Automattic Caught in AI Data Sale Debate Amid Privacy Fears

In an era where AI is seamlessly woven into the fabric of online experiences, Automattic, the company behind WordPress and Tumblr, has stirred up a storm around user data sales to AI developers. With the AI industry striving for more advanced technology such as ChatGPT, the craving for large datasets, often amassed with ambiguous consent, is on the rise. The controversy is rooted in digital privacy, as the utilization of web-sourced data by AI companies spirals into a contentious debate. Automattic defends itself by mentioning an opt-out option for users to prevent their data from being funneled into AI training. Yet, there is skepticism about the real effectiveness and clarity of this opt-out mechanism, leading to doubts over the actual respect for and safeguarding of user preferences. This contention casts a spotlight on the fine line between technology advancement and the sanctity of personal digital rights.

Examining the Opt-Out Dilemma

Automattic is grappling with ethical considerations around using private data for training AI. The risk of inadvertently training AI with unowned advertising material has sparked debate on what is public or private information. To tackle these challenges, Automattic is exploring a tool to prevent web crawlers from indexing private content, but its effectiveness is uncertain in safeguarding user privacy.

Users are encouraged to vigilantly adjust their privacy settings, choose what to share online carefully, and advocate for stronger privacy measures. The article emphasizes the need for transparent, consensual data usage as AI becomes more pervasive. It calls for enhanced privacy laws and corporate accountability to empower user decision-making regarding their personal data. The tech community faces an urgent task to raise privacy standards and ensure data is used ethically.

Explore more

SHRM Faces $11.5M Verdict for Discrimination, Retaliation

When the world’s foremost authority on human resources best practices is found liable for discrimination and retaliation by a jury of its peers, it forces every business leader and HR professional to confront an uncomfortable truth. A landmark verdict against the Society for Human Resource Management (SHRM) serves as a stark reminder that no organization, regardless of its industry standing

What’s the Best Backup Power for a Data Center?

In an age where digital infrastructure underpins the global economy, the silent flicker of a power grid failure represents a catastrophic threat capable of bringing commerce to a standstill and erasing invaluable information in an instant. This inherent vulnerability places an immense burden on data centers, the nerve centers of modern society. For these facilities, backup power is not a

Has Phishing Overtaken Malware as a Cyber Threat?

A comprehensive analysis released by a leader in the identity threat protection sector has revealed a significant and alarming shift in the cybercriminal landscape, indicating that corporate users are now overwhelmingly the primary targets of phishing attacks over malware. The core finding, based on new data, is that an enterprise’s workforce is three times more likely to be targeted by

Samsung’s Galaxy A57 Will Outcharge The Flagship S26

In the ever-competitive smartphone market, consumers have long been conditioned to expect that a higher price tag on a flagship device guarantees superiority in every conceivable specification, from processing power to camera quality and charging speed. However, an emerging trend from one of the industry’s biggest players is poised to upend this fundamental assumption, creating a perplexing choice for prospective

Outsmart Risk With a 5-Point Data Breach Plan

The Stanford 2025 AI Index Report highlighted a significant 56.4% surge in AI-related security incidents during the previous year, encompassing everything from data breaches to sophisticated misinformation campaigns. This stark reality underscores a fundamental shift in cybersecurity: the conversation is no longer about if an organization will face a data breach, but when. In this high-stakes environment, the line between