Tuesday, April 29, 2008

Politics may be a touchy subject but...

Barack Obama has a massive database of over 2 million people's personal information. Yahoo! News reported that Obama has built up a database of personal information collected from his supporters through MySpace, Facebook, and his campaign website...Even if his run at the White House fails, he can sell this list to the highest bidder, whether it be to another canidate or any special interest group he chooses.

The information he holds includes: addresses, phone numbers, names of friends, and views of certain issues. After persuading about 800,000 people to enter information on his campaign website, it is estimated that it is now worth nearly $200 million...which could eventually be sold for a profit. According to the article, this information is more accurate than past years because his supporters are voluntarily giving it up. Obama has found most of his information by social networking, where he is lightyears ahead when compared to both Clinton and McCain.

People probably do not stop and think that when they enter the information on Obama's website that it could potentially be used long after the elections are over. Anything a person does on the internet can never be deleted. Somewhere in cyberspace those photos, or that blog post, will live on forever. In this case, it doesn't fall into the blackhole of the internet, but instead is closely monitored by whoever owns the information....talk about a privacy risk!!!!!!!!!!!!!

Another reason why you should remain anonymous while using the internet...

Monday, April 21, 2008

Private Proxy Introduces Automatic Connection to Private Domain Names

Tampa, Florida (April 21, 2008) - PrivacyView Software, LLC the developer of award-winning Internet and computer privacy software, announced today that the latest release of its anonymous proxy server, Private Proxy, automatically connects to private domains.

This recent update allows Private Proxy users to avoid being blocked by outside parties, such as restrictive governments found in Asia or the Middle East. Private Proxy automatically connects to private domain names that are not blocked enabling secure anonymous surfing on the Internet.

Many restrictive governments have banned websites that their citizens wish to visit such as news websites from the NY Times and CNN, reference sites like Wikipedia and popular social media sites such as MySpace and Facebook. With the increase in censorship, people need safe and secure access to the Internet in order to protect their privacy and freedom. Private Proxy allows users to choose an anonymous proxy server where their Internet browsing can not be monitored or blocked. Learn more about censorship issues.

The software comes with a 7 day free trial allowing users to decide if they want to keep the service without having to spend any money. Along with the 7 day free trial, PrivacyView offers two options for its users: they can subscribe to a monthly service for $9.95 or choose a quarterly option for only $24.95.

About PrivacyView Software:

PrivacyView Software, LLC is a privately held company headquartered in Tampa, Florida. Founded in 2003, the company creates and markets privacy software for consumers. The company and its products have won numerous technology awards. For more information about PrivacyView, its awards and its affiliate program, please visit http://www.privacyview.com/.

Thursday, April 17, 2008

Paper or plastic....or theft?

While doing some research, I came across this article from the Privacy Rights Clearinghouse and needed to share it. With the emphasis placed on Internet privacy and protection, it is also important to remember to protect yourself from privacy threats in your everyday life.

This article discusses the uses of credit card vs debit card (and also touches on other areas like store cards, and gift cards, etc). Basically...don't use or have a debit or checking card. The article gives greater details as to why you should use credit over debit. Some of the main points include:
  • Debit cards do not offer the same quality of protection against fraudulent use that credit cards do. Debit card fraud must be reported within 2 days, and even then banks can wait up to 2 weeks before refunding your stolen money--which means missed bills and possibly an overdrawn account.
  • Credit cards allow you to stop payment or dispute a charge, while debit cards are drawn directly from your checking account and the transaction is relatively quick.
  • Debit cards may or may not require the user to know a PIN code, they can use a signature instead. This is important for two reasons:
    1. Someone who steals or find a lost debit card can use it at will without having to know the PIN.
    2. When signing for an item instead of entering a PIN, it takes the same processing route as a credit card, meaning your transaction will not show up right away in your account.
As far as making online purchases, those should all be done with a credit card, basically for the same reasons listed above. Sites can be hacked, or set up entirely with malicious intent to steal information from the user. Again, it is easier to deal with fraudulent use of a credit card opposed to a debit card. The article references using an ATM only card to access your checking account, which is different than a debit card because you can not use it at retail outlets and must always enter your PIN.

The article also includes the following "Tips for Limiting Your Loss:"
  1. Protect your cards, account numbers, and PINs. Keep your cards safe and be sure to sign the back of the card as soon it arrives. Take home your receipts (which may have your account numbers printed on them) and shred them instead of leaving them in the store’s trash. Memorize your PIN; don’t write it on your card or write it on a note in your purse or wallet. And always position your body so that no one can see the keypad at the ATM or checkout counter when you punch in your number.

  2. Timely reporting is a must. To limit your credit card loss to $50, you must report unauthorized charges within 60 days. For debit, ATM and other electronic transfers, you only have two days to minimize your loss.

  3. Monitor your credit card charges and bank accounts frequently. Online access is an easy way to monitor even daily activity.

  4. For online purchases use credit cards rather than providing your debit card, especially when dealing with an unfamiliar site.

  5. Checks should be written only to those you know and trust. Remember, your check includes your bank routing number and account number. This is all a thief may need to access your bank account.

  6. Suspect payments, especially money orders, you receive from an unknown source. For tips on how to spot a phony money order, see the US Postal Service, September 2005, fraud alert: www.usps.com/postalinspectors/fakemo.htm.

  7. Caution is advised when depositing money orders, checks, cashier’s checks or other payments you receive from an unknown source. Deposits you make may not have cleared, even if your bank balance shows the funds have been added.

  8. Beware of suspicious-looking ATMs and checkout-lane card readers. Unbranded ATM machines in convenience stores and the like can be scams. Also, some recent high-profile thefts have involved the practice of “skimming,” in which account data from cards’ magnetic stripes were secretly copied from checkout-lane card readers and later used to create counterfeit cards.
Privacy threats can come from any source so being vigilant of what is going on with your accounts is important. Using proxy servers and other tools while using the Internet doesn't mean you are protected from other sources of fraud and criminal activity.

Tuesday, April 15, 2008

Being smart when surfing the internet...

An article by the Malaysian Star Online recently released an article about protecting yourself while using the internet. The main focus was placed on phishing, trolling, and web bugs. According to the article:

"Phishing refers to Internet scams whereby e-mails are sent purportedly from banks or other companies, asking users for sensitive personal information, which are then used in identity thefts."

"Trolling is when someone uses specific phrases in a chat group to “bait” and target people who respond in a certain way."

"Web bugs are tiny image files that contain programmes that install themselves undetected on your computer and transfer information back to the source."

They also go on to discuss other things such as cyber-stalking. The article discusses how women are at a higher risk for facing these threats, which is discussed in greater detail throughout the rest of the article.

Of course these threats, and many more, affect anyone who uses the internet. Cyber criminals are smarter and more technologically advanced than ever, and are using that to their advantage. About 15 million people are affected by some form of identity theft every year. Those numbers increase every year, most likely because people do not pay attention to the threats facing them while using the internet. Using Norton, or whatever anti-virus program, isn't enough. Anti-virus programs only protect a fraction of the threats. Proxy servers and other tools are very useful to protect yourself while online.

Some basic tips include:

Protecting your password

Keeping up-to-date records of your accounts/bills

Check your credit report regularly

Do not use debit cards to make online purchases, use credit cards instead.

Do not post or give out prvate information to a website without researching it first (i.e. reading the privacy policy, etc)

Use elaborate, complex passwords.

Come to PrivacyView's Support/FAQ section for more information on general internet knowledge and ways to protect yourself.

Friday, April 11, 2008

China plans to reopen Tibet....or do they?

The Sydney Morning Herald reported that the plan to reopen Tibet...well who knows. Chinese authorities will not release any information regarding the reopening of Tibet's borders to foreigners. Originally, the date to reopen was set to be May 1st, but now it is uncertain when this will happen. Certain "reliable reports," according to the article, state that Tibet won't reopen until the start of this year's Olympic games.

This isn't really something that seems unexpected. With all the things that have been going on in Tibet, this is just the icing on the cake. China's Great Firewall limited all news access about Tibet. Chinese citizens could not search for news updates about the current situation since Google, Wikipedia, and YouTube are all blocked by the Chinese censors. Surfing through a proxy server was the only hope Chinese citizens had to find information, that is until the Chinese government shut down all forms of media in Tibet and made all foreigners leave the area.

I know the use of proxy servers and other internet privacy tools must be on the rise in certain parts of the world. Chinese citizens are not allowed to view websites that are outside China's borders, severely limiting the news and information flow through the country. Bloggers and media face severe penalties if they post things that the Chinese government finds offense or does not approve of. The need for anonymity becomes more important every day. I know I will be using a proxy server...I do not do anything illegal therefore I shouldn't be tracked when using the internet, and the same should especially go for the Chinese citizens who can't even look up information on Wikipedia or use Google.

While I am glad I have certain freedoms that others do not, who knows how extreme censorship can become...therefore I will continue using my proxy server to stay anonymous.

Quick update on Wednesday's post....

Reports from the UK tell that the Information Commissioner has ruled that users/customers must consent and request to "opt-in" to Phorm's advertising system. ISPs must have consent from their users to send targeted advertisements. The ICO decision was happily accepted by many people, including Which Technology editor Matthew Bath. Mr. Bath went on to state, "Broadband customers would have been kept in the dark that their web browsing behaviour was being collected and sold to advertisers. This means consumers will now be fully aware of what the system does before any data is collected."

Wednesday, April 9, 2008

Privacy threats....heading to a search engine near you.

EUObserver.com reported that the "European Commission's data protection watchdog" prepared a draft stating search engines should not hold onto information longer than six months. Currently, some search engines hold onto data for up to 2 years (18 months for the big boys--Yahoo! and Google), which is a big no-no in regards to privacy.

The board stated in their draft that, "Search engine providers must delete or irreversibly anonymise personal data once they no longer serve the specified and legitimate purpose they were collected for." Also, the board added that the user must consent to search engines collecting and storing personal data.

The data collected by the search engines is done through the computer's IP address (which is basicially your identification while using the internet) and by placing cookies. A proxy server sounds like a good idea right about now...

The article also goes on to mention the AOL fiasco from 2006....a brief rundown of it: AOL put 650,000 users search information on the internet. It has already happened once in recent times, how much bigger could it be next time when Yahoo! or Google (the titans of search engines) accidently post information about everyone that uses the search engine? I think it will be worse...that's just my 2 cents.

Saturday, April 5, 2008

"We spied on 36,000 customers..."

I thought that would get some attention. No posts for a while, but here is a good one (good articles, not so good news).

Articles found here and here.

BT, a British broadband provider, recently came out and wanted to let everyone know that they spied on 36,000 customers...without the customers knowledge of course. Basically, BT monitored every page visited to help tailor advertisements to them. Good or bad? BAAAAAAAAAAAAAAAAAD! To cover up, BT originally told customers that a software virus was the culprit; then decided to tell the 36,000 users that they were used as a "small-scale technical trial." To put people at ease the executives assured that no personally identifiable information was recorded.

The monitoring system was created by Phorm and would scan and record information, such as keywords, from a website and add the information to a file about the person based on anonymous code numbers (maybe by IP addresses?) so that online ads could be better tailored to them. Phorm claims that this is a benefit...Is it acceptable to get a good deal on a laptop through these ads, because your ISP monitored your information? I am not on board with that theory and think I will keep using a proxy server to mask my IP address.

And if your gonna spy, don't leave viruses behind...duh. Customers were buying brand new computers and BT would still them it was a software virus....I hope they get reimbursed.