Connect with us

Technology

WhatsApp Pauses February 8 New Privacy Policy Amid Growing Concerns 

Published

on

WhatsApp Worldwide users

By Adedapo Adesanya

WhatsApp has halted plans towards its proposed update, aimed at increasing business transactions on the platform, after concerns from users globally about privacy.

WhatsApp users received notification this month that it was preparing a new privacy policy and terms, and it reserved the right to share some user data with the Facebook app, and this caused a global uproar with new users rushing to competitor private messaging apps including Telegram and Signal.

Weighing the threat this has to its over 2 billion users globally, the social networking app cancelled the February 8 deadline for accepting the update to its terms concerning sharing data with Facebook, saying it would use the pause to clear up misinformation around privacy and security.

“This update does not expand our ability to share data with Facebook,” it said in a statement.

“While not everyone shops with a business on WhatsApp today, we think that more people will choose to do so in the future and it’s important people are aware of these services,” it said.

Facebook has been rolling out business tools on WhatsApp over the past year as it moves to boost revenue from higher-growth units like WhatsApp and Instagram while knitting together e-commerce infrastructure across the company.

Facebook aims to monetize WhatsApp by allowing businesses to contact clients via the platform, making it natural for the internet giant to centralize some data on its servers.

It acquired WhatsApp for $19 billion in 2014 but has been slow to monetize it.

The app already shares certain categories of personal data, including the user’s phone number and IP address, with Facebook.

“We don’t keep logs of who everyone’s messaging or calling. We also can’t see your shared location and we don’t share your contacts with Facebook,” it said.

WhatsApp said in October that it would start to offer in-app purchases via Facebook Shops and would offer firms who use its customer service messaging tools the ability to store those messages on Facebook servers.

WhatsApp said at the time that chats with a business using the new hosting service would not be protected by the app’s end-to-end encryption.

The planned integration by the Mark Zuckerberg owned enterprise faced many backlashes especially on issues of privacy even though there would be advantages in the long run such as ease of conducting businesses and easy purchase accessibility.

Adedapo Adesanya is a journalist, polymath, and connoisseur of everything art. When he is not writing, he has his nose buried in one of the many books or articles he has bookmarked or simply listening to good music with a bottle of beer or wine. He supports the greatest club in the world, Manchester United F.C.

Advertisement
1 Comment

1 Comment

Leave a Reply

Your email address will not be published. Required fields are marked *

Technology

Emergent Ventures, Others Invest $2.2m in Potpie

Published

on

potpie engineering software $2.2m capital

By Dipo Olowookere

About $2.2 million pre-seed round to help engineering teams unify context across their entire stack and make AI agents genuinely useful in complex software environments has been announced by Potpie.

Potpie was established by Aditi Kothari and Dhiren Mathur, who were determined to unify context across the entire engineering stack and enabling spec driven development.

As generative AI adoption accelerates, most tools focus on surface-level code generation while ignoring the deeper problem of context.

Large language models are powerful, but without access to system-level understanding, tooling history, and architectural intent, they struggle in real production environments.

Traditional approaches rely on senior engineers to manually hold this context together, a model that breaks down at scale and fails when AI agents are introduced.

The platform enables teams to automate high-impact and non-trivial use cases across the software development lifecycle, like debugging cross-service failures, maintaining and writing end-to-end tests, blast radius detection and system design.

It is designed for enterprise companies with large and complex codebases, starting at around one million lines of code and scaling to hundreds of millions.

Rather than acting as another coding assistant, Potpie builds a graphical representation of software systems, infers behaviour and patterns across modules, and creates structured artefacts that allow agents to operate consistently and safely.

A statement made available to Business Post on Monday revealed that the funding support came from Emergent Ventures, All In Capital, DeVC and Point One Capital.

The capital will be used to support early enterprise deployments, expand the engineering team, and continue building Potpie’s core context and agent infrastructure, it was disclosed.

“As AI makes code generation easier, the real challenge shifts to reasoning across massive, interconnected systems. Potpie is our answer to that shift, an ontology-first layer that helps enterprises truly understand and manage their software,” Kothari was quoted as saying in the disclosure.

A Managing Partner at Emergent Ventures, Anupam Rastogi, said, “In large enterprises, the real challenge is not generating code, it is understanding the system deeply enough to change it safely.

“Potpie’s ontology-first architecture, combined with rigorous context curation and spec-driven development, creates a structured model of the entire engineering ecosystem. This allows AI agents to reason across services, dependencies, tickets, and production signals with the clarity of a senior engineer. That is what makes Potpie uniquely capable of solving complex RCA, impact analysis, and high-risk feature work even in codebases exceeding 50 million lines.”

Continue Reading

Technology

Expert Reveals Top Cyber Threats Organisations Will Encounter in 2026

Published

on

Cyber Threats

By Adedapo Adesanya

Organisations in 2026 face a cybersecurity landscape markedly different from previous years, driven by rapid artificial intelligence adoption, entrenched remote work models, and increasingly interconnected digital systems, with experts warning that these shifts have expanded attack surfaces faster than many security teams can effectively monitor.

According to the World Economic Forum’s Global Cybersecurity Outlook 2026, AI-related vulnerabilities now rank among the most urgent concerns, with 87 per cent of cybersecurity professionals worldwide highlighting them as a top risk.

In a note shared with Business Post, Mr Danny Mitchell, Cybersecurity Writer at Heimdal, said artificial intelligence presents a “category shift” in cyber risk.

“Attackers are manipulating the logic systems that increasingly run critical business processes,” he explained, noting that AI models controlling loan decisions or infrastructure have become high-value targets. Machine learning systems can be poisoned with corrupted training data or manipulated through adversarial inputs, often without immediate detection.

Mr Mitchell also warned that AI-powered phishing and fraud are growing more sophisticated. Deepfake technology and advanced language models now produce convincing emails, voice calls and videos that evade traditional detection.

“The sophistication of modern phishing means organisations can no longer rely solely on employee awareness training,” he said, urging multi-channel verification for sensitive transactions.

Supply chain vulnerabilities remain another major threat. Modern software ecosystems rely on numerous vendors and open-source components, each representing a potential entry point.

“Most organisations lack complete visibility into their software supply chain,” Mr Mitchell said, adding that attackers frequently exploit trusted vendors or update mechanisms to bypass perimeter defences.

Meanwhile, unpatched software vulnerabilities continue to expose organisations to risk, as attackers use automated tools to scan for weaknesses within hours of public disclosure. Legacy systems and critical infrastructure are especially difficult to secure.

Ransomware operations have also evolved, with criminals spending weeks inside networks before launching attacks.

“Modern ransomware operations function like businesses,” Mitchell observed, employing double extortion tactics to maximise pressure on victims.

Mr Mitchell concluded that the common thread across 2026 threats is complexity, noting that organisations need to abandon the idea that they can defend against everything equally, as this approach spreads resources too thin and leaves critical assets exposed.

“You cannot protect what you don’t know exists,” he said, urging organisations to prioritise visibility, map dependencies, and focus resources on the most critical assets.

Continue Reading

Technology

NCC Begins Review of National Telecommunications Policy After 26 Years

Published

on

Nigerian Communications Commission NCC

By Adedapo Adesanya

The Nigerian Communications Commission (NCC) has commenced a comprehensive review of the National Telecommunications Policy 2000 (NTP), 26 years after its approval, citing rapid technological advancements and shifting market dynamics as the primary catalysts for the reform.

In a consultation paper released to the public, the commission said it is seeking input from stakeholders, including telecom operators, tech companies, legal experts, and the general public, on proposed revisions designed to reposition Nigeria’s telecommunications framework to match current digital demands. Submissions are expected by March 20, 2026.

The NTP 2000 marked a turning point in Nigeria’s telecom landscape. It replaced the 1998 policy, introducing full liberalisation and a unified regulatory framework under the NCC, and paved the way for the licensing of GSM operators such as MTN, Econet (now Airtel), and Globacom in 2001 and 2002.

Prior to the NTP, the sector was dominated by Nigerian Telecommunications Limited (NITEL), a government-owned monopoly plagued by obsolete equipment, low teledensity, and poor service. At the time, Nigeria had fewer than 400,000 telephone lines for the entire country.

However, the NCC noted that just as the 1998 policy was overtaken by global developments, the 2000 framework has become structurally misaligned with today’s telecom reality, which encompasses broadband, 5G networks, satellite internet, artificial intelligence, and a thriving digital economy worth billions of dollars.

“The rapid pace of technological change and emerging digital services necessitate a comprehensive update to ensure the policy continues to support economic growth while protecting critical infrastructure,” the Commission stated.

The review will target multiple chapters of the policy. Key revisions include: Enhancements on online safety, content moderation, digital services regulation, and improved internet exchange protocols; a modern framework for satellite harmonisation, coexistence with terrestrial networks, and clearer spectrum allocation to boost service quality, and policies to address fiscal support, reduce multiple taxation, and lower operational costs for operators.

The NCC is also proposing entirely new sections to the policy to address emerging priorities. Among the key initiatives are clear broadband objectives aimed at achieving 70 per cent national broadband penetration, with a focus on extending connectivity beyond urban centres to reach rural communities.

The review also seeks to formally recognise telecom infrastructure, including fibre optic cables and network masts, as Critical National Infrastructure to prevent vandalism and enhance security.

In addition, the commission is targeting the harmonisation of Right-of-Way charges across federal, state, and local governments, alongside the introduction of a one-stop permitting process for telecom deployment, designed to reduce bureaucratic delays and lower operational costs for operators.

According to the NCC, the review aims to make fast and affordable internet widely accessible. “The old framework was largely voice-centric. Today, data is the currency of the digital economy,” the commission said, highlighting the need to close the urban-rural broadband divide.

The consultation process is intended to gather diverse perspectives to ensure the updated policy reflects current technological trends, market realities, and consumer needs. By doing so, the NCC hopes to maintain the telecommunications sector’s role as a key driver of economic growth and digital inclusion.

Continue Reading

Trending