Tag Archives: protected

Breadcrumbs Privacy Software 1.1.3.1 (Beta) Updated – Now With 64 Bit Support

Earlier this month, I ran a short test on Breadcrumbs Privacy Software (Beta) – Free Breadcrumbs Beta – Slaps Down Data Miners – which, according to the developer “……. automatically creates a Bogus Identity for you, thus preventing trackers from analyzing your real browsing information, leaving them with useless data.”

So, is this fair – is it OK to screw with so called “data miners”? Undoubtedly, you’ll make up your own mind on this – but, I won’t hesitate to state my opinion – “You’re damn right it is!”

Data miners, in an attempt to camouflage broad scale privacy intrusions, conveniently refer to their activities as predictive analytics, customer profiling, customer segmentation, predictive modeling, lifestyle clustering – yeah, right.

While predictive analytics, predictive modeling, etc. (you have to love how these guys paint privacy intrusions), may well be allowed under existing legislation – from a moral and ethical perspective, it’s reprehensible in my view.

Consider this – you’re cruising the Net and a tracker, or trackers, records every action you take, every motion you make –recording the type of sites you visit and revisit, time spent on sites, your shopping and spending habits, your political views, your marital status, and much more. All of this builds a profile of your browsing habits so that the data (your personal data), can be sold, bartered, and traded.

But don’t look for any sweeping legislative changes which will rein in these parasites any time soon. By and large, regulatory authorities have neither the moral courage, or the technical acumen (they simple fail to grasp the essence of the technology) necessary to enact appropriate consumer protection laws.

If you object to this type of intrusion into your privacy, then consider installing Breadcrumbs Privacy Software, and give these intrusive jerks the heave-ho. It may not be a perfect solution but, it’s a definite step in the right direction.

Fast facts:

Create your bogus identity – Breadcrumbs bogus Identity feature automatically creates a Bogus Identity for you, thus preventing trackers from analyzing your real browsing information, leaving them with useless data. Read more

The Do Not Track Me stamp – Once enabled, the Do Not Track Me stamp identifies you as a Breadcrumbs Protected User. It tells trackers that you do not wish to be tracked, and also lets them know that they will be fooled by your Bogus Identity in case they decide to track you anyway. Read more

Watchers Analytics – Breadcrumbs Watchers Analytics feature enables you to see who is watching you online. It’s an easy way to block ads and prevent trackers from tracking you across the Internet. Read more

Installation is simple and the application settings are limited, but effective. Click on the graphic to expand to original.

image

The dashboard will give you the opportunity to “watch the watchers” and block selectively. Click on the graphic to expand to original.

image

The most interesting feature of Breadcrumbs is the promise that it will build a “‘bogus identity” which will mislead watchers. Click on the graphic to expand to original.

According to the developer –

“In order for the feature to work it first needs to “learn the user” then it will synthesize what bogus data should be added in order to mask your real data and identity (so give it a few more hours/days). All of the learning process is encrypted and is done on the client-side, hence no one can see or use it but the software (and in the future you).”

image

In the following screen capture the expandable “Page Watcher” panel is shown – (shown expanded). This feature is selectable under “settings”. Click on the graphic to expand to original.

image

Current Version: 1.1.3.1 (Beta) – release date: May 24, 2011.

Changes in this version:

Bug fixes.

Better performance (CPU + RAM)

64 bit support.

Enhanced security to the automated Bogus browser.

Tray notifier which notifies when privacy protection analysis ended, and when a new software version is available.

Added the option to turn watchers blocking on and off through the Watchers Analytics Panel in your browser, this feature is very helpful in cases you are not sure if the page is not loaded correctly because a watcher is blocked (so you can just turn blocking off and see if that is the problem) – the panel appears in red in case blocking is turned off.

System Requirements: Windows XP, Vista and Win 7. Microsoft .NET Framework 3.5 SP1 or above. (Breadcrumbs installer will alert you in case .NET Framework installation is needed)

Supported Web Browsers: Internet Explorer 7 or above. (including IE9). Firefox 3.6 or above. (including FF4). Google Chrome.

Download at: Developer’s site (Breadcrumb Solutions)

Breadcrumbs Usage and Demo: Video 2:26

I often hear from people who feel that since the information being mined is anonymous, no real invasion of privacy is taking place. While that may have been the case previously, that’s not the case currently.

Consider readingPrivacy: reidentification a growing risk.

Browser fingerprinting (a method used to identify you specifically) – Consider taking the Panopticlick test which analyses  your browser to see how unique it is based on the information it will share with sites it visits.

My test results:

Your browser fingerprint appears to be unique among the 1,546,722 tested so far. Currently, we estimate that your browser has a fingerprint that conveys at least 20.56 bits of identifying information.

If you found this article useful, why not subscribe to this Blog via RSS, or email? It’s easy; just click on this link and you’ll never miss another Tech Thoughts article.

8 Comments

Filed under 64 Bit Software, Beta Software, Browsers, downloads, Freeware, Interconnectivity, Privacy, Software, Surveillance, Windows Tips and Tools

Guard Your Sensitive Files With My Lockbox Freeware

image Rick Robinette at What’s On My PC, recently wrote a couple of intriguing articles on some esoteric ways cyber-criminals can gain access to the confidential information many of us keep on our computers.

If you think your confidential files are cyber-criminal proof, because you consider yourself an astute and savvy Internet user, and your machine is protected by the latest and greatest AV products – take a look at Atypical Ways of How Your Data Can Be Stolen, and Are Wireless Keyboards Secure?, on Rick’s site. You might be in for a surprise.

Reading these two articles has prompted me to republish the following article on how we can take advantage of the freeware program My Lockbox, to keep confidential files hidden from view.

You might wonder why you would need to conceal files on your computer in the first place; after all you have nothing to hide, right? Well if you’re like the rest of us, it’s almost certain that you do have something to hide.

At a minimum, it would be sensible to conceal files that contain financial data and other confidential information, that can easily be subject to intrusive viewing by others not authorized to do so.

Files that contain financial data and other confidential information continue to be targeted by hackers/information thieves, for the purpose of identity theft. The reality is; there is no such thing as a totally secured internet connected computer; all internet connected computers are subject to attack. Masking these files then, seems like a sensible precaution.

image

Confidentially of course, may not be the only reason you may have to conceal files. On a shared computer for example, it may be prudent to conceal particular files to ensure that they are not subject to accidental erasure. In fact, you may have lots of personal reasons to mask special files on your machine.

My Lockbox is a freeware software application that allows you to conceal files, and then password protect those files on your computer. Other users will not have access to these files, nor will they be able to accidentally, or otherwise, view them or manipulate them in any way.

The protected folder (lockbox) is hidden from all other users and applications on your computer; including the Administrator and the System. The lockbox (protected folder), is impossible to access not only from the local computer, but also from the Internet.

Following the on-screen instructions makes this program extremely easy to setup and use. The lockbox location, password, and parameters are configured during the easy setup procedure.

After the setup is completed, the lockbox will be hidden and locked until you, as the user, enter the valid password. My Lockbox Control Panel allows you easily change basic lockbox parameters: lockbox location, protection status, and password.

The program is effective, easy to use and best of all – it’s free.

Quick facts:

Very easy to use

Almost any folder on your computer can be password protected

Instant protection – no file scrambling

Lockbox folder is inaccessible even by the system administrators

Lockbox folder is inaccessible both locally and remotely

Lockbox folder can be protected in Windows safe mode

Hotkeys support – you can popup the Control Panel with a keystroke

Skinned user interface

Freeware

System Requirements: Windows 2000, XP, 2003 Server, Vista

Download at: Download.com.

Elsewhere in this Blog there is a review, and file download, for a similar type of program that encrypts, as well as conceals your files. The following is part of the review for this open source free program… “T r u e C r y p t is a free open-source disk encryption program for Windows and Linux, which creates a virtual encrypted disk within a file and mounts it as a real disk. The program automatically and transparently encrypts in real time”.

Go here for the full review of T r u e C r y p t and the file download.

If you enjoyed this article, why not subscribe to this blog via RSS, or email? It’s easy; just click on this link and you’ll never miss another Tech Thoughts article.

7 Comments

Filed under Anti-Malware Tools, Don't Get Hacked, Encryption Software, Free Security Programs, Freeware, Privacy, Software, Spyware - Adware Protection, Windows Tips and Tools, Windows XP

My Lockbox Freeware – Hide Your Computer’s Private Files

Why would you need to conceal files on your computer; after all you have nothing to hide do you? Well if you’re like the rest of us, it’s almost certain that you do have something to hide.

At a minimum, it would be sensible to conceal files that contain financial data and other confidential information that you don’t want anyone else to have access to.

Confidentially of course may not be the only reason you may have to conceal files. On a shared computer for example, it may be prudent to conceal particular files to ensure that they are not subject to accidental erasure. In fact, you may have many personal reasons to mask particular files on your machine.

My Lockbox is a freeware software application that allows you to do just that, and then password protect those files on your computer. Other users will not have access to these files, nor will they be able to accidentally, or otherwise, view them or manipulate them in any way.

The protected folder (lockbox) is hidden from all other users and applications on your computer; including the Administrator and the System. The lockbox (protected folder), is impossible to access not only from the local computer, but also from the Internet.

Files that contain financial data and other confidential information continue to be targeted by hackers/information thieves, for the purpose of identity theft. The reality is; there is no such thing as a totally secured internet connected computer; all internet connected computers are subject to attack and penetration.

Masking files that contain financial data and confidential information, in my view, is not only sensible and prudent but given the nature of the current state of Internet security, it is an absolute necessity.

Following the on-screen instructions makes this program extremely easy to setup and use. The lockbox location, password, and parameters are configured during the easy setup procedure.

After the setup is completed, the lockbox will be hidden and locked until you, as the user, enter the valid password. My Lockbox Control Panel allows you easily change basic lockbox parameters: lockbox location, protection status, and password.

The program is effective, easy to use and best of all – it’s free.

Quick facts:

  • Very easy to use
  • Almost any folder on your computer can be password protected
  • Instant protection – no file scrambling
  • Lockbox folder is inaccessible even by the system administrators
  • Lockbox folder is inaccessible both locally and remotely
  • Lockbox folder can be protected in Windows safe mode
  • Hotkeys support – you can popup the Control Panel with a keystroke
  • Skinned user interface
  • Freeware

System Requirements: Windows 2000, XP, 2003 Server, Vista

Download at: Download.com

2 Comments

Filed under Encryption, Free Security Programs, Freeware, Internet Safety, Internet Safety Tools, Privacy, Software, Spyware - Adware Protection, Utilities, Windows Tips and Tools

Make Your Personal Files Vanish – My Lockbox Freeware

Why would you need to conceal files on your computer; after all you have nothing to hide do you? Well if you’re like the rest of us, it’s almost certain that you do have something to hide.

At a minimum, it would be sensible to conceal files that contain financial data and other confidential information that can easily be subject to intrusive viewing by others not authorized to do so.

Confidentially of course may not be the only reason you may have to conceal files. On a shared computer for example, it may be prudent to conceal particular files to ensure that they are not subject to accidental erasure. In fact, you may have lots of personal reasons to mask special files on your machine.

My Lockbox is a freeware software application that allows you to do just that, and then password protect those files on your computer. Other users will not have access to these files, nor will they be able to accidentally, or otherwise, view them or manipulate them in any way.

The protected folder (lockbox) is hidden from all other users and applications on your computer; including the Administrator and the System. The lockbox (protected folder), is impossible to access not only from the local computer, but also from the Internet.

Files that contain financial data and other confidential information continue to be targeted by hackers/information thieves, for the purpose of identity theft. The reality is; there is no such thing as a totally secured internet connected computer; all internet connected computers are subject to attack. Masking these files then, seems like a sensible precaution.

Following the on-screen instructions makes this program extremely easy to setup and use. The lockbox location, password, and parameters are configured during the easy setup procedure.

After the setup is completed, the lockbox will be hidden and locked until you, as the user, enter the valid password. My Lockbox Control Panel allows you easily change basic lockbox parameters: lockbox location, protection status, and password.

The program is effective, easy to use and best of all – it’s free.

Quick facts:

  • Very easy to use
  • Almost any folder on your computer can be password protected
  • Instant protection – no file scrambling
  • Lockbox folder is inaccessible even by the system administrators
  • Lockbox folder is inaccessible both locally and remotely
  • Lockbox folder can be protected in Windows safe mode
  • Hotkeys support – you can popup the Control Panel with a keystroke
  • Skinned user interface
  • Freeware

System Requirements Windows 2000, XP, 2003 Server, Vista

Download at: CNET Download.com.

Elsewhere in this Blog there is a review, and file download, for a similar type of program that encrypts as well as conceals your files. The following is part of the review for this open source free program…”T r u e C r y p t is a free open-source disk encryption program for Windows and Linux, which creates a virtual encrypted disk within a file and mounts it as a real disk. The program automatically and transparently encrypts in real time”.

Go here for the full review and file download.

5 Comments

Filed under Freeware, Privacy, Productivity Software, Software, Spyware - Adware Protection, Utilities, Windows Tips and Tools