Sunday, June 17, 2012

Microsoft Announces Change To “Do Not Track”


Internet Explorer Version 10 will soon be available and when it is, it comes with an update to the “Do Not Track” feature.  Microsoft just announced that when this new version is released, “Do Not Track” will no longer have to be manually enabled by the user; it will be a default setting.   In earlier versions, a user would have to go into their settings to enable “Do Not Track”, now, it will be done automatically.  However, even when “Do Not Track” is enabled, any advertisements on the Microsoft ad network ignore the signals.  What this means to users is that they won’t be tracked by ads on networks OTHER than Microsoft.  It’s interesting that this default “Do Not Track” works to Microsoft’s advantage.

Many groups do not agree with Microsoft making “Do Not Track” a default setting.  They feel that since Microsoft was involved in the development of the “Do Not Track” principles, they should understand that this should be a user preference, not a default setting.  The advertisers who do not agree with Microsoft will probably choose to ignore any “Do Not Track” signals.

For a long time, Microsoft has been trying to compete with Google’s success in online advertising.  At one point, Microsoft even attempted to buy Yahoo in order to boost their success.  Now that “Do Not Track” will become a default setting, there are some in the online advertising industry who claim that this is yet another ploy by Microsoft to damage Google’s status.

The World Wide Web Consortium’s Tracking Protection Group was one that was stunned by Microsoft’s decision.  “Do Not Track” policies are being formed by the Tracking Protection Group.   However, according to Aleecia M. McDonald, Co-Chair of the TPG, they had no idea what Microsoft was planning until the announcement was made.  

Not only is Ms. McDonald the Co-Chair of the TPG, she is also working for Mozilla, part-time, as a privacy researcher.  She feels that the Microsoft announcement is forcing an immediate action on the “Do Not Track” issue.  Mozilla’s Privacy and Public Lead Person, Alex Fowler, is yet another person who rejects Microsoft’s plan.  In his rejection, he references the World Wide Web Consortium’s report that states that in order for “Do Not Track” to work effectively, it must be based on user preference.  In a blog, Mr. Fowler stated:  “If DNT is on by default, it’s not a conversation.  For DNT to be effective, it must actually represent the user’s voice.”   By making “Do Not Track” a default setting, the user would lose control.

However, the concept of “Do Not Track” as a default setting was not rejected by all.  There are some lawmakers and policy-makers who agree that this is a good idea.

Sunday, June 10, 2012

Cookies? What are They? Can I Avoid Them?

 We’ve all heard about “cookies”, but not everyone knows what they are.  Sometimes, they’re called “HTTP cookies”, “browser cookies” or “web cookies”.  Sometimes, they’re just “cookies”.  It doesn’t matter what name you call them; cookies are what websites use to store and identify actions performed by people on their browsers.  Each time a person uses their computer to read a news article, log into a website, shop online, or even if that person simply clicks the “Like” button on Facebook, that person’s information is stored on those sites for an indefinite amount of time.  This is why, when you log into your favorite sites, you no longer have to input your personal information.  The visits are “remembered” by the browser, so your “username”, and even your password, automatically pop up.  You can delete these cookies, but sometimes, even deleting them won’t ensure your safety on the internet.

Websites using “tracking cookies” and “third-party tracking cookies” caused significant privacy concerns, prompting lawmakers in the US and Europe to take a stand against the use of cookies.  Cookies do not carry “viruses”, nor do they install malicious software (or malware) on computers, but they DO store the browsing and purchasing histories of internet users for many, many years.  According to privacy advocates, this is not acceptable.

There are many different kinds of cookies.  They all perform particular tasks, but they all center on storing sensitive information.  Examples of cookies are as follows:

  • Session Cookies stay on the computer only as long as the user is on a certain website.  Normally, the browser deletes these cookies as soon as the session is finished.
  • Third-Party Cookies are used by advertisers to gather information in order to build a detailed profile on a specific user.  For example:  if a user signs into a site that was targeted by an advertisement, then signs into another site which has the same targeted advertisement, both visits are tracked by the advertiser. 
  • Authentication Cookies are said to be the most important kind of cookie.  These cookies are used by servers to identify if a user is logged on.  These cookies can also identify which specific account the computer is logged onto.  With this device, the website recognizes if it is safe to transmit personal information.  If the user cannot be identified by the cookie, a “You Must Log In” message is shown.  If a website or browser does not have a high security level, it’s possible that the user’s information could be captured by hackers.  In other words, authentication cookies are only as safe as the user’s browser and website being logged into. 

Friday, April 27, 2012

Bullying VS Cyberbullying

Cyberbullying should not be equated to bullying. In the past, the schoolyards or the streets were the most common venues of bullying. It was there that they become either victims or act as bullies, depending on some characteristics.

Today, cyberbullying is becoming more common among them. What this means is that the venues are not just the schoolyards or the streets, but cyberspace as well!

What raises some privacy concerns are the results of researches conducted on “real life” bullying and cyberbullying among the youth. It started when it was observed that some schools were under the assumption that existing anti-bullying programs can also deal with cyberbullying. Contrary to this, students aged 10 to 18 that were involved in the research do not share that same belief. They say that aggressions that happen online cannot be dealt with by existing anti-bullying rules.

Studies on bullying in schools showed three characteristics. These characteristics are: power differential between the bully and the victim, a planned targeting of a victim, and ongoing aggression. These characteristics are not necessarily involved in cyberbullying. In fact, some of the findings suggest that these kids play multiple roles in cyberbullying. They can be the bullies, the victims, or the witnesses. At any time, a teenager can take the role of any one or two of these online.  In school, the above three characteristics will give an individual his or her enduring role in the bullying circle.

Another disturbing finding is that 95% of the kids asked about this issue say that cyberbullying, since only done online, is just a joke. They do not realize the level of harm that is associated with these actions. Cyberbullying can be damaging to the victim’s mental health and developmental well-being. If the victim is a student, his or her academic achievements can be negatively affected. The worst case scenario can be a suicide attempt, which can end up in an unjustifiable death. It is high time that specific laws on cyberbullying should be crafted and implemented.

Image: Grant Cochrane / FreeDigitalPhotos.net

Monday, April 23, 2012

Tighter Online Privacy Rules - A Must

There are high expectations that consumers will enjoy the benefits of tighter online privacy rules by the end of 2012. Many companies have signified their willingness to adopt the final recommendations set forth as best practices in privacy protection. By backing tighter online privacy laws, the Federal Trade Commission (FTC) is confident that consumers’ data will not be abused. It is anticipated that consumers will be able to benefit from new services without sacrificing their privacy.

For a start, companies are already working to include privacy protection into every project that they have. Attention is being given on how people’s data is kept safe and in controlling how much information is collected. Consumers are being put in control by giving them the option to decide what information about them is to be shared. This can be achieved if there is a “Do Not Track” system that can be used by consumers in order to control the tracking of their activities.

How can tighter online privacy rules help internet consumers? The beginning of all these privacy issues is due to the large number of privacy violations. Consumers are not aware that their online activities are being tracked. They also do not know what happens after their personal data is collected. It is either used directly, or sold to other companies. Most important of all, they do not know that there are ways of protecting their privacy.

This is why U.S. regulators are insisting that an easy-to-use tool that really works for consumer protection is put in place on internet companies. Some companies responded positively and promised to cooperate. The rest are still holding on to their belief that too much control will kill innovation and eventually, the business. There is a possibility that a favorable, final agreement will be reached among internet companies.

The government wants the data miners to give more respect to consumer privacy. Innovation should not only continue, but should also be encouraged because it promotes creativity and boosts the economy. However, it is not right to compromise privacy rights just because consumers do not have the tools to protect themselves. It must be remembered that tighter online privacy rules are meant to protect both consumers and internet businesses.
Image: digitalart / FreeDigitalPhotos.net

Thursday, April 19, 2012

US IP Address - How To Get One

When living outside of the United States there are a couple of reasons why you should use an anonymous proxy to surf the Internet.

1. If you need to access US-based websites, they might be blocked because of your IP address.
2. If the country you are in censors the Internet, by using a private proxy you can bypass their filters and gain unrestricted access to any website.

Here's an example of using anonymous proxy from China.


If you need to change your IP address to be a US IP address, Sign up for a free trial of Private Proxy at www.privateproxysoftware.com.

Friday, April 13, 2012

Does Online Advertising Hurt Privacy?


Revenues of internet companies are derived mainly from advertisements. It is a well-known fact that without advertisements, a company could never thrive on its own. Online advertising is a billion-dollar industry that keeps the internet going. This powerful marketing tool gives an estimated 96 percent of Google’s and 85 percent of Facebook’s revenues.

Because of privacy issues, the government is keeping a close eye on advertising companies these days. Online advertisers are under observation because the government wants to give internet users better control over their personal information. This business now runs under self-regulation, and this is the strategy that most companies support. By this, each advertising company would sustain its own parameters as to the collection and use of personal data uploaded by consumers.

Last year’s discovery that two of the largest companies were engaged in deceptive privacy practices have received unfavorable reactions. Still, the issue is about the unauthorized collection and trade of user information to advertisers. This has in some way badly harmed the argument for self-regulation.

According to internet companies, heavy regulation does not promote innovation and stifles the growth of the internet. The so called “privacy bill of rights” and the “do not track” system debates are now ongoing, and have aggravated the situation. The bill is the government’s framework to define how consumers can defend their personal information. The do not track system is the industry’s suggestion to give users the option of whether or not their personal information can be collected.

With the blunders that were experienced in the past, online advertisers should by this time have learned a valuable lesson. The policy on self regulation can continue if the companies can act accordingly. It does not really matter if sooner or later the privacy bill of rights will be approved and implemented. Still, they have to consider the privacy of internet users. On their own, they have to take measures in order to address the lack of control over the collection and trading of data to advertisers. Because users’ online activities and real-life identities are revealed, such actions expose internet users to dangers.

Image: digitalart / FreeDigitalPhotos.net

Monday, April 9, 2012

Mobile Apps and Privacy Concerns


Are you aware that more new privacy concerns are raised as more mobile apps are available on the market? It seems very effortless for many smartphone users to click on any application and download it without any concern. However, they do not pay attention to the app’s terms and conditions; they simply accept all of what the fine print contains. The thing is that they do not know about the privacy implications that go along with the products that they “buy”.

Mostly written by lawyers, service terms and security policies make little or no sense at all to the lay person. Many may have tried to read that fine print but end up abandoning the idea because of the lengthy litanies of legal terms. The explanation for this is simple - because they are too extreme for the lay man to understand. Eventually, more privacy concerns emerge as more users ignore the importance of understanding those terms and conditions.

Reading and understanding the terms and conditions, however, do not guarantee privacy. A user has to agree on giving up some of his or her personal information in exchange for the product. The bottom line would be how much information the user is willing to give up. The user’s willingness would also depend on how open the data mining company is about how the data will be used. Sad to say, there are users who care less about privacy just to have the benefits and convenience of an application.

The number of mobile apps is growing fast, reaching beyond the almost 600,000 sold by Apple alone. Think about the privacy implications generated by each of these apps. There have been bad reports in the past about personal data being downloaded by gaming apps without the user’s knowledge. Users get to know about this when they are being haunted by targeted ads and other aggravating tricks.

Because of their usefulness, popularity and attractiveness, it would be impractical to stop the flood of new apps. Users are expected to be interested in, be curious about and eventually use them. Except for the very few, most users would dive into the sea of apps without any hint of the repercussions. However, the availability of these products adds to the force that pushes users to download them.

Those less informed users are now trying to be reached by several privacy groups. They are being educated on how they could preserve their privacy. One of the efforts that the groups are undertaking is how to make users aware of the information that they share. They are trying to find easier ways for users to know what information is being gathered about them. At present, less than 50% of the apps have their privacy policies posted, which makes the job difficult to do. Nonetheless, the issue of privacy concerns raised by mobile apps needs to be resolved quickly.

Image: Idea go / FreeDigitalPhotos.net