#AxisOfEasy 440: Meta Ray-Ban Glasses Footage Sent To Human Reviewers


Weekly Axis Of Easy #440


Last Week’s Quote was: “All we have to decide is what to do with the time that is given us,” by – J. R. R. Tolkien.  Jonathan is our winner.  Congrats!

This Week’s Quote:  “The only clue to what man can do is what man has done.”  By ???

THE RULES:  No searching up the answer, must be posted at the bottom of this blog post, in the comments section.

The Prize:  First person to post the correct answer gets their next domain or hosting renewal on us.


This is your easyDNS #AxisOfEasy Briefing for the week of March 2nd, 2026. Our Technology Correspondent Joann L Barnes and easyCEO Mark E. Jeftovic send out a short briefing on the state of the ‘net and how it affects your business, security and privacy.

To Listen/watch this podcast edition with commentary and insight from Joey and Len the Lengend click here.

In this issue:

  • Meta Ray-Ban Glasses Footage Sent to Human Reviewers
  • Israel Allegedly Hacks Iranian Prayer App to Push Wartime Messages
  • Canadian Tire Data Breach Hits Millions
  • FULCRUMSEC Claims Major LexisNexis Data Breach
  • California Mandates Device-Level Age Tracking
  • The Government Wants an AI With No Guardrails. What Could Go Wrong?

Elsewhere Online:

  • Over 300 Domains Seized in Massive Europol Coordinated Strike Against Tycoon2FA
  • Powerful Coruna Exploit Kit Targets Older iOS Devices Using 23 Vulnerabilities
  • Over One Million Individuals Impacted by University of Hawaii Cancer Center Hack
  • Iran Expected to Launch Aggressive Cyber Campaigns Against Global Targets
  • Qualcomm Zero Day Vulnerability Exploited in Targeted Android Attacks

Still fighting with the OpenClaw install?

Try easyClaw VPS (Beta) — launching Friday the 13th.

Ready-to-go VPS with easyClaw preinstalled so you can deploy and operate faster. Get on the invite list.

Join early access→ https://invite.easyclaw.md


Meta Ray-Ban Glasses Footage Sent to Human Reviewers

Video feeds from Meta Ray-Ban smart glasses are sent to human data annotators in Kenya, sometimes showing sex, financial information, and private moments. The glasses record manually or via AI, which sends footage to Meta servers in Luleå, Sweden, and Denmark.

Algorithmic filters intended to block sensitive content can fail. Workers report discomfort reviewing intimate material, and Meta provides no clarity beyond its vague Terms of Service and Privacy Policy, leaving users uncertain about what footage is shared and how it is handled.

More via 9to5 Mac


Israel Allegedly Hacks Iranian Prayer App to Push Wartime Messages

Amid open warfare, Israel reportedly hacked BadeSaba, an Iranian prayer app with about 37 million downloads, to send messages inside Iran. Reuters said notifications reading “It’s time for reckoning,” titled “Help has arrived,” urged military members to oppose the regime.

Hamid Kashfi of DarkCell called the app a strategic target, citing its religious, potentially pro-regime user base and location-data access. Lukasz Olejnik of King’s College London described a psychological operation exploiting push systems “trusted by design.”

More via The Register 


Canadian Tire Data Breach Hits Millions

More than 38 million accounts were affected by an October 2025 data breach at Canadian Tire, discovered October 2. The e-commerce database included customer information from Canadian Tire, SportChek, Mark’s/L’Équipeur, and Party City. Compromised data included names, email addresses, dates of birth (fewer than 150,000 accounts), encrypted passwords, and some incomplete credit card numbers.

No Canadian Tire Bank or Triangle Rewards data was affected. The dataset was later added to Have I Been Pwned, which reported roughly 42 million records, including 38.3 million email addresses, addresses, phone numbers, gender, PBKDF2-hashed passwords, and partial credit card details. Affected individuals have been notified via email.

More via Security Week 


FULCRUMSEC Claims Major LexisNexis Data Breach

The extortion group FULCRUMSEC claims to have breached LexisNexis, RELX Group’s legal and business analytics division, exploiting a container role to access AWS infrastructure.

Allegedly exfiltrated data includes 2.04 GB of Redshift and VPC tables, 53 AWS secrets, 3.9M Enterprise Data Warehouse records, 400,000 cloud profiles, 118 government accounts (federal judges, DOJ attorneys, SEC staff, law clerks), 21,042 customer accounts, 5,582 attorney survey responses, 45 employee password hashes, cleartext customer passwords, complete VPC mapping, 10,000 IT tickets, and 10,000 internal defect records—a significant compromise of corporate, government, and customer intelligence.

More via Daily Dark Web

 

California Mandates Device-Level Age Tracking

California’s Assembly Bill 1043, signed by Governor Gavin Newsom and effective January 1, 2027, requires all OS providers—including Windows, macOS, Android, iOS, Linux distributions, and Valve’s SteamOS—to collect user age at setup and broadcast it via a real-time API to app developers. Age brackets follow users across devices and apps without consent.

Open-source systems like Arch, Debian, and Gentoo face compliance challenges. Authored by Assemblymember Buffy Wicks, the law passed unanimously. Developers are deemed to have actual knowledge of user ages, with penalties up to $7,500 per child enforced by the California Attorney General, embedding a persistent age-signaling layer that enables OS-level content moderation.

More via Reclaim The Net 

 

The Government Wants an AI With No Guardrails. What Could Go Wrong?

Anthropic finds itself in an unusual standoff with the Pentagon this week, after CEO Dario Amodei published a statement confirming the Department of War has threatened to cut ties — and potentially invoke the Defense Production Act — unless the AI company removes certain built-in safeguards. To be clear, Anthropic isn’t exactly a reluctant defense contractor: they were the first frontier AI company deployed on classified government networks, first into the National Labs, and Claude is already deeply embedded across military and intelligence operations. These aren’t peaceniks — they’ve voluntarily walked away from hundreds of millions in revenue to cut off CCP-linked clients and have lobbied hard for chip export controls to maintain American AI dominance.

The two sticking points are mass domestic surveillance and fully autonomous weapons — and frankly, reasonable people can disagree on both. On autonomous weapons, Anthropic’s position is essentially technical rather than ideological: today’s systems aren’t reliable enough, and they’ve offered to work with DoD on R&D to get there. That seems like a reasonable contractor position, not a political one. The domestic surveillance question is thornier — the government’s ability to vacuum up commercially available data on American citizens without a warrant is a longstanding bipartisan concern, and AI just turbocharged the problem. The Pentagon’s response — threatening to brand an American company with a label normally reserved for Chinese military fronts — is the kind of bureaucratic overreach that should raise eyebrows across the political spectrum. If the DoW wants compliant AI vendors with zero guardrails, they should be careful what they wish for.

More via Anthropic 


Curated Posts

Posts added to axisofeasy.com since the last edition:


Elsewhere Online:

Over 300 Domains Seized in Massive Europol Coordinated Strike Against Tycoon2FA
Read: https://www.bleepingcomputer.com/news/security/europol-coordinated-action-disrupts-tycoon2fa-phishing-platform/

Powerful Coruna Exploit Kit Targets Older iOS Devices Using 23 Vulnerabilities
Read: https://thehackernews.com/2026/03/coruna-ios-exploit-kit-uses-23-exploits.html

Over One Million Individuals Impacted by University of Hawaii Cancer Center Hack
Read: https://hackread.com/ransomware-breach-university-of-hawaii-cancer-center/

Iran Expected to Launch Aggressive Cyber Campaigns Against Global Targets
Read: https://www.infosecurity-magazine.com/news/iran-cyber-attacks-global-google/

Qualcomm Zero Day Vulnerability Exploited in Targeted Android Attacks
Read: https://www.darkreading.com/threat-intelligence/qualcomm-zero-day-exploited-targeted-android-attacks


Previously on #AxisOfEasy

If you missed the previous issues, they can be read online here:

Leave a Reply

Your email address will not be published. Required fields are marked *