Emma Watson's photo hack: How much control do we have over our own images?

Private photos of the actress were stolen. Even less conspicuous targets for hackers may see reason to take extra cybersecurity measures.

|
Mario Anzuon/Reuters
Cast member Emma Watson poses at the premiere of 'Beauty and the Beast' in Los Angeles, on March 2, 2017.

Hackers stole private photos belonging to Emma Watson, her publicists say, after several of the images appeared online on Tuesday night.

“Photos from a clothes fitting Emma had with a stylist a couple of years ago have been stolen,” her publicist told the BBC. “They are not nude photographs. Lawyers have been instructed and we are not commenting further.”

The theft is likely to revive debates about the distribution of women’s private images without their consent, especially given Ms. Watson’s notoriety as a feminist figure. It might also animate anxieties about the security of images stored in online databases even among women who are less of an obvious target for hackers than celebrities.

As The Christian Science Monitor reported in 2014, hundreds of millions of users keep private information on cloud servers like the Apple iCloud, which was accessed by hackers who stole nude photos of Jennifer Lawrence, Kate Upton, and other female celebrities in that year’s “Celebgate” scandal:

Perhaps the simplest step that cloud users can take [to protect their data] is to add a second layer of authentication similar to that employed by many banking websites.

Both Google and Apple offer multiple-layer verification features. They aren’t default settings, so users have to search for them.

Apple’s two-step verification system tethers an Apple ID to a specific device, most commonly a cellphone. Any time a user with activated two-step verification makes any changes to their Apple ID account, Apple sends a four digit verification code to the specified device as a secondary password. This feature means that even if hackers crack a user’s password, they can’t make blanket changes to the account. It won’t keep hackers out entirely, but it will prevent them from locking the verified user out of their own account.

Google offers a similar feature for its suite of services including Google Drive, Gmail, and Google+.

Watson was also threatened, in the midst of 2014’s Celebgate, with the release of private nude images, in what turned out to be a hoax that the actress attributes to a speech on gender equality she gave before the United Nations as a goodwill ambassador that year, notes The Washington Post.

“I knew it was a hoax, I knew the pictures didn't exist,” said Watson at a 2015 Facebook event, according to the BBC. “The minute I stepped up and talked about women's rights I was immediately threatened – within less than 12 hours I was receiving threats.”

The leak of Watson’s private photos comes in the weeks after she drew criticism from some quarters for a Vanity Fair shoot in which she posed in a revealing crochet top – a shoot that some described as antithetical to feminist ideals. The actress has said those criticisms were fueled by “a fundamental and complete misunderstanding of what feminism is,” according to the Associated Press.

“Feminism is about equality and it's about choice,” she told the agency. “Feminism is not a stick with which to beat other women.” 

This report contains material by the Associated Press.

You've read  of  free articles. Subscribe to continue.
Real news can be honest, hopeful, credible, constructive.
What is the Monitor difference? Tackling the tough headlines – with humanity. Listening to sources – with respect. Seeing the story that others are missing by reporting what so often gets overlooked: the values that connect us. That’s Monitor reporting – news that changes how you see the world.

Dear Reader,

About a year ago, I happened upon this statement about the Monitor in the Harvard Business Review – under the charming heading of “do things that don’t interest you”:

“Many things that end up” being meaningful, writes social scientist Joseph Grenny, “have come from conference workshops, articles, or online videos that began as a chore and ended with an insight. My work in Kenya, for example, was heavily influenced by a Christian Science Monitor article I had forced myself to read 10 years earlier. Sometimes, we call things ‘boring’ simply because they lie outside the box we are currently in.”

If you were to come up with a punchline to a joke about the Monitor, that would probably be it. We’re seen as being global, fair, insightful, and perhaps a bit too earnest. We’re the bran muffin of journalism.

But you know what? We change lives. And I’m going to argue that we change lives precisely because we force open that too-small box that most human beings think they live in.

The Monitor is a peculiar little publication that’s hard for the world to figure out. We’re run by a church, but we’re not only for church members and we’re not about converting people. We’re known as being fair even as the world becomes as polarized as at any time since the newspaper’s founding in 1908.

We have a mission beyond circulation, we want to bridge divides. We’re about kicking down the door of thought everywhere and saying, “You are bigger and more capable than you realize. And we can prove it.”

If you’re looking for bran muffin journalism, you can subscribe to the Monitor for $15. You’ll get the Monitor Weekly magazine, the Monitor Daily email, and unlimited access to CSMonitor.com.

QR Code to Emma Watson's photo hack: How much control do we have over our own images?
Read this article in
https://www.csmonitor.com/Technology/2017/0316/Emma-Watson-s-photo-hack-How-much-control-do-we-have-over-our-own-images
QR Code to Subscription page
Start your subscription today
https://www.csmonitor.com/subscribe