Kinesisk tangentbordsapp läcker allt: Hundra miljoner kan drabbas

Kinesisk tangentbordsapp läcker allt: Hundra miljoner kan drabbas

För mobilanvändare som vill skriva på kinesiska är det nära nog omöjligt utan att klara sig utan en tredjepartsapp för tangentbord. Nu visar det sig att de här apparna – kanske – kan läsa allt användarna skriver. Antalet drabbade kan vara hundratals miljoner. Third-party keyboard apps make typing in Chinese more efficient, but they can also be a privacy nightmare By Zeyi Yanga August 21, 2023 For millions of Chinese people, the first software they download on a new laptop or smartphone is always the same: a keyboard app. Yet few of them are aware that it may make everything they type vulnerable to spying eyes. Since dozens of Chinese characters can share the same latinized phonetic spelling, the ordinary QWERTY keyboard alone is incredibly inefficient. A smart, localized keyboard app can save a lot of time and frustration by predicting the characters and words a user wants to type. Today, over 800 million Chinese people use third-party keyboard apps on their PCs, laptops, and mobile phones. But a recent report by the Citizen Lab, a University of Toronto–affiliated research group focused on technology and security, revealed that Sogou, one of the most popular Chinese keyboard apps, had a massive security loophole. “This is an app that handles very sensitive information—specifically, every single thing that you type,” says Jeffrey Knockel, a senior research associate at the Citizen Lab and coauthor of the report. “So we wanted to look into that in greater detail and see if this app is properly encrypting this very sensitive data that it’s sending over the network—or, as we found, is it improperly doing it in a way that eavesdroppers could decipher?” Indeed, what he and his colleagues found was that Sogou’s encryption system could be exploited to intercept and decrypt exactly what people were typing, as they were typing it. Sogou, which was acquired by the tech giant Tencent in 2021, quickly fixed this loophole after the Citizen Lab researchers disclosed it to the company. “User privacy is fundamental to our business,” a Sogou spokesperson told MIT Technology Review. “We have addressed the issues identified by the Citizen Lab and will continue to work so that user data remains safe and secure. We transparently disclose our data processing activities in our privacy policy and do not otherwise share user data.” But there’s no guarantee that this was the only vulnerability in the app, and the researchers did not examine other popular keyboard apps in the Chinese market—meaning the ubiquitous software will continue to be a security risk for hundreds of millions of people. And, alarmingly, the potential for such makes otherwise encrypted communications by Chinese users—in apps like Signal, for example—vulnerable to systems of state surveillance. Officially called input method editors (IMEs), keyboard apps are necessary for typing in languages that have more characters than a common Latin-alphabet keyboard allows, like those with Japanese, Korean, or Indic characters. For Chinese users, having an IME is almost a necessity. “There’s a lot more ambiguity to resolve when typing Chinese characters using a Latin alphabet,” says Mona Wang, an Open Technology Fund fellow at the Citizen Lab and another coauthor of the report. Because the same phonetic spelling can be matched to dozens or even hundreds of Chinese characters, and these characters also can be paired in different ways to become different words, a keyboard app that has been fine-tuned to the Chinese language can perform much better than the default keyboard. Starting in the PC era, Chinese software developers proposed all kinds of IME products to expedite typing, some even ditching phonetic spelling and allowing users to draw or choose the components of a Chinese character. As a result, downloading third-party keyboard software became standard practice for everyone in China. Released in 2006, Sogou Input Method quickly became the most popular keyboard app in the country. It was more capable than any competitor in predicting which character or word the user actually wanted to type, and it did that by scraping text from the internet and maintaining an extensive library of Chinese words. The cloud-based library was updated frequently to include newly coined words, trending expressions, or names of people in the news. In 2007, when Google launched its Chinese keyboard, it even copied Sogou’s word library (and later had to apologize). In 2014, when the iPhone finally enabled third-party IMEs for the first time, Chinese users rushed to download Sogou’s keyboard app, leaving 3,000 reviews in just one day. At one point, over 90% of Chinese PC users were using Sogou. Over the years, its market dominance has waned; as of last year, Baidu Input Method was the top keyboard app in China, with 607 million users and 46.4% of the market share. But Sogou still had 561 million users, according to iiMedia, an analytics firm. A keyboard app can access a wide variety of user information. For example, once Sogou is downloaded and added to the iPhone keyboard options, the app will ask for “full access.” If it’s granted, anything the user types can be sent to Sogou’s cloud-based server. Connecting to the cloud is what makes most IMEs successful, allowing them to improve text prediction and enable other miscellaneous features, like the ability to search for GIFs and memes. But this also adds risk since content can, at least in theory, be intercepted during transmission. It becomes the apps’ responsibility to properly encrypt the data and prevent that from happening. Sogou’s privacy policy says it has “adopted industry-standard security technology measures … to maximize the prevention of leak, destruction, misuse, unauthorized access, unauthorized disclosure, or alteration” of users’ personal information. “People generally had suspicions [about the security of keyboard apps] because they’re advertising [their] cloud service,” says Wang. “Almost certainly they’re sending some amount of keystrokes over the internet.” Nevertheless, users have continued to grant the apps full access. When the Citizen Lab researchers started looking at the Sogou Input Method on Windows, Android, and iOS platforms, they found that it used EncryptWall, an encryption system it developed itself, instead of Transport Layer Security (TLS), the standard international cryptographic protocol that has been in use since 1999. (Sogou is also used on other platforms like MacOS and Linux, but the researchers haven’t looked into them.) One critical difference between the two encryption systems, the Citizen Lab found, is that Sogou’s EncryptWall is still vulnerable to an exploit that was revealed in 2002 and can turn encrypted data back into plain text. TLS was updated to protect against this in 2003. But when they used that exploit method on Sogou, the researchers managed to decrypt the exact keystrokes they’d typed. The existence of this loophole meant that users were vulnerable to all kinds of hacks. The typed content could be intercepted when it went through VPN software, home Wi-Fi routers, and telecom providers. Not every word is transmitted to the cloud, the researchers found. “If you type in nihao [‘hello’ in Chinese] or something like that, [the app] can answer that without having to use the cloud database,” says Knockel. “But if it’s more complicated and, frankly, more interesting things that you’re typing in, it has to reach out to that cloud database.” Along with the content being typed, Knockel and his Citizen Lab colleagues also obtained other information like technical identifiers of the user’s device, the app that the typing occurred in, and even a list of apps installed on the device. A lot of malicious actors would be interested in exploiting a loophole like this and eavesdropping on keystrokes, the researchers note—from cybercriminals after private information (like street addresses and bank account numbers) to government hackers. (In a written response to the Citizen Lab, Sogou said the transmission of typed text is required to access more accurate and extensive vocabularies on the cloud and enable a built-in search engine, and the uses are stated in the privacy agreement.) This particular loophole was closed when Tencent updated the Sogou software across platforms in late July. The Citizen Lab researchers found that the latest version effectively fixed the problem by adopting the TLS encryption protocol. Around the world, people who are at high risk of being surveilled by state authorities have turned to apps that offer end-to-end encryption. But if keyboard apps are vulnerable, then otherwise encrypted communication apps like Signal or WhatsApp are now also unsafe. What’s more, once a keyboard app is compromised, even an otherwise offline app, like the built-in notebook app, can be a security risk too. (Signal and WhatsApp did not respond to MIT Technology Review’s requests for comment. A spokesperson from Baidu said, “Baidu Input Method consistently adheres to established security practice standards. As of now, there are no vulnerabilities related to [the encryption exploit Sogou was vulnerable to] within Baidu Input Method’s products.”) As early as 2019, Naomi Wu, a Shenzhen-based tech blogger known as SexyCyborg online, had sounded the alarm about the risk of using Chinese keyboard apps alongside Signal. “The Signal ‘fix’ is ‘Incognito Mode’ aka for the app to say ‘Pretty please don’t read everything I type’ to the virtual keyboard and count on Google/random app makers to listen to the flag, and not be under court order to do otherwise,” she wrote in a 2019 Twitter thread. Since keyboard apps have no obligation to honor Signal’s request, “basically all hardware here is self-compromised 5 minutes out of the box,” she added. Wu suspects that the use of Signal was the reason some Chinese student activists talking to foreign media were detained by the police in 2018. In January 2021, Signal itself tried to clarify that its Incognito Keyboard feature (which only works for users on Android systems, which are more vulnerable than iOS) was not a foolproof privacy solution: “Keyboards and IME’s can ignore Android’s Incognito Keyboard flag. This Android system flag is a best effort, not a guarantee. It’s important to use a keyboard or IME that you trust. Signal cannot detect or prevent malware on your device,” the company added to its article on keyboard security. The recent Citizen Lab findings lend further support to Wu’s theory. The security risk is particularly acute for users in China, since they are more likely to use keyboard apps and are under strict surveillance by their government. (Wu herself has disappeared from social media since the end of June, following a visit from police that was reportedly related to her online discussions of Signal and keyboard apps.) Still, other governments seem to have been paying attention to vulnerabilities with encrypted data transmission as well. A 2012 document leaked by Edward Snowden, for instance,shows that the Five Eyes intelligence alliance—comprising Canada, the US, Britain, Australia, and New Zealand—had been discreetly exploiting a similar loophole in UC Browser, a popular Chinese program, to intercept certain transmissions. Beyond being targeted by state actors, there are other ways keystroke information acquired via keyboard apps can be sold, leaked, or hacked. In 2021, it was reported that advertisers were able to access personal information through Sogou, as well as Baidu’s keyboard and similar apps, and use it to push customized ads. And in 2013, a loophole was found that made multimedia files that users uploaded and shared through Sogou searchable on Bing. These security problems are not unique to Chinese apps. In 2016, users of SwiftKey, an IME that was acquired by Microsoft that year, found that the app was auto-filling other people’s email addresses and personal information, as a result of a bug with its cloud sync system. The following year, a virtual keyboard app accidentally leaked 31 million users’ personal data. Even though the specific loophole identified by the Citizen Lab was fixed quickly, given all these breaches, it feels somewhat inevitable that another security flaw in a keyboard app will be revealed soon. As Knockel notes, using Sogou and similar apps always poses security risks, particularly in China, since all Chinese apps are legally required to surrender data if asked by the government. “If that’s something that’s concerning to you,” he says, “you might also just reconsider using Sogou, period.” © 2023 Technology Review, Inc. Distributed by Tribune Content Agency.

Experten: Därför tog det så lång tid att hitta försvunna paret

Experten: Därför tog det så lång tid att hitta försvunna paret

Det äldre paret från Mjölby som var ute på en svamputflykt anmäldes försvunna i måndags. Polisen sökte i området med stora resurser i flera dagar men avslutade sin aktiva insats på onsdagen då man bedömde att paret inte längre kunde vara vid liv. Organisationen Missing People fortsatte dock sin sökinsats och hittade till slut paret, som då var döda, nedanför ett stup drygt en kilometer ifrån platsen där paret hade parkerat sin bil. Polisen har beskrivit platsen där paret hittades som ”en dalsänka med tjocka träd och tät skog”.

– Vi hade 257 personer som deltog i sökandet, säger Lotta Klang Bergström, insatsledare för Missing People, till TV4 Nyheterna.

Trots att paret hittades i området där polisen hade letat med bland annat drönare, helikopter och värmekameror lyckades polisen inte hitta paret. Men det förvånar inte räddningsforskaren och universitetslektorn Rebecca Stenberg.

– En gång under en sökövning hade jag en sökare som stod endast tio centimeter från mitt huvud, men kunde ändå inte hitta mig, säger Rebecca Stenberg.

Hon ger exempel på ett annat äldre fall där en försvunnen kvinna hittades på sin egen tomt efter flera år.

– Jag tycker inte att det är ett dugg konstigt. Att söka efter försvunna personer särskilt i sådana krångliga miljöer under sådana förhållanden är otroligt svårt, säger Rebecca Stenberg. ”Väldigt stort området” Hon tillägger att ett område på en kilometer i varje riktning är ”väldigt stort” även om det kanske inte verkar som det. Dessutom har sökandet försvårats av rådande väderförhållanden, menar hon. – Det varit kallt och regnigt, och så faller löven plus att det inte är särskilt ljust så här års. Stenberg förklarar att äldre personer dessutom är en svår grupp att leta efter. – En yngre person kanske hade kunnat klättra upp till en klippa för att göra sig mer synlig, säger hon. Missing People: ”Fantastiskt arbete” Insatsledaren för Missing People, Lotta Klang Bergström, hyllar polisen och alla som i flera dagar deltagit i sökandet efter paret. – Alla har verkligen gjort ett fantastiskt arbete, säger hon till TV4 Nyheterna. – Vi hade ingen större förhoppning om att hitta paret vid liv när polisen avslutade sin sökinsats med det är väldigt viktigt för anhöriga att hitta kropparna, fortsätter hon.

Försvunna paret i Boxholm har hittats döda – "tragisk olycka"

Försvunna paret i Boxholm har hittats döda – "tragisk olycka"

Det äldre paret från Mjölby som var ute för att plocka svamp i skogen utanför Boxholm har hittats döda, bekräftar polisen. Deras anhöriga är underrättade. – Det ser ut som en tragisk olycka. Vi misstänker inget brott, säger Angelica Forsberg, polisens presstalesperson. Per Inge och Margareta sågs senast i fredags och anmäldes försvunna av en orolig anhörig på måndagen. Trots en stor sökinsats kunde de inte hittas. Polisen avslutade sin aktiva sökinsats efter paret under onsdagen, då man bedömde att det inte längre var möjligt att hitta paret vid liv. Hittades inom sökområdet Organisationen Missing People fortsatte dock söka efter paret i skogsområdet och hittade dem under lördagseftermiddagen. Parets bil stod parkerad på samma ställe sedan i fredags. Paret anträffades inom sökområdet. – Det är en oländig terräng som är tuff att gå, och de har anträffats på en plats som i princip är som ett stup, säger Angelica Forsberg, presstalesperson på polisen i region Öst. Svårt att hitta dem Det har inletts en räddningsinsats för att kunna transportera bort personerna från platsen. Varför paret hittades först nu tror polisen beror på flera faktorer. – Vi har haft drönare och helikopter i luften men där personerna hittades var i en dalsänka med tjocka träd och tät skog. Det har varit svårt för helikopter och drönare att hitta dem. Värmekamera är också ett verktyg vi använder men den kan ju bara se när det är värme, säger Angelica Forsberg. Hur länge kan personerna ha legat där? – Det är inget jag vill inte spekulera i nu. Jag antar att det kommer bli rättsmedicinsk undersökning och då får vi reda på dödsorsak och tid, säger hon och lägger till: – Det är fruktansvärt det som har hänt, det är personer som har mist sina kära. Texten uppdateras

Polisen avslutar sökinsats i Boxholm

Polisen avslutar sökinsats i Boxholm

”Polisens mer omfattande aktiva sökinsats, så som den sett ut under dagen, avslutas då man gjort bedömningen att det tyvärr inte längre finns möjlighet att hitta paret vid liv”, skriver polisen på sin hemsida. Polisen fortsätter dock arbetet men i annan form. De är fortfarande intresserad av iakttagelser som kan vara kopplade till försvinnandet. Omfattande sökinsats Paret sågs senast i fredags, då de gav sig ut i skogen. Polisen spärrade tidigare av ett sökområde, även Missing People och hemvärnet deltog i den omfattande sökinsatsen. – Trots en ålder på 80 år har de haft möjlighet att röra sig ganska långt vilket gör att vårt sökområde blir väldigt stort, sade polisens presstalesperson Angelica Israelsson Silfver. Parets bil har stått parkerad på samma ställe sedan i fredags och det var en orolig anhörig som kontakade polisen i måndags. Under gårdagen hade polisen inte gjort några fynd som fört de närmare det försvunna paret. I sökandet har man bland annat använt sig av drönare, värmekameror och hundpatruller. Utreder människorov – inga konkreta misstankar Polisen har inlett en förundersökning om människorov, men det finns inga konkreta misstankar. – Det handlar om att vi ska kunna ta till åtgärder som kan leda framåt i sökandet, säger polisens presstalesperson Olle Älveroth till TV4 Nyheterna.

Paret i svampskogen saknas fortfarande

Paret i svampskogen saknas fortfarande

Paret har inte setts till sedan i fredags då de gav sig ut på en skogsutflykt. – Vad jag har förstått är paret vana svampplockare och trots en ålder på 80 år har de haft möjlighet att röra sig ganska långt vilket gör att vårt sökområde blir väldigt stort, säger polisens presstalesperson. Under gårdagen spärrade polisen av hela sökområdet och involverade hemvärnet i den omfattande sökinsatsen, som ska återupptas under onsdagsförmiddagen. – Vi har haft en lägre sökinsats under natten på grund av mörker, men på förmiddagen i dag kommer sökpådraget återigen att fortsätta och öka i takt. Både polis, hundförare, drönare och Missing people kommer delta i sökandet, säger Angelica Israelsson Silfver. Polisen tror fortfarande att det finns en chans att Margareta och Per Inge är vid liv. – Men det beror lite på vad som har hänt och hur deras förhållanden har sett ut de här dygnen.

Fortfarande inga spår efter det försvunna paret i svampskogen

Fortfarande inga spår efter det försvunna paret i svampskogen

I fem dagar har nu mannen och kvinnan, hemmahörande i Mjölby, varit borta efter att de försvann på en skogsutflykt nordost om Boxholm. – De ska ha känt till området och varit ute och plockat svamp där tidigare, säger Mats Pettersson, presstalesperson på polisen. Hemvärnets soldater stödjer polisen Under tisdagen har polisen inga nya uppgifter om var kvinnan eller mannen är någonstans. Stora resurser har kopplats in i sökandet, där hela området nu är helt avspärrat. Polisen använder sig av drönare och har kopplat in hundförare och hemvärnet. Även Missing people är engagerade. – Vi har jobbat med att scanna av närområdet och har nu utökat det här området och delat in det i sektioner för att kunna jobba på ett systematiskt sätt, säger Martina Gradian, presstalesperson på Region Öst till TV4 Nyheterna. ”Inget fynd” Minst trettio poliser letar nu aktivt efter paret i skogen med både ficklampor och drönare med värmekameror. Men vid midnatt kommer patrullerna att minska något – för att återupptas med full styrka under onsdagsmorgonen igen. – Vi behöver låta patrullerna vila och planera för en långsiktig insats, säger Martina Gradian och tillägger att det finns en risk med att patrullerna jobbar i mörkret: – Det är klart det blir svårare att leta på natten. Det är därför vi avvecklar en del patruller för vi måste bedöma den fara vi kan utsatta patrullerna jämfört med den nytta vi gör, säger Martina Gradian. Hur stora är chanserna att hitta dem vid liv? – Det kan jag inte spekulera i. Vi har inte hittat något fynd som fört oss närmare paret, men våra förhoppningar är att hitta dem så välbehållna som möjligt, säger Martina Gradian.

People på YouTube

Libianca - People (Official Video)

Listen to "People" on streaming platforms : https://libianca.lnk.to/PeopleDC Connect with me: Instagram: ...

LibiancaVEVO på YouTube

Libianca - People (Lyrics)

Follow the official 7clouds playlist on Spotify : http://spoti.fi/2SJsUcZ ​ Libianca - People (Lyrics) ⏬ Download / Stream: ...

7clouds Rock på YouTube

The ‘New Girl’ Guys Reunite For the First Time Since the Show Ended | PEOPLE

The four male leads of 'New Girl' reunite on camera for the first time since the series finale of the hit show. Jake Johnson, Lamorne ...

People på YouTube

Libianca - People (Official Visualiser) ft. Ayra Starr, Omah Lay

Listen to "People" Ft. Ayra Starr & Omah Lay on streaming platforms: https://libianca.lnk.to/People-RemixDC Connect with me: ...

LibiancaVEVO på YouTube

People i poddar

The Junk Food Doctor: "This Food Is Worse Than Smoking!" & "This Diet Prevents 60% Of Disease!" - Chris Van Tulleken (Ultra-Processed People Author)

What if what you were eating wasn’t really food but an industrially produced edible substance, and your diet was worse for you than smoking?In this new episode Steven sits down with doctor and New York Times bestselling author, Chris van Tulleken.Dr. Chris van Tulleken is an infectious diseases doctor and one of the BBC’s leading science presenters, appearing on shows such as, ‘The Doctor Who Gave Up Drugs’, ‘Trust Me, I’m A Doctor’ and ‘Operation Ouch!’. He is the author of the Sunday Times bestselling book, ‘Ultra-Processed People’.In this conversation Dr. Chris and Steven discuss topics, such as: What is ‘Ultra-Processed Food’ Why 80% of the average diet is not real food The ways that ultra-processed food can impact your health How there is a pandemic of junk food Dr Chris’s experiment of living of ultra-processed food The ways that junk food is causing a public health emergency The ways that your diet can be deadlier than smoking The lies we’ve been told about 'health' food Why ‘health’ food isn’t actually healthy The ways that food guidelines are actually nonsense How half the world’s population is predicted to become obese in 12 years time Why exercise can't burn off fat fast enough How we are tackling obesity in the wrong way The impact of a Ultra-Processed diet on intelligence How you can inherit obesity The ways that food companies have made their food addictive How food companies are like the mafia Ways that food companies target us with ultra-processed food How ultra-processed food can be more addictive that nicotine How the average diet is making people not just fatter but shorter Why we need to start a food revolution You can purchase Chris’ most recent book, ‘Ultra-Processed People: Why Do We All Eat Stuff That Isn’t Food … and Why Can’t We Stop?’, here: https://amzn.to/3sikpaZFollow Chris:Instagram: https://bit.ly/491nqwzTwitter: https://bit.ly/46RyafcWatch the episodes on Youtube -https://g2ul0.app.link/3kxINCANKsbMy new book! 'The 33 Laws Of Business & Life' is out now:https://smarturl.it/DOACbookFollow me:Instagram:http://bit.ly/3nIkGAZTwitter:http://bit.ly/3ztHuHmLinkedin:https://bit.ly/41Fl95QTelegram:http://bit.ly/3nJYxST Learn more about your ad choices. Visit podcastchoices.com/adchoices

Introducing... People Who Knew Me

Coming 23rd May 2023...Emily Morris uses 9/11 to fake her own death and run away to start a new life in California as Connie Prynne. Fourteen years later, now with a teenage daughter by her side, Connie is diagnosed with breast cancer. She will be forced to confront her past so that her daughter will not be left on her own if she does not survive. She must decide how to explain her lies, her secrets, her selfish decisions – and ultimately her ‘widowed’ husband. Everything she thought she had fled from when she pretended to die in New York.Starring Rosamund Pike and Hugh Laurie, Kyle Soller, Isabella Sermon and Alfred Enoch. The first audio drama from the makers of Bad Sisters, People Who Knew Me is a 10-part series, written and directed by Daniella Isaacs, adapted from the book by Kim Hooper.Written and Directed by Daniella Isaacs Adapted from the original novel and Consulting Produced by Kim Hooper Produced by Joshua BuckinghamExecutive Producers for Merman: Sharon Horgan, Faye Dorn, Clelia Mountford, Kira Carstensen, Seicha Turnbull and Brenna Rae Eckerson Executive Producer for eOne: Jacqueline Sacerio, Co-Executive Producer: Carey Burch NelsonCommissioning Editor: Dylan Haskins Assistant Commissioner for the BBC: Lorraine Okuefuna Additional Commissioning support for the BBC Natasha Johansson and Harry RobinsonProduction Executive: Gareth Coulam Evans Production Manager: Sarah Lawson Casting Director: Lauren Evans Audio Production & Post-Production by SoundNode Supervising Dialogue Recordist & Editor: Daniel Jaramillo Supervising Sound Editor, Sound Design & Mix: Martin Schulz Music composed by Max Perryment Additional Dialogue Recording: David Crane, Martin Jilek Assistant Dialogue Recordists: Jack Cook, Giancarlo Granata Additional Dialogue Editing: Marco Toca Head of Production: Rebecca Kerley Production Accountant: Lianna Meering Finance Director: Jackie Sidey Legal and Business Affairs: Mark Rogers at Media Wizards Dialect Coach for Rosamund Pike: Carla Meyer Read in: Hannah Moorish Stills Photographer: May Robson Artwork: Mirjami Qin Artwork Photographer: Sibel AmetiAdditional thanks to: Emily Peska, Caitlin Stegemoller, Sam Woolf, Charly Clive, Ellie White, Ellen Robertson, Kate Phillips, Ed Davis, Ciarán Owens, Jonathan Schey, Daniel Raggett, Jason Phipps and Charlotte RitchieA Merman / Mermade production for BBC Radio 5 Live & BBC Sounds

11. Bonus

In this bonus episode of People Who Knew Me, Writer and Director Daniella Isaacs revisits the series and its existential themes with cast members Rosamund Pike, Kyle Soller and Isabella Sermon. They discuss what captivated them about the story of Emily faking her own death in 9/11, their own experience with truth and lies, and how this fuelled their performance.Credits Connie / Emily - ROSAMUND PIKE Drew - KYLE SOLLER Claire - ISABELLA SERMON Hosted by Daniella IsaacsSeries adapted from the original novel and Consulting Produced by Kim Hooper Produced by Joshua Buckingham Executive Produced by Faye Dorn, Clelia Mountford, Sharon Horgan, Kira Carstensen, Seicha Turnbull and Brenna Rae Eckerson Executive Producer for eOne Jacqueline Sacerio Co-Executive Producer - Carey Nelson Burch Leo Executive Producer for the BBC Dylan Haskins Assistant Commisioner for the BBC Lorraine Okuefuna Additional Commissioning support – Natasha Johansson and Harry Robinson Assistant Producer Louise Graham Casting Director Lauren Evans Bonus episode Audio Recording & Post-Production by Soundcatchers Bonus Episode Sound Recordist Paul Cameron Bonus Episode Sound Editor & Mix Oliver Beard Music composed by Max Perryment Head of Production Rebecca Kerley Production Accountant Lianna Meering Finance Director Jackie Sidey Legal and Business Affairs Georges Villeneau and Susan Cooke at Media WizardsAdditional thanks to: Emily Peska, Caitlin Stegemoller, Sam Woolf, Charly Clive, Ellie White, Ellen Robertson, Kate Phillips, Ed Davis, Ciaràn Owens, Jonathan Schey and Charlotte Ritchie.