ToTok: A Famous Chatting App is a Federal Spying Tool in Reality

ToTok: A Famous Chatting App is a Federal Spying Tool in Reality

While installing apps on smartphones, users casually allow them to access phonebook, gallery, files, etc. At the time, users are unaware of the fact that some developers might spy on them or misuse their data. Today’s news is regarding a well-known messaging app, ToTok. Touting itself as the safest mean of chatting with friends and family, the messaging app, in reality, is a spying tool. Reportedly, the United Arab Emirates use ToTok to keep an eye on the users who install it. Since Google and Apple have removed the chatting tool from their respective app stores. Still, the app will continue to monitor the activities of users who already have the app on the phone. Above all, it is better to delete such extra-smart apps from smartphones.

As per the latest reports, the UAE government uses ToTok to extract location information of its users. Apart from this, they have access to text and voice chats, including the social connections of the users. Well, most of ToTok users reside in the UAE, but the app has gained popularity across the globe. The recently-launched chatting tool has achieved record-breaking results by having over half a million users across America. To so-called end-to-end encrypted messaging service has access to the user’s every movement, chat, image, sound, etc.

Breej Holding, a frontal for DarkMatter, is a cyber-intelligence agency based in Abu Dhabi. Even more, it is a hacking organization that recruits Emirati intelligence officers and ex-employees of the National Security Agency. The company also has a history of employing ex-Israeli military intelligence agents. Apart from this, Breej Holding is facing an inquiry from the officials of U.S. intelligence, for alleged hacking violations. ToTok is a copy-and-paste version of YeeCall, a Chinese app. Above all, ToTok is not secretly scouring user data. At the time of registration, it asks for permission, the same as other social networks. But it has access to every part of the online identity of users. As usual, it is because people don’t read the privacy policy carefully before accepting it.

Related posts

Leave a Comment