Tag: internet privacy

  • Google Reads All Emails Justifies Rightly

    Google has admitted to reading  all the Email contents in , what it terms as to ‘to provide you personally relevant product features, such as customised

    search results, tailored advertising, and spam and malware detection. This analysis occurs as the content is sent, received, and when it is stored.”

     

    Google reads emails as part of its service
    Google says the change in its policy allowing the company to trawl through emails will give “people even greater clarity”. Photo: AP

     

    Privacy goes through the Window!

     

    But it may be added that if you need personalized recommendations from the Service provider, I do not think there is any other option but to agree to what Google says.

    Google is right.

    One can not have the cake and eat it too

     

    Google Inc updated its terms of service on Monday, informing users that their incoming and outgoing emails are automatically analyzed by software to create targeted ads.

    The revisions more explicitly spell out the manner in which Google software scans users’ emails, both when messages are stored on Google’s servers and when they are in transit, a controversial practice that has been at the heart of litigation.

    Last month, a U.S. judge decided not to combine several lawsuits that accused Google of violating the privacy rights of hundreds of millions of email users into a single class action.

    Users of Google’s Gmail email service have accused the company of violating federal and state privacy and wiretapping laws by scanning their messages so it could compile secret profiles and target advertising. Google has argued that users implicitly consented to its activity, recognizing it as part of the email delivery process.

    Google’s updated terms of service added a paragraph stating that “our automated systems analyze your content (including emails) to provide you personally relevant product features, such as customized search results, tailored advertising, and spam and malware detection. This analysis occurs as the content is sent, received, and when it is stored.”

    A Google representative did not immediately respond to a request for comment.

     

    Source .Huffington Post.

     

    Enhanced by Zemanta
  • Data Stealing Market What They Share About You

    When I posted an article about NSA spying and overhearing about 540 Millions Conversations a month, at the back of my mind was the thought, if this were true, there should be people/companies making money out of this.

    Data Brokers.
    Data Stealing

    Yes, I found this out from Pando.-Link provided at the close of this post.

    The people who over hear or steal our information, from land Lines, Cell phones, Internet, either by way of advertising solicitations, Tele-calling or simple phishing, they sell this information.

    Even giants like Google and Facebook do sell, though they do not admit it in so many words.

    Some companies who collect this information call themselves Data Brokers.

    They sell this information.

    The market? $150 billions.

    In 2012, the data broker industry generated 150 billion in revenue that’s twice the size of the entire intelligence budget of the United States government—all generated by the effort to detail and sell information about our private lives.”
    — Senator Jay Rockefeller IV

    There is also an estimate that the market is $ 200 Billion.

    There are 4000 companies which specialize in data broking or put it simply stealing your personal information, though it is illegal.

    And for this amount what do they share?

    They share your,

    Financial History, bank records, bankruptcies,

    Purchase pattern,

    Your health details including drug addiction, illnesses,medicines taken,if you have been raped, those details,

    Read a Sample list at http://www.medbase200.com/updating.html

    For instance, if lists of rape victims aren’t your thing, MEDbase can sell dossiers on people suffering from anorexia, substance abuse, AIDS and HIV, Alzheimer’s Disease, Asperger Disorder, Attention Deficit Hyperactivity Disorder, Bedwetting (Enuresis), Binge Eating Disorder, Depression, Fetal Alcohol Syndrome, Genital Herpes, Genital Warts, Gonorrhea, Homelessness, Infertility, Syphilis…

    ..

    MEBbase isn’t the only company exploiting these loopholes. By the industry’s own estimates, there are something like 4,000 for-profit intel companies operating in the United States. Many of them sell information that would normally be restricted under federal law. They offer all sorts of targeted dossier collections on every population segments of our society, from the affluent to the extremely vulnerable:

    • people with drug addictions
    • detailed personal info on police officers and other government employees
    • people with bad credit/bankruptcies
    • minorities who’ve used payday loan services
    • domestic violence shelter locations (normally these addresses would be shielded by law)
    • elderly gamblers..
    •  Source: http://pando.com/2013/12/22/a-peek-into-surveillance-valley/

     

  • Browse Internet without Leaving Traces.

     These tools will help you Browse the Internet with out any Trace.

    Possible that some one might have circumvented this as well.

    If you want to use the Internet without anyone knowing who you are or leave an untraceable phone number or email address, then these tools are for you.

    1. Big String. Big String offers self-destructing IMs and emails for those who don’t want any evidence of their online communications. Use with many popular IM clients.
    2. Mozilla Firefox, Portable Edition. This free web browser leaves no personal information on your computer. Not only can you use this anywhere, but no one will know you were there.
    3. x Paranoia mod. This Firefox extension is great for those who want to leave nothing behind on the computer. With a couple of clicks you can clear all your Internet history, passwords, cookies, and cache.
    4. Bugmenot.com. If you’ve ever had to register with a site just to read an article or watch a video, then you will want this tool. Find login information for many websites that require registration and never have to give your information again.
    5. 10 Minute Mail. Use this tool to get an email address that is good for 10 minutes, then expires. This is a great way to register with sites that require an email validation or just to cover your tracks.
    6. inumbr. Get a disposable phone number that you can use to forward calls to any other phone in the U.S. No one will be able to trace you with this number.
    7. GrandCentral. Here’s another phone option when you don’t want to be traced by your number. Consolidate all your phones into one with this tool that gives you one voice mailbox and one number for all your phones.
    8. drop.io. Want to share a top-secret online file with someone and then have no sign of the evidence later? This is the tool for you. The file is deleted after 30 days.
    9. Fake Name Generator. If you need a name, address, email, or even a UPS tracking code, use this handy tool to generate any one of the necessary fakes.
    10. cl1p.net. Create a note or upload a photo that you can keep for yourself or share, then delete it when you are finished with absolutely no sign of what you had.

    Browsing Security

    1. Hide My Ass!. Hide your identity with this free tool. This proxy service will hide your IP address so no one will know you.
    2. Tor.  This free service allows you to hide your Internet identity with a “network of virtual tunnels.”
    3. Guardster. Another proxy service that hides your IP, this one is available in both free and for a fee versions. The free version does not work with encrypted SSL sites.
    4. Megaproxy. Paste the URL for whatever website you want to visit into this tool and you will have a completely private look at your target site. No registration or downloads needed to use this tool.
    5. Scandoo. Get real time protection when surfing the Internet with warnings about websites before you click on them. Based on ScanSafetechnology, this home version is free.
    6. ShieldsUP!. Check out this tool to learn what information your browser is sending out.
    7. Privoxy. Privoxy is an open source non-caching web proxy with advanced filtering capabilities for enhancing privacy, modifying web page data and HTTP headers, controlling access, and removing ads and other obnoxious Internet junk.
    8. What Is My IP Address?. Use this tool to ensure your IP blockingsoftware is working correctly and not revealing your true IP address.
    9. Clusty. Use this search engine when browsing. Clusty doesn’t save your information or track you at all when you use it.
    10. Scroogle. Try searching Google with this tool. Scroogle uses SSL to send your search terms to Google with encryption, then does the same when sending the results back to you.

    Computer Security

    Using the Internet is a huge open door for people to stick their nose in your business. Use these tools to slam that door tightly shut.

    1. Malwarebytes’ Anti-Malware. This anti-malware software is one of the best tools available for removing crap from your computer. Best when used in conjunction with Ad-Aware to keep your PC 99.999% malware free.
    2. avast!. This free anti-virus software is one of the best available (for free or for a fee) at protecting your computer. This tool will alert you any time malware is detected and even checks incoming email. avast! also includes a boot-time scan option.
    3. Ad-Aware. The free version of this software does an excellent job of protecting your computer against spyware and adware. The paid version gives you real-time protection which is not available with the free one.
    4. Sandboxie. This free tool is great for both protecting your computer and getting rid of evidence. It works as a temporary storage area for information that would normally go to and from your hard drive. When you are finished in the “sandbox,” you can just clear it out.
    5. ThreatFire. Use this in conjunction with your anti-virus to fend off malware. ThreatFire detects malicious behavior such as capturing keystrokes and also serves to defend against zero-day threats.
    6. SnoopFree Privacy Shield. The ultimate free software for the ultra-cautious, this tool will detect any method of privacy invasion through your keyboard, screen, and open windows.
    7. Comodo Firewall. Keep out hackers with this free firewall. This program is one of the best when it comes to protecting your computer.
    8. WinPatrol. Protect your privacy and your computer with this free tool that works by alerting you to “hijackings, malware attacks and critical changes made to your computer without your permission.”
    9. AVG Free Anti-Virus. Get anti-virus and anti-spyware protection from this free software. This software also includes a scheduled scan option.
    10. TrueCrypt. This disk encryption software will keep nosey-parkers at bay. You can create a virtual encrypted disk, encrypt USB flash drives and hard drives, and more.
    11. Trustable Downloader. Download files from the Internet without worries of Trojans, worms, or viruses with this free application. As described, this tool will help guard you against government spying on its citizens.
    12. SiteAdvisor. This software alerts you before you visit a website that has spyware or harvests your information for spam. Use their color-coded system to alert you to the potential dangers of websites.
    13. Peer Guardian 2. This IP blocker is capable of blocking incoming and outgoing connections. You can also select to block spyware, adware, and educational and government ranges.
    14. GlowWorm FW Lite . Mac users can use this software to be informed when a program attempts to make an outgoing connection. Not only will this tool protect your information, it also guards against malware.

    Laptop Tracking

    If someone makes off with your laptop, know how to stop them with these tools.

    1. Adeona. If you want to guard against someone taking your laptop, check out this tool. This software continually tells you where your laptop is located without the interference of any third party to help you track and recover your computer.
    2. iAlertU. Another laptop protection and tracking device, this one specifically for Macs, this software is based off mouse and keyboard movement which sets off an alarm, takes a photo of the thief, and emails the photo to a specified email address.

    Spying on Those Out to Get You

    If you know someone is trying to get to you, then turn the tables on them with these tools that will help you get the dirt on them.

    1. GotVoice. Take advantage of the 14 day free trial to have your target’s voice mail sent directly to you. If you need more time, get another 14 day trial with different information.
    2. Decoding Social Security Numbers in One Step. You can’t get everything out of that magical number with this tool, but you can narrow down the state and year of issue with any social security number instantly.
    3. Keylogger. This free software allows you to log everything entered on the keyboard so you can track computer usage. Be sure to use the stealth mode so your target doesn’t know you are tracking him.
    4. Decode Your License. This article describes how you can get a driver’s license from any state and decode the barcode on it to receive personal information. You will need the Internet tool described in the article and a scanner.
    5. Webcam Spy. Use this software to spy on your target using a webcam. The software activates the webcam with a motion sensor for an auto on and off feature. Spying on your target isn’t the only use for this–you can also use it in your home to see who comes by when you are gone.

    Maps for Monitoring Occurrences

    Whether you are looking for evidence for your conspiracy theory or trying to put all the pieces together on a plot you know is about to be hatched, then these maps will help you get all the information you need.

    1. Global Incident Map. Find out where terrorism is occurring around the world with this mapping tool. You be able to find plenty of patterns to put together your own theories.
    2. HealthMap. This tool will keep you posted on health alerts. Find outbreaks by geographical location, disease, or chronological occurrence.
    3. Who is Sick?. This Google map-based tool shows symptoms for any geographical spot. You’ll be able to track any type of outbreaks with this tool.
    4. Incident1. Track police, fire, and emergency services on this map. You can also do a search by zip code or select a region within the states.
    5. Incidentlog. If you live in the northeast and couldn’t find anything on Incident1, try Incidentlog for more options. This map is populated from a different pool of data.
    6. Havaria Information Service Alert Map. Find everything from earthquakes to hazmat incidences to biological hazards on this world map. You can narrow the results by country if you don’t want to see the world view.
    7. GeoMAC Wildfire Information. This map shows where wildfires are currently burning throughout the United States or check out past wildfires since 2002.
    8. Piracy Attacks Maps. Pirates on the high seas are not a thing of the past. Use this map to track current piracy around the world.
    9. UNEP: Atlas of Our Changing Environment. Sponsored by the United Nations Environment Programme, this map includes incidents that document environmental changes around the world. Click on each incident to see photos and read the story.
    10. Google Maps Mania. This unofficial site follows the incredible array of various interactive maps being used in conjunction with Google Maps. Find a map that tracks your favorite passion or create one of your own.
    11. Related:


  • Google collects data from Wireless Networks.

     

    All internet companies collect information and utilise them for their benefit.

    Some are very discreet,some are caught.

    Read my blog on Administering Internet.

    Story.

    When Eric Schmidt, Google’s CEO, said that his company’s policy was “to get right up to the creepy line and not cross it” he will have provoked more than a few shudders. Schmidt’s remarks, made in an American magazine earlier this month, come with the company fighting privacy battles across the world.

    http://www.telegraph.co.uk/technology/google/8086191/How-Google-crossed-the-creepy-line.html

    AfrikaansAlbanianArabicBelarusianBulgarianCatalanChineseCroatianCzechDanishDetect languageDutchEnglishEstonianFilipinoFinnishFrenchGalicianGermanGreekHaitian Creole ALPHAHebrewHindiHungarianIcelandicIndonesianIrishItalianJapaneseKoreanLatvianLithuanianMacedonianMalayMalteseNorwegianPersianPolishPortugueseRomanianRussianSerbianSlovakSlovenianSpanishSwahiliSwedishThaiTurkishUkrainianVietnameseWelshYiddishAfrikaansAlbanianArabicBelarusianBulgarianCatalanChineseCroatianCzechDanishDutchEnglishEstonianFilipinoFinnishFrenchGalicianGermanGreekHaitian Creole ALPHAHebrewHindiHungarianIcelandicIndonesianIrishItalianJapaneseKoreanLatvianLithuanianMacedonianMalayMalteseNorwegianPersianPolishPortugueseRomanianRussianSerbianSlovakSlovenianSpanishSwahiliSwedishThaiTurkishUkrainianVietnameseWelshYiddish

    Detect language » Hungarian