Dell Gets Pwned…. 49 Million Customers Affected

Posted in Commentary with tags , on May 14, 2024 by itnerd

Late last week, after threat actors posted evidence of a hack on BreachForums, Dell started warning 49 million customers that a threat actor has obtained their personal information through a data breach using a partner portal API they accessed posing as a fake company. The breach was first reported by DailyDark Web. The data includes detailed customer information on Dell system purchases s between 2017 and 2024. With a huge portion of Dell’s $88.4 billion in annual revenue coming from sales to the US government, this reaches deeply into that sector.

The data includes customer information of purchases made from Dell in the US, China, India, Australia, and Canada. Data stolen includes:

  • The full name of the buyer or company name
  • Full address
  • Unique seven-digit service tag of the system
  • Shipping date of the system
  • Warranty plan
  • Serial number
  • Dell customer number
  • Dell order number

The threat actor known as Menelik put the data up for sale on the Breached hacking forum on April 28th and told BleepingComputer that they were able to steal the data from a portal for Dell partners, resellers, and retailers. All Menelik had to do was register multiple accounts under fake company names and he had access within two days without any additional verification.

“It is very easy to register as a Partner. You just fill an application form,” Menelik said.

“You enter company details, reason you want to become a partner, and then they just approve you, and give access to this “authorized” portal. I just created my own accounts in this way. Whole process takes 24-48 hours.”

The threat actor claims they could harvest the information of 49 million customer records by generating 5,000 requests per minute for three weeks, without Dell blocking the attempts.

The threat actors said they emailed Dell on April 12th and 14th to report the bug to their security team but apparently Dell never replied to the emails and didn’t fix the bug until approximately two weeks later, around the time the stolen data was first put up for sale on the Breach Forums hacking forum.

Ted Miracco, CEO, Approov Mobile Security had this to say:

The breach was conducted via an API accessible through the partner portal, which Menelik accessed using the fake accounts. The ability to generate 5,000 requests per minute for an extended period without being flagged or blocked by Dell’s security systems points to inadequate rate limiting and abnormal activity detection on Dell’s APIs, beyond the blatantly lax vetting process for registering partners. This lack of robust API security controls such as proper throttling and anomaly detection mechanisms exposed Dell to prolonged unauthorized data extraction. The breach impacts customers across multiple major markets, including the US, China, India, Australia, and Canada, potentially exposing Dell to regulatory scrutiny and fines under various data protection laws like GDPR, CCPA, and others. Moreover, the breach should erode trust among Dell’s customers and partners, affecting its reputation negatively.

Dell has a lot of explaining to do. There is no way that this should have happened. I hope that Dell gets smacked silly by authorities everywhere so it send a message that companies have to make every effort to protect customer data without fail. And that there’s going to be punishment if that’s not happening.

Do Not Buy ASUS Products… Ever

Posted in Commentary with tags on May 13, 2024 by itnerd

As many of you know, I own a few ASUS products. Specifically, this gaming PC that I use for cycling indoors on Zwift. And this ZenWiFi XT8 mesh router that I’ve been using for a few years now. But today, I am going public with this statement.

Anyone who reads this blog should not buy ASUS products. Ever.

There’s a pair of reasons that drove me to make this statement. The first is their technical support. Which is abysmal. The second is that there’s an increasing pattern of ASUS not supporting their customers warranty claims by bullying them into paying for repairs that they don’t need.

Let’s start with their tech support. Or rather lack of it. I have had my own issues with their tech support as evidenced by this interaction with them where they couldn’t understand and help me with setting up a PPPoE connection that worked well. I ran around in circles with them for about two weeks before I got fed up with their incompetence. At the time, I said this:

What is worse is that all this troubleshooting was done via email which is the absolute worst way to provide tech support. Especially with complex issues like this. Getting onto a Zoom session or a phone call would have likely resulted in some sort of positive progress, and maybe even a solution. But they didn’t go that route and the net result of this rather negative experience is that it drove me to look at other options that avoided the use of PPPoE to get better performance from the XT8. It also made me decide that I won’t be recommending ASUS gear to my home and prosumer clients anymore. And chances are, my next router at home won’t be an ASUS product. While ASUS has great hardware, their support doesn’t meet the mark. Having competent tech support adds to the value of the gear that a vendor like ASUS makes. Or in this case, not having competent support detracts from the value of the gear that ASUS makes. So if the people at ASUS are reading this, they might want to look at this negative situation and make changes internally to make sure that they’re not on the wrong side of a public post like this as this sort of #Fail reflects poorly on ASUS as a brand. And will likely affect their future sales.

Since I wrote that, I’ve received dozens of emails from people that have had similar experiences with their tech support. That’s not a good look for ASUS because a company is only as good as the support they provide your customers. And if they provide bad support to their customers, those customers will get fed up and not be their customers any longer. And they will tell their friends, or someone like me who has the reach to tell a whole lot of people about how bad that ASUS tech support is. ASUS should consider that and change course before they have no customers to speak of.

That brings me to the second point. Which is ASUS not supporting their customers warranty claims by bullying them into paying for repairs that they don’t need. YouTube channel Gamers Nexus has investigated the bad behaviour of ASUS in the past. And their latest video details what looks like a systemic pattern of ASUS trying to extract cash from users who send in their hardware for warranty repairs by bullying them into paying for extra repairs that they don’t need. I would set aside 30 minutes to watch this video to get the full story:

The thing is, this isn’t the first time that ASUS has been caught doing something shady. If you do a search for “Gamers Nexus ASUS” on YouTube, you can see all the shady stuff that they have been caught doing. In addition, right to repair advocate and YouTuber Louis Rossmann has his own take on this:

If that’s not enough, there’s actually more. A Reddit thread surfaced in the last few days where ASUS quoted a Canadian customer a mind blowing $2799 USD to repair an RTX 4090 GPU that needed its 16-pin power connector replaced. The price is insane because the card had been purchased two week before this happened for $2050 USD. To say that the behaviour of ASUS is a bit suspect in this is an understatement.

On top of the fact that YouTuber JayzTwoCents dumped them as a sponsor to his channel because of their shady behaviour a while back. Here’s the video that details why he did that:

This is pretty bad for ASUS. When A YouTuber dumps you, you know you’re in a bad place.

Now in my case, I’ve been doing some dumping of ASUS products of my own. The PC that I mentioned earlier has been removed from service and replaced by this M2 Pro Mac mini. The PC in question is now sitting in my storage locker waiting to be sold. If you’re interested, I’ve got a fresh install of Windows 11 and it’s ready to go. Email me and we can take it from there. Now while I do have my issues with Apple, they support their customers and they don’t have a reputation for shady behaviour like ASUS does. Thus I will continue to buy products from Apple as they have largely demonstrated that they deserve my money.

Next up is my mesh router. While the XT8 mesh router has been generally reliable, the shady behaviour of ASUS combined with my negative tech support experience will mean that a mesh router from from another company will take its place when it’s time for me to go to WiFi 7. Right now the leading contender to replace the XT8 is Netgear who used to be suspect in terms of how they handled security issues, but have very much improved on that front after being called out on that front repeatedly. Though I have to admit that I’m looking at other companies as well, and I will base my decision on what I go with on the following criteria:

  • Security posture: In other words, how well they deal with security issues. Such as deploying patches and how fast they go public in terms of letting their customers know about severe issues that need immediate attention.
  • Performance: I want my router to give me top notch performance at all times because I want to maximize the speed of my Internet connection at all times.
  • Product Support: As I said earlier, a product is only as good as its support. So this is going to factor into what I get.

I’m hoping to do this switch this year. But one of the things that I am waiting on is WiFi 7 routers to appear in quantity so that I get a fair amount of choice before serving up my credit card to pay for it.

The only other thing that I’ve done is that I stopped recommending ASUS products to my home and prosumer customers. In fact, that happened about a year and a half ago when I had that negative experience with ASUS tech support. The reason I stopped recommending them is that when I recommend something, it has to be something that I would be willing to stake my reputation on. I can’t stake my reputation on recommending ASUS products. No way, no how.

Finally if you have had an issue with ASUS when it comes to the warranty repair of a product, report it as per the advice of Louis Rossmann and Gamers Nexus. In the US you can file a report using this link:

https://reportfraud.ftc.gov

If I find a similar reporting vehicle for Canada, I will post it here. The point is that if enough people report the behaviour of this company to the feds, then ASUS will have a whole lot of explaining to do.

So in short, I am done with ASUS. Given the issues with ASUS that have been exposed by others, and the issues that I’ve personally experienced, the only conclusion that you should come to is that ASUS doesn’t deserve your money. And one of the best ways to drive that point home to ASUS other than to report their behaviour to the feds is to not buy their gear. After all, ASUS may not care about how consumers feel about them. But they sure will care about their bank account getting smaller and smaller as consumers don’t buy their products. Maybe then ASUS will change course and become a company that cares about consumers rather than appear to screw them over at every opportunity. Though I am not holding my breath on that front given how they have behaved up until now. But I suppose anything is possible.

Tango Launches Global Choice Link

Posted in Commentary with tags on May 13, 2024 by itnerd

Tango, a leader in the global digital rewards and payouts space, today launched an important new product called Global Choice Link. This game-changing solution offers recipients their choice of digital gift cards and prepaid cards instantly—without the operational headaches of managing complex geographic and currency management issues.

This launch represents a considerable leap forward for Tango—and the industry at large—in ease of use and global capabilities. Until now, sending rewards globally could be challenging even for well-established providers as they struggled to find attractive rewards in emerging countries, worked to localize language, managed unstable supply chains, and dealt with currency conversions. Global Choice Link removes these hassles for our business customers. With Global Choice Link, you send one product to recipients wherever they happen to be on the globe, and they have immediate access to rewards that are relevant and impactful for them.

Upon receiving the Global Choice Link, the recipient selects their country and currency and chooses from a relevant list of rewards available in their local area. This is simply awesome for the recipient.

To learn more about Global Choice Link or request a demo, visit Tango’s website.

Reddit Announces New Ads Executive

Posted in Commentary with tags on May 13, 2024 by itnerd

Reddit’s announced that they’ve appointed Jyoti Vaidee as their new VP of Ads Product. Jyoti was previously the Director of Product Management at Google where she spent 11 years leading ads products like Google’s Display Ads and monetization efforts. In this new role, Jyoti will drive ads product strategy, execution, and management of the Ads Product organization.

You can read more about this appointment here.

How Virtual Machines Make It Easy And Safe For Me To Investigate #Scams

Posted in Commentary with tags , , on May 12, 2024 by itnerd

Investigating scams is not a risk free business. For example a scam website might be a vector for malware or viruses. Which means if I use my MacBook Pro to test something, that there’s a risk that I could blow it up and be out of business for days. Fortunately, there’s a way around that. I use virtual machines.

A virtual machine is the virtualization or emulation of a computer system. Virtual machines are based on computer architectures and provide the functionality of a physical computer. Their implementations may involve specialized hardware, software, or a combination of the two. In my case, I currently run two pieces of virtual machine software to do my investigations:

  • For Windows I run the free VMware Fusion Player. This has the ARM version of Windows 11 Professional which is always fully patched.
  • For Mac I run the free UTM virtualization software. This has macOS Sonoma which is always fully patched.

So why not have a simply have an extra computer or two lying around to do this sort of thing? We’ll, there’s several advantages for me:

  • Because it’s on my MacBook Pro, this is portable. Which means that I can use these on a client’s site at home or abroad.
  • Virtual machines have the advantage of being able to be cloned or snapshotted depending on the virtual machine software that you’re using so that you can save the current state of the the virtual machine so that if a virus blows it up, you can simply restore from the clone or snapshot and be back in business.
  • You can fully isolate the virtual machine from the real computer. So any infections that a virtual machine gets won’t spread.

Now running virtual machines requires a powerful computer to do it properly. In my case I run a 16″ MacBook Pro with the M1 Pro processor. Between the powerful processor and the 32 GB of RAM, I have no issues. But when it comes time to replace this computer, which as I wrote here I don’t see the need to do currently, I’ll likely be bumping up the RAM to 64GB and maybe increase the storage from 1TB to 2TB to accommodate additional virtual machines. I should note that if you’re on PC, you will likely need a Core i7, Core i9, Ultra 7 or Ultra 9 processor with 32 to 64 GB of RAM to do what I do.

Now, earlier on I did mention that I currently run two virtual machine software. That’s going to change as I am going to migrate to UTM for all my virtual machines. I’m doing that because since VMware has been acquired by Broadcom, their level of support has nosedived. You can take a scroll through the VMware Sub-Reddit to see the complaints about this acquisition that people have. And a lot of my clients are looking to move their enterprise level virtual machines off of the VMware platform for greener pastures like Microsoft Hyper-V, Nutanix or Citrix as a result of the chaos caused by the Broadcom acquisition. That lessens my need to run VMware’s software. Also UTM has much broader support for classic operating systems such as Windows XP and Windows 7. Which is something that VMware doesn’t offer. Thus it makes sense for me to transition to UTM.

So that’s my current virtual machine setup. After I do my transition to UTM, I’ll be doing a follow up to walk you through my setup and how I did it. Stay tuned for that and please leave any questions or comments below.

A Follow Up About My Recent Posts About Bell Being Used In Telephone #Scams

Posted in Commentary with tags on May 11, 2024 by itnerd

Recently, I’ve written about two instances where I’ve come across a threat actor or actors using Bell Canada’s name in an attempt to scam people. If you want to read about those scams, click here and here for details.

I wanted to make sure that my readers have every opportunity to protect themselves. So I went to Bell directly to ask for commentary as well as tips that would allow you to protect yourself from scams like these. A Bell representative sent me this which I have reprinted verbatim:

This style of fraudulent activity is what is called social engineering, where fraudsters exploit emotions to achieve various objectives. These include accessing sensitive information like passwords, credit card or SIN details, gaining control over computers or devices, or directly acquiring funds from unsuspecting victims. 

We want our customers to know that Bell will never contact you to ask for personal information unless we are responding to an inquiry made by the customer. We strongly advise our customers to beware of these fraudulent tactics, trust their instincts, and if they are uncertain about a caller’s identity, hang up and contact our team directly. We take such matters seriously and investigate each matter brought to our attention. If you suspect you have encountered someone fraudulently posing as a Bell representative please email fraud.fraude@bell.ca. For more information on how to protect yourself from telecom fraud, please visit bell.ca/security.

This is very good advice as a whole. And I want to highlight this part specifically:

We strongly advise our customers to beware of these fraudulent tactics, trust their instincts, and if they are uncertain about a caller’s identity, hang up and contact our team directly.

Because I come to the rescue of people who come in contact with scammers on a regular basis, I can say that trusting your instincts is one of the best things that you can do to protect you from being a victim of a scam. If you get the sense that something is wrong, go with it because you’re likely right. And trusting your instincts can save you from a very bad situation. On top of that, if you get a call from someone claiming to be from Bell, and what you hear doesn’t sound right, hang up and call Bell directly at 310-Bell. Finally, this advice doesn’t just apply to Bell, but to any situation that you might find yourself in where you get contacted out of the blue by someone claiming to have some great deal for you, or wanting to take some course of action that doesn’t sound right.

I want to thank Bell for responding to my request for a comment on this as this will help a great many people avoid being on the wrong end of a scam.

Ascension Hospital Healthcare Network Pwned In Far Reaching Cyberattack By BlackBasta

Posted in Commentary with tags on May 11, 2024 by itnerd

The Ascension Hospital cyber attack continues to head much of this week’s news, particularly as it follows on both the Heritage healthcare cyber attack and the City of Wichita getting hit by LockBit this week. CNN is reporting that the BlackBasta ransomware group is behind the attack. This latest cyberattack has had significant effects in terms of patient care:

The cyberattack on Ascension, a St. Louis-based nonprofit network that includes 140 hospitals in 19 states, is also disrupting access to electronic health records, some phone systems and “various systems utilized to order certain tests, procedures and medications,” Ascension said in a statement distributed Thursday evening.

The sprawling health care network, which also owns 40 senior living facilities, said that it would be using “downtime procedure for some time,” because of the cyberattack. Downtime procedures are typically when health providers revert to backup processes, including paper records, that allow them to care for patients when computers are down.

Steve Hahn, Executive VP, BullWall:

   “So we’re just getting word that Black Basta is behind this attack at Ascension Healthcare and this in the same week that the LockBit ransomware group claimed the attack on the city of Wichita, taking down their network and demanding a ransom. This marks a worrying trend. Russian ransomware groups, such as BlackBasta, LockBit and Blackcat (AlphV), are intensifying their focus on U.S. healthcare. These actions follow the FBI’s operation against Blackcat’s infrastructure, with both groups vowing increased attacks on this sector. These organizations, deeply embedded in Russia, likely amassed close to a billion dollars in ransom in 2023 alone. Their connections with former KGB leaders, including Putin, suggest a geopolitical strategy to target sectors that Putin aims to destabilize.

   “The financial toll of these attacks is staggering. United Healthcare’s $22 million payment to decrypt data is minor compared to the broader economic impact, likely exceeding $5 billion. Hospitals like Lehigh Valley Health Network have faced both data encryption and extortion, with potential legal fallout from the threatened release of sensitive patient photos.

   “Healthcare systems, with their myriad of IoT devices, widespread provider networks, and vast attack surfaces, are particularly vulnerable. The recent suspension of operations in Northeast hospitals due to cyberattacks underlines the sector’s susceptibility and the potentially fatal consequences of such disruptions.

   “For healthcare, preparation is not optional but essential. They must develop robust backup, recovery, and rapid ransomware containment strategies to mitigate these risks and minimize the impact of these inevitable attacks.”

As usual when healthcare organizations get pwned, I get to say that this sector is a soft target for hackers. This needs to stop because at some point someone is going to die because they can’t get the care that they need because of a cyberattack like this one. And the only way that this stops is through making sure healthcare organizations can make the required investments that allows them to be less of a target.

Printer Tech Support #Scams Are No Laughing Matter

Posted in Commentary with tags on May 10, 2024 by itnerd

Fun fact. Or perhaps not such a fun fact. More and more companies have done away with having a phone number that you can call for technical support. Having a tech support line and staffing it with competent people is a cost that businesses want to avoid. So these businesses have moved to doing email or online support such as a chat bot as that’s much cheaper. But many consumers are used to calling someone for help with their tech. Scammers know this and have filled in the void by creating technical support scams that are easy for the unsuspecting to find via a Google search. What I mean by that is that scammers will poison Google search results so that their scams pop up first as the natural human tendency is to click on the first, second or third result in a Google search. Then if the unsuspecting person calls the number, bad things will happen to them.

That’s what happened to an elderly couple yesterday. They had their Bell Fibe modem replaced yesterday and everything was fine except their Brother printer which was wireless wouldn’t print. So they Googled for a tech support number for Brother and somehow ended up in the hands of a company called Stallions Geek Solutions. More on them later. But what happened over the next hour or so was that someone who provided this couple his first name and employee number (Top tip: If a tech support person gives you only their first name and employee number on a phone call, that should be a red flag that something might be up as no legitimate tech support organization would ever do that) used TeamViewer to connect into their Mac to attempt to fix the problem. When the printer still wasn’t working, he claimed that this was a “driver issue”, and then said that he would have to escalate this to someone senior who would call them back, and it would cost them $200 to fix the problem. But first the couple would have to fill out a form that was asking for all sorts of personal information. The couple did start to do that but got suspicious and hung up the phone. That’s when I got a phone call that made me drop what I was doing to drive to their home and investigate.

Now the actual problem with the printer was really simple. The printer as I said earlier was a wireless one. So when Bell replaced the modem, nobody updated the printer’s wireless configuration so that it knew how to connect to the new modem. That’s why it wouldn’t work, and that took me a grand total of four minutes to sort out. Any person with even a basic understanding of how this stuff works who listened to the situation should have come to that conclusion. But clearly these scammers weren’t competent enough to do that. Or they were simply too focused on putting on a show so that they could execute their scam.

When I examined the Mac, I found a copy of TeamViewer. And based on the TeamViewer logs, it looks like the scammer tried to set it up so that they could connect to the computer any time they wanted. But they failed miserably in doing so. I didn’t find any evidence of any other remote access software like ConnectWise which is a favourite of scammers these days. So while I have to follow up with them in a few days, I felt confident in saying that their Mac was clean. And I think what saved them from something much worse happening was that the scammer didn’t really know his way around a Mac, and they refused to give the scammer their admin password for the Mac. If they did, he could have done anything he wanted. But they didn’t which limited what the scammer could do.

So, who are these Stallion Geek Solutions people? Using the number that they called, I managed to hunt down their website. Now I won’t post the URL for the website, but I will show you what it looks like:

It looks pretty. But to be totally honest, it’s one of the worst websites that I have ever seen. The text on it would make an English teacher cringe. It was clearly written by someone whose first language wasn’t English and the text that is there seems to be there to fill in space so that it makes this business look legitimate. Or put another way, they’re likely hoping that people won’t look at the details of the website and come to the conclusion that this business isn’t who they say that they are. To add to that, some of the links on the website go nowhere, which for a company who claims that they do web design among other things is pretty bad. For fun I checked their domain registration and found that the domain was registered in Europe. But all the administrative and technical contact info had been redacted for privacy. That isn’t unusual in isolation. But it combined with what else I am going to serve up makes this company look suspect.

This company had a Canadian address, but when I looked at it on Apple Maps, it was in a home in suburban Toronto. Again, by itself that’s not unusual. But when I checked to see what “Printer Services” that they offered, this made it unusual:

This was on the same page as their Canadian address. So are they in Canada or Australia? I’m guessing that they’re at neither place. Or maybe the Canadian address is some sort of front for the company as Apple Maps lists the company as operating out of the home that I spoke of earlier. And the company is elsewhere on the planet.

Finally, the phone number that the couple phoned has been implicated in a pop up scam back in 2022. I discovered that by running the number through a number of Scambaiter websites and getting a few hits. Such as this one:

In case you’re not familiar with the term, scambaiters are basically people who go after scammers by pranking them and doing everything that they can to disrupt their operations as it’s difficult if not next to impossible to get scammers arrested. Thus they feel that vigilante justice is better than no justice.

There’s enough evidence here that I think that I can conclude that this company was out to scam this couple. And that this company likely are some sort of scam operation. As part of this incident I submitted the log files from TeamViewer and passed them along to TeamViewer so that they can take action against these scammers. Which means that TeamView can use these logs to remotely disable their software so that the scammers can’t use it. That will put them out of business for a bit until they find some other remote access software to use.

Now if you need tech support for some piece of tech, Google is not your friend. Like I said earlier, scammers will do things to ensure when the search results pop up, they appear ahead of legitimate companies. Thus my recommendation is to go directly to the official website of the product manufacturer and only use their official channels for tech support. And if they don’t have actual phone support, don’t go hunting for some sort of phone number. That will only end badly for you because there are no “secret” or “unpublished” phone numbers for tech support, despite what you might have heard.

I’ll be updating this story with new information as warranted. But for now, consider this situation a cautionary tale of what can happen if you are not careful in terms of how you’re looking for tech support for the tech that you own.

Roku announces the launch of TVA+ on the Roku platform

Posted in Commentary with tags on May 9, 2024 by itnerd

Roku and TVA Group announced the launch of TVA+ on the Roku platform. Expanding the options for French-language content on the Roku platform in Canada, TVA+ brings an exciting array of entertainment, news, public affairs programming, and sports, including the NHL and MLB, to Roku users.

As TVA’s digital destination, TVA+ includes Quebec’s most popular original content – often surpassing 1 million views – as well as a catalogue of nearly 100 movies and series from here and abroad. TVA+  provides viewers with a wide range of original hit shows like IndéfendableSi on s’aimaitAlertesSorcières, and Révolution, plus popular Quebec adaptations such as La VoixSortez-moi d’ici and Chanteurs masqués, the family-friendly variety series that has ranked #1 in Canada (regardless of language) for 3 consecutive seasons. TVA+ also features TVA newscasts, along with several public affairs and sports programs.

Included in TVA+ is TVA Sports en Direct, available with a choice of two subscription packages. TVA Sports en Direct is the exclusive French-language broadcaster of the National Hockey League (NHL), including Saturday night Montreal Canadiens games and all playoff games. The channel also offers Major League Baseball (MLB), WTA tennis, the National Bank Open, the Laver Cup, UFC galas, and much more.

TVA+ is now available on all Roku devices and Roku TVs and can be added to the home screen directly from the Channel Store.

TikTok Will Now Label AI-Generated Content Made On Other Platforms

Posted in Commentary with tags on May 9, 2024 by itnerd

This morning, TikTok announced that they have become the first video sharing platform to start automatically labeling AI-generated content (AIGC) that’s made on other platforms by implementing Content Credentialsa new technology from the Coalition for Content Provenance and Authenticity (C2PA). TikTok already labels AIGC made with TikTok AI effects and were the first to launch an AIGC labeling tool which over 37M creators have used since September 2023.

On top of that, TikTok is launching new media literacy campaigns that we developed with guidance from experts including Mediawise. And they are also joining the Adobe-led Content Authenticity Initiative (CAI) to help drive Content Credentials adoption.

TikTok put out a full statement on this here: https://newsroom.tiktok.com/en-ca/partnering-with-our-industry-to-advance-ai-transparency-and-literacy-ca