Imagine your personal photos and messages secretly uploaded to the cloud without your consent. This is the reality for millions whose devices are compromised by stalkerware apps like Cocospy, Spyic, and Spyzie. These apps, designed for covert surveillance, upload sensitive data to Amazon Web Services (AWS), and despite a breach alert weeks ago, the data remains accessible.\n\nStalkerware Data Persists on AWS\nTechCrunch reported in February that Amazon was notified about this breach, yet the data persists on AWS. This raises serious privacy and security concerns. These apps, essentially spyware, grant unauthorized access to messages, photos, call logs, and more, all stored on Amazon's servers.\n\nAmazon's Inaction Raises Concerns\nThe issue extends beyond the apps themselves to Amazon's response. Despite a clear policy against hosting data from spyware and stalkerware, Amazon has not acted, citing procedural reasons. This inaction is perplexing given Amazon's resources and ability to enforce its policies.\n\nThe Ease of Stalkerware Installation\nThese apps often disguise themselves as system services, making detection difficult. Once installed, they upload a range of data to the cloud, accessible to those who planted the app. This violates privacy and exposes victims to further exploitation.\n\nProtecting Yourself from Stalkerware\nRegular Device Checks: Use antivirus software and look for unfamiliar apps.Permission Caution: Scrutinize app permission requests, especially for sensitive data.Strong Security Measures: Enable two-factor authentication and use strong passwords.\n\nThe Need for Vigilance\nWhile Amazon's response is concerning, it underscores the importance of personal vigilance. Proactive security measures can mitigate the risk of stalkerware. Resources like the National Domestic Violence Hotline and the Coalition Against Stalkerware offer support and guidance for victims.\n\nIn conclusion, Amazon's continued hosting of stalkerware data raises critical questions about privacy and responsibility in the tech industry. We must remain vigilant and take steps to protect ourselves, whether through regular device checks or advocating for stronger privacy protections.