programming4us
programming4us
SECURITY

Who’s Watching You? (Part 3)

- Free product key for windows 10
- Free Product Key for Microsoft office 365
- Malwarebytes Premium 3.7.1 Serial Keys (LifeTime) 2019

The law

It response to the ever-increasing issues surrounding privacy, EU Law has put in place the e-Privacy Directive. This states that no user should be tracked without their consent. You may have noticed the pop-up boxes that now appear at the top of websites announcing that they use cookies; they will either require you to click to accept this or, in some cases, state that by continuing to use the site you are giving your consent.

The short explanations very rarely mention anything about third-party cookies, and often appear only the first time you visit the site. If you fail to spot the notifications or think you’ll have a look when you have more time on your hands, you will continue to be tracked as before.

Description: Panopticlick allows visitors to its site to establish whether their PC is trackable

Panopticlick allows visitors to its site to establish whether their PC is trackable

To learn how the site uses cookies, you normally have to click the privacy polices link highlighted in the message. Sometimes you can select which cookies using your web browser’s private or ‘Incognito’ mode, which stop sites from adding permanent cookies or tracking your web history.

Another sensible move is to visit the security settings in your browser of choice and look for the ‘Do Not Track’ or ‘Do not allow third-party cookies’ option. Plug-ins such as Ghostery are available for most browsers and offer an enhanced level of security, while Internet Explorer users can use ‘Tracking Protection Lists’ to prevent know offending sites to place cookies on their machine.

Sadly, even these settings can be overcome by something called device fingerprinting. Your system is made up of lots of small details such as the browser type, operating system, plug-ins, and even system fonts that can be scanned and interrogated to reveal an individual digital fingerprint that identifies your machine on the web.

The Electronic Frontier Foundation (eff.org) is a digital rights group that campaigns against invasions of civil liberties. To illustrate the effectiveness of device fingerprinting, it set up the Panopticlick website. Here, users are able to measure how easily identifiable their system are.

We tested our road-worn laptop and were slightly unnerved to discover that, out of the 2,287,979 users that had scanned their machines on the site, ours was unique and therefore trackable.

Some would agree that the ability for companies to track our interests is a fair price to pay for the free services we receive. After all, websites are only offering opportunities for advertisers to pitch their products to us. Television, radio and cinema all do the same thing, and use demographic profiling to promote certain products at calculated times hence all the beer and crisp commercials during football coverage.

No-one forces us to use networks, and there are alternatives to all Google’s online offerings. But it is such a bad thing that we are being watched what have you got to hide? Well, that all depends on who is doing the watching, and why.

The spying game

Currently negotiating its way through parliament is the government’s Communications Data Bill, or the ‘Snooping Bill’, as opponents prefer have termed it. This radical restructuring of British law would force ISPs to retain communications data for all email, web browsing and even mobile phone use in the UK.

The authorities would then be able to access the information in a limited capacity at any time, or in its entirely when granted a warrant. The government is also claiming that it will be able to decode SSL encryption as part of the process..

For a nation that’s already heralded as the most surveillance heavy country in the world, this might seem to many a step too far. What some privacy campaigners see as the real problem, though, isn’t necessarily the government prying into our digital lives (although that’s obviously a concern that they are highly), but rather the fact so much information about us will be collected and stored, with potentially dangerous consequences.

Most of us would agree that although we might not always like how our elected officials behave, we still have a reasonably accountable government. We could also agree that while companies such as Facebook and Google make money from us in a less-than-transparent manner, they too are not out to harm us. But the fact that all are intent on assembling hugely detailed data sets poses a problem if that information is ever used by organisations that are not so benign.

In January 2010 Google announced that it had been the victim of a sophisticated cyberattack originating in China. The hackers had gone after the email addresses of human rights activists, journalists, and some senior US officials. Wikileaks then released leaked cable communications that suggested a senior member of the Chinese Politburo had been involved in the attacks. Some reports suggested that the motivates behind the attack were to identify and locate political dissidents who were speaking out against the government’s human rights records.

Description: In January 2010 Google announced that it had been the victim of a sophisticated cyberattack originating in China

In January 2010 Google announced that it had been the victim of a sophisticated cyberattack originating in China

The following year saw the rise of the ‘Hacktivist’. Modern day protestors against abuses of civil liberties or digital freedom.

Among the high profile victims of groups such as Anonymous and LulzSec and Sony, the US Bureau of Justice, our own Ministry of Justice, the Home Office, several Chinese government sites and even the Vatican... twice. In fact, Verizon released figures reporting that more than 100 million users’ data had been compromised by the Hacktivist groups in the past year.

Although the motivation behind the Hacktivists efforts are generally for the greater good, the ease with which they seem to be able to either bring down or infiltrate supposedly secure sites should bring into question the wisdom of having so much personal information stored in one location, undoubtedly attacked to the internet.

Other  
 
Top 10
Free Mobile And Desktop Apps For Accessing Restricted Websites
MASERATI QUATTROPORTE; DIESEL : Lure of Italian limos
TOYOTA CAMRY 2; 2.5 : Camry now more comely
KIA SORENTO 2.2CRDi : Fuel-sipping slugger
How To Setup, Password Protect & Encrypt Wireless Internet Connection
Emulate And Run iPad Apps On Windows, Mac OS X & Linux With iPadian
Backup & Restore Game Progress From Any Game With SaveGameProgress
Generate A Facebook Timeline Cover Using A Free App
New App for Women ‘Remix’ Offers Fashion Advice & Style Tips
SG50 Ferrari F12berlinetta : Prancing Horse for Lion City's 50th
- Messages forwarded by Outlook rule go nowhere
- Create and Deploy Windows 7 Image
- How do I check to see if my exchange 2003 is an open relay? (not using a open relay tester tool online, but on the console)
- Creating and using an unencrypted cookie in ASP.NET
- Directories
- Poor Performance on Sharepoint 2010 Server
- SBS 2008 ~ The e-mail alias already exists...
- Public to Private IP - DNS Changes
- Send Email from Winform application
- How to create a .mdb file from ms sql server database.......
programming4us programming4us
programming4us
 
 
programming4us