Big news! US user Dillon reveals that Pi may be removed from Google and Apple app stores. Dillon Twitter account (x.com/dillon), tweet address: https://x.com/Dillon/status/1893783303054102629?s=19
🚨#PiNetwork app is about to be removed from Google Play and Apple Store worldwide! They violate data privacy laws by allowing unverified users to handle sensitive information such as passports and ID cards.
Google and Apple are actively investigating these unethical practices. When the app is shut down, Pi Network becomes useless, exposing its centralized Ponzi scheme structure disguised as a cryptocurrency.
Their KYC process involves random users verifying other people's personal data (passports, ID cards, proof of address, etc.) without proper supervision, and only recommends that verifiers do not take screenshots - this method is highly unethical and illegal in many countries and directly violates the terms of service of Google Play and Apple.
The Pi Network application requires users to undergo a Know Your Customer (KYC) verification process that involves submitting sensitive personal information, including government-issued ID documents and personal photos. This data is then reviewed and verified by other users who have completed their own KYC verification but are not formal employees or contractors of Pi Network. This practice raises the following significant concerns:
Lack of lawful basis for data sharing: There is a lack of clear lawful basis for sharing sensitive personal data with non-affiliated individuals, as required by Article 6 of the GDPR.
Unauthorized access to personal data: Allowing non-employees to access and process sensitive information may constitute unauthorized data sharing, in violation of GDPR regulations.
Inadequate data protection measures: The decentralized nature of this verification process may not provide sufficient safeguards against unauthorized access or misuse of personal data, as required by the GDPR.
User submission of sensitive data: Users are prompted to upload images of government-issued ID documents and personal photos for identity verification.
Peer verification: These submitted documents are then reviewed by other users (peers) who have completed their own KYC but are not formally affiliated with Pi Network.
This peer-to-peer verification system may expose users' sensitive personal information to unauthorized individuals, increasing the risk of data breach and misuse.