Wednesday, March 20, 2013

Instagram Claims Right to Sell Photos



Early in 2012, Facebook approached the founders of Instagram with a $1 billion deal to buy the fledgling Internet photo company.  In September 2012, the deal was finalized for reportedly $750 million.  Good news for Instagram, but bad news for anyone who posted one or more of the 5 billion photos.  Why?  Because now, with Facebook owning Instagram they have the right to sell any of these photos.

The policy to sell user photos was supposed to take effect on January 16, 2013, which was 3 months after Facebook’s purchase.  According to this new policy, Facebook is claiming their right to sell Instagram photos without notifying or paying the original poster.  The only way to avoid this happening to you is if you deleted your Instagram account before the January 16th deadline.  News of this caused an uproar among users.   

But how will this new Instagram policy affect users’ privacy?  If you have an account that hasn’t been deleted prior to the January 16, 2013 deadline, any of your photos could be sold to advertisers.  In other words, that picture of you in your bikini while you were on Spring break, holding up a bottle of Coors Light, could be sold to Coors and used in one of their advertisements.  Imagine your surprise when you see this picture on a billboard!  Instagram will be making money for Facebook from Coors, Coors will be making money from the advertisement and you will be making nothing at all for your part in all of this.

Kurt Opsahl, Senior Staff Attorney with the Electronic Frontier Foundation says of this new policy, “It’s asking people to agree to unspecified future commercial use of their photos.  That makes it challenging for someone to give informed consent to that deal.”

Because there is nothing specified, this leaves an endless list of possibilities for exploitation of user photos.  Travel agencies, airlines and resorts can all use your photos in magazine ads, brochures, Internet advertising, television advertising, etc.  All they have to do is pay the fee to Facebook and your Instagram photo is now theirs to use as they see fit.  There is no limit to what types of photos will be sold.  This means that if you post a picture of your children playing in the sands of a tropical island, your children could be the subject of an advertisement.  

Thursday, February 28, 2013

Facebook Finds a New Way to Make Money Off of You



Facebook now has a new feature:  Promote and Share.  This feature allows all Facebook members to promote posts made by their friends.  Of course, to do this, there will be a fee.  You can now choose to “Promote and Share” any post made by any friend, for a $7 fee.  The posts promoted do take into consideration privacy settings, but there is no way to opt out of this.  The feature is causing some privacy concerns because the friends whose posts you’re sharing have no say in the matter. 

According to Facebook, this feature has been added because they felt there was a need.  It is said to be beneficial to all Facebook members by allowing them to make others aware of special events in a friend’s life.  This includes such things as landing a new job, welcoming a new member into the family, graduations or good deeds.

A statement issued by Facebook said, “This feature respects the privacy of the original poster – i.e. it will promote to everyone who originally saw it.  You can only promote posts to the people that your friend originally shared with.  If you have mutual friends, they’ll see that you shared it and promoted it.”

Some may not see the need to spend $7 to promote a post since the only people who can see the promoted and shared information are the ones who were originally allowed to see it.  What would be the advantage of such a feature?  The “advantage” would be that it would bring the post higher up on the news feeds, so if a mutual friend missed the original post, he or she would most likely see the promoted and shared post.

Wednesday, October 10, 2012

Can Your GPS Lead a Stranger to Your Door?



Nowadays, almost everyone has a GPS.  As you drive down the highways and back roads, just about every car you see has one attached to the windshield.  Some newer models of cars come with the GPS as either a standard feature or an option.  A GPS doesn’t only tell you how to get where you’re going; it also tells you when you should be arriving.   If one of the roads you need is closed, or if traffic is unusually heavy, the GPS will tell you which detour to take.  For these reasons, I’m addicted to my GPS, just like millions of other people.

Yes, the GPS is a huge part of our lives, but do we ever think about how we can be risking our safety by using it?  Think of all the information about you that a criminal can get just by looking through your GPS’s “Favorite Places”.   Below is a scenario that is played over and over all over the country:

You just got a promotion at your job.  Along with this came a very large raise, so, to celebrate, you and your husband go out for a night on the town.  Your first stop is that new nightclub that opened a few weeks ago because a band that you both love is playing there.   You know the address, but aren’t sure how to get there, so you program it into your GPS.  You get to the club and hand your car over to the valet so you don’t have to walk unfamiliar streets to find it later.  If you have an in-dash GPS, it’s all but forgotten, but if you have a portable GPS, you stash it in the glove box so it’s out of sight.

Maybe your husband comments about the band and how long it’s been since you’ve both been to one of their concerts.  You tell him that you can’t wait and will savor every minute until the club closes and you are forced to leave.  During this conversation, the valet has heard every word.  He also noticed where you put your portable GPS, or that you didn’t turn off your in-dash GPS.  Who is this person that you just handed your car to?  Does he have a criminal background?  Well, whoever this person is, he now knows your plans for the entire evening.

The valet is doing a quick scan of your keys as you are walking into the club.  He notices that you are like thousands of others who keep their house keys on the same key ring as your car key.  He then takes your car and parks it.  He reaches for your GPS and scans your list of “Favorite Places”.  He hits the jackpot when he sees an entry listed as “Home”.

Friday, September 7, 2012

Which Would You Choose: Privacy or Security?

Carnegie Mellon University’s Pedo-Biometrics Lab in Pittsburgh, PA has a joint project with a Canadian company, Autonomous ID.  The project is a security scanner that is built into the in-soles of shoes.  These in-soles will be used at high security companies, power plants and military bases to screen employees attempting to gain access to high risk areas.

The idea for this type of device came to Todd Gray, President of Autonomous ID, when he visited his daughter right after she gave birth.  Gray noticed that the walls of the maternity ward were decorated with the footprints of all the babies who were born there.  When he saw this, he realized that each person’s footprints were as unique as their fingerprints.  To start the project, Gray paid $1.5 million to Pedo-Biometrics Lab.  

Security or privacy?  The choice is yours.
These special in-soles will have sensors that measure the amount of pressure each step places on specific areas.   Height, weight and gait are all factors used to make these measurements.   When an employee is fitted with these in-soles, he or she will walk around so his or her data can be stored in a master file located in microcomputers.  From this master file, security clearance level will be confirmed.  If confirmed, access to the area will be granted; a silent alarm will be triggered if the employee does not have clearance.   

Preliminary tests that were run on in-sole samples demonstrated that there is an accuracy rate of 99% after only three steps.  Further tests are taking place that will take such factors as dieting, athleticism and nationality into account.  Tests will also be done on fraternal and identical twins.  Mr. Gray is of the opinion that there is less of a privacy risk to these in-soles as opposed to eye scans. 

Attorney Lee Tien of the Electronic Frontier Foundation (EFF) doesn’t fully agree with that opinion.    “Every biometric capture device is a potential tracking device, just like every iPhone is a potential tracking device.  That’s just the way things are.” is the statement made by Mr. Tien.  He did, however, feel that the in-soles “might make a person feel a little bit better” about their security.  Another positive point Tien made was that the identification accuracy rate of 99% after merely three steps is “pretty impressive”.

Can you be tracked without consent?
There was a negative side that Tien saw:  these in-soles could be inserted into an employee’s shoes without his knowledge or consent.  In this respect, they could be considered a “spy tool”.

Thinking about all the pros and cons, I can’t imagine allowing my employer to know everywhere I go, even on my time off from work.  I would simply feel like I was being stalked.  I’m not willing to give up my privacy like that.

Privacy is our greatest asset and we should not be willing to risk it.  Learn how to protect yourself both on line and off by taking a few minutes to download the free Internet Privacy Guide at the top of this page.  Isn’t it worth a few minutes to learn how to keep your privacy safe?

Wednesday, August 22, 2012

Will You Sign Up For Facedeals?


Facedeals will offer you "specials" by facial recognition
My morning ritual begins with turning on my TV to catch the news.  One story this morning really grabbed my attention in a very disturbing way.  It was about a new technology called “Facedeals”, which could be one of the more frightening apps to come our way.

RedPepper Labs, a development group headquartered in Nashville, TN has just announced its latest entry into the world of digital technology.  They call it Facedeals, and the testing has begun.  As I was listening to this story, I started to be concerned about how this could put everyone’s privacy at risk.  Facedeals will be connected to your Facebook account and will use facial recognition to pinpoint your location whenever you enter your favorite shops and restaurants.

Unlike FourSquare, where you physically have to enter your location, the only action you need to complete with Facedeals is to walk in the door.  As you approach the door, a camera placed outside the shop will scan your face and link it to Facebook’s application program interface (or API) and associate it with your “Likes” so that shop will be able to offer you discounts and other deals accordingly.

Before this app can scan you, you must approve it through your Facebook settings, which at least gives you some control.  If you choose to approve Facedeals, you will be asked to scan one of the newest photos you have of yourself.  After that, each time you enter a business that has a Facedeals camera at the door, that business will know you are there, will know the Facebook “Likes” you have that are relevant to that business, and you will be sent special offers to your cell phone within seconds.

Since installation of these cameras doesn’t require anything more than a wall outlet and WiFi connection, they can be place anywhere.  For now, the test area is limited to Nashville, Tennessee, but RedPepper is hoping to soon expand the area.

It’s too soon to tell how quickly Facedeals will be accepted by the public.  Personally, I can’t imagine that a large amount of people would be willing to be “followed” around like this.  I know that I would feel as if I were being stalked, so I will not be approving this app.  My privacy is too important to me to have strangers know my “Likes” when it comes to everything from fashion sense to favorite meals.

Privacy is such a valuable asset.  Learn how to avoid risk by downloading the free Internet Privacy Guide at the top of the page.  After all, keeping your privacy safe is well worth the few minutes it takes to download the Guide.

Monday, August 6, 2012

So, You Think You Can’t Be Hacked?


I’m a Customer Service Representative at Private Proxy.  Every day, I speak with people about Internet privacy issues.  Most of the people I speak with feel that they cannot be hacked because they are careful.  They know all about identity theft, but are sure that it won’t happen to them.  That’s when I ask them if they ever use the free, public WiFi in hotspots like Starbucks and Panera.  I then tell them how they can be jeopardizing their Internet privacy by giving them this example:

You are in a store making a small purchase and your credit card is denied.  You don’t think anything of it, and swipe another card.  That one, too, is denied.  Now you start to wonder what’s up, so you call the credit card companies.   When you speak to Customer Service, you are told that your cards are maxed out.  These cards aren’t used that much and you always pay your bills in full as soon as they’re due, so how could you be maxed out?  You ask for copies of your transaction reports so you can see where the problem is.

You get your reports and, sure enough, not only are the cards maxed out, they are each over the credit limit!  Big problem!  As you look at the transactions, you see purchases made in stores you never heard of.  These purchases include gaming systems, computers and flat-screen TVs.  There was even a vacation at a Tahitian resort on there.  None of these purchases were made by you, so you call the card companies again and cancel those two cards.  Just to be on the safe side, you also cancel your other credit cards and bank card.

For the life of you, you can’t understand how this could be happening.  After wracking your brain trying to think of when you last used these credit cards, you remember that a couple of weeks before, you used both cards shopping on-line while you were taking your lunch hour at Panera.  Since this is a free public hotspot, everyone can use it.  Because it’s for the public to use, the data stream isn’t encrypted, so anyone with computer knowledge and the right software can intercept your data stream and get hold of your username, password and credit card information.   Mystery solved, but how do you stop it from happening again?

Well, for starters, you should download our Internet Privacy Guide.  When you read this, you will learn how your identity can and will be stolen.  When you learn of all that could go wrong, it would help you tremendously to take part in our FREE trial of Private Proxy.  It’s very easy to understand how the product works and it’s also easy to use.  You will have a choice of many servers, all using encryption to keep your data safe from cyber-crooks.

Protect Your Internet Identity!

Sunday, July 29, 2012

Today’s Tech-Savvy Youth

Children today are becoming more and more tech savvy.  Everywhere you go, you see toddlers holding toy cell phones, or “working” on toy computers that are loaded with learning games.  Parents bring portable DVD players on car trips or to restaurants in order to keep the kids entertained.   These devices, marketed for young children, are seen more and more.  It seems that technology is taking over not only our lives, but the lives of our kids.

Classes on basic computer operations are being held in pre-schools.   When children reach elementary school age, they should not only know how to operate a computer, but they should also know how to access the Internet and conduct web searches.  The rising cost of textbooks has made it impossible for schools to purchase a book for every class for each child.   Now, to save costs, they are having the students download e-textbooks from the schools’ websites.   Each school’s website also doubles as an on-line community where students can “speak” to each other.   Teachers volunteer to tutor after hours on the website, so if students are having difficulties with a homework assignment or a particular subject in general, they can get help. 

At the beginning of the new school year, or at the end of the old school year, the schools will send memos to the parents on which computers or laptops to purchase.   This is to insure that the students have the equipment that meets the system requirements for downloads, etc.  The schools will also advise the parents of where these computers can be purchased at the best possible price.  Some may even offer coupons for a limited time.