Showing posts with label Internet Privacy. Show all posts
Showing posts with label Internet Privacy. Show all posts

Sunday, September 7, 2014

Privacy Taken by Life-Logging Cameras

One of the founders of Memoto, Martin Kaellstroem, lost both of his parents to cancer when he was a young adult.  When this happened, he was inspired to create a camera that would spontaneously capture the user’s life as it is being lived.  This small “life-logging camera” is worn either clipped to your shirt collar, or around your neck on a string.  Every 30 seconds, a picture is taken and there is no off button.  Essentially, it captures every ½ minute of a person’s life
.
Now in his late 30s, Mr. Kaellstroem has said, “When you lose your parents, you realize that you don’t live forever.  It definitely affected me in my entrepreneurship.  I can’t wait until later to fulfill my dreams; I have to live my dream now.” He states that normally, people bring their cameras to special events to capture those around them at their best.  He stated, “You don’t know in advance which moments will be important in the future.  Perhaps you meet your future wife or witness an accident or a crime.  These are pictures you might want to return to.”  But, will everyone accept that they will be filmed whenever they are with a user of a life-logging camera?

This brings “Big Brother” and “The Truman Show” to life.  Mr. Kaellstroem doesn’t see his camera as a breach to anyone’s privacy; he sees it as a collection of memories.  Personally, I don’t see it that way.  I would not want to meet friends for lunch knowing that one of them is using a life-logging camera.  I’m a fairly private person and I wouldn’t like knowing that someone has pictures of every 30 seconds of me as I sat down with them for lunch or dinner.  It’s not that I have something to hide; it’s just that I don’t like having my picture taken.  To know that a picture would be taken every 30 seconds would not make me happy at all.

This life-logging camera looks like an iPod mini and gathers pictures automatically.  They are sorted by GPS location, time and lighting.  Anyone using this camera can share the pictures on Twitter, Facebook, or any other social media.  Oskar Kalmaru, who is co-founder of Memoto, likens the camera to a diary for those who are tech-savvy and who don’t have the patience or discipline it takes to keep a written diary.  He says, “I’ve failed several times when trying to write a blog or travelogue.  Older relatives managed to keep a diary over 20 years, but it’s hard with the routine.”

Monday, June 9, 2014

Something Else to Worry About: Web Bugs

Spammers use them all the time, but have you ever heard of web bugs?  Sure, we all know what cookies are, but what about web bugs?  Well, these are a type of spyware that allows a spammer to know when an e-mail he sent was viewed.  They are also used to confirm the validity of the e-mail address.

Advertisers are also using these web bugs to see which sites people are visiting and how often they visit.  By using this information, the advertisers are able to generate reports on Internet users so that related ads can be placed on each particular user’s browser.

Browsers can either accept or reject cookies, but web bugs are a different story.  They are usually formatted as a GIF (Graphic Interchange Format), which is commonly used on the Internet.  This is why a browser will normally accept the web bugs.  Even though it’s a GIF (which people associate with pictures), the web bug will go unnoticed in a spammer’s e-mail.  This is because the image is very small; usually no bigger than 1 X 1 pixel.  The image will also blend into whatever background it’s on; if the background is white, the web bug will be white.  As for advertisers, they are very clever, too.  They can hide a web bug in a site’s logo, so even though it is right in front of you, you will never see it.

If you’ve ever received an e-greeting card, you have encountered web bugs.  When a card is sent, the sender will be given an option to be e-mailed when the card is received and viewed.  This is a prime example of web bugs at work.

Because spammers are one of the main users of web bugs, concerns about privacy are high.  With the use of web bugs, a spammer will have access to an incredible amount of information about the recipients of his e-mails.  The web bugs will tell the spammer the IP Address of the computer receiving the web bug, it identifies the URL the web bug came from, it identifies the URL of the page it was viewed on and it can identify the exact time the web bug was viewed.  These web bugs are like tiny little stalkers, keeping track of your movements.

Privacy concerns also arise when a web bug is placed on a particular website.  The main concern is that an individual’s Internet browsing is being tracked without that individual’s knowledge or consent.  To make matters worse, this tracking isn’t going against any website’s privacy policy since the bugs are generally placed by third parties.  Third parties aren’t required to adhere to the privacy policy terms and conditions.

Whether they come from a spammer’s e-mail or a website, these web bugs are putting everyone’s privacy in jeopardy.  Personal information is being gathered, yet there’s nothing you can do to stop it.  One thing you can do to help guard against the web bugs is to turn off your browser cookies.  A safer option would be to use a proxy server.  With a proxy server, you and your activities can’t be tracked by web bugs because it’s not your IP Address that is being tracked; it’s the IP Address of the proxy server.

You can also keep your privacy secure by using the proxy servers of Privacy Partners.  They offer a FREE trial so that you may see firsthand how using a proxy server can work to your advantage.  Besides changing your IP Address, each connection is encrypted and NEVER monitored, so you can be sure that your information will be safe. 

Friday, May 30, 2014

Law Enforcement and Social Media



It’s common knowledge that most criminals aren’t the smartest people around.  Many of them are so proud of their crimes that they feel the need to tell people about them.  This has happened a lot in the past, but now, that just about everyone has at least one social media account, the criminals now have a wider audience they can brag to.  Before social media, it took a while for word to spread about how “George” burglarized 10 houses in one night.  Now, with Facebook, Twitter and Instagram, the word can go out immediately to thousands of people. 
 
While spreading the word mouth-to-mouth took a while, it also took the police to catch up with these criminals.  Social media, along with the egos of criminals, has now made arresting some of these crooks a quick, simple process.  Things go a lot quicker for the police when criminals are posting about their crimes on Facebook and Twitter, posting pictures of their “haul” on Instagram and even posting videos of the crime, as it’s happening, on YouTube. Like I said, criminals aren’t the smartest people around.
 
While criminals have long discovered that bragging about crimes they commit on social media lets people know how “bad” they are, the police are now discovering how to use Pinterest as a means to catch criminals.  In Redwood City, California, police have used Pinterest to post photos of items recovered from arrests in order to return them to their rightful owners.  Detective Dave Stahler had success using Pinterest in February when he posted a picture of a family heirloom that was recovered among other stolen jewelry.  Three users called in tips within a few hours of the post going up.

In Richmond, Virginia, police have used Pinterest to solve murder cases and a town in Pennsylvania set up a Pinterest board to post mug shots.  Arrests for theft, sexual assault and fraud have seen a 57% increase since this board was set up.  Hopefully, more towns will see the usefulness of this and begin their own mug shot boards.

Tuesday, May 13, 2014

Is Your Baby Monitor Safe?



As if new parents didn’t have enough to worry about, now they have to worry about hackers taking over their baby monitors.  In August of 2013, Marc Gilbert, a father in Texas ran to his daughter Allyson’s room when he heard a voice saying, “Wake up, you little slut”.  When he got to the room, he realized that someone hacked the baby monitor, took control of the camera and was watching his little girl.  When he went to unplug the camera, he watched as it turned to see what he was doing.  Little Allyson slept through the incident, but Mr. Gilbert made sure that he had tighter security and firewalls installed on both the monitor and his Internet.

The baby monitor used by the Gilberts was made by Foscam and connected to the Internet.  This particular monitor was known to have security issues, but since they didn’t buy the monitor directly from Foscam, they never received the company’s email regarding an available update that corrected the problem.  As of today, there are estimated to be another 40,000 monitors that can still be hacked.

Just recently, a hacker found one of those monitors in Cincinnati, Ohio.

In April 2014, Adam and Heather Schreck woke up to the sound of someone yelling, “Wake up, baby!”, coming from their 10 month old daughter’s room.  The parents rushed to the room and were horrified when they realized the voice was coming from their baby monitor!  The monitor’s camera started moving and pointed right at them while the person on the other end of the monitor continued to yell obscenities at them and the baby. 
 
This could be the same person who hacked the Gilbert’s baby monitor in Texas or it could be a copycat, but they will never know.  In order to remove the threat, the Schrecks quickly unplugged the baby monitor.  Marc Gilbert also unplugged his daughter’s monitor.  Unfortunately, by doing this, all information stored in the monitor, including the log of IP addresses that accessed it, are erased, making it impossible for the police to trace who is responsible.

Wednesday, April 23, 2014

The Importance of Parental Supervision



This article is a bit different from most of the Internet privacy articles in this blog, however, a particular news story prompted me to write this (Utah Mom’s Facebook Check May Have Saved Son From Shooting Plot).  The article appeared on The Huffington Post site on April 8, 2014.   While many parents are realizing the importance of supervising and monitoring their kids when they go on the Internet, there are still many parents who don’t see the point of this.

Obviously, one parent in Salt Lake City, Utah is thankful that she chose to monitor her son’s social media.  If she didn’t do this, she, and possibly many other parents, would be mourning the loss of their kids.   The mom, who was not identified, saw threats made to her son on his Facebook page and called police.  When police went to the school, they found two teens sitting in a car near the targeted victim’s high school.  In the car, they found a gun, a loaded magazine, marijuana and a bong.  The two were immediately arrested. 

Another trend developing are kids going to answer sites asking how they can get away with having social media behind their parents’ backs.  In order to have a social media account, a child must be at least 13 years old.  We already know that some parents help their younger kids open accounts, but there are some who don’t feel their kids are mature enough at 13, so they won’t allow it.  Some parents will monitor their kids’ social media and will take it away because they have seen posts they don’t approve of.  Here is an example of the types of questions being asked (this particular example was found on Yahoo Answers) by the kids whose parents either won’t allow it, or have taken it away because of inappropriate, on-line behavior:


Ok so I am 14 and my dad has confiscated my Facebook account because of a past incident and I have understood my mistake but he won't give me my password.  I really want to add kids from my school.

Update 1: No need for anymore answer because i am making a new one and i doubt my dad would find that out unless i tell him that i would not tell so soon.

Here is the answer that the 14 year old chose as the Best Answer:

I see your update, but have to answer.

This is not a very smart idea. As a 14 year old, I know you think parents are stupid, but they aren't. Your dad will find out about the other account and then you will not only lose Facebook, but you will lose other privileges as well. You will no longer be trusted.

You don't say how long your dad has been holding your FB hostage, but you need to give him some time while you show him you can be responsible. He didn't delete your account, so he is going to give it back, you're just "grounded" from FB for a while. Sneaking around isn't helping your case. In fact, it's hurting it.

You need to have an open discussion with your dad and show him that you realize your mistake. You could also go over the linked article and check out the guidelines. Discuss them with your dad and see what the two of you can come up with as a compromise so he will allow you to access your account again.

But, if this just happened, you could wait a while before adding people. It seems that you really learned nothing from all this.

Voice of reason, right?  Well, the 14 year old made this comment after choosing this answer:

Friday, February 28, 2014

How Else Will Your Privacy Be Taken?



In the article Looking for a Job?  Beware of this Privacy Risk, you learned how looking for work could lead to a breach in your privacy.  This is a risk for only those who are currently looking for a job.  There is another privacy risk that should be a concern to everyone, regardless of age or state of employment.  Employers and schools are demanding to know your social media information.

Many companies do not want their names mentioned in social media unless they have control over what is being said.  The only way these companies have to keep control over this is by checking each employee’s social media accounts to make sure nothing derogatory is being said about the company.  Because anyone can set privacy controls, the only way to know everything that an employee says on social media is to have full access to the accounts.  That is why employers are asking for the log-in names and passwords of all employees. 
 
Employers are not only looking for what is said about the company, or if the employee has the company name listed as their place of employment, they are also looking for anything inappropriate that may be posted.  Pictures of wild parties or visits to a nude beach may just get you fired.  True, these parties and beach pictures were taken on your leisure time, but now, unless you have a contract, you are considered an “at will” employee.  This means that your employer can terminate your employment for any reason.  Even if you have a contract, most of them have a morals clause, so any inappropriate postings could void the contract.

Monday, February 3, 2014

Losing Privacy While Seeking Employment



As we all know, the rate of unemployment all over the US is staggering.  Many of these unemployed people are without jobs through no fault of their own.  Many companies are closing their doors, and with so many people out of work and looking for jobs, this gives employers a chance to try new methods of weeding out “undesirable” candidates.  One of the methods now being used is to ask each candidate to agree to a credit check at the time an application is submitted. 
 
What does a credit check have to do with one’s ability to work?  Well, according to employers, if someone has bad credit, they are considered a high risk for corporate theft.  So, if you have bad credit, you will not be getting an interview.  By using this theory, instead of creating a time frame for 20 interviews, that number can be lowered to 5 or less with the click of a button.

True, prospective employees aren’t forced to submit to this credit check, however, if you don’t agree, your application will not be considered.  The employers hold all the cards on this. 
 
There are a few flaws with this method of choosing potential employees:

1.  Each time a credit check is run, it lowers your credit score.  Credit reporting services don’t see this as an employment check; they just see it as you looking to get approval to raise your credit limit or to add yet another credit account.

2.  If you file applications with several companies, all of which are receiving your credit report.  This means that an unknown number of strangers are privy to not only your credit score, but also know each bank and amount you have credit with.
 
3.  You will not be given a chance to explain your low credit score.  Employers don’t care WHY the credit score is low; they just care that it IS low.

4.  Employers don’t take into consideration that you haven’t paid your bills because you’ve been unemployed.  They see the low credit score and automatically assume that you will steal from the company.  It doesn’t seem to cross anyone’s mind that you want a job not to steal, but to earn money to pay your bills in order to raise your credit score.

Wednesday, January 8, 2014

Is Social Media Stressing Your Kids?



It’s part of my job to search the Internet for subjects that have to do with Internet privacy.  In the past couple of months, I’ve seen a lot of questions on answer sites that have to do with kids and social media.  Most of these questions involve getting “Likes” on their social media pages.

Kids today are under enough pressure in their real lives when it comes to school and grades.  Now, it seems that these kids are adding pressure on themselves all because of social media.  Instead of worrying about having an active social life with real friends, these kids are stressing over the fact that their Facebook profile picture isn’t getting enough likes.  If they don’t have enough followers or “Likes” on Instagram and Twitter, it’s like the end of the world.

I have seen 13 year olds begging for likes because it’s “embarrassing” that their profile picture only got 10 “Likes” on Facebook.  Others are depressed that they only have 15 followers on Instagram.  Others yet are blogging on Tumblr about personal things and asking strangers to read their blogs and follow them. 
 
They are actually going on answer sites to beg for “Likes” and followers.  Not only that, it has become so important to them that they are actually going to sites to buy “Likes” and followers.  It’s scary to think that these kids are our future, yet they find nothing wrong with the practice of buying “Likes”.  When did it become acceptable to buy rewards instead of earning them?  I’d like to know how many parents are keeping track of their kids’ social media pages to see that they are actually cheating and if they approve of this cheating.  In other words:  What are we teaching our kids?

The cost isn’t a lot, but in order to pay the $1 to $3 charge, a credit card or PayPal account is needed.   This brings up a whole other issue:  privacy.  Do you know who your kids are giving your credit card number to in order to buy these “Likes” and followers?  What about the actual followers?  They need to be able to see everything posted in order to “Like” things on your children’s pages.  Strangers will know where your children live, what they look like, what schools they go to.  These strangers will see posts saying that the family will be away on vacation or pictures of your kids at the beach.  They will be able to see those slumber party videos posted to Facebook, which include other parents’ kids.  How will those other parents feel knowing that strangers are watching what should be private videos? 
 
Parents need to teach their kids that social media isn’t something to get stressed out about, or depressed over.  It wasn’t intended to stress over; it was intended as a way to express our thoughts and keep in touch with friends and family.  I doubt very much the intention was to make teenagers feel bad about themselves because only 3 people “Liked” their profile picture. 
 
The minimum age for social media is 13 years old.  Some kids are mature enough at 13 to realize that what happens on social media really isn’t what’s important.  For others, it’s a place that means everything.  Parents need to teach their kids that while it’s good to be creative on Tumblr and Instagram and share views on Facebook and Twitter, it should not be the defining factor in a teenager’s life.  Each parent knows their own child best to determine whether or not social media is right for that child. 
 
In order to keep your privacy safe, parents must teach their kids not to give out personal information over the Internet.  Another way to stay safe is to surf the Internet anonymously with a proxy server.  Please take advantage of our FREE trial offer and see how changing your IP Address and encrypting every connection will make you feel safer knowing that you can’t be found.

Tuesday, December 3, 2013

Make Sure Your Password is Secure



Just about every day, there’s an article in the newspaper or a story on the news that talks about cyber-crime, usually in the form of identity theft.  Most Internet users feel that they are safe because they are “cautious”; they never download from strange websites, nor do they open an e-mail unless they know who sent it.  The problem is that these “cautious” people forget one of the most important aspects to keeping their privacy safe:  the password.  Maybe laziness or forgetfulness is the reasoning, but in this World Wide Web full of hackers, many thousands of people are still using the same password for everything they do online.  Some may argue that each password is “different”; however, having variations of the password “ABCD1234” doesn’t count as being different.   If you or someone you know is guilty of this way of thinking, you should really read on.
  
One of the first lines of our privacy defense is the password.  Whenever you sign up to become a member of a website, you need to enter a log-in name and a password.  Most sites will not accept passwords shorter than 8 characters and many require them to be alpha-numeric and case sensitive.  If you choose the password “platypus1”, you will not be granted access into that site if you mistakenly type in “Platypus1” on your next visit.  The password must be an exact match.  So, if you are a registered user on 10 different sites, you need 10 unique passwords.  “Platypus1”, “Platypus2”, “Platypus3”, etc. just won’t cut it. 

In order to try to make each password unique, many people will use different names combined with birthdates.  It’s not uncommon for a man to have “Pamela823” (his wife and her birth date, August 23) for one site, then choose “Henry312” (his son and his birth date, March 12) for another site.  A problem could arise, however, if that man signs on to Facebook using a public hotspot and is hacked.   Once the hacker knows the Facebook password, he could look to see the names and birthdates of the spouse and children.  So, if the Facebook password is “Pamela823”, this hacker will try that same password for an email account.  If that doesn’t work, he’ll look to see the son’s name and try “Henry312”.  Hackers are very good at what they do, so before you know it, this cyber-crook is going through your bank account.

There is a corporation in Virginia called Siber Systems, Inc., that realized how difficult it is for many people to come up with unique passwords.  With this in mind, in 1999 they developed RoboForm, their first product with consumers in mind.  It now has worldwide users numbering in the millions.  Demand was so great that RoboForm is now available in 30 languages.

RoboForm takes your information and each time you register for a site, it comes up with a unique username and password.  You don’t have to do a thing.  The only password you need to remember is the master password from when you first used it.  So, you log on to your computer, enter your master password into RoboForm and RoboForm goes to work for you after that.  It not only generates unique passwords, it remembers them for you.  Another plus is that each password is encrypted, making it almost impossible to be hacked.

Due to the success of the original RoboForm, in 2004, Siber Systems expanded its product line with RoboForm2Go.  This portable version of RoboForm is on a USB flash drive that you plug into your computer.  No matter where you travel, you will have RoboForm2Go with you.  Not only that, it will work in your native language.

RoboForm is the perfect solution for creating unique passwords and then remembering what they are for each site that you visit.  It is a great tool for keeping you safe when you surf the Net.

To add even more protection to your Internet surfing, you should use a proxy server from a reputable company.  Please take the time to visit Privacy Partners and take advantage of the FREE trial offer.  You will be glad you did once you see how safe you feel knowing that you can surf the Internet from anywhere knowing that every time you connect, your information is encrypted.

Thursday, November 21, 2013

What Is An IP Address?



Anyone who uses a computer has heard the term “IP Address”, but what exactly does that mean?  What is an IP Address?
 
An IP Address, or Internet Protocol Address, is the digital “address” assigned to every device connected to the Internet. Internet Protocol is the technical standard that should be followed while using the Internet.  This protocol was developed in the 1970s.

There are two versions of IP that support the computer network addressing.  They are:  Internet Protocol version 4 (IPv4) and Internet Protocol version 6 (IPv6).  The most commonly used version is IPv4.  With this version, the IP Addresses are four bytes (or 32 bits) long.  IPv6 is the newer version, which allows IP Addresses of 16 bytes (or 128 bits) long.  Whichever version is used, the IP Address has two main purposes:  host or network interface identification and location addressing. 

IPv4 addresses are typically shown in a “dot-decimal” sequence.  They are made up of four parts, using numbers that range from 0 to 255.  Each part is separated by a decimal (or dot) and each group consists of 8 bits.  An example of this is shown below:

The Internet Assigned Numbers Authority (IANA) is responsible for coordinating the global pool of IP Addresses and then providing them to the Regional Internet Registries (RIRs) so they can be assigned to end users, including Internet service providers.  The main address pool used by IANA was depleted on February 3, 2011.  This is the date that the last blocks were assigned to the 5 RIRs.

IPv4 addresses were depleting so rapidly due to the explosive growth of the Internet, that the Internet Engineering Task Force (IETF) was forced to look into new technologies in order to expand the address capacities.  The solution they decided on was to completely redesign the Internet Protocol.   In 1995, IPv6 was named as a means to replace IPv4.

In this new version, the address size was increased to 128 bits from the original 32 bits.  Even considering a growth explosion, this should give a sufficient amount of available addresses well into the future.  A typical IPv6 address would look like this:
This new formula is capable of automatically changing the routing prefix of whole networks without the need to redesign or renumber the system.  This will be necessary if global routing policy changes.