )] TJ ET BT 61.016 533.497 Td /F4 9.0 Tf [(accounts within the same organisation.)] TJ ET BT 61.016 513.508 Td /F4 9.0 Tf [(The use of a university e-mail as the alleged sender often lulls us into thinking it is legitimate and we respond. We forget )] TJ ET BT 61.016 502.519 Td /F4 9.0 Tf [(that senders and most mail details in an e-mail can be forged by these scammers.)] TJ ET BT 61.016 482.530 Td /F4 9.0 Tf [(The mail below is an example of one such scam. It might be useful to remember that personnel currently have 1Gb of )] TJ ET BT 61.016 471.541 Td /F4 9.0 Tf [(mailbox storage, and students have 50Gb through Office365. The dangerous links have been removed.)] TJ ET BT 61.016 451.552 Td /F4 9.0 Tf [(The second e-mail targetsPick & Pay clients with an e-mail on)] TJ ET BT 312.107 451.552 Td /F1 9.0 Tf [(Smart Shopper credits. )] TJ ET BT 413.636 451.552 Td /F4 9.0 Tf [(\(see example below with active )] TJ ET BT 61.016 440.563 Td /F4 9.0 Tf [(links removed\))] TJ ET BT 61.016 420.574 Td /F4 9.0 Tf [(Take note of the following:)] TJ ET BT 61.016 400.585 Td /F4 9.0 Tf [(1. The e-mail is never addressed to you personally - it's just a generic heading.)] TJ ET BT 61.016 389.596 Td /F4 9.0 Tf [(2. It asks the receiver to divulge personal information, e.g, Smartshopper number and ID number.)] TJ ET BT 61.016 378.607 Td /F4 9.0 Tf [(3. The wording is somewhat threatening - make sure and must.)] TJ ET BT 61.016 358.618 Td /F4 9.0 Tf [(With the information sourced by the e-mail, Smartshopper cards can be duplicated. Since your ID number is also joined )] TJ ET BT 61.016 347.629 Td /F4 9.0 Tf [(with yourSmartshopper card, not only your credits are at risk, but also the possibility of identity theft.)] TJ ET BT 61.016 327.640 Td /F4 9.0 Tf [(Never respond to this sort of mail. Information Technology will never send such a mail about your mailbox size and Pick & )] TJ ET BT 61.016 316.651 Td /F4 9.0 Tf [(Pay also won't communicate with its clients in this way. If in doubt phone the IT Service Desk.)] TJ ET BT 61.016 296.662 Td /F4 9.0 Tf [()] TJ ET 0.592 0.592 0.592 rg 0.592 0.592 0.592 RG 305.016 286.964 m 306.516 286.964 l 305.766 286.214 l 305.766 286.214 l f 1.000 1.000 1.000 rg 1.000 1.000 1.000 RG 305.016 284.714 m 306.516 284.714 l 305.766 285.464 l 305.766 285.464 l f 306.516 286.964 m 306.516 284.714 l 305.766 285.464 l 305.766 286.214 l f 0.592 0.592 0.592 rg 0.592 0.592 0.592 RG 305.016 286.964 m 305.016 284.714 l 305.766 285.464 l 305.766 286.214 l f 0.153 0.153 0.153 rg BT 61.016 266.923 Td /F1 9.0 Tf [(From:)] TJ ET BT 86.513 266.923 Td /F4 9.0 Tf [( University, Personnel, Address <)] TJ ET 0.373 0.169 0.255 rg BT 219.812 266.923 Td /F4 9.0 Tf [(faultyaddress@sun.ac.za)] TJ ET 0.373 0.169 0.255 RG 0.18 w 0 J [ ] 0 d 219.812 265.772 m 320.990 265.772 l S 0.153 0.153 0.153 rg BT 320.990 266.923 Td /F4 9.0 Tf [(>)] TJ ET BT 61.016 246.934 Td /F1 9.0 Tf [(Sent:)] TJ ET BT 83.516 246.934 Td /F4 9.0 Tf [( Wednesday, 14 October 2015 08:24)] TJ ET BT 61.016 235.945 Td /F1 9.0 Tf [(Subject:)] TJ ET BT 96.521 235.945 Td /F4 9.0 Tf [( 500MB)] TJ ET BT 61.016 215.956 Td /F4 9.0 Tf [(Dear E-mail User,)] TJ ET BT 61.016 195.967 Td /F4 9.0 Tf [(Your webmail quota has exceeded the set quota which is )] TJ ET 0.000 0.800 1.000 rg BT 290.633 195.967 Td /F4 9.0 Tf [(500MB)] TJ ET 0.000 1.000 1.000 rg BT 319.145 195.967 Td /F4 9.0 Tf [(.)] TJ ET 0.153 0.153 0.153 rg BT 321.647 195.967 Td /F4 9.0 Tf [( you are currently running on )] TJ ET 0.000 0.800 1.000 rg BT 438.701 195.967 Td /F4 9.0 Tf [(1.3GB)] TJ ET 0.153 0.153 0.153 rg BT 464.216 195.967 Td /F4 9.0 Tf [(. To re-activate and )] TJ ET BT 61.016 184.978 Td /F4 9.0 Tf [(increase your webmail quota please )] TJ ET 0.000 0.800 1.000 rg BT 207.077 184.978 Td /F4 9.0 Tf [(verify and update your webmail)] TJ ET 0.153 0.153 0.153 rg BT 331.628 184.978 Td /F4 9.0 Tf [( Account In order to re-activate and increase your )] TJ ET BT 61.016 173.989 Td /F4 9.0 Tf [(webmail quota )] TJ ET 0.000 0.800 1.000 rg BT 121.541 173.989 Td /F4 9.0 Tf [(click link)] TJ ET 0.153 0.153 0.153 rg BT 155.039 173.989 Td /F4 9.0 Tf [( :)] TJ ET 0.373 0.169 0.255 rg BT 162.545 173.989 Td /F4 9.0 Tf [(http://phishing.site.in.russia/)] TJ ET 0.18 w 0 J [ ] 0 d 162.545 172.838 m 273.596 172.838 l S 0.153 0.153 0.153 rg BT 273.596 173.989 Td /F4 9.0 Tf [( LOGON WITH YOUR LOGIN DETAILS TO COMPLETE )] TJ ET BT 61.016 163.000 Td /F4 9.0 Tf [(UPGRADE.)] TJ ET 0.000 0.800 1.000 rg BT 61.016 143.011 Td /F4 9.0 Tf [(Failure to do so may result in the cancellation of your webmail account.)] TJ ET 0.153 0.153 0.153 rg BT 343.634 143.011 Td /F4 9.0 Tf [( You may not be able to send or receive new mail )] TJ ET BT 61.016 132.022 Td /F4 9.0 Tf [(until you re-validate your mailbox.)] TJ ET BT 61.016 112.033 Td /F4 9.0 Tf [(Thanks, and sorry for the inconvenience.)] TJ ET endstream endobj 8 0 obj << /Type /Font /Subtype /Type1 /Name /F1 /BaseFont /Helvetica-Bold /Encoding /WinAnsiEncoding >> endobj 9 0 obj << /Type /Font /Subtype /Type1 /Name /F2 /BaseFont /Helvetica-Oblique /Encoding /WinAnsiEncoding >> endobj 10 0 obj << /Type /Font /Subtype /Type1 /Name /F3 /BaseFont /Helvetica-BoldOblique /Encoding /WinAnsiEncoding >> endobj 11 0 obj << /Type /Font /Subtype /Type1 /Name /F4 /BaseFont /Helvetica /Encoding /WinAnsiEncoding >> endobj 12 0 obj << /Type /Annot /Subtype /Link /A 13 0 R /Border [0 0 0] /H /I /Rect [ 219.8117 266.0902 320.9897 275.2477 ] >> endobj 13 0 obj << /Type /Action /S /URI /URI (mailto:faultyaddress@sun.ac.za) >> endobj 14 0 obj << /Type /Annot /Subtype /Link /A 15 0 R /Border [0 0 0] /H /I /Rect [ 162.5447 173.1562 273.5957 182.3137 ] >> endobj 15 0 obj << /Type /Action /S /URI /URI (http://blogs.sun.ac.za/it/2015/06/12/think-youre-safe-online/) >> endobj 16 0 obj << /Type /Page /Parent 3 0 R /Annots [ 18 0 R ] /Contents 17 0 R >> endobj 17 0 obj << /Length 2530 >> stream 0.153 0.153 0.153 rg 0.373 0.169 0.255 RG 0.18 w 0 J [ ] 0 d 0.702 0.800 0.816 rg 34.016 34.016 543.969 723.969 re f 1.000 1.000 1.000 rg 45.266 480.127 521.469 277.857 re f 0.773 0.773 0.773 rg 0.773 0.773 0.773 RG 45.266 480.127 m 566.734 480.127 l 565.984 480.877 l 46.016 480.877 l f 566.734 757.984 m 566.734 480.127 l 565.984 480.877 l 565.984 757.984 l f 45.266 757.984 m 45.266 480.127 l 46.016 480.877 l 46.016 757.984 l f 61.016 495.877 m 550.984 495.877 l 550.984 496.627 l 61.016 496.627 l f 0.153 0.153 0.153 rg BT 61.016 740.193 Td /F4 9.0 Tf [(Admin/ Webmaster/ Local host)] TJ ET 0.592 0.592 0.592 rg 0.592 0.592 0.592 RG 305.016 730.495 m 306.516 730.495 l 305.766 729.745 l 305.766 729.745 l f 1.000 1.000 1.000 rg 1.000 1.000 1.000 RG 305.016 728.245 m 306.516 728.245 l 305.766 728.995 l 305.766 728.995 l f 306.516 730.495 m 306.516 728.245 l 305.766 728.995 l 305.766 729.745 l f 0.592 0.592 0.592 rg 0.592 0.592 0.592 RG 305.016 730.495 m 305.016 728.245 l 305.766 728.995 l 305.766 729.745 l f 0.153 0.153 0.153 rg BT 61.016 710.454 Td /F4 9.0 Tf [()] TJ ET BT 61.016 690.465 Td /F1 9.0 Tf [(From:)] TJ ET BT 86.513 690.465 Td /F4 9.0 Tf [( Pick N Pay [)] TJ ET 0.373 0.169 0.255 rg BT 138.029 690.465 Td /F4 9.0 Tf [(mailto:faultyaddress@pnp.co.za)] TJ ET 0.373 0.169 0.255 RG 0.18 w 0 J [ ] 0 d 138.029 689.314 m 266.216 689.314 l S 0.153 0.153 0.153 rg BT 266.216 690.465 Td /F4 9.0 Tf [(])] TJ ET BT 61.016 670.476 Td /F1 9.0 Tf [(Sent:)] TJ ET BT 83.516 670.476 Td /F4 9.0 Tf [( Tuesday, 20 October 2015 05:42)] TJ ET BT 61.016 659.487 Td /F1 9.0 Tf [(Subject:)] TJ ET BT 96.521 659.487 Td /F4 9.0 Tf [( Your R700 Pick N Pay \(PNP\) Shopping Voucher ready for claim)] TJ ET BT 61.016 639.498 Td /F4 9.0 Tf [(Attention PNP Smart Card Owner,)] TJ ET BT 61.016 619.509 Td /F4 9.0 Tf [(You have qualified to receive a shopping voucher of R700 to shop for groceries at any "PNP" outlet near you. Make sure )] TJ ET BT 61.016 608.520 Td /F4 9.0 Tf [(you have your SMART SHOPPER CARD with you before you can proceed.)] TJ ET BT 61.016 588.531 Td /F1 9.0 Tf [(CLICK HERE TO PROCEED)] TJ ET 0.153 0.153 0.153 RG 0.18 w 0 J [ ] 0 d 61.016 587.102 m 178.025 587.102 l S BT 61.016 568.542 Td /F4 9.0 Tf [(Regards,)] TJ ET BT 61.016 548.553 Td /F4 9.0 Tf [(PNP)] TJ ET BT 358.438 528.564 Td /F4 9.0 Tf [([INFORMATION SUPPLIED BY DAVID WILES])] TJ ET 0.400 0.400 0.400 rg BT 61.016 510.075 Td /F2 9.0 Tf [(Posted in:E-mail,Security | Tagged:Phishing,Webmail | With 0 comments)] TJ ET endstream endobj 18 0 obj << /Type /Annot /Subtype /Link /A 19 0 R /Border [0 0 0] /H /I /Rect [ 138.0287 689.6326 266.2157 698.7901 ] >> endobj 19 0 obj << /Type /Action /S /URI /URI (mailto:faultyaddress@pnp.co.za) >> endobj xref 0 20 0000000000 65535 f 0000000008 00000 n 0000000073 00000 n 0000000119 00000 n 0000000312 00000 n 0000000341 00000 n 0000000479 00000 n 0000000568 00000 n 0000007442 00000 n 0000007554 00000 n 0000007669 00000 n 0000007789 00000 n 0000007897 00000 n 0000008025 00000 n 0000008107 00000 n 0000008235 00000 n 0000008348 00000 n 0000008432 00000 n 0000011015 00000 n 0000011143 00000 n trailer << /Size 20 /Root 1 0 R /Info 5 0 R >> startxref 11225 %%EOF October « 2015 « Informasietegnologie
Language:
SEARCH
  • Recent Posts

  • Categories

  • Archives

October, 2015

Cyber security – no science fiction

Monday, October 26th, 2015

“Cyber” – the word conjures up images of futuristic robots, a post apocalyptic world and machines displaying human characteristics. Clearly we’ve seen too many sci-fi movies.

However, cyber security isn’t in the future, it’s here now and the threat is very real.

Wikipedia defines cyber security as follows:

Computer security, also known as cybersecurity or IT security, is the protection of information systems from theft or damage to the hardware, the software, and to the information on them, as well as from disruption or misdirection of the services they provide. It includes controlling physical access to the hardware, as well as protecting against harm that may come via network access, data and code injection, and due to malpractice by operators, whether intentional, accidental, or due to them being tricked into deviating from secure procedures. https://en.wikipedia.org/wiki/Computer_security (2015/10/12)

It is clear that any theft from ICT equipment or data, as well as any disruption of service, can be added to this definition.

The following categories have been included in Wikipedia: Backdoors; Denial-of-service attack; Direct-access attacks; Eavesdropping; Spoofing; Tampering; Privilege escalation; Phishing; Clickjacking; Social engineering and trojans. (Over the next few months we will be discussing these categories in more detail.)

The reasons for attacks on companies are mostly for financial gain, but where Stellenbosch University is concerned, there are a few other reasons. For example financially, manipulation of marks or degrees, access to exam papers, access to and manipulation of research material, obtaining contact information (staff, students or donors), for ideological reasons, using our computing power and abusing our high speed internet access to launch attacks on other entities, etc.

The biggest weak spots in security include usernames and passwords; untrained or inadvertent users; unsafe work stations; obsolete equipment, faulty hard drives; “man-in-the-middle“attacks and cloud services.

The easiest way to gain access to our systems is by means of an existing username and password. Of course it’s of the utmost importance that users choose passwords that are difficult to hack and maintain good password practice.

Don’t use official SU usernames and passwords for any other service or social media. Rather create a separate gmail or live.com e-mail address and use it for official registrations and services.

User access needs to be audited on a regular basis and out-dated rights, need to be removed.

Untrained or inadvertent users are probably the single biggest risk. It’s easy to be “convinced” to click on a link or open an e-mail attachment. Someone who does not pay attention to what they do, are easy targets – even in cyber space.

Work stations under control of end users with administrator rights provide another risk, since they can install any programme. Users navigate to any web address and click links without thinking twice. Any of these links can compromise the workstation and subsequently also the whole campus infrastructure.

Even outdated equipment contains data. Therefore it is important that any data be removed before equipment leaves university property.

These are just a few examples of threats to cyber security and the challenges they present Information Technology. With the assistance of our users, we can at least prevent a few of these dangers.

 

Credit card fraud increasing

Friday, October 23rd, 2015

It’s Friday afternoon and you are looking forward to an effortless evening of movies and take-aways. You drop in at the closest pizza place on your way home. In your rush to silence your growling stomach, you forgot to draw cash. The closest ATM is 5 kilometres away, but at least you have a credit card.

Paying is no problem and the transaction is safe. You can see the card machine the shop assistant uses and you discreetly type in your PIN number. Besides, card cloning only takes place when someone takes your card out of sight. So they say.

But did you notice that the machine swallowed a little bit more of your card than other times. Usually you can still fit your thumb on the card while you complete the transaction, but now it’s hardly visible.

Coincidence. Actually no. Your card was just skimmed.

Last year R450 million was lost to credit card scams, 23% more than in 2013. The increase was particularly sharp at take-away outlets. But even handheld devices in restaurants can be tampered with. Between 2005 and 2015 1377 compromised devices were confiscated.

Card cloning is just one form of credit card fraud. When you use your card on the internet, whether it’s for banking or online shopping, there’s always some risk involved.

According to Kaspersky Lab, one of the leaders in internet security, 5000 websites are compromised daily. Malware and phishing through e-mails are still one of the biggest problems at Stellenbosch University.

How do you avoid becoming a victim?

Keep an eye on your card at all times.

  • Place your credit card in the machine yourself so you can feel if it goes in easily. With a chip card, you should still be able to comfortably fit your thumb on the card, even when it’s in the machine.
  • Never send your banking details with e-mail.
  • Also never click on a link asking these details – even if it looks like you bank’s branding.
  • Install spam blocking software to eliminate phishing e-mails.
  • Ensure that your antivirus software is up to date and regularly updated.
  • When you purchase online with your credit card, only use official, safe websites. Even then, see if the address starts with “https:”, otherwise it’s not secure.
  • Don’t use public wi-fi for any personal transactions or purchases. (read more here)

[SOURCE: www.mybroadband.co.za]

 

E-mails with a hidden agenda

Wednesday, October 14th, 2015

Two e-mails trying to scam staff out of their information, and potentially money, materialised in our mailboxes last week.

The first is a familiar one attempting to get you to reactivate to increase your webmail quota.

The source of the scam is Russia, and  it uses a man-in-the-middle method to send out the mail. This method takes the e-mail credentials from a staff member who has inadvertently given their e-mail details to the scammers. It typically occurs when you respond to a “you have won/inherited X-amount of money in a lucky draw/online survey/death of a unknown relative/government official” e-mail or click on an advert on a compromised website.

The scammers use your e-mail address and, if it is also infected with malware or a virus, your PC, to send an e-mail to all accounts within the same organisation.

The use of a university e-mail as the alleged sender often lulls us into thinking it is legitimate and we respond. We forget that “senders” and most mail details in an e-mail can be forged by these scammers.

The mail below is an example of one such scam. It might be useful to remember that personnel currently have 1Gb of mailbox storage, and students have 50Gb through Office365. The dangerous links have been removed.

The second e-mail targets Pick & Pay clients with an e-mail on Smart Shopper credits. (see example below with active links removed)

Take note of the following:

1. The e-mail is never addressed to you personally – it’s just a generic heading.
2. It asks the receiver to divulge personal information, e.g, Smartshopper number and ID number.
3. The wording is somewhat threatening –  “make sure” and “must”.

With the information sourced by the e-mail, Smartshopper cards can be duplicated. Since your ID number is also joined with your Smartshopper card, not only your credits are at risk, but also the possibility of identity theft.

Never respond to this sort of mail. Information Technology will never send such a mail about your mailbox size and Pick & Pay also won’t communicate with its clients in this way. If in doubt phone the IT Service Desk.

 


From: University, Personnel, Address <faultyaddress@sun.ac.za>

Sent: Wednesday, 14 October 2015 08:24
Subject: 500MB

Dear E-mail User,

Your webmail quota has exceeded the set quota which is 500MB. you are currently running on 1.3GB. To re-activate and increase your webmail quota please verify and update your webmail Account In order to  re-activate and increase your webmail quota click linkhttp://phishing.site.in.russia/   LOGON WITH YOUR LOGIN DETAILS TO COMPLETE UPGRADE.

Failure to do so may result in the cancellation of your webmail account. You may not be able to send or receive new mail until you re-validate your mailbox.

Thanks, and sorry for the inconvenience.

Admin/ Webmaster/ Local host


 

From: Pick N Pay [mailto:faultyaddress@pnp.co.za]

Sent: Tuesday, 20 October 2015 05:42
Subject: Your R700 Pick N Pay (PNP) Shopping Voucher ready for claim

Attention PNP Smart Card Owner,

You have qualified to receive a shopping voucher of R700 to shop for groceries at any “PNP” outlet near you. Make sure you have your SMART SHOPPER CARD with you before you can proceed.

CLICK HERE TO PROCEED

Regards,

PNP

 [INFORMATION SUPPLIED BY DAVID WILES]

Peeple – an app for the people?

Friday, October 9th, 2015

peepleIt’s 6:08 in the morning. Seconds ago you were fast asleep and oblivious to the rest of the world. Until your cell phone alerted you of a new message.

Someone, who claims to know you, has given you a one star rating on an online app. Additionally she’s also reviewed your personal and romantic life and the outcome is not exactly favourable.

Sounds like a clip from a sci-fi movie, doesn’t it? Only it’s not. In less than a week, this could be a reality when Nicole McCullough and Julia Cordray unleash their controversial app, Peeple, on the world.

A cloud of inauspiciousness hovers above Peeple since the announcement early in October.

Initially you would be notified if any negative comments were listed on the app. You then have the opportunity to convince your critic that he or she is wrong – you have 48 hours to accomplish this prickly task. If your negotiation skills prove unsuccessful, you can still defend yourself on the platform. Negative comments will not be removed: in short, you have little say.

After overwhelming criticism in the media – particularly the breeding ground Peeple will create for bullying and harassment – the app’s quickly changed it’s approach.

A prominent article in the Washington Post even led to the prompt removal of Peeple‘s website, Facebook page and Twitter accounts.

At the moment it is marketed as an app encouraging positive feedback – a “positive revolution”, as the website so optimistically states.

Recently Cordray stated on LinkedIn that no person will be listed without their consent. The 48 waiting period for removing negative comments is no longer applicable. If you do not approve a comment, it will not be posted.

Whether Peeple changes it’s procedures or approach, the real impact of an app that intrudes on human rights, will only truly be felt once it’s in operation.

Clearly there is already enormous opposition. A petition to ban Peeple accumulated more than 7000 signatures last week. Two parodies already exist: “Sheeple,” and “Meet Peeple”. Even satirist John Oliver commented in his unique, outspoken, rant-like style.

Peeple in the media: http://www.theguardian.com | http://www.latimes.com | http://www.forbes.com | http://arstechnica.com | http://www.mybroadband.co.za

 

 

© 2013-2025 Disclaimer: The views and opinions expressed in this page are strictly those of the page author(s) and content contributor(s). The contents of this page have not been reviewed or approved by Stellenbosch University.