Tag Archives: Privacy

How to Protect Your Privacy on Social Media

Guest writer Sarah Clare tackles the thorny issue of Internet privacy and offers spot-on advice  to help you keep your online information private.

imageThis week, social media was abuzz over reports that Instagram’s new terms of service allowed the photo-sharing site to hock its users personal photos for advertisements and other promotions. The story prompted outcry about the privacy that members can expect (or not expect) on social media sites like Instagram and Facebook, which purchased Instagram and which has a spotty history when it comes to its users’ privacy.

Understanding your rights and how you can protect your privacy on social media is important. The things you do online leave a virtual footprint that can be traced back to you for years to come. If you really want to protect your privacy on social media, here are a few things you can do:

Use a Dummy E-mail

One of the easiest ways that other users can find you on social media is by searching for your e-mail. You can make it harder, if not impossible, for people to find you by using a dummy e-mail. That way, only your close friends or family who you give the e-mail to can find your profile. Be sure to use an e-mail that does not include your name and that you only use for this purpose.

Use a Fake Name

Of course, even if you’re using a dummy e-mail, if you’re using your real name, anyone can find you. Make it harder for others to connect your profile to you by using a fake name. An easy way to do it is to simply drop your last name, using your first and middle name instead. Or you can use a nickname instead of your first name. Or you can make up a new name entirely.

Again, be sure you keep this name private and only give it to close friends and family who you want to know about your profile. Don’t use the name for any other purposes.

Set Privacy Options

Every social network has options for allowing you to control what you share with your network and with the public. You can control your privacy settings for your whole profile and for individual posts. Take the time to investigate your options and to set what you can to private. In many cases, you can lock down all your information so that it is visible only to your contacts (or even only to yourself).

Keep Business and Personal Separate

Most of us want to maintain some privacy online to protect our professional identities. You can help do this by using one profile for your private connections and another profile for your business connections. Of course, you would use your real name for your business profile and would share little to no personal information on it. You can then share personal information on your personal profile kept private through the previous steps.

Control What You Share

Of course, the easiest way to keep your information private online is not to share it. No matter what you do to protect your information, there will be some way for businesses or other people to see it. Keep your information private by keeping it offline, especially personal photos, information about your children, or thoughts about your political or religious beliefs.

Online privacy is a serious issue, and one which requires a greater level of personal responsibility as the options for connecting online continue to expand. These tips can help you to keep your personal information private while you connect with friends and business contacts online.

Sarah Clare is a writer and oversees the site projectmanagementsoftware.com, where she has recently been researching bug tracking software. In her spare time, Sarah enjoys cooking and scrapbooking.

3 Comments

Filed under Guest Writers, Internet Safety, Online Privacy, Social Networks

How Will the Cloud Change Computers?

Kelsey Clark brings her perspective on “The Cloud” in this guest article.

The Cloud is one of the tech world’s most-discussed concepts. Embracing a wide variety of different paradigms, the Cloud is an evolving concept. The basics of what the Cloud means, however, are well established. Here are a few questions people are asking themselves about what the Cloud will mean for computing in the future.

1. Security Changes
With the data stored on remote hard drives and computation being done on remote processors, the Cloud promises to move most security issues to servers. Local security issues will not necessarily lead to data being compromised. However, server security will become even more important; compromising a major Cloud server will potentially lead to thousands or millions of users having their data compromised. Are current security measures enough to prevent hackers from accessing personal data?

2. Privacy
Having all data on a remote site will raises questions about how companies will use this data. Will minor encroachments on privacy be met with customer resistance? Will users tolerate having their data scanned and used for targeted ads? In the tech world, low prices help increase a customer base. Finding the right balance of low cost and sufficient privacy, however, may take some time for the market to determine.

3. Performance
For some types of programs, the Cloud paradigm works well. Whether all programs can be run in a Cloud environment, however, remains an open question. Some envision the future Cloud as a paradigm that takes advantage of local processing power and RAM, but others believe that this eliminates some of the advantages of Cloud computing. Further developments may be necessary to ensure that the Cloud performs as well as users demand.

4. Operating Systems
Some are speculating if the Cloud will remove the importance of having a modern operating system. A browser may be all that is necessary to run important programs, so will users begin to use alternative operating systems more often? Apple’s operating systems currently suffer from their inability to run certain industry-specific programs needed for work, and Linux distributions flourish in the server world but languish on the desktop. Will the Cloud increase these platforms’ presences?

5. Sense of Ownership
Many expect that the Cloud programs of the future will require that users pay a monthly or yearly fee to access the program. In this sense, users do not truly own the program. Studies have shown that people prefer to buy products outright instead of paying for access when necessary. Will this lead consumers to reject the Cloud?

The Cloud is clearly making inroads in the business world. For individuals, however, its impact remains unclear. With a number of programs expected to become available online in the coming years, the tech world may get some indication on how popular the Cloud will be.

Author Byline:

Kelsey is the editor in chief for www.findananny.net/. She loves to write article and ideas that parents & nannies would be interested in hearing. She helps society on giving information about nannies through nanny services. She is a professional writer and loves writing on anything.

4 Comments

Filed under Cloud Computing, Connected Devices, Guest Writers, Opinion

I am not a number, I am a free man! – I am not a consumer, I am a free man!

imageThere are those happy occasions when a reader’s comment here is so insightful, that the comment deserves to be highlighted as a stand alone post. Comments from Mark Schneider, Michael Fisher, John Bent, and several other readers, have been highlighted previously, using this criteria.

Following a recent opinion piece – Open Source BleachBit 0.9.3 – Deletes HTML5 Cookies – which detailed the rise of a new threat to personal privacy, regular reader RedNightHawk offered this comment for consideration and discussion.

I think you’ll find it worthwhile to evaluate the issues raised in RedNightHawk’s perceptive comment.

“I usually check the Options/Settings/Preferences of my browser after an upgrade to make sure I haven’t lost any settings, and to see what’s new. I remember when I saw an option to allow HTML5 to use local storage (and a sub-option to delete any files on close), I refused to allow any local storage.

I did that for the same reason I used to have my flash storage set to zero – I didn’t know what all the storage would be used for, and if it’s optional then it’s clearly not needed for the technology to work.

I eventually wound up enabling local flash storage (some sites wouldn’t work without it enabled), once I got the NirSoft program that deleted LSO’s, and I used a program that sat in the tray and let me turn the flash bit on and off so I wouldn’t get cookies when I was just surfing; only when I actually wanted to see some particular flash content.

My current most-used browser allows me to click on specific flash objects if I want to allow them. What a pain this all is (how inconvenient!), and here’s the kicker – just a few days ago, thanks to a link in your Tech Thoughts, I was reading about a tracking company trade group CEO telling Senators he thought the industry was doing a good job of policing itself and legislation wasn’t needed to control tracking, or protect privacy.

When mechanical gadgets first started being made it was for convenience – to benefit us by freeing up time for other things. Now, in the information age, the CON part of convenience seems to be prevalent. Corporations know we’ll make poor decisions and put convenience above things like privacy, nutrition, financial well-being, etc.

Too often a gadget or technological breakthrough is a mere piece of cheese, luring the consumer into a trap – the worst kind of trap: one which they never realize they’re in. Are we mice now, destined to live our lives running around the mazes they create for us?

I’m reminded more and more of the opening of the TV series The Prisoner where Patrick McGoohan yells out, “I am not a number, I am a free man!” More and more there’s times when I feel like grabbing a CEO’s lapels and yelling, “I am not a consumer, I am a free man!” Think the message would get through?”

–   RedNightHawk

P.S.
Dan Tapscott has an interesting series about privacy in the digital age on The Star’s website that you and your readers might be interested in:
http://www.thestar.com/news/insight/article/1204668

8 Comments

Filed under Opinion

Flash Cookies – Spyware By Any Other Name

imageI first wrote on the issue of Flash cookies back in September 2009, and since then, I’ve watched as these obnoxious web trackers and privacy invaders multiply like a virus. Based on the number of questions I continue to get on the Flash cookie issue, it’s apparent – confusion reigns when it comes to this underhanded privacy threat.

One of the better forum comments I’ve seen referencing Flash cookies:

“I think many people may not realize how serious it is. In many ways, I see it as the virtual equivalent of dumpster diving or taping together a shredded document. It is deliberately ignoring a data owners deletion of data by an entity that has no business doing so.”

This practice of  web sites dropping Flash cookies onto your computer, which occurs without your knowledge or permission, is akin to hacking – according to some in the security community. Frankly, I agree.

Continuing developments in tracking technologies, and a complete disregard for fundamental privacy rights, should be a major topic of conversation in the security community – until such time as the issue has been resolved in favor of consumers.

In the meantime, we’re on our own. It’s up to us, as individual consumers, to take the appropriate steps to safeguard our privacy (as best we can), while interacting with the Internet.

Here’s what we’re up against – and, this is just one small example.

From Disinformation.com

McDonald’s, CBS, Mazda, Microsoft Sued For Tracking Internet Users’ Histories

In a complaint filed Tuesday with the U.S. District Court for the Southern District of New York, Sonal Bose alleges that McDonald’s and the other companies “acted in concert with Interclick,” to mine users’ Web surfing history for marketing purposes. “Defendants circumvented the privacy and security controls of consumers who, like plaintiff, had configured their browsers to prevent third-party advertisers from monitoring their online activities,” Bose alleges.

The lawsuit alleges that the companies violated the federal computer fraud law, wiretap law and other statutes. She is seeking class-action status. This lawsuit comes several weeks after Bose sued Interclick for allegedly using history-sniffing technology and Flash cookies to track her online activity.

History-sniffing technology exploits a vulnerability in browsers to discover the Web sites users previously visited. Researchers from the University of California, San Diego recently brought the technique to light when they published a paper explaining the technique and naming 46 Web sites where history-sniffing technology was being deployed. In at least some cases, ad company Interclick reportedly used the technology without the publishers’ knowledge.

Bose also says in her complaint that she believes that the defendants used Flash cookies for tracking purposes. Flash cookies are stored in a different place in the browser than HTTP cookies, and therefore, require additional effort to delete.

Flash cookie quick facts:

They never expire

Can store up to 100 KB of information compared to a text cookie’s 4 KB.

Internet browsers are not aware of those cookies.

LSO’s usually cannot be removed by browsers.

Using Flash they can access and store highly specific personal and technical information (system, user name, files,…).

Can send the stored information to the appropriate server, without user’s permission.

Flash applications do not need to be visible.

There is no easy way to tell which flash-cookie sites are tracking you.

Shared folders allow cross-browser tracking – LSO’s work in every flash-enabled application

No user-friendly way to manage LSO’s, in fact it’s incredible cumbersome.

Many domains and tracking companies make extensive use of flash-cookies.

If you value your privacy, then without a doubt you need to control these highly invasive objects, and if you are a Firefox user there is a solution – BetterPrivacy – a free Firefox add-on.

From the BetterPrivacy page:

“Better Privacy serves to protect against not delectable, long-term cookies, a new generation of ‘Super-Cookie’, which silently conquered the internet.

This new cookie generation offers unlimited user tracking to industry and market research. Concerning privacy Flash- and DOM Storage objects are most critical.

This add-on was made to make users aware of those hidden, never expiring objects and to offer an easy way to get rid of them – since browsers are unable to do that for you”.

In the following screen capture (click to expand to original), you’ll notice BetterPrivacy has deleted a cumulative total of 6188 Super Cookies.

image

The Options and Help tab (shown in the following screen shot), will allow you to choose specific deletion methods. You should consider selecting “Disable Ping Tracking”, which will prohibit sites from following you as you surf the Net.

image

image

Download at: Mozilla

For a more detailed breakdown on flash cookies, and the danger they represent to personal privacy, checkout The Electronic Privacy Information Center.

Google Chrome users can take advantage of the Click&Clean Extension (works with Firefox as well).

The following screen capture of Click&Clean’s Options menu, illustrates the application’s ability to deal with Flash cookies.

image

Fast facts:

Delete your browsing history
Clear records from your download history
Remove cookies and Empty cache
Delete temporary files
Remove Flash Local Shared Objects (LSO)
Delete private data when Firefox closes
Automatically close all windows/tabs
Clean up your hard drives and Free up more disk space – including secure file deletion
Launch external applications, like CCleaner, Wise Disk Cleaner etc. on Windows – or Janitor, BleachBit, etc. on Linux

Download the Firefox version at: Mozilla

Download the Chrome version at: The Chrome Web store

You can read a full review of this application – Clean Up With Click&Clean Firefox and Chrome Extension, on this site.

If you found this article useful, why not subscribe to this Blog via RSS, or email? It’s easy; just click on this link and you’ll never miss another Tech Thoughts article.

19 Comments

Filed under Browser add-ons, Chrome Add-ons, downloads, Firefox Add-ons, Flash Cookies, Freeware, Privacy, Windows Tips and Tools

Join The Crowd – Snoop On Your Kids Internet Privacy – 55% Of Brits Do!

imageDo you monitor your children’s online activity? Is an invasion of your child’s privacy on such a scale, necessary? Do you tell yourself that you’re just being prudent?

We know from survey after survey, that teenagers have misplaced confidence in their ability to stay safe online. While the majority of teenagers say they are confident they can remain safe online, survey results continue to show a wide gap exists between the perception, and the reality.

Even so – is that state of affairs cause for alarm? Or, have parents been manipulated into a state of “perverts run amok” fear and anxiety, by a mainstream media which is expert at molding public perception – à la Rupert Murdoch and his now defunct News of the World? The fear mongering practiced by parental control security providers, I’ll leave for another time.

Given the often accepted (but, statistically false) notion that children/teenagers are in mortal danger in a technological age with its easy access to social networking, mobile communication (and all that entails), lost in the translation, it seems to me, are the practical benefits for adolescents that technology provides.

It would be difficult to argue to the contrary, that today’s young people face a tough, harsh “World”, the World of the Internet and attached devices –  in which the technology itself, the content it delivers and its instant contact capabilities – come with associated risks.

Undoubtedly, there are age specific potential risks but, snooping on your child’s or your adolescent’s online activity, is hardly what could be called – a positive influence. Certainly not when communication – the sharing of knowledge and safety strategies – coupled with effective guidance, is much more likely to lead to the results that all parents are seeking.

The reality is – staying safe in today’s techno centric world demands knowledge, and acquiring that knowledge requires that a major effort be made to obtain it. If you, as a parent, see the need to positively influence your young person’s technology habits then, you must make the effort to acquire the appropriate knowledge.

On the other hand, you can always take the easy way out and – just snoop. If you so choose, rest assured that you’ll have lots of company.

According to a recently released study commissioned by security application provider BullGuard, made up of 2000 interviews of internet users across the UK – 55% of parents “keep an eye” on a son or daughter by checking their social networking profile, with a further 5% saying “they would if they knew how”.

This snooping doesn’t stop there however – 76% of respondents say they check Internet history to ensure children aren’t visiting unsuitable websites –  21% check instant messaging history, and 23% snoop through email accounts.

Additional information on the survey is available here.

Young people value their privacy – just as we all do. I suspect that those parents who routinely violate this privacy compact, as the 55% of respondents to this survey apparently do, may well have additional issues (other than a lack of appropriate parenting skills), with which they need to deal. I suspect that their mental balance sheet is more than a little skewed.

If you found this article useful, why not subscribe to this Blog via RSS, or email? It’s easy; just click on this link and you’ll never miss another Tech Thoughts article.

5 Comments

Filed under Internet Safety for Teenagers, Online Safety, Point of View, social networking, Social Networks, Windows Tips and Tools

Delete Data Permanently With Free Free File Shredder 2

This article is a companion piece to – Staples Resells Storage Devices Without Wiping Customers’ Personal Information – published earlier today.

File Shredder 3Many of us now own, and use a paper file shredder to destroy documents, and personal and financial papers that we don’t want to fall into the hands of identity thieves, or anyone else not entitled to have access.

So now, consider those files on your computer that you’ve deleted, sent to the recycle bin, and then flushed as you emptied the recycle bin. When you go through this process the deleted files are gone forever, right?

Well if you’re a typical computer user, you quite likely do believe that they’re gone forever, since the deleted files can’t be seen in Windows Explorer. In fact, you can’t find these files anywhere on your Hard Drive.

It may surprise you to learn that not only can I find those files but I can recover them as well. Oh, it’s not because I’m a super- duper tech wizard – although I will say, with some modesty, that I am. LOL.

Here’s the lowdown: when a file is deleted from your Hard Drive, what really gets deleted is the system link pointing towards the file, but not the file itself. Surprisingly, it is relatively easy to retrieve the deleted file using specialized file recovery software (often available as a free download), which takes advantage of shortcomings in the Windows operating systems.

Let me give you an example. Recently, I agreed to rebuild 30+ computers (at no cost – my way of giving back), being donated to a local charity for distribution to less fortunate families.

While working on these machines I noticed immediately that although the Hard Drives had undergone file deletion, they had not been wiped. Since these machine had been donated by a government agency; that struck me as being negligent in the extreme.

In order to bring this situation to the attention of those who had committed this serious breach in security, I recovered a number of these files. Not unexpectedly, the recovered files did in fact did contain confidential information. In this case – confidential information on families on public assistance.

As part of the process, I saved the recovered files to disk and presented the disk to the appropriate authorities. Shock, surprise, embarrassment, were just some of the reactions. It’s easy to see from this example, that deleted files (or a good portion of a file) can easily be recovered.

In order to delete or shred files permanently, to protect your privacy and potentially your security, or for any other reason for that matter, you need a program such as File Shredder 2 that is capable of overwriting the file with a random series of binary data multiple times.

This process is often called shredding. That way, the actual content of the file has been overwritten and the possibilities of recovering such a shredded file becomes mainly theoretical.

File Shredder 2, is a simple but powerful program, with a straightforward interface, that many users judge to be better than some commercial file shredders. With File Shredder 2 you can remove files from your hard drive permanently, and feel confident that the file can’t be recovered.

File Shredder 4

Running the program allows you to choose between 5 different shredding algorithms, each one gradually stronger than the previous one. As well, it has an integrated Disk Wiper which uses a shredding algorithm to wipe unused disk space. I use this feature frequently, to clean up my drives (after running test applications), and to destroy any leftover fragments of previously deleted/uninstalled files.

If you’re looking for a great free file shredder application that does what it says it does, in an easy to understand manner, I highly recommend File Shredder 2.

System requirements: Windows 2000,  XP, Vista, Win 7.

Download at: Download.com

If you’re looking for a more robust portable application – checkout Disk Wipe.

Disk Wipe is a free, portable Windows application for permanent volume data destruction. With Disk Wipe you can erase all disk data and prevent recovery of that data.

Disk Wipe uses powerful algorithms which fill the volume with useless rubbish binary data, multiple times. The possibility of recovering information from drives formatted with Disk Wipe, is virtually non existent.

System requirements: Windows 2000,  XP, Vista, Win 7.

Download at: the developer’s site (Disk Wipe)

If you found this article useful, why not subscribe to this Blog via RSS, or email? It’s easy; just click on this link and you’ll never miss another Tech Thoughts article.

5 Comments

Filed under Freeware, Geek Software and Tools, Hard Drive Tools, Portable Applications, Privacy, Secure File Deletion, Software, USB, Windows Tips and Tools

Ditch Facebook – Go Private With Free Flink12

imageThere are 600 Million plus, active Facebook users, but I must confess – I’m not one of the active users. It’s true, I do have a Facebook page but, I use it sparingly.

Since many software developers are now into the – “visit our Facebook page, click on the Like button, and we’ll give you ……….” school of marketing,  I use my Facebook account to meet this manipulative requirement.

My list of grievances with Facebook is a long one, but privacy, or more precisely, the lack of privacy, overrides all other concerns – I’ll leave the considerable security issues aside, for the moment.

I’ve always found it difficult to get a handle on Facebook’s constantly shifting definition of privacy and, it’s difficult to understand and hard to apply, personal privacy restrictions.

Maybe I’m old fashioned, but I just can’t get my head around the idea of putting private information out into the ether of the Internet. On the other hand, there are those who love the Facebook experience, and it seemingly plays an important role in their lives. I think it’s safe to say, that this is a market which will continue to grow exponentially.

Some people see this as inevitable progress – but I’m not one of them. Instead, my definition of progress in this market, is the development of private social networking platforms. Platforms that are designed specifically for friends, families, and  work teams, to privately share, discuss, organize photos, videos, etc., – all in a single easy to use private environment.

One such platform that caught my attention recently is Flink12. It was a “no-brainer” really. An application that can set out in a sentence, or three, an approach to privacy that meets my requirements, is sure to grab my attention.

Here’s what Flink12 has to say on social sharing privacy:

“Privacy first” is the highest priority at Flink12. This approach ensures that your personal information will remain completely secure. With no privacy settings to manage, your information is automatically safe. Personal information will not indexed on the web by search engines. You decide when, where and how much of your life you want to share and with whom.”

Since Flink12 passed my first test, I went on to the next set of questions – did it meet my requirements for functionality? Did it meet my requirements for usability? It did in both cases – and, the following list of features was very convincing.

Fast facts:

Safe & Private – Our “Privacy first” approach ensures that your personal information will remain private. Your information will not be indexed on the web by search engines. We designed Flink12 at its roots to be “udderly” private. Users have complete control.

Easy Photo Sharing – Easy to upload, free, fast, private photo sharing. Caption your photos. Comment on photos. There are several options for sharing each photo and privatizing comments. It’s truly the best way to share photos and comments.

Private Texting/Chat – Free instant communication one-on-one between you and any person in your Flink. Texting is free on Flink12.

Blogging – Write about your personal thoughts and activities as often as you wish. Blogging on Flink12 is quick, easy and fun. There are several options for sharing of blogs and comments amongst your flinks.

Friend Mapping – See where your friends are anytime, worldwide. You have a choice to show your location to your Flink friends or not. Very useful for travelers or friends and relatives across the globe or meeting up with friends for coffee.

Playful Icon Themes – Never forget to play. Our icons are all about expressing yourself in a playful way. Flink icons are uniquely humorous and allow you to quickly share your mood, health, activities and events using preset text or by entering your own text. Choices of several fun themes such as Moms & Babies, Sports Fans, Diva’s, Teens and Pets are coming soon.

Web & Apps – You can join and update on any platform- website, iPhone, iPad, iPod Touch and Android and you only have to post it once- Flink 12 updates seamlessly on all platforms.

Alerts – There are several options for notifications or alerts from your friends. On mobile, MOO’s and cowbells let you know when your friends have posted fresh news.

For more information and to sign up – visit the developer’s site: Flink12

Bottom line:

Flink12 is a technology rich application; full of powerful features – many more than I’ve been able to cover in this short review. At the same time, Flink12 has been designed for speed and simplicity.

If you’re into social networking and privacy is a concern, then take Flink12 for a test drive – I think you’ll be glad you did.

If you found this article useful, why not subscribe to this Blog via RSS, or email? It’s easy; just click on this link and you’ll never miss another Tech Thoughts article.

10 Comments

Filed under Cloud Computing, Connected Devices, downloads, Freeware, Interconnectivity, Mobile Applications, Networking, Peer to Peer, Privacy, Social Blogging, social networking, Social Networks, Software, Windows Tips and Tools

Take Control Of Your Internet Privacy With BetterPrivacy Firefox Add-on

In the real world of Internet security push and shove, it seems everything has a “season” – a space in the spotlight. For example – each day we are bombarded with the latest, subjectively “most dangerous” – malware threat, cyber criminal operational techniques, application vulnerabilities, or irresponsible enterprise behavior – the latest being the negligent Epsilon data breach. All destined to become “old news” and seemingly irrelevant, within days

Just wait a few days and the Epsilon data breach will no longer be news worthy; it will simple fade away (just as if it never happened) – as have the other 20+ serious data breaches which have occurred in the last 30 days. Data breaches that have impacted governments, educational facilities, major enterprises ……

Test yourself – can you name one other security breach, application vulnerability, or dangerous malware threat, or technique, reported on in the last thirty days?

Internet privacy is a perfect example of this; in favor – out of favor, critical issue – non-critical issue cycle of Internet security push and shove. Lately, Internet privacy has been relegated to the back burner. Sort of like – hey, it’s not a big deal. Besides, there are newer and more exciting issues to report on – Internet privacy is old news!

But here’s the thing – Internet privacy is a substantial issue, and a more critical issue than ever. Developments in tracking technologies and a complete disregard for fundamental privacy rights, should be a major topic of conversation in the security community – until such time as the issue has been resolved in favor of consumers.

In the meantime, we’re on our own. It’s up to us, as individual consumers, to take the appropriate steps to safeguard our privacy (as best we can), while interacting with the Internet.

You can take a step in that direction by increasing your awareness of a significant threat to your privacy – Flash Cookies (also described as (LSO) – Local Shared Objects, and Smart Cookies).

Late last year, I wrote an article “BetterPrivacy Firefox Add-on Kills Flash Cookies”, centered on this stealthy and underhanded privacy threat, which I have now updated. I think you’ll find it’s worth another read.

image

If you hear something repeated often enough, then that “something” takes on a veneer of truth. It doesn’t necessarily mean that it is true of course – but, it appears to be true. The “truth” regarding Internet site cookies, falls into that category.

Most of us have heard that “truth” – without cookies (and now, Flash cookies), your Web experience would be terrible. You’d be starting from scratch each time you did anything on a given site online. Or, something along that line.

Nonsense! For years, I have deleted cookies at every Browser shut down, and have experienced no perceptible difference in performance when visiting the same 30 or so sites, that I visit every day

Here’s the reality:

imageCookies are there for the benefit of advertisers; not the web site visitor – plain and simple. Keep in mind, that it’s critically important to advertisers to generate advertising that is specific to the web site visitor at the time of the visit – not later, but right then. And a cookie is the tool that facilitates this happening.

Luckily, Internet browsers can be set to allow full user control over cookies including accepting, rejecting, or wiping private data which includes wiping cookies. That is, until recently.

It appears that a user’s decision to control cookies, in this way, is simply not acceptable to advertisers and certain web sites, and so, we now have the Flash Cookie (LSO) – Local Shared Objects.

There is a major advantage for an advertiser to employ Flash cookies, not the least of which is; they are virtually unknown to the average user. Equally as important, from an advertisers perspective is; they remain active on a system even after the user has cleared cookies and privacy settings.

This practice of  web sites dropping Flash cookies onto your computer, which occurs without your knowledge or permission,  according to some in the security community, is akin to hacking. Frankly, I agree.

If you think this practice is restricted to shady web sites, you’d be wrong. Of the top 100 web sites, the majority use Flash Cookies. So, I was not particularly surprised, when I found some of my favorite sites involved in this invasive practice.

I first wrote on the issue of Flash Cookies back in September 2009, and since then, I’ve watched as these obnoxious web trackers and privacy invaders multiply like a virus.

Quick Flash cookie facts:

They never expire

Can store up to 100 KB of information compared to a text cookie’s 4 KB.

Internet browsers are not aware of those cookies.

LSO’s usually cannot be removed by browsers.

Using Flash they can access and store highly specific personal and technical information (system, user name, files,…).

Can send the stored information to the appropriate server, without user’s permission.

Flash applications do not need to be visible.

There is no easy way to tell which flash-cookie sites are tracking you.

Shared folders allow cross-browser tracking – LSO’s work in every flash-enabled application

No user-friendly way to manage LSO’s, in fact it’s incredible cumbersome.

Many domains and tracking companies make extensive use of flash-cookies.

If you value your privacy, then without a doubt you need to control these highly invasive objects, and if you are a Firefox user there is a solution – BetterPrivacy – a free Firefox add-on.

From the BetterPrivacy page:

“Better Privacy serves to protect against not delectable, long-term cookies, a new generation of ‘Super-Cookie’, which silently conquered the internet.

This new cookie generation offers unlimited user tracking to industry and market research. Concerning privacy Flash- and DOM Storage objects are most critical.

This add-on was made to make users aware of those hidden, never expiring objects and to offer an easy way to get rid of them – since browsers are unable to do that for you”.

In the following screen capture (click to expand to original), you’ll notice BetterPrivacy has deleted a cumulative total of 6188 Super Cookies. An amazing number, considering the OS on this machine was freshly installed on March 1, 2011.

image

The Options and Help tab (shown in the following screen shot), will allow you to choose specific deletion methods. You should consider selecting “Disable Ping Tracking”, which will prohibit sites from following you as you surf the Net.

image

Download at: Mozilla

Simple HTTP cookies (ordinary cookies), can be subject to attack by cyber criminals, so it won’t be long before flash cookies will be subject to the same manipulation. Better you should learn how to control them now – not later.

Privacy, in all areas of our life is under constant attack, but that shouldn’t mean that we give up. We need to learn to fight back with every tool that’s available.

For a more detailed breakdown on flash cookies, and the danger they represent to personal privacy, checkout The Electronic Privacy Information Center.

If you found this article useful, why not subscribe to this Blog via RSS, or email? It’s easy; just click on this link and you’ll never miss another Tech Thoughts article.

14 Comments

Filed under Browser add-ons, downloads, Firefox Add-ons, Flash Cookies, Freeware, Privacy, Software, Windows Tips and Tools

LimeWire Is Dead – Long Live FrostWire!

If you visit the official LimeWire website, you will, no doubt, be surprised to see the following message –  “This is an official notice that LimeWire is under a court-ordered injunction to stop distributing and supporting its file-sharing software. Downloading or sharing copyrighted content without authorization is illegal.”

The Recording Industry Association of America which represents the recording industry distributors in the United States, has struck once again in its aggressive battle to combat what it defines as copyright infringement. While I’m not a supporter of copyright infringement, I do consider RIIA’s tactics not far removed from those that were once employed by the Spanish Inquisition. Heavy handed – to say the least.

image

Unfortunately, if you were a LimeWire user you’ve noticed that searching, downloading, uploading, file sharing and so on, are no longer available. But, don’t despair – there are other solutions. Maybe now is the time to take a close look at a LimeWire alternative – FrostWire.

FrostWire (newest version: 4.21), released September 29, 2010, is a free, open source Peer to Peer application which incorporates all of the now dead LimeWire’s functionality, as well as a number of the features of the old LimeWire Pro – including multi-threading downloads, and Turbo-Charged connections.

To insure broad appeal, FrostWire is a multi platform program running on Windows 7, Vista, XP, 2000, NT, Mac OS X 10.4 or later, Linux, and some flavors of Unix.

image

Fast facts:

Open-source

Firewall-to-firewall transfers

Built-in community chat

Connects to more sources

Creative commons license support

Broadband network connection

Junk result filters

Turbo-Charged download speeds

iTunes integration

Gnutella support

BitTorrent support

Proxy Support

If P2P file sharing is one of your interests, then you’ll find that this program, with its highly intuitive interface, should meet all of your needs. With almost 30 Million downloads on CNET alone, calling this application “very popular” is a bit of an understatement.

System requirements: Windows 7, Windows 2000, Windows Vista, Windows NT, Windows XP, Mac OS X 10.5 or later, Linux, Unix such as Solaris.

Additional requirements: Java Runtime Environment 1.6

Download at: FrostWire.com

Note: Consider the trade-offs, and the very real risks involved in Peer to Peer file sharing.

Privacy: When you are connected to file-sharing programs, you may unintentionally allow others to copy confidential files you did not intend to share. So be sure to setup the file-sharing software very carefully.

If you don’t check the proper settings when you install the software, you could allow access not just to the files you intend to share, but also to other information on your hard drive, such as your tax returns, email messages, medical records, photos, and other personal and financial documents.

It’s extremely important to be aware of the files that you place in, or download to, your shared folder. Don’t put information in your shared folder that you don’t want to share with others. Your shared folder is the folder that is shared automatically with others on peer to peer file sharing networks.

Copyright Issues: You may knowingly, or otherwise, download material that is protected by copyright laws and find yourself caught up in legal issues. Copyright infringement can result in significant monetary damages, fines, and even criminal penalties.

Some statistics suggest as many as 70% of young people between the ages of 9 – 14, regularly download copyrighted digital music. If you are a parent, you bear the ultimate responsibility for this illegal activity.

Adult Content: Again, if you are a parent you may not be aware that their children have downloaded file-sharing software on the family computer, (Susan Naulls), and that they may have exchanged games, videos, music, pornography, or other material that may be unsuitable for them. It’s not unusual for other peoples’ files to be mislabeled and you or your children can unintentionally download these files.

Spyware: There’s a good chance that the file-sharing program you’re using has installed other software known as spyware to your computer’s operating system. Spyware monitors a user’s browsing habits and then sends that data to third parties. Frequently the user gets ads based on the information that the spyware has collected and forwarded to these third parties.

I can assure you that spyware can be difficult to detect and remove. Before you use any file-sharing program, you should buy, or download free software, that can help prevent the downloading or installation of spyware, or help to detect it on your hard drive if it has been installed.

Viruses: Use and update your anti-virus software regularly. Files you download could be mislabeled, hiding a virus or other unwanted content. Use anti-virus software to protect your computer from viruses you might pick up from other users through the file-sharing program.

Generally, your virus filter should prevent your computer from receiving possibly destructive files. While downloading, you should avoid files with extensions such as .exe, .scr, .lnk, .bat, .vbs, .dll, .bin, and .cmd.

Default Closing Behavior: It is critical that you close your connection after you have finished using the software. In some instances, closing the file-sharing program window does not actually close your connection to the network. That allows file-sharing to continue and will increase your security risk. Be sure to turn off this feature in the programs “preferences” setting.

What’s more, some file-sharing programs automatically run every time you turn on your computer. As a preventive measure, you should adjust the file-sharing program’s controls to prevent the file-sharing program from automatically starting.

If you found this article useful, why not subscribe to this Blog via RSS, or email? It’s easy; just click on this link and you’ll never miss another Tech Thoughts article.

6 Comments

Filed under downloads, Freeware, FrostWire, Interconnectivity, Open Source, Peer to Peer, Software, Ubuntu, Windows 7, Windows Tips and Tools, Windows Vista, Windows XP

BetterPrivacy Firefox Add-on Kills Flash Cookies

imageIf you hear something repeated often enough, then that “something” takes on a veneer of truth. It doesn’t necessarily mean that it is true of course – but, it appears to be true. The “truth” regarding Internet site cookies, falls into that category.

Most of us have heard that “truth” – without cookies (and now, Flash cookies), your Web experience would be terrible. You’d be starting from scratch each time you did anything on a given site online. Or, something along that line.

Nonsense! For years, I have deleted cookies at every Browser shut down, and have experienced no perceptible difference in performance when visiting the same 30 or so sites, that I visit every day

Here’s the reality:

imageCookies are there for the benefit of advertisers; not the web site visitor – plain and simple. Keep in mind, that it’s critically important to advertisers to generate advertising that is specific to the web site visitor at the time of the visit – not later, but right then. And a cookie is the tool that facilitates this happening.

Luckily, Internet browsers can be set to allow full user control over cookies including accepting, rejecting, or wiping private data which includes wiping cookies. That is, until recently.

It appears that a user’s decision to control cookies, in this way, is simply not acceptable to advertisers and certain web sites, and so, we now have the Flash Cookie (LSO) – Local Shared Objects.

There is a major advantage for an advertiser to employ Flash cookies, not the least of which is; they are virtually unknown to the average user. Equally as important, from an advertisers perspective is; they remain active on a system even after the user has cleared cookies and privacy settings.

This practice of  web sites dropping Flash cookies onto your computer, which occurs without your knowledge or permission,  according to some in the security community, is akin to hacking. Frankly, I agree.

If you think this practice is restricted to shady web sites, you’d be wrong. Of the top 100 web sites, 50+ use Flash Cookies. So, I was not particularly surprised, when I found some of my favorite sites involved in this invasive practice.

I first wrote on the issue of Flash Cookies back in September 2009, and since then, I’ve watched as these obnoxious web trackers and privacy invaders multiply like a virus.

Quick Flash cookie facts:

They never expire

Can store up to 100 KB of information compared to a text cookie’s 4 KB.

Internet browsers are not aware of those cookies.

LSO’s usually cannot be removed by browsers.

Using Flash they can access and store highly specific personal and technical information (system, user name, files,…).

Can send the stored information to the appropriate server, without user’s permission.

Flash applications do not need to be visible.

There is no easy way to tell which flash-cookie sites are tracking you.

Shared folders allow cross-browser tracking – LSO’s work in every flash-enabled application

No user-friendly way to manage LSO’s, in fact it’s incredible cumbersome.

Many domains and tracking companies make extensive use of flash-cookies.

If you value your privacy, then without a doubt you need to control these highly invasive objects, and if you are a Firefox user there is a solution – BetterPrivacy – a free Firefox add-on.

From the BetterPrivacy page:

“Better Privacy serves to protect against not delectable, long-term cookies, a new generation of ‘Super-Cookie’, which silently conquered the internet.

This new cookie generation offers unlimited user tracking to industry and market research. Concerning privacy Flash- and DOM Storage objects are most critical.

This add-on was made to make users aware of those hidden, never expiring objects and to offer an easy way to get rid of them – since browsers are unable to do that for you”.

image

alt

Download at: Mozilla

Simple HTTP cookies (ordinary cookies), can be subject to attack by cyber criminals, so it won’t be long before flash cookies will be subject to the same manipulation. Better you should learn how to control them now – not later.

Privacy, in all areas of our life is under constant attack, but that shouldn’t mean that we give up. We need to learn to fight back with every tool that’s available.

I have tried to write this article in a non-technical way, to make it easy for the average computer user to understand. For a more detailed breakdown on flash cookies, and the danger they represent to personal privacy, checkout The Electronic Privacy Information Center.

If you found this article useful, why not subscribe to this Blog via RSS, or email? It’s easy; just click on this link and you’ll never miss another Tech Thoughts article.

15 Comments

Filed under Browser add-ons, Firefox Add-ons, Flash Cookies, Freeware, Interconnectivity, Point of View, Privacy, Software, Spyware - Adware Protection, Surveillance, Windows Tips and Tools