Close Menu
TechBrunchTechBrunch
  • Home
  • AI
  • Apps
  • Crypto
  • Security
  • Startups
  • TechCrunch
  • Venture

Subscribe to Updates

Subscribe to our newsletter and never miss our latest news

Subscribe my Newsletter for New Posts & tips Let's stay updated!

What's Hot

Perfect Pitch: This NEA Partner says that all founders should answer these 5 questions

July 19, 2025

These are our favorite cyber books on hacking, spying, cryptography, surveillance and more.

July 19, 2025

For privacy and security, think carefully before granting AI access to your personal data

July 19, 2025
Facebook X (Twitter) Instagram
TechBrunchTechBrunch
  • Home
  • AI

    OpenAI seeks to extend human lifespans with the help of longevity startups

    January 17, 2025

    Farewell to the $200 million woolly mammoth and TikTok

    January 17, 2025

    Nord Security founder launches Nexos.ai to help enterprises move AI projects from pilot to production

    January 17, 2025

    Data proves it remains difficult for startups to raise capital, even though VCs invested $75 billion in the fourth quarter

    January 16, 2025

    Apple suspends AI notification summaries for news after generating false alerts

    January 16, 2025
  • Apps

    Duckduckgo allows you to hide AI-generated images in search results

    July 18, 2025

    Twitch begins testing vertical video streams

    July 17, 2025

    Meta appoints a generated AI VP to run the thread

    July 17, 2025

    Substack will raise $100 million from Chernin Group, Andreessen Horowitz and CEO Skims.

    July 17, 2025

    Zuckerberg and Meta investors reach settlement in a $8 billion privacy case

    July 17, 2025
  • Crypto

    North Korean hackers blamed record-breaking spikes in 2025

    July 17, 2025

    Bitcoin surpasses $118K at the second highest high in 24 hours

    July 11, 2025

    Vitalik Buterin reserves for Sam Altman's global project

    June 28, 2025

    Calci will close a $185 million round as rival Polymeruk reportedly seeks $200 million

    June 25, 2025

    Stablecoin Evangelist: Katie Haun's Battle of Digital Dollars

    June 22, 2025
  • Security

    These are our favorite cyber books on hacking, spying, cryptography, surveillance and more.

    July 19, 2025

    For privacy and security, think carefully before granting AI access to your personal data

    July 19, 2025

    Surveillance vendors have been caught exploiting new SS7 attacks to track people's phone locations

    July 18, 2025

    Hackers are trying to steal passwords and sensitive data from signal clone users

    July 17, 2025

    Call of Duty scammers complain after Activision launches a new wave of Mass-Bans

    July 16, 2025
  • Startups

    7 days left: Founders and VCs save over $300 on all stage passes

    March 24, 2025

    AI chip startup Furiosaai reportedly rejecting $800 million acquisition offer from Meta

    March 24, 2025

    20 Hottest Open Source Startups of 2024

    March 22, 2025

    Andrill may build a weapons factory in the UK

    March 21, 2025

    Startup Weekly: Wiz bets paid off at M&A Rich Week

    March 21, 2025
  • TechCrunch

    OpenSea takes a long-term view with a focus on UX despite NFT sales remaining low

    February 8, 2024

    AI will save software companies' growth dreams

    February 8, 2024

    B2B and B2C are not about who buys, but how you sell

    February 5, 2024

    It's time for venture capital to break away from fast fashion

    February 3, 2024

    a16z's Chris Dixon believes it's time to focus on blockchain use cases rather than speculation

    February 2, 2024
  • Venture

    Perfect Pitch: This NEA Partner says that all founders should answer these 5 questions

    July 19, 2025

    Caastle founder charged with fraud turns himself back

    July 18, 2025

    After raising more than $3 million, AmiColé, a popular VC-backed beauty brand, is shut down

    July 17, 2025

    A comprehensive list of 2025 tech layoffs

    July 16, 2025

    Rex Salisbury's Cambrian Ventures gathers new funds and backs Fintech slowdowns

    July 16, 2025
TechBrunchTechBrunch

For privacy and security, think carefully before granting AI access to your personal data

TechBrunchBy TechBrunchJuly 19, 20254 Mins Read
Facebook Twitter Pinterest Telegram LinkedIn Tumblr WhatsApp Email
Share
Facebook Twitter LinkedIn Pinterest Telegram Email


AI is for some reason forced on us in almost every aspect of life, from phones and apps to search engines and even drive-thru. The fact that you currently have a web browser with an AI assistant burning chatbots indicates that the way some people use the internet to search and consume information today is very different from a few years ago.

However, AI tools are increasingly seeking total level of access to personal data, pretending they need to work. This type of access is not normal and does not need to be normalized.

Until recently, it would be right to question why the seemingly harmless free “flashlight” or “calculator” apps from the app store are trying to request access to contacts, photos, and even real-time location data. These apps may not need that data to work, but if you think you can make a dollar or two by monetizing your data, you'll request it.

These days, AI isn't that different.

As an example, we'll take Comet, Perplexity's latest AI-powered web browser. Comet allows users to use the built-in AI search engine to find answers and automate daily tasks such as email and calendar event summary.

In a recent browser practice, TechCrunch discovered that when Prplexity requests access to a user's Google Calendar, the browser asks for broad permissions from the user's Google account, and includes the ability to manage drafts and send emails, including the ability to get contacts, viewing, editing events, and even copies of the entire employee on all calendars.

A list of more than 12 permissions that Perplexity browsers require access when connecting to a person's Google account.Comet is requesting access to a user's Google account. Image credit: TechCrunch

The embarrassment says that much of this data is stored locally on the device, but it still grants the company's right to access and use personal information, such as improving the AI model of everyone else.

Confusion doesn't just require access to your data. For example, there is a tendency for AI apps to save time by transcription of calls and work meetings, but you need an AI assistant to access private, real-time conversations, calendars, contacts, and more. Meta is also testing the limits of what AI apps can request access. For example, tapping a photo saved in the camera roll of a user that has not yet been uploaded.

Signal President Meredith Whitaker recently compared the use of AI agents and assistants to “put them in the brain into the bottle.” Whittaker explained how some AI products can promise to perform all sorts of mundane tasks, such as booking tables at restaurants or booking tickets for concerts. But to do that, AI will say that to open a browser you will need to open a website (which can allow AI access to saved passwords, bookmarks, browsing history), a credit card, a calendar to make reservations, and a calendar that marks the dates.

There are serious security and privacy risks associated with the use of data-dependent AI assistants. By granting access, you can instantly and irreversibly hand over the entire snapshot of your most personal information at that moment, such as messages, messages, calendar entries dating back to the year. All this saves you from having to actively think about it, either to perform a task that ostensibly saves time, or to the point of Whittaker.

It also accepts that you have given AI agents permission to act autonomously on your behalf, and requires you to place a huge amount of trust in technology that tends to make things wrong or keep things firm. With AI, you need to trust the profit-seeking companies developing these AI products. It relies on data to improve the performance of AI models. When things go wrong (and they do a lot), it is common practice for people from AI companies to look into your private prompts and understand why things didn't go well.

From a security and privacy perspective, a simple cost-benefit analysis of connecting AI to the most personal data is not worth giving up access to personal information. AI apps seeking these levels of permissions should ring the alarm bell so that the flashlight app wants to know where you are at any time.

Given the set of data you are handing over to AI companies, ask yourself if what you get from it is really valuable.



Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email

Related Posts

These are our favorite cyber books on hacking, spying, cryptography, surveillance and more.

July 19, 2025

Surveillance vendors have been caught exploiting new SS7 attacks to track people's phone locations

July 18, 2025

Hackers are trying to steal passwords and sensitive data from signal clone users

July 17, 2025

Call of Duty scammers complain after Activision launches a new wave of Mass-Bans

July 16, 2025

UK retail giant cooperative confirms that hackers have stole all 6.5 million customer records

July 16, 2025

Chinese authorities are using new tools to hack seized phones and extract data

July 16, 2025

Leave A Reply Cancel Reply

Top Reviews
Editors Picks

7 days left: Founders and VCs save over $300 on all stage passes

March 24, 2025

AI chip startup Furiosaai reportedly rejecting $800 million acquisition offer from Meta

March 24, 2025

20 Hottest Open Source Startups of 2024

March 22, 2025

Andrill may build a weapons factory in the UK

March 21, 2025
About Us
About Us

Welcome to Tech Brunch, your go-to destination for cutting-edge insights, news, and analysis in the fields of Artificial Intelligence (AI), Cryptocurrency, Technology, and Startups. At Tech Brunch, we are passionate about exploring the latest trends, innovations, and developments shaping the future of these dynamic industries.

Our Picks

Perfect Pitch: This NEA Partner says that all founders should answer these 5 questions

July 19, 2025

These are our favorite cyber books on hacking, spying, cryptography, surveillance and more.

July 19, 2025

For privacy and security, think carefully before granting AI access to your personal data

July 19, 2025

Subscribe to Updates

Subscribe to our newsletter and never miss our latest news

Subscribe my Newsletter for New Posts & tips Let's stay updated!

© 2025 TechBrunch. Designed by TechBrunch.
  • Home
  • About Tech Brunch
  • Advertise with Tech Brunch
  • Contact us
  • DMCA Notice
  • Privacy Policy
  • Terms of Use

Type above and press Enter to search. Press Esc to cancel.