<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Civic Engagement Archives - Toronto Guardian</title>
	<atom:link href="https://torontoguardian.com/category/the-city/civic-engagement/feed/" rel="self" type="application/rss+xml" />
	<link>https://torontoguardian.com/category/the-city/civic-engagement/</link>
	<description>Toronto Guardian - Toronto News, Events, Arts &#38; Culture.</description>
	<lastBuildDate>Wed, 18 Feb 2026 21:31:46 +0000</lastBuildDate>
	<language>en-CA</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://torontoguardian.com/wp-content/uploads/2015/10/cropped-TorontoGuardian_FaviconLogo512_C1V1-32x32.jpg</url>
	<title>Civic Engagement Archives - Toronto Guardian</title>
	<link>https://torontoguardian.com/category/the-city/civic-engagement/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>More than 38,000 Ontarians may be entitled to a refund from Spring Financial</title>
		<link>https://torontoguardian.com/2026/02/more-than-38000-ontarians-may-be-entitled-to-a-refund-from-spring-financial/</link>
		
		<dc:creator><![CDATA[Joel Levy]]></dc:creator>
		<pubDate>Wed, 18 Feb 2026 21:31:46 +0000</pubDate>
				<category><![CDATA[Civic Engagement]]></category>
		<category><![CDATA[The City]]></category>
		<guid isPermaLink="false">https://torontoguardian.com/?p=119417</guid>

					<description><![CDATA[<p>This week, Consumer Protection BC announced that Vancouver Island–based lender Spring Financial has agreed to refund more than 65,000 consumers <a class="mh-excerpt-more" href="https://torontoguardian.com/2026/02/more-than-38000-ontarians-may-be-entitled-to-a-refund-from-spring-financial/" title="More than 38,000 Ontarians may be entitled to a refund from Spring Financial">[...]</a></p>
<p>The post <a href="https://torontoguardian.com/2026/02/more-than-38000-ontarians-may-be-entitled-to-a-refund-from-spring-financial/">More than 38,000 Ontarians may be entitled to a refund from Spring Financial</a> appeared first on <a href="https://torontoguardian.com">Toronto Guardian</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>This week, Consumer Protection BC announced that Vancouver Island–based lender Spring Financial has agreed to refund more than 65,000 consumers across Canada who signed up for what it called a “secured savings loan” (SSL) between April 8, 2016, and March 12, 2021.</p>
<p>While the regulator is based in British Columbia, the impact stretches far beyond provincial borders. According to the release, more than 38,000 eligible borrowers live in Ontario — the largest group affected outside B.C. Another 19,500 are in Alberta. British Columbia borrowers were refunded in 2023 and 2024.</p>
<p><img fetchpriority="high" decoding="async" class="aligncenter size-full wp-image-119419" src="https://torontoguardian.com/wp-content/uploads/2026/02/301b6a31-643d-463b-a5c9-7ab69db76c5f.jpg" alt="Ontario Refund notification" width="1000" height="667" srcset="https://torontoguardian.com/wp-content/uploads/2026/02/301b6a31-643d-463b-a5c9-7ab69db76c5f.jpg 1000w, https://torontoguardian.com/wp-content/uploads/2026/02/301b6a31-643d-463b-a5c9-7ab69db76c5f-300x200.jpg 300w, https://torontoguardian.com/wp-content/uploads/2026/02/301b6a31-643d-463b-a5c9-7ab69db76c5f-571x381.jpg 571w, https://torontoguardian.com/wp-content/uploads/2026/02/301b6a31-643d-463b-a5c9-7ab69db76c5f-768x512.jpg 768w" sizes="(max-width: 1000px) 100vw, 1000px" /></p>
<p>For Ontario residents, this is not a class-action windfall automatically deposited into bank accounts. It is a time-sensitive opportunity that requires attention.</p>
<h2>What happened?</h2>
<p>The agreement — formally known as an undertaking — follows an investigation prompted by a high volume of consumer complaints related to Spring Financial’s secured savings loans. The regulator alleges the company was deceptive in how it marketed or sold the product.</p>
<p>Though details of individual complaints vary, secured savings loans were generally promoted as tools to help consumers build credit. The undertaking does not constitute a court finding of wrongdoing, but it does commit the company to providing refunds to eligible borrowers outside British Columbia.</p>
<p>Spring Financial has confirmed that it emailed all eligible consumers by December 31, 2025, using the last known email address on file. The subject line to look for: “<strong>Administrative Update</strong>.”</p>
<p>That detail may prove crucial.</p>
<h2>Why many Ontarians could miss out</h2>
<p>People change email addresses. Messages get filtered to junk folders. Some accounts are abandoned entirely.</p>
<p>Louise Hartland, Director of Public Relations for Consumer Protection BC, cautioned that anyone who changed their contact information — or deleted the email — may miss the opportunity unless they proactively contact the company.</p>
<p>Eligible consumers must submit a claim within six months of receiving notification. For most recipients, that means a deadline in late June 2026.</p>
<p>Consumers will be asked to explain their interactions with Spring Financial as part of the claims process. If a claim is denied and the consumer believes they are eligible, Consumer Protection BC may review the file.</p>
<h2>What Ontario residents should do now</h2>
<p>If you signed up for a secured savings loan with Spring Financial between April 2016 and March 2021:</p>
<ol>
<li>Search your email inbox — including spam and archived folders — for “Administrative Update.”</li>
<li>If you believe you are eligible but did not receive an email, contact Spring Financial directly at <strong>customerservice@springfinancial.ca</strong>.</li>
<li>Act before late June 2026 to preserve your claim.</li>
</ol>
<p>High-cost credit products often target consumers seeking to rebuild or establish credit. That makes transparency and clarity in marketing especially important. While the regulatory action originated in British Columbia, its financial implications now extend deeply into Ontario households.</p>
<p>For tens of thousands of Ontarians, this is less about headlines and more about checking an inbox — and potentially reclaiming money they are owed.</p>
<p>As always, residents should review official information carefully and avoid sharing personal financial details except through verified company channels.</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p>The post <a href="https://torontoguardian.com/2026/02/more-than-38000-ontarians-may-be-entitled-to-a-refund-from-spring-financial/">More than 38,000 Ontarians may be entitled to a refund from Spring Financial</a> appeared first on <a href="https://torontoguardian.com">Toronto Guardian</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>How Social Media Targeting Became a Weapon of Division</title>
		<link>https://torontoguardian.com/2026/02/how-social-media-targeting-became-a-weapon-of-division/</link>
		
		<dc:creator><![CDATA[Joel Levy]]></dc:creator>
		<pubDate>Tue, 03 Feb 2026 02:18:21 +0000</pubDate>
				<category><![CDATA[Civic Engagement]]></category>
		<category><![CDATA[The City]]></category>
		<guid isPermaLink="false">https://torontoguardian.com/?p=119083</guid>

					<description><![CDATA[<p>The 2016 election and the political turmoil that followed marked a turning point in public understanding of influence operations. Regardless <a class="mh-excerpt-more" href="https://torontoguardian.com/2026/02/how-social-media-targeting-became-a-weapon-of-division/" title="How Social Media Targeting Became a Weapon of Division">[...]</a></p>
<p>The post <a href="https://torontoguardian.com/2026/02/how-social-media-targeting-became-a-weapon-of-division/">How Social Media Targeting Became a Weapon of Division</a> appeared first on <a href="https://torontoguardian.com">Toronto Guardian</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>The 2016 election and the political turmoil that followed marked a turning point in public understanding of influence operations. Regardless of one’s view of the <a href="https://en.wikipedia.org/wiki/Steele_dossier" target="_blank" rel="noopener">Steele dossier</a> itself, the period that followed revealed a key insight through investigations and <a href="https://digitalcommons.unl.edu/senatedocs/4/" target="_blank" rel="noopener">reporting</a>: foreign actors were not merely trying to support a single ideological camp. They were often trying to inflame all camps at once.</p>
<p><img decoding="async" class="aligncenter size-full wp-image-119085" src="https://torontoguardian.com/wp-content/uploads/2026/01/ChatGPT-Image-Jan-27-2026-09_07_51-PM.jpg" alt="" width="1000" height="667" srcset="https://torontoguardian.com/wp-content/uploads/2026/01/ChatGPT-Image-Jan-27-2026-09_07_51-PM.jpg 1000w, https://torontoguardian.com/wp-content/uploads/2026/01/ChatGPT-Image-Jan-27-2026-09_07_51-PM-300x200.jpg 300w, https://torontoguardian.com/wp-content/uploads/2026/01/ChatGPT-Image-Jan-27-2026-09_07_51-PM-571x381.jpg 571w, https://torontoguardian.com/wp-content/uploads/2026/01/ChatGPT-Image-Jan-27-2026-09_07_51-PM-768x512.jpg 768w" sizes="(max-width: 1000px) 100vw, 1000px" /></p>
<p>The goal wasn’t persuasion so much as destabilization: amplify anger, deepen mistrust, and make democratic societies feel ungovernable. One of the clearest lessons from that era is that influence campaigns thrive not by inventing divisions from scratch, but by exploiting divisions that already exist.</p>
<h2>The Power of Microtargeting</h2>
<p>Modern platforms allow advertisers and bad actors to target audiences with astonishing precision.</p>
<p>Not &#8220;the public&#8221;, but:</p>
<ul>
<li>young men angry about cultural change</li>
<li>communities fearful about safety</li>
<li>activists outraged by injustice</li>
<li>people primed for conspiracy narratives</li>
<li>voters who feel ignored</li>
</ul>
<p>This is where social-media influence becomes uniquely dangerous. Unlike a TV broadcast, microtargeted content is often invisible to everyone except the recipient. Two people can live in the same city, scroll the same platform, and experience completely different political realities.</p>
<table>
<thead>
<tr>
<th>Step</th>
<th>Example</th>
<th>Effect</th>
</tr>
</thead>
<tbody>
<tr>
<td>Data Collection</td>
<td>Watches a video about housing crisis</td>
<td>Platform knows you care about housing</td>
</tr>
<tr>
<td>Audience Segmentation</td>
<td>Targeted as &#8220;concerned citizen&#8221;</td>
<td>Receives posts about political outrage</td>
</tr>
<tr>
<td>Content Delivery</td>
<td>Angering meme or story</td>
<td>Generates outrage, engagement</td>
</tr>
<tr>
<td>Algorithmic Amplification</td>
<td>Boosts most engaging posts</td>
<td>Even small extremist posts get visibility</td>
</tr>
<tr>
<td>Societal Impact</td>
<td>Social division, distrust</td>
<td>People feel everyone else is against them</td>
</tr>
</tbody>
</table>
<h2>Amplifying Extremes, Not Representing Majorities</h2>
<p>One of the most corrosive effects of algorithmic targeting is that it rewards the loudest edges. Most people involved in social movements, whether pro-Palestinian activism, conservative populism, or progressive causes,  are not extremists. But influence actors don’t need majorities. They need amplification.</p>
<p>A small number of incendiary voices, boosted through engagement algorithms or coordinated networks, can distort the perception of an entire cause.</p>
<p>In the context of the Israel–Gaza war, for example, <a href="https://arxiv.org/abs/2402.05873" target="_blank" rel="noopener">researchers have warned that online ecosystems can blur lines between legitimate protest and extremist propaganda</a>, with fringe content sometimes elevated far beyond its actual support.</p>
<p>At the same time, far-right online spaces have been fertile ground for foreign narratives that frame Western democracies as corrupt, decadent, or collapsing — themes that conveniently align with authoritarian state messaging (research shows these communities amplify extreme content and identity-driven narratives; see <a class="decorated-link" href="https://www.sciencedirect.com/science/article/pii/S2211695825000339?utm_source=chatgpt.com" target="_blank" rel="noopener">Far‑Right Online Communities and Social Media Influence</a>).</p>
<p>The tactic is not to make everyone “pro” anything.</p>
<p>It’s to make everyone distrust everyone else.</p>
<h2>The Infrastructure of Influence: Platforms, Data, and Terms of Service</h2>
<p>Influence campaigns are not only about content. They’re about infrastructure.</p>
<p>Platforms collect immense behavioural data:</p>
<ul>
<li>what you watch</li>
<li>what you linger on</li>
<li>what enrages you</li>
<li>what makes you share</li>
</ul>
<p>That data powers recommendation engines designed for engagement — but engagement is not truth. Engagement is often outrage.</p>
<p>And Terms of Service agreements frequently grant platforms sweeping rights to process, analyze, and reuse user-generated content. Even when content is private or encrypted, metadata and behavioural signals remain powerful.</p>
<p>The result is an ecosystem where:</p>
<ul>
<li>emotions are measurable</li>
<li>audiences are targetable</li>
<li>outrage is profitable</li>
<li>division is scalable</li>
</ul>
<p>Foreign actors don’t need to “hack” society when society’s attention systems can be nudged from within.</p>
<h2>Why Canada Isn’t Immune</h2>
<p>Canadians often view foreign interference as an American problem. But Canada’s social fabric is just as vulnerable to wedge politics: immigration, Indigenous reconciliation, housing, identity, war, and trust in institutions.</p>
<p>And Canada’s digital life runs through the same platforms, the same algorithms, and the same opaque advertising systems.</p>
<p>The question is no longer whether influence operations exist.</p>
<p>The question is whether democracies are willing to regulate the systems that make them so effective.</p>
<h2>A Simple Rule for the Scroll Era</h2>
<p>The most dangerous influence content rarely announces itself. It doesn’t arrive wearing a foreign flag. It arrives as a post that feels tailor-made to make you furious.</p>
<p>If a piece of content makes you feel immediate rage, certainty, or contempt, you should pause.</p>
<p>That emotional spike is often the point.</p>
<p>Because in the age of targeting, division is not an accident of the internet.</p>
<p>It’s a business model. And sometimes, a weapon.</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p>The post <a href="https://torontoguardian.com/2026/02/how-social-media-targeting-became-a-weapon-of-division/">How Social Media Targeting Became a Weapon of Division</a> appeared first on <a href="https://torontoguardian.com">Toronto Guardian</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>What You’re Really Giving Away When You Post Online</title>
		<link>https://torontoguardian.com/2026/01/what-youre-really-giving-away-when-you-post-online/</link>
		
		<dc:creator><![CDATA[Joel Levy]]></dc:creator>
		<pubDate>Wed, 28 Jan 2026 23:15:45 +0000</pubDate>
				<category><![CDATA[Civic Engagement]]></category>
		<guid isPermaLink="false">https://torontoguardian.com/?p=119073</guid>

					<description><![CDATA[<p>In the digital age, it’s easy to hit “agree” and scroll past the dense legalese in an app’s Terms of <a class="mh-excerpt-more" href="https://torontoguardian.com/2026/01/what-youre-really-giving-away-when-you-post-online/" title="What You’re Really Giving Away When You Post Online">[...]</a></p>
<p>The post <a href="https://torontoguardian.com/2026/01/what-youre-really-giving-away-when-you-post-online/">What You’re Really Giving Away When You Post Online</a> appeared first on <a href="https://torontoguardian.com">Toronto Guardian</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>In the digital age, it’s easy to hit “agree” and scroll past the dense legalese in an app’s Terms of Service (ToS). But if you’ve ever wondered what rights you actually give up when you post content to apps like TikTok, as well as smaller Canadian platforms, the answer may be more troubling than you think.</p>
<h3><strong>A Trap in Plain Sight</strong></h3>
<p>Most platforms still include a clause that says users <em>own</em> the content they create, this includes your videos, photos, text, and everything you upload. At first glance, that sounds reassuring. But beneath that reassurance lies a broader legal reality: by uploading, you usually grant the company a license to do almost anything with your content.</p>
<p><img decoding="async" class="aligncenter size-full wp-image-119075" src="https://torontoguardian.com/wp-content/uploads/2026/01/ChatGPT-Image-Jan-27-2026-08_15_01-PM.jpg" alt="Terms of service in social media companies." width="1000" height="667" srcset="https://torontoguardian.com/wp-content/uploads/2026/01/ChatGPT-Image-Jan-27-2026-08_15_01-PM.jpg 1000w, https://torontoguardian.com/wp-content/uploads/2026/01/ChatGPT-Image-Jan-27-2026-08_15_01-PM-300x200.jpg 300w, https://torontoguardian.com/wp-content/uploads/2026/01/ChatGPT-Image-Jan-27-2026-08_15_01-PM-571x381.jpg 571w, https://torontoguardian.com/wp-content/uploads/2026/01/ChatGPT-Image-Jan-27-2026-08_15_01-PM-768x512.jpg 768w" sizes="(max-width: 1000px) 100vw, 1000px" /></p>
<p>For example, TikTok’s U.S. Terms of Service state that while you retain copyright, by posting content you grant the platform an <em>“unconditional, irrevocable, non-exclusive, royalty-free, fully transferable, perpetual worldwide license”</em> to use, adapt, distribute, publish, and even authorize others to use your material.</p>
<p>In other words, TikTok doesn’t own your videos, but it <em>can</em> use them forever — even in ways you might not expect — and <em>without paying you anything</em>.</p>
<h3><strong>What That Really Means For You</strong></h3>
<p>Here’s the practical side of this legal language:</p>
<ul>
<li><strong>The platform can reuse your work in ads, promotions, or products without compensation.</strong></li>
<li><strong>They can modify it, make derivatives, or even share it with others.</strong></li>
<li><strong>You can’t object later if they use your name, image, or voice in ways you don’t like.</strong></li>
<li><strong>You don’t get a cut of any revenue generated from your content.</strong></li>
</ul>
<p>Even though you “own” the original material, the rights you grant are so broad that ownership becomes nearly academic.</p>
<h3><strong>It’s Not Just TikTok</strong></h3>
<p>The warning applies far beyond TikTok. Many newer apps and services, including Canadian ones, adopt similar terms. For example, the Terms of Service from a Canadian social media company called EH! asks users to agree that any content they post can be:</p>
<ul>
<li>used, copied, reproduced, or resold</li>
<li>adapted or incorporated into other works</li>
<li>sub-licensed to third parties</li>
<li>published and distributed in any media, forever</li>
</ul>
<p>This isn’t limited to videos or text, it can apply to your name, photos, logos, and personal images too. In some cases, users even waive “moral rights,” meaning they lose the legal ability to stop certain uses of their own work. This broad license applies “now known or hereafter developed,” meaning any future technology can also be used with your content.</p>
<p><img loading="lazy" decoding="async" class="aligncenter size-full wp-image-119074" src="https://torontoguardian.com/wp-content/uploads/2026/01/ChatGPT-Image-Jan-27-2026-08_11_53-PM.jpg" alt="Terms Of Service Cheat Guide for Social Media" width="1000" height="1500" srcset="https://torontoguardian.com/wp-content/uploads/2026/01/ChatGPT-Image-Jan-27-2026-08_11_53-PM.jpg 1000w, https://torontoguardian.com/wp-content/uploads/2026/01/ChatGPT-Image-Jan-27-2026-08_11_53-PM-200x300.jpg 200w, https://torontoguardian.com/wp-content/uploads/2026/01/ChatGPT-Image-Jan-27-2026-08_11_53-PM-254x381.jpg 254w, https://torontoguardian.com/wp-content/uploads/2026/01/ChatGPT-Image-Jan-27-2026-08_11_53-PM-768x1152.jpg 768w" sizes="auto, (max-width: 1000px) 100vw, 1000px" /></p>
<h3><strong>Why Platforms Ask for These Rights</strong></h3>
<p>From a business standpoint, this broad license allows companies to:</p>
<ul>
<li>build features like recommendation algorithms</li>
<li>create derivative products</li>
<li>run ads tied to user content</li>
<li>allow other users to remix or reuse content</li>
<li>even license user content to partners</li>
</ul>
<p>For them, it’s about flexibility and growth. But for creators, especially young or emerging ones, it can feel like handing over the keys to your digital work.</p>
<h3><strong>Should You Be Worried?</strong></h3>
<p>Not everyone reading these terms is a professional artist or brand. Sometimes you’re just sharing a fun video. But the concern grows when:</p>
<ul>
<li>your content goes viral</li>
<li>it appears in marketing or ads</li>
<li>other companies reuse it without credit</li>
<li>you later regret having granted such broad rights</li>
</ul>
<p>And importantly, a typical user has no real negotiating power when presented with a TOS. It’s take it or leave it. The legal term for this kind of contract is a <em>“contract of adhesion”</em> &#8211; one party with much more power dictates the terms.</p>
<h3><strong>What You Can Do</strong></h3>
<p>If this seems unfair or concerning, here are a few practical steps:</p>
<ul>
<li><strong>Read the terms before signing up</strong> (yes, practice!)</li>
<li><strong>Decide whether the platform is worth the rights you grant</strong></li>
<li><strong>Keep copies of your content offline</strong></li>
<li><strong>Avoid posting things you wouldn’t want reused commercially</strong></li>
<li><strong>Use platforms with more favourable creator terms</strong></li>
</ul>
<p>Platforms aren’t going away. But the next time an app asks for “worldwide, perpetual rights,” it’s worth pausing to think before you tap agree.</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p>The post <a href="https://torontoguardian.com/2026/01/what-youre-really-giving-away-when-you-post-online/">What You’re Really Giving Away When You Post Online</a> appeared first on <a href="https://torontoguardian.com">Toronto Guardian</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>The Ultimate Guide to Common Scams: How they Work &#038; How to Stay Safe</title>
		<link>https://torontoguardian.com/2025/07/ultimate-guide-to-common-scams-how-they-work/</link>
		
		<dc:creator><![CDATA[Joel Levy]]></dc:creator>
		<pubDate>Tue, 08 Jul 2025 01:25:49 +0000</pubDate>
				<category><![CDATA[Civic Engagement]]></category>
		<category><![CDATA[The City]]></category>
		<guid isPermaLink="false">https://torontoguardian.com/?p=115587</guid>

					<description><![CDATA[<p>In today&#8217;s digital world, scams have become more sophisticated and widespread. From job offers too good to be true to <a class="mh-excerpt-more" href="https://torontoguardian.com/2025/07/ultimate-guide-to-common-scams-how-they-work/" title="The Ultimate Guide to Common Scams: How they Work &#038; How to Stay Safe">[...]</a></p>
<p>The post <a href="https://torontoguardian.com/2025/07/ultimate-guide-to-common-scams-how-they-work/">The Ultimate Guide to Common Scams: How they Work &#038; How to Stay Safe</a> appeared first on <a href="https://torontoguardian.com">Toronto Guardian</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p data-start="258" data-end="632">In today&#8217;s digital world, scams have become more sophisticated and widespread. From job offers too good to be true to phishing emails that look incredibly real, scammers are constantly evolving their tactics. Whether you&#8217;re online, on the phone, or even checking your mailbox, it&#8217;s essential to know how to spot a scam before it costs you your money—or worse, your identity.</p>
<figure id="attachment_115590" aria-describedby="caption-attachment-115590" style="width: 678px" class="wp-caption aligncenter"><img loading="lazy" decoding="async" class="wp-image-115590 size-full" src="https://torontoguardian.com/wp-content/uploads/2025/07/kev-costello-w3jVXGkYZCw-unsplash.jpg" alt="Woman on her phone looking concerned - The ultimate guide to common scams: How they work &amp; how to stay safe" width="678" height="452" srcset="https://torontoguardian.com/wp-content/uploads/2025/07/kev-costello-w3jVXGkYZCw-unsplash.jpg 678w, https://torontoguardian.com/wp-content/uploads/2025/07/kev-costello-w3jVXGkYZCw-unsplash-300x200.jpg 300w, https://torontoguardian.com/wp-content/uploads/2025/07/kev-costello-w3jVXGkYZCw-unsplash-572x381.jpg 572w" sizes="auto, (max-width: 678px) 100vw, 678px" /><figcaption id="caption-attachment-115590" class="wp-caption-text">Photo by <a href="https://unsplash.com/@kevcostello?utm_content=creditCopyText&amp;utm_medium=referral&amp;utm_source=unsplash">Kev Costello</a> on <a href="https://unsplash.com/photos/woman-leaning-on-white-wooden-table-while-holding-black-android-smartphone-w3jVXGkYZCw?utm_content=creditCopyText&amp;utm_medium=referral&amp;utm_source=unsplash">Unsplash</a></figcaption></figure>
<p data-start="634" data-end="744">Here’s a breakdown of some of the most common types of scams, how they work, and how you can protect yourself.</p>
<h2 data-start="751" data-end="774">🔍 1. <strong data-start="760" data-end="774">Task Scams</strong></h2>
<p data-start="776" data-end="1074"><strong data-start="776" data-end="793">How it works: </strong>You’re approached online (often through messaging apps, job boards, or even social media) with a simple offer: “Complete small tasks and earn quick cash.” These tasks may involve liking videos, rating apps, or writing reviews. At first, you&#8217;re paid small amounts to build trust.</p>
<p data-start="1076" data-end="1293">Eventually, you’re asked to &#8220;invest&#8221; your own money to unlock higher-paying tasks. Once you&#8217;ve paid, the scammer disappears or continuously demands more money under the guise of “unlocking” the next level of earnings.</p>
<p data-start="1295" data-end="1311"><strong data-start="1295" data-end="1309">Red Flags:</strong></p>
<ul data-start="1312" data-end="1459">
<li data-start="1312" data-end="1344">
<p data-start="1314" data-end="1344">Too-good-to-be-true earnings</p>
</li>
<li data-start="1345" data-end="1392">
<p data-start="1347" data-end="1392">Requests for payment to access higher tasks</p>
</li>
<li data-start="1393" data-end="1459">
<p data-start="1395" data-end="1459">Telegram/WhatsApp-based recruitment with no official affiliation</p>
</li>
</ul>
<p data-start="1461" data-end="1491"><strong data-start="1461" data-end="1489">How to protect yourself:</strong></p>
<ul data-start="1492" data-end="1740">
<li data-start="1492" data-end="1567">
<p data-start="1494" data-end="1567">Never pay to work. Legitimate jobs pay <em data-start="1533" data-end="1538">you</em>, not the other way around.</p>
</li>
<li data-start="1568" data-end="1663">
<p data-start="1570" data-end="1663">Research the company. A real business will have an online presence and contact information.</p>
</li>
<li data-start="1664" data-end="1740">
<p data-start="1666" data-end="1740">Don’t engage in financial transactions with strangers over messaging apps.</p>
</li>
</ul>
<h2 data-start="1747" data-end="1769">💼 2. <strong data-start="1756" data-end="1769">Job Scams</strong></h2>
<p data-start="1771" data-end="2076"><strong data-start="1771" data-end="1788">How it works: </strong>You receive a job offer without an interview or after a very brief one. Often, the scammer poses as a hiring manager from a reputable company and offers high pay for remote work. After you&#8217;re &#8220;hired,&#8221; you&#8217;re asked to purchase equipment or software using your own money or a fake check.</p>
<p data-start="2078" data-end="2094"><strong data-start="2078" data-end="2092">Red Flags:</strong></p>
<ul data-start="2095" data-end="2223">
<li data-start="2095" data-end="2123">
<p data-start="2097" data-end="2123">Upfront payment required</p>
</li>
<li data-start="2124" data-end="2188">
<p data-start="2126" data-end="2188">Suspicious email domains (e.g., Gmail, not a company domain)</p>
</li>
<li data-start="2189" data-end="2223">
<p data-start="2191" data-end="2223">No formal interview or process</p>
</li>
</ul>
<p data-start="2225" data-end="2255"><strong data-start="2225" data-end="2253">How to protect yourself:</strong></p>
<ul data-start="2256" data-end="2461">
<li data-start="2256" data-end="2310">
<p data-start="2258" data-end="2310">Never pay for job-related equipment out-of-pocket.</p>
</li>
<li data-start="2311" data-end="2383">
<p data-start="2313" data-end="2383">Verify the company and role by contacting the organization directly.</p>
</li>
<li data-start="2384" data-end="2461">
<p data-start="2386" data-end="2461">Watch for poor grammar or odd interview methods (like only messaging apps).</p>
</li>
</ul>
<h2 data-start="2468" data-end="2495">💌 3. <strong data-start="2477" data-end="2495">Phishing Scams</strong></h2>
<p data-start="2497" data-end="2689"><strong data-start="2497" data-end="2514">How it works: </strong>You get an email or text pretending to be from your bank, a retailer, or even the government. It asks you to click a link and log in, supposedly to verify or fix something.</p>
<p data-start="2691" data-end="2783">The link goes to a fake website designed to steal your login credentials or install malware.</p>
<p data-start="2785" data-end="2801"><strong data-start="2785" data-end="2799">Red Flags:</strong></p>
<ul data-start="2802" data-end="2906">
<li data-start="2802" data-end="2841">
<p data-start="2804" data-end="2841">Generic greetings (“Dear customer”)</p>
</li>
<li data-start="2842" data-end="2874">
<p data-start="2844" data-end="2874">Spelling or grammar mistakes</p>
</li>
<li data-start="2875" data-end="2906">
<p data-start="2877" data-end="2906">Urgent threats or deadlines</p>
</li>
</ul>
<p data-start="2908" data-end="2938"><strong data-start="2908" data-end="2936">How to protect yourself:</strong></p>
<ul data-start="2939" data-end="3114">
<li data-start="2939" data-end="2991">
<p data-start="2941" data-end="2991">Don’t click links in suspicious emails or texts.</p>
</li>
<li data-start="2992" data-end="3055">
<p data-start="2994" data-end="3055">Always type the website address directly into your browser.</p>
</li>
<li data-start="3056" data-end="3114">
<p data-start="3058" data-end="3114">Use multi-factor authentication (MFA) wherever possible.</p>
</li>
</ul>
<h2 data-start="3121" data-end="3159">📞 4. <strong data-start="3130" data-end="3159">Phone and Voicemail Scams</strong></h2>
<p data-start="3161" data-end="3359"><strong data-start="3161" data-end="3178">How it works: </strong>You receive a call or voicemail claiming urgent action is needed—maybe the IRS is suing you, your Social Security number has been suspended, or your bank account was compromised.</p>
<p data-start="3361" data-end="3495">Scammers aim to create panic and get you to act quickly—often transferring money, giving away sensitive info, or downloading software.</p>
<p data-start="3497" data-end="3513"><strong data-start="3497" data-end="3511">Red Flags:</strong></p>
<ul data-start="3514" data-end="3627">
<li data-start="3514" data-end="3555">
<p data-start="3516" data-end="3555">Calls from unknown or spoofed numbers</p>
</li>
<li data-start="3556" data-end="3589">
<p data-start="3558" data-end="3589">Demands for immediate payment</p>
</li>
<li data-start="3590" data-end="3627">
<p data-start="3592" data-end="3627">Threats of legal action or arrest</p>
</li>
</ul>
<p data-start="3629" data-end="3659"><strong data-start="3629" data-end="3657">How to protect yourself:</strong></p>
<ul data-start="3660" data-end="3846">
<li data-start="3660" data-end="3732">
<p data-start="3662" data-end="3732">Hang up and call the organization directly using an official number.</p>
</li>
<li data-start="3733" data-end="3813">
<p data-start="3735" data-end="3813">Don’t give out personal info over the phone unless <em data-start="3786" data-end="3791">you</em> initiated the call.</p>
</li>
<li data-start="3814" data-end="3846">
<p data-start="3816" data-end="3846">Block and report scam numbers.</p>
</li>
</ul>
<h2 data-start="3853" data-end="3907">💸 5. <strong data-start="3862" data-end="3907">Investment Scams (including Crypto Scams)</strong></h2>
<p data-start="3909" data-end="4173"><strong data-start="3909" data-end="3926">How it works: </strong>You’re promised high returns with little or no risk. Scammers may show fake testimonials or demo dashboards that make it look like your investment is growing. Crypto scams are particularly common, with fraudsters posing as traders or platforms.</p>
<p data-start="4175" data-end="4191"><strong data-start="4175" data-end="4189">Red Flags:</strong></p>
<ul data-start="4192" data-end="4280">
<li data-start="4192" data-end="4214">
<p data-start="4194" data-end="4214">Guaranteed returns</p>
</li>
<li data-start="4215" data-end="4242">
<p data-start="4217" data-end="4242">Pressure to act quickly</p>
</li>
<li data-start="4243" data-end="4280">
<p data-start="4245" data-end="4280">Requests for crypto wallet access</p>
</li>
</ul>
<p data-start="4282" data-end="4312"><strong data-start="4282" data-end="4310">How to protect yourself:</strong></p>
<ul data-start="4313" data-end="4483">
<li data-start="4313" data-end="4379">
<p data-start="4315" data-end="4379">Don’t trust anyone offering investment advice out of the blue.</p>
</li>
<li data-start="4380" data-end="4414">
<p data-start="4382" data-end="4414">Research platforms thoroughly.</p>
</li>
<li data-start="4415" data-end="4483">
<p data-start="4417" data-end="4483">Understand the risks—if you don’t know how it works, don’t invest.</p>
</li>
</ul>
<h2 data-start="4490" data-end="4516">❤️ 6. <strong data-start="4499" data-end="4516">Romance Scams</strong></h2>
<p data-start="4518" data-end="4731"><strong data-start="4518" data-end="4535">How it works: </strong>You meet someone on a dating app or social platform. They seem perfect—until they start asking for money. Common excuses include emergency medical bills, travel costs, or a locked bank account.</p>
<p data-start="4733" data-end="4749"><strong data-start="4733" data-end="4747">Red Flags:</strong></p>
<ul data-start="4750" data-end="4891">
<li data-start="4750" data-end="4796">
<p data-start="4752" data-end="4796">Avoiding video calls or in-person meetings</p>
</li>
<li data-start="4797" data-end="4845">
<p data-start="4799" data-end="4845">Moving the conversation off-platform quickly</p>
</li>
<li data-start="4846" data-end="4891">
<p data-start="4848" data-end="4891">Stories that tug on your heart and wallet</p>
</li>
</ul>
<p data-start="4893" data-end="4923"><strong data-start="4893" data-end="4921">How to protect yourself:</strong></p>
<ul data-start="4924" data-end="5092">
<li data-start="4924" data-end="4973">
<p data-start="4926" data-end="4973">Don’t send money to someone you’ve never met.</p>
</li>
<li data-start="4974" data-end="5024">
<p data-start="4976" data-end="5024">Be cautious of anyone professing love quickly.</p>
</li>
<li data-start="5025" data-end="5092">
<p data-start="5027" data-end="5092">Reverse-search their profile pictures to check for stolen images.</p>
</li>
</ul>
<h2 data-start="5099" data-end="5138">📦 7. <strong data-start="5108" data-end="5138">Delivery or Shipping Scams</strong></h2>
<p data-start="5140" data-end="5291"><strong data-start="5140" data-end="5157">How it works: </strong>You receive a text or email about a package you didn’t order. It asks you to click a link to schedule delivery or pay customs fees.</p>
<p data-start="5293" data-end="5353">The link may lead to phishing sites or even install malware.</p>
<p data-start="5355" data-end="5371"><strong data-start="5355" data-end="5369">Red Flags:</strong></p>
<ul data-start="5372" data-end="5459">
<li data-start="5372" data-end="5405">
<p data-start="5374" data-end="5405">Vague or generic package info</p>
</li>
<li data-start="5406" data-end="5433">
<p data-start="5408" data-end="5433">Poorly written messages</p>
</li>
<li data-start="5434" data-end="5459">
<p data-start="5436" data-end="5459">Unusual web addresses</p>
</li>
</ul>
<p data-start="5461" data-end="5491"><strong data-start="5461" data-end="5489">How to protect yourself:</strong></p>
<ul data-start="5492" data-end="5672">
<li data-start="5492" data-end="5553">
<p data-start="5494" data-end="5553">Verify with the delivery service via their official site.</p>
</li>
<li data-start="5554" data-end="5624">
<p data-start="5556" data-end="5624">Don’t click unknown links—especially if you didn’t order anything.</p>
</li>
<li data-start="5625" data-end="5672">
<p data-start="5627" data-end="5672">Use package tracking from verified retailers.</p>
</li>
</ul>
<h2 data-start="5679" data-end="5712">🔒 General Tips to Avoid Scams</h2>
<p data-start="5714" data-end="6136">✅ <strong data-start="5716" data-end="5743">Think before you click.</strong> Always take a moment to verify the source of any message or offer.<br data-start="5810" data-end="5813" />✅ <strong data-start="5815" data-end="5839">Research thoroughly.</strong> A quick Google search can reveal scam reports.<br data-start="5886" data-end="5889" />✅ <strong data-start="5891" data-end="5924">Use strong, unique passwords.</strong> And enable multi-factor authentication when available.<br data-start="5979" data-end="5982" />✅ <strong data-start="5984" data-end="6010">Keep software updated.</strong> Security patches help protect you from known vulnerabilities.<br data-start="6072" data-end="6075" />✅ <strong data-start="6077" data-end="6096">Trust your gut.</strong> If something feels off, it probably is.</p>
<h2 data-start="6143" data-end="6182">🚨 What to Do If You’ve Been Scammed</h2>
<ul data-start="6184" data-end="6610">
<li data-start="6184" data-end="6394">
<p data-start="6186" data-end="6208"><strong data-start="6186" data-end="6206">Report the scam:</strong></p>
<ul data-start="6211" data-end="6394">
<li data-start="6211" data-end="6268">
<p data-start="6213" data-end="6268">U.S.: <a class="cursor-pointer" href="https://reportfraud.ftc.gov/" target="_blank" rel="noopener" data-start="6219" data-end="6266">FTC Report Fraud</a></p>
</li>
<li data-start="6271" data-end="6330">
<p data-start="6273" data-end="6330">Canada: <a href="https://antifraudcentre-centreantifraude.ca/index-eng.htm" target="_blank" rel="noopener">Canadian Anti-Fraud Centre</a> &#8211; 1-888-495-8501</p>
</li>
<li data-start="6333" data-end="6394">
<p data-start="6335" data-end="6394">Global: Local cybercrime unit or consumer protection agency</p>
</li>
</ul>
</li>
<li data-start="6396" data-end="6483">
<p data-start="6398" data-end="6483"><strong data-start="6398" data-end="6440">Contact your bank/credit card provider</strong> to dispute charges or stop transactions.</p>
</li>
<li data-start="6484" data-end="6562">
<p data-start="6486" data-end="6562"><strong data-start="6486" data-end="6511">Change your passwords</strong> immediately if any credentials were compromised.</p>
</li>
<li data-start="6563" data-end="6610">
<p data-start="6565" data-end="6610"><strong data-start="6565" data-end="6588">Run antivirus scans</strong> to check for malware.</p>
</li>
</ul>
<hr data-start="6612" data-end="6615" />
<blockquote data-start="6617" data-end="6764">
<p data-start="6619" data-end="6764"><strong data-start="6619" data-end="6668">Stay informed, stay skeptical, and stay safe.</strong><br data-start="6668" data-end="6671" />Scammers thrive on urgency and emotions. Arming yourself with knowledge is your best defence.</p>
</blockquote>
<hr data-start="6766" data-end="6769" />
<p data-start="6771" data-end="6850" data-is-last-node="" data-is-only-node="">
<p>The post <a href="https://torontoguardian.com/2025/07/ultimate-guide-to-common-scams-how-they-work/">The Ultimate Guide to Common Scams: How they Work &#038; How to Stay Safe</a> appeared first on <a href="https://torontoguardian.com">Toronto Guardian</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>X dominates antisemitic content during Canadian election, CyberWell report finds</title>
		<link>https://torontoguardian.com/2025/04/x-dominates-antisemitic-content-during-canadian-election-cyberwell-report-finds/</link>
		
		<dc:creator><![CDATA[Joel Levy]]></dc:creator>
		<pubDate>Wed, 30 Apr 2025 06:19:05 +0000</pubDate>
				<category><![CDATA[Civic Engagement]]></category>
		<category><![CDATA[The City]]></category>
		<guid isPermaLink="false">https://torontoguardian.com/?p=114307</guid>

					<description><![CDATA[<p>A new report by CyberWell, an organisation dedicated to combating online antisemitism, revealed that X (formerly Twitter) hosted the overwhelming <a class="mh-excerpt-more" href="https://torontoguardian.com/2025/04/x-dominates-antisemitic-content-during-canadian-election-cyberwell-report-finds/" title="X dominates antisemitic content during Canadian election, CyberWell report finds">[...]</a></p>
<p>The post <a href="https://torontoguardian.com/2025/04/x-dominates-antisemitic-content-during-canadian-election-cyberwell-report-finds/">X dominates antisemitic content during Canadian election, CyberWell report finds</a> appeared first on <a href="https://torontoguardian.com">Toronto Guardian</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>A new report by CyberWell, an organisation dedicated to combating online antisemitism, revealed that X (formerly Twitter) hosted the overwhelming majority—72.1 percent—of confirmed antisemitic posts tied to Canada’s 2025 federal election cycle. Alarmingly, only 22 percent of flagged posts on the platform were removed, a sharp decline from CyberWell’s 2024 average global removal rate of 50 percent across major platforms.</p>
<figure id="attachment_114308" aria-describedby="caption-attachment-114308" style="width: 678px" class="wp-caption aligncenter"><img loading="lazy" decoding="async" class="size-full wp-image-114308" src="https://torontoguardian.com/wp-content/uploads/2025/04/chris-desort-U-fJl3lTWJ4-unsplash.jpg" alt="Ottawa Parliament building" width="678" height="452" srcset="https://torontoguardian.com/wp-content/uploads/2025/04/chris-desort-U-fJl3lTWJ4-unsplash.jpg 678w, https://torontoguardian.com/wp-content/uploads/2025/04/chris-desort-U-fJl3lTWJ4-unsplash-300x200.jpg 300w, https://torontoguardian.com/wp-content/uploads/2025/04/chris-desort-U-fJl3lTWJ4-unsplash-572x381.jpg 572w" sizes="auto, (max-width: 678px) 100vw, 678px" /><figcaption id="caption-attachment-114308" class="wp-caption-text">Photo by <a href="https://unsplash.com/@desort_design?utm_content=creditCopyText&amp;utm_medium=referral&amp;utm_source=unsplash">Chris DeSort</a> on <a href="https://unsplash.com/photos/brown-and-white-concrete-building-near-green-trees-under-blue-sky-during-daytime-U-fJl3lTWJ4?utm_content=creditCopyText&amp;utm_medium=referral&amp;utm_source=unsplash">Unsplash</a></figcaption></figure>
<p>The analysis, conducted between August 2024 and April 2025, identified 86 posts tied to the Canadian federal election as antisemitic, verified using the International Holocaust Remembrance Alliance (IHRA) working definition of antisemitism. These posts targeted Jewish politicians and amplified long-standing antisemitic narratives, including conspiracy theories, Holocaust trivialisation, and claims of Jewish world control.</p>
<p>According to the report, antisemitic rhetoric centred around Prime Minister Mark Carney, Conservative Party Leader Pierre Poilievre, and Jewish political figures such as MP Melissa Landsman and Immigration Minister Rachel Bendayan. The data showed that X accounted for 72.1 percent of these posts, far outpacing other platforms: Facebook (16.3 percent), Instagram (4.6 percent), TikTok (3.5 percent), and YouTube (3.5 percent).</p>
<p>While Meta platforms (Facebook and Instagram) removed 72 percent of flagged posts and TikTok removed 67 percent, X’s removal rate was significantly lower at 22 percent. YouTube removed none, though only one of its identified posts violated community guidelines due to stricter hate speech enforcement specific to election-related content.</p>
<p>CyberWell’s findings also showed that 95 percent of antisemitic posts fell under IHRA Example 2, which alleges Jewish control over government, media, and societal institutions—a narrative explicitly prohibited by social media hate speech policies.</p>
<figure id="attachment_114311" aria-describedby="caption-attachment-114311" style="width: 1536px" class="wp-caption aligncenter"><img loading="lazy" decoding="async" class="size-full wp-image-114311" src="https://torontoguardian.com/wp-content/uploads/2025/04/tal-or-cohen-montemayor-aspect-ratio-200-200.jpg" alt="Tal-Or Cohen Montemayor" width="1536" height="1536" srcset="https://torontoguardian.com/wp-content/uploads/2025/04/tal-or-cohen-montemayor-aspect-ratio-200-200.jpg 1536w, https://torontoguardian.com/wp-content/uploads/2025/04/tal-or-cohen-montemayor-aspect-ratio-200-200-300x300.jpg 300w, https://torontoguardian.com/wp-content/uploads/2025/04/tal-or-cohen-montemayor-aspect-ratio-200-200-381x381.jpg 381w, https://torontoguardian.com/wp-content/uploads/2025/04/tal-or-cohen-montemayor-aspect-ratio-200-200-150x150.jpg 150w, https://torontoguardian.com/wp-content/uploads/2025/04/tal-or-cohen-montemayor-aspect-ratio-200-200-768x768.jpg 768w" sizes="auto, (max-width: 1536px) 100vw, 1536px" /><figcaption id="caption-attachment-114311" class="wp-caption-text">Tal-Or Cohen Montemayor</figcaption></figure>
<p>“This analysis demonstrates how deeply embedded antisemitic conspiracy theories remain in political discourse and how easily they find traction online,” said CyberWell Founder and Executive Director Tal-Or Cohen Montemayor. “Platforms must urgently enforce policies against election-related antisemitism to protect democratic integrity and vulnerable communities from real-world harm.”</p>
<p>CyberWell publishes its findings regularly on its <a href="https://cyberwell.org/reports/" target="_blank" rel="noopener">official reports page</a>, presenting critical insights into antisemitism trends across various platforms. Their reports cover a broad range of issues, including responses to global events, hate speech trends tied to political elections, and platform-specific analyses. Highlights from their publications include:</p>
<p>Annual overviews of online antisemitism, such as the 2024 Annual Report and the 2023 Annual Report, detailing platform-specific enforcement data and the most prominent antisemitic narratives.<br />
In-depth investigations into specific events, like their exploration of antisemitic narratives surrounding the 2024 U.S. Elections and the rise of antisemitism during major global conflicts.<br />
Policy recommendations to platforms like Meta, providing public advisory opinions that help shape social media moderation, such as the report on Meta’s policy concerning Holocaust denial and distortion.</p>
<p>Special issue reports tackling specific topics, including monetised antisemitic content on YouTube, hate speech trends on Jewish remembrance days, and conspiracy theories like the Judeo-Masonic narrative.</p>
<p>CyberWell ensures that their reports are accessible to the public for greater transparency. They also submit tailored reports and recommendations directly to social media platforms, urging them to prioritise the removal of antisemitic content and improve policy enforcement.</p>
<p>CyberWell’s full report is available at <a href="http://www.cyberwell.org" target="_blank" rel="noopener">www.cyberwell.org</a>.</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p>The post <a href="https://torontoguardian.com/2025/04/x-dominates-antisemitic-content-during-canadian-election-cyberwell-report-finds/">X dominates antisemitic content during Canadian election, CyberWell report finds</a> appeared first on <a href="https://torontoguardian.com">Toronto Guardian</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
