Public
Viral Backlash Erupts as Messaging App Accused of Quiet Camera Access
March 24, 2026 — A rapidly growing messaging platform is facing mounting public backlash after cybersecurity researchers revealed the app may have been activating users’ device cameras in the background, triggering a wave of concern and panic across social media.
The application, Veya, widely used for personal and professional communication, has come under scrutiny after analysts identified irregular camera activity tied to the app’s background processes. While the company has positioned itself as a privacy-first alternative in a crowded messaging market, recent findings suggest its use of camera permissions may extend beyond user expectations.
The issue first came to light following reports of unusual device behavior, including unexplained battery drain and intermittent camera indicator activity. A deeper technical review conducted by Northshore Digital Forensics Lab found that the app appeared to invoke camera-related functions even when not actively in use, without triggering any visible video session.
As details of the findings began circulating online, public reaction escalated quickly.
“nah bc why did my camera light blink at like 2am… i thought i was tripping 😭 deleted Veya so fast” — @mara.jpg
“be so fr why does a messaging app need camera access 24/7?? something is off” — @talia224
“we used to joke about phones watching us… yeah i’m not laughing anymore” — @laurasees
“just uninstalled and put tape over my camera idc y’all stay safe 💀” — @daniel.dog
Across platforms, users began sharing their own experiences, with some claiming they noticed brief camera activations late at night or while their devices were idle. While many of these reports remain unverified, the volume of posts has amplified concern and fueled speculation.
Cybersecurity analysts caution that while there is no confirmed evidence of images or video being recorded or transmitted, the behaviour itself raises serious questions around transparency and consent.
“This is where perception becomes reality,” said one analyst familiar with the investigation. “Even if no data is leaving the device, activating a user’s camera without clear, active intent crosses a line, especially in a consumer-facing product.”
Initial technical assessments suggest the activity may be linked to an internal feature described as a “presence intelligence” system, designed to determine whether a user is active or available. Researchers believe this module may be leveraging brief camera checks as part of its functionality, though the exact implementation remains unclear.
Veya has acknowledged awareness of the situation, stating it is “reviewing internal features to ensure they align with user expectations.” The company has not directly addressed whether background camera activation is intentional or a byproduct of the system’s design.
Meanwhile, organizations are beginning to respond. Several companies have reportedly issued internal guidance advising employees to remove the app from corporate devices pending further clarity, citing potential privacy and compliance risks.
The incident highlights a growing tension in modern app design, where advanced features powered by behavioral analytics and AI may blur the line between convenience and intrusion.
For many users, however, the technical nuance matters less than the underlying concern.
“I don’t care if it’s a ‘feature’ or not. If my camera turns on without me knowing, that’s a problem.” — @lenaaaa3
As the story continues to unfold, security experts are urging users to review app permissions, restrict unnecessary access to cameras and microphones, and remain cautious about how much trust is placed in even the most widely used platforms.
In the absence of clear answers, one thing is certain: once users begin to question whether their devices are watching them, rebuilding that trust becomes significantly harder.
Reporting where the public speaks loudest — online and unfiltered. — Jamie Mora
Public
The Hidden Risks of Having a Social Media Presence
Over the weekend, a dataset allegedly linked to approximately 8.4 million users of the popular photo-sharing app Blink began circulating in private online forums. While Blink has stated there is no evidence of a breach of its internal systems, cybersecurity observers say the information being shared. Including usernames, associated email addresses, linked phone numbers, follower counts and public profile details appears detailed enough to create real-world consequences. No passwords have been confirmed in the material. Even so, within hours of the reports surfacing, users across North America and Europe began describing suspicious password reset emails, unexpected SMS security alerts and phishing messages designed to mimic official Blink communications.
The episode may ultimately prove to be the result of automated scraping or the aggregation of publicly visible information rather than a direct intrusion. But for millions of users, that distinction offers little comfort. The incident underscores a broader reality about life online: maintaining a social media presence carries risks that extend far beyond posting photos or sharing updates with friends.
In 2026, social platforms function as more than entertainment tools. They are storefronts, professional portfolios, customer acquisition channels and, for many, primary sources of income. They also serve as digital identity hubs, linking together email addresses, phone numbers, business contacts and personal networks. When fragments of that information circulate outside their intended context, the consequences can escalate quickly.
One of the most significant risks is identity aggregation. A username on its own may seem harmless. An email address, by itself, may not appear sensitive. A phone number attached to a public profile might feel routine. But when these elements are combined, they form a verified identity footprint. Cybercriminals increasingly rely on compiling small pieces of publicly accessible or previously exposed data to build detailed personal profiles. What was once scattered information becomes a structured target list.
That aggregation fuels more convincing phishing campaigns. Security professionals warn that fraudulent messages are far more effective when they reference accurate usernames or partial phone numbers. A message that appears personalized creates urgency and credibility, increasing the likelihood that a recipient will click a malicious link or provide login credentials. Even without passwords included in a dataset, attackers can exploit trust to obtain them.
Phone numbers linked to social accounts introduce another layer of risk. SIM-swap attacks in which a fraudster convinces a mobile carrier to transfer a victim’s number to a new device can allow attackers to intercept verification codes and reset account credentials across multiple services. Once control of a primary email or social account is gained, recovery can become complicated and time-consuming.
For small business owners and creators, the implications extend beyond personal inconvenience. A compromised or impersonated account can disrupt sales, damage brand credibility and erode customer trust. Fraudsters who replicate profile names and messaging styles may target followers directly, using the credibility of an established account to facilitate scams. In such cases, the reputational impact can linger long after technical access is restored.
There is also a psychological dimension. Even when an incident does not involve confirmed internal compromise, headlines about circulating data can trigger widespread anxiety. Users may begin to question every notification or login alert. Trust in digital communication weakens. The sense of exposure, whether or not it results in direct harm can be unsettling.
Many exposures today do not stem from traditional “hacks,” but from scraping, where automated systems collect publicly visible information at scale. The misconception that public equals safe continues to persist. In reality, publicly displayed information can still be harvested, indexed and redistributed in ways that amplify risk. Once data enters underground marketplaces, it is often copied, resold and repackaged repeatedly.
Authorities have not announced any formal investigation into the Blink reports, and the platform continues to reassure users that its infrastructure remains secure. Still, cybersecurity professionals emphasize that digital visibility inevitably expands one’s attack surface. The more interconnected a person’s online identity becomes, the more valuable it can appear to bad actors.
Maintaining a social media presence is now inseparable from modern professional and personal life. But with that presence comes responsibility. Experts recommend enabling app-based multi-factor authentication, using unique passwords across platforms, minimizing publicly visible contact information and approaching unexpected security alerts with caution.
The Blink episode serves as a reminder that exposure does not always require intrusion. Sometimes it requires only accumulation, fragments of information gathered over time and assembled into something far more powerful than any single post.
In an era where identity is increasingly digital, awareness may be the most important safeguard of all.
Reporting where the public speaks loudest — online and unfiltered. — Jamie Mora
Public
Transit Chaos Ensues as Riders Report Sudden $0 Balances on siberX Transit Systems Cards
TORONTO, ON —
Morning commuters across the city were thrown into confusion today as hundreds of riders reported that their siberX Transit Systems cards suddenly displayed a $0 balance, despite many claiming they had topped up their cards within the last 24 hours.
Long lines formed at station kiosks as frustrated passengers attempted to reload their cards—only to see their funds vanish immediately. Several users said their transaction histories had been wiped clean, showing no record of recent reloads.
Transit officials have acknowledged “intermittent account visibility issues” but have not confirmed the cause. The outage comes as the city continues managing system instability from earlier disruptions.
Social media erupts
Within minutes, social platforms were flooded with posts from confused and anxious riders:
“HELLOOO?? Just loaded $50 last night and now my card says $0?? I’m not walking to work in November.” — @sarahsnotes
“Everyone at St. Andrew station is standing around tapping their cards like it’ll magically fix itself. Mine just straight up reset.” — @johnnyboy
“Why is my siberX card acting broke when I’m not???” — @throughmylens
“Can confirm: vibes terrible, balance gone, line wrapped around the platform.” — @coldbrewandchaos
Some posts also claimed that tapping a second time would “force the balance to refresh,” while others warned that “cards are being drained with every tap.” None of these claims have been verified.
Confusion spills into stations
Station staff were quickly overwhelmed as riders demanded explanations, refunds, or temporary passes. One commuter described the scene as “a mix of panic, annoyance, and people loudly Googling whether this has happened before.”
Several stations briefly halted fare-gate enforcement to prevent overcrowding, allowing riders through while the issue was investigated.
Officials urge patience
siberX Transit Systems released a short statement saying teams are “actively working to restore accurate balance information” and advising riders to avoid repeated reload attempts until the issue is resolved.
No timeline for a fix has been provided.
In the meantime, social media continues to amplify rumours, speculation, and memes—none of which are helping restore calm to an already strained transit network.
Reporting where the public speaks loudest — online and unfiltered. — Jamie Mora
Public
“Bro is the ocean coming or not??” — Canada MELTS DOWN After Fake Tsunami Alert Sparks Chaos
Ottawa, ON —
If you were on Canadian TikTok or X (formerly Twitter) this past Tuesday, you already know: everyone thought they were gonna die.
Phones across Ontario blared with an emergency alert around 8:37 AM:
“TSUNAMI WARNING. Evacuate immediately.”
No context. No follow-up. Just panic.
Cue the chaos: people sprinting barefoot through downtown, grandmas grabbing cats, someone live-streaming themselves crying in a bathtub holding a bike helmet.
Only it wasn’t real.
The federal government confirmed hours later that the alert was part of a cyberattack that exploited Canada’s emergency alert infrastructure.
And now? The internet is absolutely roasting the government.
SOCIAL MEDIA REACTIONS (BECAUSE YOU KNOW THEY WENT OFF)
@urfavbarista (X):
ok but when the tsunami alert hit and my dad started packing granola bars while my mom yelled at siri, I realized we’re not surviving sh*t 💀
@imnotjennifer (TikTok):
POV: you’re trying to evacuate but your car’s outta gas, your phone’s at 2%, and you don’t know which direction is “higher ground” 💀💀💀
@shxwnxo (Threads):
CANADA: accidentally sends false nuke-level panic alert
ALSO CANADA: “whoopsies, that was hackers lol anyway”
@thepeachfiles (X):
why did the tsunami alert give zero context. like hi?? WHERE?? WHEN?? is it here?? is it vibing?? is it inn group chat???
@govtflop (X):
this country couldn’t organize a fire drill let alone a disaster response. bro we got hacked by a tsunami. a fake one.
REAL CONSEQUENCES, REAL OUTRAGE
Not everyone’s joking.
Hospitals saw a spike in injuries as people tripped, ran into traffic, or had panic attacks during the chaos. Some nursing homes began full evacuations before being told it was a false alarm.
And for young people, this isn’t just a funny TikTok trend. It’s a brutal reminder of how fragile things really are.
“We laugh bc otherwise we’d cry,” wrote one Reddit user. “Like we really live in a timeline where fake disasters go viral before real ones even hit.”
AND THE GOVERNMENT? RADIO SILENCE.
It took nearly 45 minutes for anyone official to say “it’s not real.”
Three hours for Ottawa to admit it was a cyberattack.
No word yet on who’s responsible. No apology. No plan.
Now there’s a Change.org petition with 100k+ signatures demanding a full public inquiry. Even Gen Z MPs are getting in on it — one called it a “national clown show” on livestream.
THE INTERNET’S VERDICT?
“Next time the world ends, I’ll wait for the TikTok to confirm.”
– @softcrashbandicoot
Reporting where the public speaks loudest — online and unfiltered. — Jamie Mora
-
Public9 months agoReddit Thread Over ‘Inventory Drift’ Surges as Canadians Vent Over Retail Glitches
-
Business8 months agoAre Canadian Companies Learning from Global Cyber Attacks? Insider Insights into the Secret Downfall of Canadian Businesses
-
Retail Watch8 months agoCalgary Small Business Hit by Sudden Payment Outage, Sparks Cybersecurity Concerns
-
Cybersecurity9 months agoCanadian Airline NorthSky Faces Cyberattack, Disrupting Online Services
-
Business11 months agoCanadian Software Vendor Breach Exposes Cloud Environments Across Energy Sector
-
Retail Watch8 months agoUnderstaffed and overwhelmed, IT teams face rising pressure as retail digitization accelerates
-
Politics7 months agoNationwide Government System Outage Paralyzes Public Services
-
Business8 months agoInsurance Without a Safety Net? Canadian Firms Face Premium Hikes Amid Cyber Liability Crisis
