Tatler Philippines

Queen of Hearts

The legendary life of Princess Diana is not showing any signs of fading in collective memory, more so now, with that special gift on her birthday

- By Chit L Lijauco

When Sir Elton John revised his threnody Candle in the Wind in 1997 to honour Diana, Princess of Wales, no words ever rang truer than his final line: “Your candle’s burned out long before your legend ever will”. On the first of July, that legend will further grow when a statue of the beloved People’s Princess, commission­ed by her two sons, all grown-up now with families of their own, is unveiled at their mother’s official residence, Kensington Palace, a home she was fond of, even dubbing it the nickname, KP.

The statue, by renowned British sculptor Ian RankBroadl­ey who designed the image of the Queen used on coins in the UK, will take pride of place at Princess Diana’s favourite spot in the palace, the Sunken Garden. Head gardener Sean Harkin will surround it with her favourite flowers such as forget-me-nots, white lilies, white roses, tulips, narcissi and daisies. Harkin shares that this colour scheme echoes Diana’s personal preference for whites and creams.

In a rare joint press release, Prince William and Prince Harry made the announceme­nt of the unveiling, adding that it is their hope that this statue, commission­ed in 2017, will “recognise her positive impact in the UK and around the world…Our mother touched so many lives. We hope the statue will help all those who visit Kensington Palace to reflect on her life and legacy”. The princes worked closely with Rank-Broadley, especially on the design. Prince Harry, now living in California, was reported to have sent the sculptor photos of his preferred design.

She would have been 60 this year. For almost 17 years, from her engagement to Prince Charles, heir to the throne of England, on February 24, 1981 to her tragic death on August 31, 1997 from injuries sustained in a car crash in the Pont de l’Alma tunnel in Paris, she enthralled, enchanted, entranced us with her great beauty, shy demeanour and a warmth never seen before in a member of the royal family. She visited orphanages, embraced children with Aids, walked across a minefield to make a strong statement of her advocacy against landmines. She looked gorgeous in gowns, suits, sundresses and khaki pants. And those eyes.

The media went crazy; the world fell in love. Understand­ably, we gave her our sympathy when her marriage ended disastrous­ly, and our anguish when that careless fatal accident deprived us of our precious jewel.

Twenty years later, we still remember. Especially when memories of her come flooding back in the lives of her sons. Which one looks like her or takes after her? When we beheld an equally beauteous bride in Catherine, duchess of Cambridge and wife of Prince William, and the feisty, equally lovely Meghan, duchess of Sussex and wife of Prince Harry. Who dresses like her? Who acts like her?

The fairy tale of Diana continues with the addition of new characters and current events. Her statue will also definitely continue fuelling the saga, which has never diminished in appeal; it offers an opportunit­y to be close to her, as we have never been before, perchance to touch her even as a cold sculpture devoid of her human warmth. It is enough for the candle of England’s Rose to burn brightly again.

It is an indisputab­le fact that the internet improved the quality of our lives. In the 21st century, spending hours in the library for research and sending handwritte­n letters are nothing but distant memories. While ideally the internet should be free of cybercrimi­nals and potentiall­y harmful software, sadly, this is too good to be true in the reality that we live in.

In 2019 alone, internet security organisati­on Fraud Watch Internatio­nal monitored 16,000 attempted cyber-attacks against financial institutio­ns and other clients in the Philippine­s. Even if the figure seems intimidati­ng, we have yet to see the total number of casualties as crimes like these, albeit rampant, are barely reported to authoritie­s.

When Covid-19 hit the world, lockdowns have been imposed everywhere; this meant many connection­s outside were compensate­d with regular interactio­ns on the web. With the rise of internet users, the number of online scammers also increased. Now, more than ever, they are ready to delude many unsuspecti­ng victims.

Art Samaniego Jr, a tech editor in a major daily, explained how data breaching becomes prevalent when many people are at home. “Stolen social media credential­s and data privacy leaks have become the ‘other pandemic’. After more than a year of on-and-off lockdowns and quarantine­s, one thing has remained consistent in the digital world—the threats and dangers of cybercrimi­nals, trying to get a piece of our private data,” he says.

The Philippine­s, which has more than 76 million active social media users, is a hotspot for hackers. “The country is a happy hunting ground for criminals; this is where they could get willing victims anytime,” Samaniego continues. “I would count it as a success even if there is only one user out there who has not been scammed.” According to Myla Pilao, Trend Micro director for technology marketing, hackers found a way to track their victims better because work from home schemes made it difficult for many people to protect the bulk of data that they store in a single, unprotecte­d device.

“I call it ‘clash of data’, made more prevalent because of our remote work operations. Today, we must recognise that personal data and out of work data are co-mingling,”

Pilao shares. “Before, we could do our job in more secure ways because maybe our companies have very strong protection; but now that you and I are moved into a smaller frame, we have to admit that the level of protection is not as safe.”

Instagram Asia-Pacific product marketing head Alex de Leon believes that phishing, or sending fraudulent links and emails, is one of the easiest procedures that hackers follow to garner data.

“I think one of the most underestim­ated threats to online security is phishing. People can often be susceptibl­e to clicking random ‘emails’ that appear to come from a company or a respectabl­e person,” De Leon tells Tatler.

In phishing, scammers may send links that are masked in convincing phrases that legitimate companies or authoritie­s use.

For example, a suspicious email may say that the victim has won a specific amount of money from a contest. It may also lead the victim to believe that there are important files he or she needs to check by going to another website. The data often collected from users are their login credential­s, credit card numbers and online banking passwords.

There are several techniques to avoid being exploited by high-profile scammers. For Samaniego, one of the best measures to take is to activate our email system’s spam filter.

“Scammers would attempt to gain sensitive informatio­n from you by posing as someone you trust. Fake emails claiming to be from banks, Facebook messages from hacked accounts and SMS messages from unknown individual­s could be used to get sensitive informatio­n from you. Banks, your friends and even strangers would not ask for sensitive informatio­n or suddenly ask for financial help,” Samaniego warns. “Always be suspicious of emails that you get especially those asking you to click links. Keep your email system’s spam filter active.”

He added that a website’s address bar says a lot about its safety. “Always check if the website you are using is using https and not http, look for a lock next to the address bar. This means you are using a secure connection.”

Meanwhile, De Leon advises social media users to be mindful of the informatio­n they post online. He says that social media users very often disregard privacy rules and share more than they are supposed to. Because of these, they become potential targets of hacking.

“Never share identifiab­le informatio­n. Personally, if I’m tagging a location, I only tag the exact place if it’s somewhere I’m only going to be at for a short term; for example, I’ll tag a restaurant that I’m eating at but not likely a resort that I’ll be at for several days. I also blur the barcodes of plane tickets since they can be repurposed,” De Leon suggests.

Devices connected to the internet are also prone to hacking. They are no different from radiofrequ­ency (RF) tools which can be hijacked by a small device that experts call RFQuack. The hacking apparatus can easily be deployed onto a site to gather signal packages and reverse-engineer the protocol of an industrial RF.

According to Pilao, the growing number of unmonitore­d and unprotecte­d devices makes it easier for cybercrimi­nals to invade one’s personal data. “The proliferat­ion of devices is a threat to online security. People purchase unprotecte­d devices like routers, Wi-Fi cameras, all of these smart technologi­es,” she says. Pilao adds that when these devices were manufactur­ed, they were not built with the highest security systems that could prevent high-profile hackers from acquiring personal data or have full control of a device.

“When you put that in a commercial perspectiv­e, people have more ability to buy and integrate that into their lives. Don’t get me wrong; I am not saying it is bad. The challenge is that the manufactur­ers of some of these devices did not have security in mind when they built them. So, security wasn’t the priority,” Pilao explains.

The series of hacking, scamming and data scalping is perpetuate­d by people who do not recognise the bigger problem: the lack of knowledge towards online safety.

Pilao believes it is society’s duty to educate one another and build a safer space online. “I guess what we could really do is to be aware. It will really bounce back to your ability to educate yourself. Educate the people around you that these kinds of attacks do not exist in movies anymore. This is reality. It is time for us to debunk a lot of misconcept­ions about cybercrimi­nals. The people behind these [hackings] are also smart. They are also using the technology that we are using. They are as advanced as we are; they are well-educated,” Pilao avers.

The modern world is witness to the boundless gifts of technology; anywhere you look today, there is at least one man who keeps a phone in his pocket. But while the internet has proven its usefulness, the law of nature remains rigid—danger evolves with mankind. We must remain aware of hackers who are always on the prowl for their next victims.

LINES OF DEFENCE

A strong password will come in handy when there are people trying to access our accounts. Samaniego shares some pointers for protection:

Do not use a password combinatio­n that’s easy to guess. A combinatio­n of numbers, letters and special characters are very good indicators of a strong password. Use a passphrase instead of a password; this is like a password but made up of words with spaces.

• Do not reuse a password. “Choose a unique password in every account that you have. This is to avoid your other accounts being compromise­d if one of your accounts is hacked,” says Samaniego.

Do not use easy-to-guess reset questions. For example, if the password reset question is your mother’s maiden name, you can put a completely unrelated answer like “San Pablo City Laguna”.

Do not trust Facebook ads that would ask for you to log in using your credential­s. Facebook won’t ask for your username and password to check your age.

Do not trust public Wi-Fi; always check if the website you are using has an https and not http; and look for a lock next to the address bar. This means you are using a secure connection.

“This is reality. It is time for us to debunk a lot of misconcept­ions about cybercrimi­nals”

— MYLA PILAO

 ??  ?? Diana, Princess of Wales in Hong Kong wearing an outfit by fashion designer Catherine Walker
Diana, Princess of Wales in Hong Kong wearing an outfit by fashion designer Catherine Walker
 ??  ??
 ??  ??
 ??  ??
 ??  ??

Newspapers in English

Newspapers from Philippines