If for some reason you want an Apple Card here’s How to Easily Opt Out of Binding Arbitration

You’ll spot binding arbitration clauses in a lot of financial agreements because it helps keep banks and their business partners out of court. If you agree to binding arbitration, you can’t go to trial against a company or join a class-action lawsuit; you can only have your issue settled by a third-party mediator. If you don’t like what the mediator decides, you still have to live with it.

Not all credit cards allow you to opt out of binding arbitration, but Apple Card does. And it makes it easy for you to opt out by allowing you to do so by text message. In fact, if you have any question about using Apple Card, you can get help via text message (instead of having to use your phone like an actual phone and wait on hold).

Nick Guy shared a screenshot on Twitter to illustrate just how easy it was to opt out of arbitration for his new Apple Card:

Take a minute now to send your opt-out request, then rest easy knowing that if you end up with major beef with Apple Card, you have access to all your options for dealing with it.

Source: How to Easily Opt Out of Apple Card Binding Arbitration

Man sued for using bogus YouTube takedowns to get address for swatting – so copyright is not only inane, it’s also physically dangerous

YouTube is suing a Nebraska man the company says has blatantly abused its copyright takedown process. The Digital Millennium Copyright Act offers online platforms like YouTube legal protections if they promptly take down content flagged by copyright holders. However, this process can be abused—and boy did defendant Christopher L. Brady abuse it, according to YouTube’s legal complaint (pdf).

Brady allegedly made fraudulent takedown notices against YouTube videos from at least three well-known Minecraft streamers. In one case, Brady made two false claims against a YouTuber and then sent the user an anonymous message demanding a payment of $150 by PayPal—or $75 in bitcoin.

“If you decide not to pay us, we will file a 3rd strike,” the message said. When a YouTube user receives a third copyright strike, the YouTuber’s account gets terminated.

A second target was ordered to pay $300 by PayPal or $200 in Bitcoin to avoid a third fraudulent copyright strike.

A third incident was arguably even more egregious. According to YouTube, Brady filed several fraudulent copyright notices against another YouTuber with whom he was “engaged in some sort of online dispute.” The YouTuber responded with a formal counter-notice stating that the content wasn’t infringing—a move that allows the content to be reinstated. However, the law requires the person filing the counter-notice to provide his or her real-world name and address—information that’s passed along to the person who filed the takedown request.

This contact information is supposed to enable a legitimate copyright holder to file an infringement lawsuit in court. But YouTube says Brady had another idea. A few days after filing a counter-notice, the targeted YouTuber “announced via Twitter that he had been the victim of a swatting scheme.” Swatting, YouTube notes, “is the act of making a bogus call to emergency services in an attempt to bring about the dispatch of a large number of armed police officers to a particular address.”

YouTube doesn’t provide hard proof that Brady was responsible for the swatting call, stating only that it “appears” he was responsible based on the sequence of events. But YouTube says it does have compelling evidence that Brady was responsible for the fraudulent takedown notices. And fraudulent takedown notices are themselves against the law.

Section 512(f) of the DMCA says that anyone who “knowingly materially misrepresents” that content is infringing in a takedown notice is liable for costs they impose on both accused infringers and platform owners. While this law has been on the books for more than 20 years, it has rarely been used because most misrepresentations have not been blatant enough to trigger legal liability.

For example, Ars covered the decade-long fight over a “dancing baby” video that happened to have a few seconds of Prince music playing in the background. The Electronic Frontier Foundation argued that the music was clearly allowed under copyright’s fair use doctrine—and that Universal Music should be held liable for submitting a takedown request anyway. A 2016 appeals court ruling made it clear that music labels had some obligation to consider fair use before issuing takedown requests, but the court set the bar so low that the targets of bogus takedowns have little hope of actually collecting damages.

Source: Man sued for using bogus YouTube takedowns to get address for swatting | Ars Technica

Data Breach in Adult Site Luscious Compromises Privacy of All Users

Luscious is a niche pornographic image site focused primarily on animated, user-uploaded content. Based on the research carried out by our team, the site has over 1 million registered users. Each user has a profile, the details of which could be accessed through our research.

Private profiles allow users to upload, share, comment on, and discuss content on Luscious. All of this is understandably done while keeping their identity hidden behind usernames.

The data breach our team discovered compromises this anonymity by potentially allowing hackers to access the personal details of users, including their personal email address. The highly sensitive and private nature of Luscious’ content makes users incredibly vulnerable to a range of attacks and exploitation by malicious hackers.

[…]

The private personal user details we viewed included:

  • Usernames
  • Personal email addresses
  • User activity logs (date joined, most recent log in)
  • Country of residence/location
  • Gender

Some users’ email addresses indicated their full names, increasing their vulnerability to exploitation and cybercrime.

It’s worth mentioning that we estimate 20% of emails on Luscious accounts use fake email addresses to sign up. This suggests that some Luscious users are actively taking extra steps to remain anonymous.

User Behaviours & Activities

The data breach also gave a complete overview of user activities. This allowed us to view things like:

  • The number of image albums they had created
  • Video uploads
  • Comments
  • Blog posts
  • Favorites
  • Followers and accounts followed
  • Their User ID number – so we can know if they’re active or have been banned

Source: Report: Data Breach in Adult Site Compromises Privacy of All Users

Ouch – if you were on there, good luck and change your details immediately!