Linux Privacy - Page 42

We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.

Discover Privacy News

Search Engines Are At the Center Of Privacy Debate

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

At the center of the square off over the access to private personal data online -- a much publicized debate that extends from Beijing to Washington -- stands an uncertain arbiter: the search engine. The companies that operate the most popular search engines -- Google, Yahoo and Microsoft -- are making decisions about how the information they collect about user behavior should be protected, in some cases from the eyes of governments that want to take a closer look but lack a clear legal right to do so.

Feds: Google's privacy concerns Unfounded

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

The U.S. Justice Department has denied requesting anything from Google that could threaten the privacy of the search engine's users, as the company recently contended. And by trying to block the government's efforts to review a week's worth of search terms, Google is holding up efforts to protect children from pornography, according to a brief filed Friday by the Justice Department.

Manage Your Own Identity Online

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Computer users' identity information is managed online today by several different data collection agencies. But imagine the freedom people would feel changing their address with one keystroke? Microsoft is working on such technology with its InfoCard identity metasystem. Now IBM, Novell and startup Parity Communications are joining the Eclipse open software foundation and Harvard Law School's Berkman Center for Internet & Society to tackle the challenge. The three companies and are contributing code to the "Higgins Project," designed to give people more control over their online identity information.

Stronger Laws Needed to Protect Privacy, CDT Report Finds

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

A new report by CDT details a widening gap between the technology that collects sensitive personal data and the laws designed to protect that data against government misuse. The National Security Agency's domestic spying program, the Justice Department's efforts to obtain millions of Internet search records, the government's use of cell phones to track suspects, and other developments highlight the law's failure to keep pace with technological advances, according to "Digital Search & Seizure: Updating Privacy Protections to Keep Pace with Technology." Stronger laws are needed to ensure that Americans retain their constitutional privacy protections, the report finds.

Stronger Laws Needed to Protect Privacy

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

A new report by CDT details a widening gap between the technology that collects sensitive personal data and the laws designed to protect that data against government misuse. The National Security Agency's domestic spying program, the Justice Department's efforts to obtain millions of Internet search records, the government's use of cell phones to track suspects, and other developments highlight the law's failure to keep pace with technological advances, according to "Digital Search & Seizure: Updating Privacy Protections to Keep Pace with Technology." Stronger laws are needed to ensure that Americans retain their constitutional privacy protections, the report finds.

Private Identities Become A Corporate Focus

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

The CEO of Sun Microsystems,--infamous for his pronouncement, "You have zero privacy anyway--Get over it."--took a conciliatory tone on the stage here, allowing that privacy might be something for which consumers should fight. He warned companies that, unless they protect consumer privacy, they could lose out on significant online growth.

America 'must consider banning rootkits'

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Perhaps the best way to deal with rootkits is to outlaw them. At least when it comes to such mishaps as the Sony BMG Music Entertainment fiasco, that's what an official from the Department of Homeland Security suggested Thursday. "The recent Sony experience shows us that we need to be thinking about how we ensure that consumers are not surprised by what their software programs do," Jonathan Frenkel, director of law-enforcement policy at the US Department of Homeland Security said in a speech in San Jose at the 2006 RSA Conference.

Things you don't want Google to find

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

"Hacking Google" isn't exactly new. That is, using the search engine to look for confidential information. But as McAfee's senior vice president for Risk Management George Kurtz demonstrated today at RSA conference, that didn't prevent users and organisations to post those goodies online for anyone to find.

Privacy and Anonymity

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Privacy and anonymity on the internet are as important as they are difficult to achieve. Here are some of the the current issues we face, along with a few suggestions on how to be more anonymous. Online privacy issues are in the news every week now. This is good for us, because when it's newsworthy and notable it means people still care about the privacy of their personal information in some fundamental and important way. Privacy on the internet (or rather, a lack thereof) has been with us for ages, but as technology converges we are all forced to make some important new choices about what we are willing to disclose. Let's start with a few examples.

UK.gov inflates ID theft risk

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

The UK government has come out with yet another questionable study to support its obsessive bent to impose ID cards on the British public. Once again, ID fraud figures as the reason why Brits need expensive biometric proofs of identity.

FAQ: The new 'annoy' law explained

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Q: So what does the rewritten law now say? The section as amended reads like this: "Whoever...utilizes any device or software that can be used to originate telecommunications or other types of communications that are transmitted, in whole or in part, by the Internet... without disclosing his identity and with intent to annoy, abuse, threaten, or harass any person...who receives the communications...shall be fined under title 18 or imprisoned not more than two years, or both."

Unauthorized Sale of Phone Records on the Rise

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Reports of the unauthorized sale of personal telephone records may be sending chills up the spines of callers across the county, but the practice does not occur underground or on the black market. It occurs right out in the open, and according to regulators it's a growing problem. Numerous data broker Web sites advertise personal phone records for sale, including the numbers called, the length of calls, and sometimes the location of cell phones.

ISPs ordered to hand over file-sharer details

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

The High Court has ordered 10 ISPs to hand over the customer details of 150 individuals accused of illegally sharing and downloading desktop software on the web. The illegal file-sharers were identified after a 12-month covert investigation by the Federation Against Software Theft (Fast), called Operation Tracker.

IT industry prepares for the worst over ID cards

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

After years in which suppliers have absorbed most of the blame for government IT failures, the case for there being equal measures of ineptitude in the civil service is gaining momentum behind the concerted campaign against ID Cards. The latest evidence was submitted as a statement this week by Intellect, the UK's IT trade association, in a thinly veiled case of passing the blame.

Marriott customer data missing

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

A division of the Marriott International hotel empire has notified more than 200,000 clients of back-up security tapes missing from the company’s Orlando corporate offices. The breached records contained personal information of about 206,000 associates, timeshare owners and timeshare customers, the company said this week in a statement. Stephen P. Weisz, Marriott Vacation Club International president, said the company was assisting affected customers.

Feds Say Computer Surveillance Hindered Without Patriot Act

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

In part of a major Bush Administration lobbying blitz Wednesday, the Department of Justice has released a list of technology-related ramifications if the remaining provisions of the Patriot Act aren't passed by Dec. 31. Lobbying hard for the passage of the remaining portions of the broad-sweeping legislation, the department released a statement Wednesday stating that the federal government would revert back to a "pre-9/11 mode of information sharing…where terrorists and spies can use technology against us."

FTC Study Concludes Masking, Filtering Stop Spammers

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Trickery and technology both play key roles in managing spam, according to a study released yesterday by the Federal Trade Commission. The agency looked at three aspects of spamming and efforts to control it: the automated harvesting of E-mail addresses on public areas of the Internet; using E-mail address masking to reduce address harvesting; and the effectiveness of spam filtering by Internet Service Providers.