Skip to content

How Companies and Scammers Exploit Your Data for Profit

Your smart TV might be spying on you, and flight prices could rise just because you searched. This exposĂ© reveals the hidden cost of your data—and how to fight back.

The image shows a poster with text and a logo that reads "When companies sneak hidden junk fees...
The image shows a poster with text and a logo that reads "When companies sneak hidden junk fees into families' bills, it can take hundreds of dollars a month out of their pockets."

How Companies and Scammers Exploit Your Data for Profit

A graphics card well below market price—paid for but never delivered. A flight that gets more expensive the more you search for it. A smart TV that logs your viewing habits and reports them to ad networks. These aren't isolated incidents but symptoms of a system: data dictates prices, products, and decisions—and creates new vulnerabilities for fraud.

The new c't special issue "Money & Data" gets to the bottom of these mechanisms. It reveals how data collection, platform logic, and business models intersect—and why the result isn't just personalized advertising but also manipulative pricing, declining product quality, and increasingly sophisticated scams. Building on this analysis, we show you in four key sections how to protect yourself and regain control.

The "Devaluation" section exposes why so many devices and programs feel worse today than their predecessors—even though they're objectively more powerful. Smart TVs that barely function without an internet connection, printers that lock up with ink subscriptions and forced accounts, software released half-finished and left to "mature" in the hands of customers:

The issue demonstrates that this isn't just carelessness—it's calculated. Under the term "enshittification," our team explains how manufacturers and platforms systematically redesign products—shifting focus away from users and toward data, subscriptions, and control. Complementary articles examine the role of monopolies and offer practical countermeasures: how to use devices with minimal data exposure, avoid dependencies, and assert your rights, from repairs to refunds.

The "Exposed" section reveals just how thoroughly companies analyze every click, movement, and transaction. Apps transmit location data, usage patterns, and device IDs to ad networks; browsers let trackers monitor mouse movements and keystrokes; smart TVs log what you watch and when you fast-forward.

From this data, firms build profiles that go far beyond mere interests—they infer personality traits, purchasing power, and risk factors, then use them for ads, dynamic pricing, or credit decisions. The issue breaks down these processes in detail—from data brokering and psychological targeting to credit scoring—and shows how you can track and limit your digital footprint: with optimized browser settings, strict app permissions, and tools to block tracking and personalized ads.

The "Safe Shopping" section dispels the myth that online retail is transparent and fair. Price comparison sites don't always rank by the best deal but by commissions and "popularity," while hidden shipping costs distort the final price. Retailers deploy artificial scarcity, countdown timers, and other dark patterns to rush buyers into decisions.

The issue shows you how to systematically evaluate offers, assess prices realistically, and spot trustworthy sellers. It explains which payment methods provide genuine buyer protection—and why prepayment or "friends and family" transfers are risky. You'll also find step-by-step guides for complaints, returns, and refunds, helping you enforce your rights instead of getting lost in customer service limbo.

Finally, the "Scam Tactics" section exposes just how professional online fraud has become. Fake shops mimic real listings, use high-quality product images, and craft legally sound descriptions—only to steal money or login credentials. Some deliver nothing at all; others send worthless substitutes to buy time. Particularly insidious are payment processes that appear legitimate but actually harvest online banking credentials or authorize new devices.

The issue dissects these schemes step by step, highlights red flags—from unrealistic prices to manipulated payment flows—and shows you how to vet shops, cancel suspicious transactions, and act fast in case of fraud before your money or account access is gone for good.

Read also: