Tuesday, April 29, 2008
Politics may be a touchy subject but...
The information he holds includes: addresses, phone numbers, names of friends, and views of certain issues. After persuading about 800,000 people to enter information on his campaign website, it is estimated that it is now worth nearly $200 million...which could eventually be sold for a profit. According to the article, this information is more accurate than past years because his supporters are voluntarily giving it up. Obama has found most of his information by social networking, where he is lightyears ahead when compared to both Clinton and McCain.
People probably do not stop and think that when they enter the information on Obama's website that it could potentially be used long after the elections are over. Anything a person does on the internet can never be deleted. Somewhere in cyberspace those photos, or that blog post, will live on forever. In this case, it doesn't fall into the blackhole of the internet, but instead is closely monitored by whoever owns the information....talk about a privacy risk!!!!!!!!!!!!!
Another reason why you should remain anonymous while using the internet...
Monday, April 21, 2008
Private Proxy Introduces Automatic Connection to Private Domain Names
This recent update allows Private Proxy users to avoid being blocked by outside parties, such as restrictive governments found in Asia or the
The software comes with a 7 day free trial allowing users to decide if they want to keep the service without having to spend any money. Along with the 7 day free trial, PrivacyView offers two options for its users: they can subscribe to a monthly service for $9.95 or choose a quarterly option for only $24.95.
PrivacyView Software, LLC is a privately held company headquartered in
Thursday, April 17, 2008
Paper or plastic....or theft?
This article discusses the uses of credit card vs debit card (and also touches on other areas like store cards, and gift cards, etc). Basically...don't use or have a debit or checking card. The article gives greater details as to why you should use credit over debit. Some of the main points include:
- Debit cards do not offer the same quality of protection against fraudulent use that credit cards do. Debit card fraud must be reported within 2 days, and even then banks can wait up to 2 weeks before refunding your stolen money--which means missed bills and possibly an overdrawn account.
- Credit cards allow you to stop payment or dispute a charge, while debit cards are drawn directly from your checking account and the transaction is relatively quick.
- Debit cards may or may not require the user to know a PIN code, they can use a signature instead. This is important for two reasons:
- Someone who steals or find a lost debit card can use it at will without having to know the PIN.
- When signing for an item instead of entering a PIN, it takes the same processing route as a credit card, meaning your transaction will not show up right away in your account.
The article also includes the following "Tips for Limiting Your Loss:"
- Protect your cards, account numbers, and PINs. Keep your cards safe and be sure to sign the back of the card as soon it arrives. Take home your receipts (which may have your account numbers printed on them) and shred them instead of leaving them in the store’s trash. Memorize your PIN; don’t write it on your card or write it on a note in your purse or wallet. And always position your body so that no one can see the keypad at the ATM or checkout counter when you punch in your number.
- Timely reporting is a must. To limit your credit card loss to $50, you must report unauthorized charges within 60 days. For debit, ATM and other electronic transfers, you only have two days to minimize your loss.
- Monitor your credit card charges and bank accounts frequently. Online access is an easy way to monitor even daily activity.
- For online purchases use credit cards rather than providing your debit card, especially when dealing with an unfamiliar site.
- Checks should be written only to those you know and trust. Remember, your check includes your bank routing number and account number. This is all a thief may need to access your bank account.
- Suspect payments, especially money orders, you receive from an unknown source. For tips on how to spot a phony money order, see the US Postal Service, September 2005, fraud alert: www.usps.com/postalinspectors/fakemo.htm.
- Caution is advised when depositing money orders, checks, cashier’s checks or other payments you receive from an unknown source. Deposits you make may not have cleared, even if your bank balance shows the funds have been added.
- Beware of suspicious-looking ATMs and checkout-lane card readers. Unbranded ATM machines in convenience stores and the like can be scams. Also, some recent high-profile thefts have involved the practice of “skimming,” in which account data from cards’ magnetic stripes were secretly copied from checkout-lane card readers and later used to create counterfeit cards.
Tuesday, April 15, 2008
Being smart when surfing the internet...
"Phishing refers to Internet scams whereby e-mails are sent purportedly from banks or other companies, asking users for sensitive personal information, which are then used in identity thefts."
"Trolling is when someone uses specific phrases in a chat group to “bait” and target people who respond in a certain way."
"Web bugs are tiny image files that contain programmes that install themselves undetected on your computer and transfer information back to the source."
They also go on to discuss other things such as cyber-stalking. The article discusses how women are at a higher risk for facing these threats, which is discussed in greater detail throughout the rest of the article.
Of course these threats, and many more, affect anyone who uses the internet. Cyber criminals are smarter and more technologically advanced than ever, and are using that to their advantage. About 15 million people are affected by some form of identity theft every year. Those numbers increase every year, most likely because people do not pay attention to the threats facing them while using the internet. Using Norton, or whatever anti-virus program, isn't enough. Anti-virus programs only protect a fraction of the threats. Proxy servers and other tools are very useful to protect yourself while online.Some basic tips include:
Protecting your password
Keeping up-to-date records of your accounts/bills
Check your credit report regularly
Do not use debit cards to make online purchases, use credit cards instead.
Do not post or give out prvate information to a website without researching it first (i.e. reading the privacy policy, etc)
Use elaborate, complex passwords.
Come to PrivacyView's Support/FAQ section for more information on general internet knowledge and ways to protect yourself.
Friday, April 11, 2008
China plans to reopen Tibet....or do they?
This isn't really something that seems unexpected. With all the things that have been going on in Tibet, this is just the icing on the cake. China's Great Firewall limited all news access about Tibet. Chinese citizens could not search for news updates about the current situation since Google, Wikipedia, and YouTube are all blocked by the Chinese censors. Surfing through a proxy server was the only hope Chinese citizens had to find information, that is until the Chinese government shut down all forms of media in Tibet and made all foreigners leave the area.
I know the use of proxy servers and other internet privacy tools must be on the rise in certain parts of the world. Chinese citizens are not allowed to view websites that are outside China's borders, severely limiting the news and information flow through the country. Bloggers and media face severe penalties if they post things that the Chinese government finds offense or does not approve of. The need for anonymity becomes more important every day. I know I will be using a proxy server...I do not do anything illegal therefore I shouldn't be tracked when using the internet, and the same should especially go for the Chinese citizens who can't even look up information on Wikipedia or use Google.
While I am glad I have certain freedoms that others do not, who knows how extreme censorship can become...therefore I will continue using my proxy server to stay anonymous.
Quick update on Wednesday's post....
Wednesday, April 9, 2008
Privacy threats....heading to a search engine near you.
The board stated in their draft that, "Search engine providers must delete or irreversibly anonymise personal data once they no longer serve the specified and legitimate purpose they were collected for." Also, the board added that the user must consent to search engines collecting and storing personal data.
The data collected by the search engines is done through the computer's IP address (which is basicially your identification while using the internet) and by placing cookies. A proxy server sounds like a good idea right about now...
The article also goes on to mention the AOL fiasco from 2006....a brief rundown of it: AOL put 650,000 users search information on the internet. It has already happened once in recent times, how much bigger could it be next time when Yahoo! or Google (the titans of search engines) accidently post information about everyone that uses the search engine? I think it will be worse...that's just my 2 cents.
Saturday, April 5, 2008
"We spied on 36,000 customers..."
Articles found here and here.
BT, a British broadband provider, recently came out and wanted to let everyone know that they spied on 36,000 customers...without the customers knowledge of course. Basically, BT monitored every page visited to help tailor advertisements to them. Good or bad? BAAAAAAAAAAAAAAAAAD! To cover up, BT originally told customers that a software virus was the culprit; then decided to tell the 36,000 users that they were used as a "small-scale technical trial." To put people at ease the executives assured that no personally identifiable information was recorded.
The monitoring system was created by Phorm and would scan and record information, such as keywords, from a website and add the information to a file about the person based on anonymous code numbers (maybe by IP addresses?) so that online ads could be better tailored to them. Phorm claims that this is a benefit...Is it acceptable to get a good deal on a laptop through these ads, because your ISP monitored your information? I am not on board with that theory and think I will keep using a proxy server to mask my IP address.
And if your gonna spy, don't leave viruses behind...duh. Customers were buying brand new computers and BT would still them it was a software virus....I hope they get reimbursed.