21
As individuals navigate their lives on websites and apps, their movements, searches, and actions are silently tracked. Streams of consumer data are then pooled by data aggregators and mined to identify potential vulnerabilities of consumers. These potential weaknesses, e.g., whether someone is in financial distress, having a health crisis, or battling an addiction, are valuable …