Tag: privacy

  • Baby’s privacy exposed on LinkedIn

    My dad was vigilant in protecting my privacy. He never allowed me to go anywhere without telling him first. And when I didn’t follow his instructions, there was hell to pay. Father’s who lead by example may be in short supply, however, the must still protect their baby’s privacy before anyone else. For as long as there’s been humans, father’s have been the primary protectors of babies. Mothers may nurture and feed babies, but it’s to the dad’s of the world the family looks for safety and security.

    You may take this for granted in the concrete jungles of South Africa and elsewhere in the industrialised world. The more people in your “tribe” or group, the less privacy you can expect. And on a recent weekend retreat in Tsitsikama, Eastern Cape, I was introduced to the liberterian philosophy of the Consent Axiom explained by Trevor Watkins:

    I believe that the basis for successful human coexistence can be reduced to a single statement, a single concept. This statement is the Consent Axiom: No action without consent.

    This statement is as brief and uncompromising as the biblical 5th commandment, “Thou shalt not kill”. Like most 4 word sentences, some further elaboration is required for better understanding.

    Patrick Korie must protect his baby's privacy on LinkedIn

    Your Baby’s Privacy is Important

    Of course a 1-year old baby cannot give consent to it’s photo being published for everyone to see on LinkedIn. Therefore it should not be published on any social networks. All parents must take the long term view before posting family photos and protect their baby’s privacy like it’s their own. Nobody will post photos of their bank account statements, so why do you post photos of your children without their consent?

    This morning I stumbled across one of the many personal things people share on social media. A father, Patrick Korie, shared his baby’s 1-year photo on LinkedIn asking people to “wish” her happy birthday. The likes and comments were streaming onto the cute photo of the baby playing with the laptop. I decided NOT to like this and wished I could ask him this question, “Why do you abuse your baby’s privacy on social media?”

    Reminder to Parents about Privacy

    Parents, please stop sharing your baby photos on social media. When they grow up, they will not be happy with all this exposure unless you want them to become attention seeking reality-show watching crybabies with low self-esteem. A baby’s privacy is not more or less important than those of an adult, it’s of equal importance. Please remember and we will keep remind you to avoid this stupidity. Someone once told me, the way you know you’ve raised your children successfully, is when they don’t want to be famous!

  • Stop Watching Us

    StopWatching.us is a coalition of more than 100 public advocacy organizations and companies from across the political spectrum. This video harnesses the voices of celebrities, activists, legal experts, and other prominent figures in speaking out against mass surveillance by the NSA. Please share widely to help us spread the message that we will not stand for the dragnet surveillance of our communications.

    The Electronic Frontier Foundation (EFF) is a nonprofit civil liberties law and advocacy center that has been fighting the NSA’s unconstitutional spying for years.

  • How to stop the online snoops

    Tired of being hounded by online retailers, indexed by search engines and possibly monitored by Big Brother governments? Jamie Carter looks at ways to thwart the online snoops.

    It’s been more than a month since the Post exclusively interviewed surveillance whistle-blower Edward Snowden, but the fallout from his revelations about the US PRISM cyber-snooping program continue. Among them were claims that US authorities have hacked Chinese mobile phone companies to access millions of private text messages, while Tsinghua University in Beijing appears to have been targeted, too.

    It has brought attention to just how public our personal web browsing, online chat, file transfer, voice-over IP calls, cloud storage and e-mail really are. But is there anything we can do to stay safe from the snoops?

    It’s hard to hide yourself, if someone pursuing your information is determined
    Lysa Myers, Virus Hunter, intego

    There are multiple ways of “digital shredding”, encrypting data and staying anonymous, but before we explore the options, it’s worth asking why you want to operate in secret. Also, if you encrypt your data, does that make you more suspicious to government snoopers?

    Kevin Curran, a senior member of the Institute of Electrical and Electronics Engineers, reckons anyone making such arguments is living in the past. He says we’ve moved on from a time when the only people using encryption were paranoid geeks, terrorists and law enforcement agencies. Forget the Big Brother angle and think of it this way: is locking your house at night suspicious behaviour, or having a PIN code on your smartphone?

    Keeping your private data secure is good practice for individuals and is becoming a necessity for businesses.

    But there is no silver bullet that will keep all of your data and online behaviour safe.

    “What you need to do to hide from online snoops depends in large part on what sort of snoops you want to hide from, and how valuable your information is to those snoops,” says Lysa Myers, virus hunter at security software company Intego.

    Its Identity Scrubber software – aimed at frequent travellers – digitally shreds sensitive data on a Mac. “It’s quite difficult to hide yourself, if someone pursuing your information is sufficiently determined,” says Myers, who recommends we take many small steps to protect privacy rather than attempt to erase all traces of ourselves online.

    Aside from letting politicians know your stance on cybercrime laws and the government’s ability to search people’s data, she recommends going through the privacy and security options already built-in to most software, including the operating system, which you’ve likely ignored so far.

    “Encrypting data at rest on a local device is best practice,” agrees Curran, who says that anything held behind a firewall is likely to be encrypted.

    “All data prior to be sent to a service like Dropbox should be encrypted before uploading to the cloud service,” he adds.

    People with the Ultimate or Enterprise version of Windows 7 or Windows 8 can use the built-in BitLocker software to encrypt the drive, while others include TrueCrypt, DiskCryptor and CloudFrogger.

    read the full piece of advice on South China Morning Post website.

  • Facebook admits year-long data breach exposed six million users

    Mark Zuckerberg Facebook CEPBy Gerry Shih, Reuters

    Facebook Inc has inadvertently exposed 6 million users’ phone numbers and email addresses to unauthorized viewers over the past year, the world’s largest social networking company disclosed late Friday.

    Facebook blamed the data leaks, which began in 2012, on a technical glitch in its massive archive of contact information collected from its 1.1 billion users worldwide. As a result of the glitch, Facebook users who downloaded contact data for their list of friends obtained additional information that they were not supposed to have.

    Facebook’s security team was alerted to the bug last week and fixed it within 24 hours. But Facebook did not publicly acknowledge the bug until Friday afternoon, when it published an “important message” on its blog explaining the issue.

    A Facebook spokesman said the delay was due to company procedure stipulating that regulators and affected users be notified before making a public announcement.

    “We currently have no evidence that this bug has been exploited maliciously and we have not received complaints from users or seen anomalous behaviour on the tool or site to suggest wrongdoing,” Facebook said on its blog.

    While the privacy breach was limited, “it’s still something we’re upset and embarrassed by, and we’ll work doubly hard to make sure nothing like this happens again,” it added.

    The breach follows recent disclosures that several consumer Internet companies turned over troves of user data to a large-scale electronic surveillance program run by U.S. intelligence.

    The companies include Facebook, Google Inc, Microsoft Corp, Apple Inc and Yahoo Inc.

    The companies, led by Facebook, successfully negotiated with the U.S. government last week to reveal the approximate number of user information requests that each company had received, including secret national security orders.

    (Reporting by Gerry Shih; Editing by Richard Chang)

    source: Reuters

  • Privacy – The Online Generation Wants It

    CHICAGO (AP) — The generation that’s grown up posting their lives online wants a little privacy. That’s not what we might expect as we debate just how much access the government should have to our mobile and online lives.

    But as it turns out, young people are much more complex than some may think when determining what personal information they want to share.

    Sure, they’re as likely as ever to post photos of themselves online, as well as their location and even phone numbers — and assume that at least some of their information is shared among website providers — say those who track their high-tech habits. But as they approach adulthood, they’re also getting more adept at hiding and pruning their online lives.

    Despite their propensity for sharing, many young adults also are surprisingly big advocates for privacy — in some cases, more than their elders.

    That attitude showed up most recently in a poll done over the weekend for the Pew Research Center for the People & the Press and The Washington Post. The poll, tied to the disclosure of broad federal surveillance, found that young adults were much more divided than older generations when asked if the government should tread on their privacy to thwart terrorism.

    Fifty-one percent of young adults, ages 18 to 29, said it was “more important for the federal government to investigate possible terrorist threats, even if that intrudes on personal privacy.”

    But 45 percent said personal privacy was more important, even if it limited the ability to investigate possible terrorist threats.

    In contrast, less than a third of adults, age 30 and older, told pollsters that preserving personal privacy was more important, while about two-thirds placed higher value on permitting terror investigations, regardless of privacy infringement.

    The young adults were much more in line with their elders when asked about the government monitoring specific modes of communication. Pollsters found that a slight majority of adults — including 18- to 29-year-olds — said it was “acceptable” for the government to secretly obtain phone call records.

    But a similar slight majority also said it was “unacceptable” for the government to monitor everyone’s emails and online activity. In an AP-NORC Center survey conducted around the 10th anniversary of the Sept. 11, 2001, terrorist attacks, those younger than age 30 also were most likely to oppose several different means of government surveillance, from emails to phone calls.

    It should be noted that the details about surveillance techniques used by the National Security Agency were still emerging as the weekend Pew poll was being done.

    “The big insight here is that younger adults are not indifferent to privacy, as many seem to believe,” says Lee Rainie, the director of the Pew Internet & American Life Project, which is affiliated with Pew Research Center for the People & the Press.

    It also fits with a report that Rainie’s staff recently issued on social media, privacy and adolescents, ages 12 to 17.

    They found that 91 percent of youth in that age bracket said they post photos of themselves on social networking sites, up from 79 percent in 2006, the last time this survey was done. Just over 70 percent post where they live, up from 61 percent. And 20 percent post their cell numbers, up from 2 percent.

    This time, researchers also asked about security and found that 60 percent of youth said they set their social networking profiles to private and were confident about keeping control of those settings. A similar proportion of young respondents said they’d also deleted some of their previous posts, blocked people from their social networking accounts and cloaked their messages with inside jokes or obscure references that only their friends would understand.

    Danah Boyd, a senior researcher at Microsoft Research, and her colleagues call the latter habit “social steganography,” a term for the hidden messages that ancient Greeks used.

    But it’s not federal investigators young people have in mind when they write in code, she says.

    “While adults are often anxious about shared data that might be used by government agencies, advertisers, or evil older men, teens are much more attentive to those who hold immediate power over them — parents, teachers, college admissions officers, army recruiters, etc.,” Boyd wrote in an online blog about the Pew Internet & American Life findings.

    “Most teens aren’t worried about strangers,” she added, “They’re worried about getting in trouble (with those they know).”

    They’re also getting more serious about editing their online lives — and adding more privacy measures — as they enter the college and work worlds, says Mary Madden, a senior researcher at the Pew Internet & American Life Project.

    “They’ve had to learn to function in this world of constant monitoring,” says Madden, who co-wrote her organization’s report on young people and privacy.

    That includes parents who track their children’s mobile devices, computers and accounts. “So they crave the freedom to have a playful space where they can do that,” Madden says.

    It explains, in part, why teens are moving to more creative and visually driven sites, such as Instagram and Snapchat.

    Results from the most recent Allstate/National Journal Heartland Monitor Poll, released Thursday but collected before the NSA story broke, found that young people were still more likely to accept the privacy tradeoffs of online life. Fifty-seven percent of young adults, ages 18 to 29, said they had a “great deal” of control over the personal information online. Even if there are risks, 54 percent also said the positives of online life made potential privacy tradeoffs worth it. Older age groups were consistently less likely to feel control over their online information and were less confident about the benefits of the tradeoffs.

    But they still want more control.

    A study published in 2010 by researchers at the University of California, Berkeley, and the University of Pennsylvania found that a large majority of young adults they questioned in 2009 thought there should be a law that would require website providers to delete all stored information about an individual.

    Those young people also wanted a law that would give them the right to know all the information those website providers have about them. Some would include government investigators, too.

    “I would highly prefer not having a target on my back for saying something in what I believe is a private forum,” says Jayson Flores, who’ll be a senior this year at Arcadia University in Pennsylvania.

    His views are consistent with the group that falls on the side of privacy over surveillance.

    Mandi Grandjean, a recent graduate of Miami University in Ohio, says she’s fine with the federal government doing secret surveillance of phone call records and Internet exchanges to combat terrorism, but “with congressional oversight.”

    “I was in sixth grade when 9/11 happened — and the world changed,” she says. “I am personally not a fan of big government, but I understand there are needs for security.”

    But even she believes it’s different when it comes to an employer, or even a coach. She was an athlete at Miami and had to agree to have her social networking accounts — even private ones — monitored by her coaches.

    She recalls one time, when she tweeted something on her locked Twitter account at midnight. Shortly after, her coach texted her: “Go to bed.”

    “I think there’s a line,” Grandjean says. “It puts me on edge.. It’s a little too close for comfort.”

    The Pew Research Center for the People & the Press/Washington Post poll was conducted by telephone June 6-9 with a random sample of 1,004 adults, age 18 and older. The margin of error is plus-or-minus 3.7 percentage points.

    The Pew Internet & American Life Project privacy poll, completed last September, tallied responses from 802 young people, ages 12 to 17, and their parents. It has a margin of error of plus-or-minus 4.5 percentage points.

    The Allstate/National Journal Heartland Monitor Poll was conducted by phone from May 29 – June 2 with 1,000 American adults age 18 and older. The margin of error is plus-or-minus 3.1 percentage points.

    ____

    On the Internet: Pew Research Center

    ____

    Martha Irvine is an AP national writer. She can be reached at mirvine@ap.org or at

  • Who can spy on your Internet browsing?

    Internet service providers explain what South Africa’s RICA law requires of them

    Internet service providers (ISPs) in South Africa must be able to divert a user’s traffic to an “interception point” on-demand as a requirement of RICA,Cybersmart CEO Laurie Fialkov recently told MyBroadband.

    The Regulation of Interception of Communications and Provision of Communication-Related Information Act (RICA) was gazetted in 2003 and, after a number of extensions, service providers finally had to fully implement it by June 2011.

    Part of the demands RICA places on ISPs, Fialkov added, is that they must be able to see what a user is connecting to, as well as broad classification of what the traffic is.

    “For instance we can tell if it is adult content or video streaming or e-mail,” Fialkov said.

    This type of interception may only happen when a person in law enforcement receives permission to do so, however.

    Fialkov highlighted sections of RICA which specify that only retired judges, or a judge of a High Court not in active service may grant a “direction” to this effect.

    This is the only way they are able to inspect a user’s traffic, Fialkov said, as they don’t store any information about which URLs or IPs users connect to.

    Laurie Fialkov
    Laurie Fialkov

     

    Franco Barbalich from Axxess and Derek Hershaw from Mweb reiterated this, saying that they don’t store specific data about their subscriber’s Internet usage.

    “At an individual user level we track total usage so that we can apply capping and so on,” explained Hershaw, who is head of Mweb ISP. This is for Mweb’s capped user-base.

    Mweb also tracks the network protocols and services that are used by its subscribers at an aggregate level, Hershaw said. This is to do traffic management and shaping.

    Asked how this data is stored and who has access, Hershaw said that it is secure.

    “We treat it the same way as all our customer information, he said. “In terms of the aggregated data we are referring to here, only a small group of staff who do our traffic management [has access].”

    Derek Hershaw
    Derek Hershaw – MWEB ISP MD

     

    source: mybroadband