Showing posts with label privacy concerns. Show all posts
Showing posts with label privacy concerns. Show all posts

Friday, February 28, 2014

How Else Will Your Privacy Be Taken?



In the article Looking for a Job?  Beware of this Privacy Risk, you learned how looking for work could lead to a breach in your privacy.  This is a risk for only those who are currently looking for a job.  There is another privacy risk that should be a concern to everyone, regardless of age or state of employment.  Employers and schools are demanding to know your social media information.

Many companies do not want their names mentioned in social media unless they have control over what is being said.  The only way these companies have to keep control over this is by checking each employee’s social media accounts to make sure nothing derogatory is being said about the company.  Because anyone can set privacy controls, the only way to know everything that an employee says on social media is to have full access to the accounts.  That is why employers are asking for the log-in names and passwords of all employees. 
 
Employers are not only looking for what is said about the company, or if the employee has the company name listed as their place of employment, they are also looking for anything inappropriate that may be posted.  Pictures of wild parties or visits to a nude beach may just get you fired.  True, these parties and beach pictures were taken on your leisure time, but now, unless you have a contract, you are considered an “at will” employee.  This means that your employer can terminate your employment for any reason.  Even if you have a contract, most of them have a morals clause, so any inappropriate postings could void the contract.

Wednesday, January 8, 2014

Is Social Media Stressing Your Kids?



It’s part of my job to search the Internet for subjects that have to do with Internet privacy.  In the past couple of months, I’ve seen a lot of questions on answer sites that have to do with kids and social media.  Most of these questions involve getting “Likes” on their social media pages.

Kids today are under enough pressure in their real lives when it comes to school and grades.  Now, it seems that these kids are adding pressure on themselves all because of social media.  Instead of worrying about having an active social life with real friends, these kids are stressing over the fact that their Facebook profile picture isn’t getting enough likes.  If they don’t have enough followers or “Likes” on Instagram and Twitter, it’s like the end of the world.

I have seen 13 year olds begging for likes because it’s “embarrassing” that their profile picture only got 10 “Likes” on Facebook.  Others are depressed that they only have 15 followers on Instagram.  Others yet are blogging on Tumblr about personal things and asking strangers to read their blogs and follow them. 
 
They are actually going on answer sites to beg for “Likes” and followers.  Not only that, it has become so important to them that they are actually going to sites to buy “Likes” and followers.  It’s scary to think that these kids are our future, yet they find nothing wrong with the practice of buying “Likes”.  When did it become acceptable to buy rewards instead of earning them?  I’d like to know how many parents are keeping track of their kids’ social media pages to see that they are actually cheating and if they approve of this cheating.  In other words:  What are we teaching our kids?

The cost isn’t a lot, but in order to pay the $1 to $3 charge, a credit card or PayPal account is needed.   This brings up a whole other issue:  privacy.  Do you know who your kids are giving your credit card number to in order to buy these “Likes” and followers?  What about the actual followers?  They need to be able to see everything posted in order to “Like” things on your children’s pages.  Strangers will know where your children live, what they look like, what schools they go to.  These strangers will see posts saying that the family will be away on vacation or pictures of your kids at the beach.  They will be able to see those slumber party videos posted to Facebook, which include other parents’ kids.  How will those other parents feel knowing that strangers are watching what should be private videos? 
 
Parents need to teach their kids that social media isn’t something to get stressed out about, or depressed over.  It wasn’t intended to stress over; it was intended as a way to express our thoughts and keep in touch with friends and family.  I doubt very much the intention was to make teenagers feel bad about themselves because only 3 people “Liked” their profile picture. 
 
The minimum age for social media is 13 years old.  Some kids are mature enough at 13 to realize that what happens on social media really isn’t what’s important.  For others, it’s a place that means everything.  Parents need to teach their kids that while it’s good to be creative on Tumblr and Instagram and share views on Facebook and Twitter, it should not be the defining factor in a teenager’s life.  Each parent knows their own child best to determine whether or not social media is right for that child. 
 
In order to keep your privacy safe, parents must teach their kids not to give out personal information over the Internet.  Another way to stay safe is to surf the Internet anonymously with a proxy server.  Please take advantage of our FREE trial offer and see how changing your IP Address and encrypting every connection will make you feel safer knowing that you can’t be found.

Thursday, November 21, 2013

What Is An IP Address?



Anyone who uses a computer has heard the term “IP Address”, but what exactly does that mean?  What is an IP Address?
 
An IP Address, or Internet Protocol Address, is the digital “address” assigned to every device connected to the Internet. Internet Protocol is the technical standard that should be followed while using the Internet.  This protocol was developed in the 1970s.

There are two versions of IP that support the computer network addressing.  They are:  Internet Protocol version 4 (IPv4) and Internet Protocol version 6 (IPv6).  The most commonly used version is IPv4.  With this version, the IP Addresses are four bytes (or 32 bits) long.  IPv6 is the newer version, which allows IP Addresses of 16 bytes (or 128 bits) long.  Whichever version is used, the IP Address has two main purposes:  host or network interface identification and location addressing. 

IPv4 addresses are typically shown in a “dot-decimal” sequence.  They are made up of four parts, using numbers that range from 0 to 255.  Each part is separated by a decimal (or dot) and each group consists of 8 bits.  An example of this is shown below:

The Internet Assigned Numbers Authority (IANA) is responsible for coordinating the global pool of IP Addresses and then providing them to the Regional Internet Registries (RIRs) so they can be assigned to end users, including Internet service providers.  The main address pool used by IANA was depleted on February 3, 2011.  This is the date that the last blocks were assigned to the 5 RIRs.

IPv4 addresses were depleting so rapidly due to the explosive growth of the Internet, that the Internet Engineering Task Force (IETF) was forced to look into new technologies in order to expand the address capacities.  The solution they decided on was to completely redesign the Internet Protocol.   In 1995, IPv6 was named as a means to replace IPv4.

In this new version, the address size was increased to 128 bits from the original 32 bits.  Even considering a growth explosion, this should give a sufficient amount of available addresses well into the future.  A typical IPv6 address would look like this:
This new formula is capable of automatically changing the routing prefix of whole networks without the need to redesign or renumber the system.  This will be necessary if global routing policy changes. 

Thursday, November 7, 2013

Grocery Shelves Will Now be Spying on Us



As if we don’t have enough to worry about, now we need to start thinking about being spied on while we do our grocery shopping.  Food giant Mondelez International, parent company of Nabisco, Kraft and Cadbury, is said to be planning on introducing “smart shelves” to grocery stores by the year 2015. 

Working with Microsoft Kinect, Mondelez International is said to be working on a system to identify shoppers walking down the food aisle.  Using facial recognition, these “smart shelves” will be able to identify shoppers by age and gender.  Once identified, a coupon will appear near a food or snack targeted to that particular shopper.  For example:  If a woman in her early 30s walks by, there’s a good chance she may be thinking about chocolate.  As she approaches the shelf for Cadbury chocolates, a coupon will pop up.

Along with facial recognition, the smart shelves will also have weight sensors installed.  This way, if a shopper over the age of 18 picks a box up from the shelf, a coupon could be sent to “persuade” the shopper into buying that product.  The coupon will come by way of either a dispenser or a display screen.  Tech writer Brian Fung of the Washington Post says of this technology, “it’s not quite Minority Report levels of creepiness, but it’s getting there.”, while Neal Ungerleider of Fastcompany.com said it’s “the ultimate in creepy, yet inevitable marketing tech.”  Personally, I have to agree with Neal about it being the ultimate in creepy.

According to Mondelez’s CIO Mark Dajani, no videos or photos of specific shoppers will be saved.  The information will only be used to collect information about the types of shoppers looking at the products or walking down the grocery store aisles.  It could help food companies with product placement so as to maximize sales.

Thursday, August 22, 2013

Is Your Smart TV Spying on You?



New York State Senator Chuck Schumer recently issued a warning to all smart TV owners:  If your TV is equipped with a camera and can connect to the Internet, it could be used to spy on you.  Yes, your smart TV is capable of allowing a hacker to steal your credit card information, or worse, your identity.  Not only that, but a hacker can remote-access your TV’s camera and watch everything you do in the room that the smart TV is in.  To make matters worse, these TVs don’t have much in the way of security settings. 

Researchers Aaron Grattafiori and Josh Yavor were at the Black Hat security conference in Las Vegas, Nevada recently and showed how a smart TV can be hacked.  During the demonstration, they were able to control social media and any other application installed on the TV, they accessed files and even turned on the camera.  If they were able to do this, anyone else can do it too.  It’s like giving up your remote control to a hacker.

Mr. Grattafiori spoke with Mashable regarding this issue (Your Smart TV Can Be Hacked to Spy on You).  He said, “Because the TV only has a single user, any type of compromise into an application or into Smart Hub, which is the operating system – the smarts of the TV – has the same permission as every user, which is, you can do everything and anything.”

Grattafiori and Yavor, who work for iSEC Partners, a security firm, began looking into the issues with smart TVs in December of 2012.  They notified Samsung about this security breach in January 2013.  Samsung issued a statement to CNN shortly after claiming that “patches” have been issued to plug up the holes in security (Your TV Might be Watching You), which now makes it difficult for hackers to break into your smart TV.

Sunday, June 9, 2013

Your Old E-Mail Can be Read Without a Warrant



What do you do with your old e-mails?  Do you just let them sit in the “Read Mail” folder, or do you permanently delete them?  If you let them sit until they automatically disappear from the “Read Mail” folder, you may have a problem. 

If you have e-mail that is over 180 days old stored in a cloud server, it is considered “legally abandoned” and can be read by any government agency without obtaining a warrant.  This means that if you use Yahoo! Mail, Hotmail, AOL Mail, G-Mail, etc, your privacy could be at risk.  If you store your e-mail on your hard drive, however, a search warrant is needed no matter how old the mail is.

The law that permits the release of e-mail without a warrant is the Electronic Communications Privacy Act (ECPA), which is from 1986.  In 1986, most people who used e-mail would delete it immediately after reading it to save on computer storage space.  There was very little chance that your average citizen would have an e-mail in storage that was 180 days old. Today, however, with the use of cloud servers, storage space is just about unlimited.  E-mails are read, then left forgotten in the “Read Mail” files.  Unfortunately, the laws haven’t been updated to keep up with the rapidly growing technology.

Recently, the ACLU requested information from the IRS under the Freedom of Information Act.  In response, the IRS indicated that their criminal investigation department does read citizens’ e-mails without obtaining search warrants.  This is one of the reasons why an update of the ECPA is needed in order to protect the privacy of all US citizens when it involves any digital communications.

The ACLU also sent a request under the Freedom of Information Act to the FBI.  The response indicated warrants aren’t generally gotten, but the FBI wouldn’t come out and say for sure.  As a way of explanation, the FBI provided the ACLU with excerpts from two of its Domestic Investigations and Operations Guides; one from 2008 and one from 2012.  Both state that “FBI agents only need a warrant for emails or other electronic communication that are unopened and less than 180 days old.”  

Obviously, the time for modification of the ECPA is well over-due.  Since 1877, any government agency was required to obtain a warrant to read any personal mail sent via the US Postal Service.  Now is the time for this policy to be expanded to include e-mail and any other electronic communications.  In the meantime, if you want to keep your privacy, make sure you use the “Delete Permanently” button provided each time you read your e-mail.  For most of us, this isn’t a matter of covering up criminal activity; it’s to protect our privacy.
 Please go to the top of this page and download the free Internet Privacy Guide.  There are many other tips and suggestions on how your privacy can remain safe both on-line and off.

Wednesday, May 8, 2013

Are Our Privacy Rules Changing?



Do you realize how much information is gathered from your smartphone?  This is something most people use every day, but not just to make calls.  It is also used to surf the Internet, send e-mails and update social networking.  Many people even use their smartphones as a GPS.  Because of its many functions, your smartphone holds information on your location, your e-mail contacts and your favorite Internet sites.   In other words, your smartphone is yet another way you can be tracked on-line. 

It seems like every month new apps are being developed for smartphones and tablets.  In fact, the smartphone is probably used less to make calls than to surf the Internet.  You can use Google Maps to find any location in the world, you can keep up with your office e-mail and you can even use GasBuddy to find the least expensive gas in the area.  When you’re ready for a break, you can play your favorite on-line games!  All this can be done with one device.  You can be traveling, yet you’ll never be far from your office or home.  You can even access sites that can help you out with a solution if you don’t know how to handle your two-year-old’s tantrums or medical sites that can tell you what that strange rash on your leg is.

Yes, these apps are a fantastic convenience, but they also leave us open for tracking.  Many people find that the convenience far out-weighs the risk of being tracked.  After all, isn’t it better to have access to all of these great sites if it means all you have to do is enter your zip code and your birth date?  There are thousands of people in that zip code with the same birth date, so what could be the harm?  Well, thousands of people aren’t using YOUR smartphone!

With this information, you are opening yourself up to being tracked by advertisers.  This can happen because many sites share the gathered information with others. They know your location from your GPS, so with your zip code, birth date and the knowledge of what sites you visit on-line added in with your e-mail address, you are going to get a whole lot of targeted advertisements in your inbox.  You could also be given suggestions for even more apps to either purchase or download for free.

These app developers claim that in order to get the full benefits, some personal information is needed.  Congress has discussed the issue of these apps as a privacy risk.  It has also been discussed that consumers should be allowed to opt out of being tracked, but so far, not much has been done to remedy this.