Your name or email adress:
Do you already have an account?
Forgot your password?
  • Log in or Sign up


    Results 1 to 11 of 11
    1. #1
      Jahness's Avatar
      Jahness is offline OniOni Warrior

      Join Date
      Mar 2005
      Location
      In amerikkka! Stolen from Afrika!
      Posts
      6,827
      Thumbs Up/Down
      Received: 1/0
      Given: 18/0
      Rep Power
      616

      Arrow Privacy & Security:Watch Out For Spies With Friendly Faces


      0 Not allowed! Not allowed!
      Privacy & Security

      Watch Out for Spies With Friendly Faces!
      Otherwise benign hardware and software can be used to track your behavior.

      Anne Kandra
      From the April 2005 issue of PC World magazine
      Posted Thursday, February 17, 2005

      As tech-savvy people, we know by now that we have to worry about technology being used to invade our privacy. But we tend to focus on the stuff that's deliberately snooping on us: spyware, keyloggers, Trojan horses, and other software and hardware designed with malicious intent. An even bigger risk, though, can come from the tools we usually trust--helpful gadgets and programs that weren't built to spy on us but can be used that way.

      Most new cell phones can allow police to find you in an accident or permit the local mall to send you phone spam. Desktop search tools can help you locate a long-lost spreadsheet or provide one-stop shopping for hackers looking for your Web passwords. Error messages can help developers improve their software or send strangers personal data from your PC.

      You don't have to be paranoid, but do be careful. "It's a balancing act," says Eric Gertler, privacy expert and author of Prying Eyes, a book on protecting your privacy (Random House, 2004). "Each individual needs to weigh the advantage of the tool or technology against the information [it's] providing." Fortunately, in some cases it takes only a few clicks to prevent your conveniences from turning creepy.

      The most common digital tattletales are cell phones. Imagine this scenario: It's Saturday morning, and you're out running errands. As you pass a nearby megastore, your phone bleats. It's the megastore calling. You haven't been in recently, so it's offering a discount coupon you can use right now, while you're in the area.

      GPS Abuse?
      Maybe we don't have to worry about retail giants pelting us with ads just yet. But such a scenario is possible with the E911 chip, a potentially life-saving GPS technology that's built into most current cell phones to help emergency services locate wireless callers more efficiently.

      Wireless carriers are just starting to deploy E911 service for consumers, and companies and lawmakers are somewhat vague about how the technology will be regulated, hazily referring to opt-out opportunities and consumer consent. But the potential for privacy abuse inherent in any technology that reports users' physical locations at any given time is frightening.

      Several services, including AccuTracking and Ulocate, allow individuals to track movements of certain GPS-enabled cell phones. Once someone with access to a particular cell phone loads the companies' software on it, that phone's movements can be tracked on the Web. Some privacy safeguards will be in place, and not just anybody can sign up to find out where you go. But if you have a boss or a spouse who shares your wireless phone account, that person may be able to.

      The best defense is to look for a way to turn off your phone's GPS for everything but emergency uses. If you can't find the right combination of keys to accomplish this, ask your service provider for help.

      The next time you rent a car, you might want to check for stowaways. A few years ago, a Connecticut rental car company fined a customer $450 when the GPS device in his car indicated that he had been speeding. And there have been other reported instances in which companies have monitored the locations and driving practices of their clients. A British insurance company, for instance, has even experimented with installing the devices in its clients' own cars--the idea being that the company could offer lower premiums for proven safe drivers.

      The practice of installing GPS devices in rental cars is quite common, and it can be a great service for consumers who become lost or have an accident. But what if you don't know that the device is in the car and that you're being monitored?

      When it comes to location tracking services, the legal parameters of privacy protection are fuzzy, but you can protect yourself by understanding the terms of service before you enter into a contract with a company that might use such technology. Whether you're buying a wireless service plan or renting a car, it's important to understand the implications of the contract before you sign on. Find out whether you can opt out or disable tracking, and ask what information will be collected and how it may be used. If you're not comfortable with the answer, let the company know and move on.

      Speaking of moving on, if you spend any time behind the wheel, you might be using one of those automatic toll collectors that let you breeze through the allotted lane, blithely bypassing us schlubs as we frantically grope under the seats for loose change. Such systems use an RFID chip, usually attached to the vehicle's windshield, that responds to a radio signal as you pass through the toll plaza. The data that the chip broadcasts is then matched with your account, and the appropriate amount is debited electronically.

      It's all very convenient and efficient, but remember that every time you pass the reader, it creates a record of your whereabouts. That might not seem too troubling to folks who are just trying to get to work on time, but consider the potential for misuse by law enforcement officials.

      Chris Hoofnagle, associate director of EPIC (the Electronic Privacy Information Center), explains, "The general problem is that these [tracking] products were developed without privacy in mind, and as a result they create digital trails. Any service that tracks who and where you are becomes a honeypot for anyone who's interested in tracking you down." The information attracts hackers, and without legal protections it also becomes a rich source of private data for law enforcement and other government officials.

      Even if you rarely venture beyond your home office, your personal information could be at risk, depending on who else has access to your computer. Google's Desktop Search application, released last year, provoked a flood of warnings to users about possible privacy breaches.

      And you have good reason to be concerned, particularly if there's any chance that your computer could be used--even for a short time--by someone other than you. GDS creates an index of every file, Web site, e-mail, and IM session you have ever seen. The index includes secure Web sites, too, which means that, for anyone on your machine, getting hold of your bank account numbers or other sensitive information is a simple matter of typing the right search phrase.

      Even if you don't share your computer with anyone else, the GDS index provides hackers a convenient place to find sensitive documents. The hacker no longer has to install a keylogger to see what you do on the Internet because GDS maintains a thorough history of your Web activity.

      Also, GDS keeps a copy of everything--even files or e-mail messages you've deleted (though the tool does let you delete the cached version of the deleted item).

      My advice? GDS can be a handy tool, but don't even consider installing it if your computer could be used by others (unless you're willing to accept the risk that someone may access your personal data). If you do install it (find it here), get familiar with the program's settings and preferences; you can, for example, set it so that it won't index secure Web sites or IM chat sessions, and you can customize it in other ways to make it more secure.

      Sometimes you shouldn't even trust people who say they want to help you (especially if the helper's track record on security falls somewhere between abysmal and tragic). I'm talking, of course, about Microsoft's earnest invitations to "send an error report" whenever you hit a brick wall in Windows XP.

      The Windows Error Report is Microsoft's way of collecting details on users' problems and conflicts so that it--and a long list of other participating software vendors--can offer fixes. Error report details are encrypted and generally anonymous, but in some cases identifying information may be included; for example, a report could contain part of a document with your name or with confidential information you recently sent to a Web site.

      If you have doubts, don't send the report. Instead, check the company's Web site for fixes, or reboot. Microsoft has enough problems of its own to deal with.

      Anne Kandra is a contributing editor for PC World. You can send her e-mail at consumerwatch@pcworld.com.

      Posted in the spirit of learning and teaching.
      Posted In The Spirit of Learning & Sharing
      One Love & Respect Always

      ***************************************
      The Quest for knowledge stops at the grave.
      HIM Emperor Haile Selassie I.


      If you fail to prepare,
      you are preparing to fail!


      Mind what you want, because someone wants your mind.

      Working together, the ants ate the elephant.


    2. #2
      RecoveringAA's Avatar
      RecoveringAA is offline Warrior

      Join Date
      Feb 2005
      Posts
      1,664
      Thumbs Up/Down
      Received: 2/0
      Given: 0/0
      Rep Power
      197

      0 Not allowed! Not allowed!
      Good Looking Out....

    3. #3
      Jahness's Avatar
      Jahness is offline OniOni Warrior

      Join Date
      Mar 2005
      Location
      In amerikkka! Stolen from Afrika!
      Posts
      6,827
      Thumbs Up/Down
      Received: 1/0
      Given: 18/0
      Rep Power
      616

      Arrow


      0 Not allowed! Not allowed!
      Thanks sis Recoveringaa!

      Technology is good and convenient to have, but we must also be very careful and conscious of how we use it and what we use it for.

      As part of our liberation and struggle, knowing and understand these things helps us to be more effective.

      Each one teach one.


      One Love & Respect Always
      Posted In The Spirit of Learning & Sharing
      One Love & Respect Always

      ***************************************
      The Quest for knowledge stops at the grave.
      HIM Emperor Haile Selassie I.


      If you fail to prepare,
      you are preparing to fail!


      Mind what you want, because someone wants your mind.

      Working together, the ants ate the elephant.


    4. #4
      IfasehunReincarnated's Avatar
      IfasehunReincarnated is offline Never Let Them Disrespect the Ancestors

      Join Date
      Jan 2004
      Location
      Sirius & Onile Simultaneously
      Posts
      6,006
      Thumbs Up/Down
      Received: 11/0
      Given: 0/0
      Rep Power
      436

      0 Not allowed! Not allowed!
      We should also be aware of how we use work computers. There is simple software that allows a tech dept to watch everything you do, collect all your emails, watch your screen as you view it, monitor every keystroke, including the ones you delete (so everything you type counts, even if you dont hit save or send) and even watch your instant messenger. with the right software nothing you do on your computer at work is private. absolutely nothing. its stored and then retrieved from the user.

      even without a network your employer can install software on your computer that you can not see, no matter how hard you search that allows them to track your usage. when you're away they can sit down, save your activity to a disc and use it later for prosecution, termination or blackmail.
      All is Well. Workin' Hard - Tryin' to Save Time for Fam. Check in Periodically.

    5. #5
      Jahness's Avatar
      Jahness is offline OniOni Warrior

      Join Date
      Mar 2005
      Location
      In amerikkka! Stolen from Afrika!
      Posts
      6,827
      Thumbs Up/Down
      Received: 1/0
      Given: 18/0
      Rep Power
      616

      Arrow


      0 Not allowed! Not allowed!
      Greetings IfasehunReincarnated

      You are absolutely correct. We have to be very careful how we use the computers on the job. If you don't want anyone to find it, then don't do it.

      I forgot to mention that one, thanks for reminding me.

      Good looking out!


      One Love & Respect
      Posted In The Spirit of Learning & Sharing
      One Love & Respect Always

      ***************************************
      The Quest for knowledge stops at the grave.
      HIM Emperor Haile Selassie I.


      If you fail to prepare,
      you are preparing to fail!


      Mind what you want, because someone wants your mind.

      Working together, the ants ate the elephant.


    6. #6
      Mjumbewu's Avatar
      Mjumbewu is offline Warrior

      Join Date
      Mar 2005
      Location
      Philly & Cali
      Posts
      31
      Thumbs Up/Down
      Received: 0/0
      Given: 0/0
      Rep Power
      0

      0 Not allowed! Not allowed!
      Quote Originally Posted by Jahness
      Technology is good and convenient to have, but we must also be very careful and conscious of how we use it and what we use it for.

      As part of our liberation and struggle, knowing and understand these things helps us to be more effective.
      Very on point. Have to be cognizant of the tools that we use and realize that they are not primarily our tools (i.e. they are not controlled by a revolutionary masses), which is even more of a reason to understand them inside and out, since we must use them anyway. Thanks for spreadin the knowledge.
      "The philosophers have only interpreted the world in various ways; the point, however, is to change it." - Karl Marx
      "Forward Ever, Backward Never!" - Kwame Nkrumah
      http://www.niaonline.org

    7. #7
      Jahness's Avatar
      Jahness is offline OniOni Warrior

      Join Date
      Mar 2005
      Location
      In amerikkka! Stolen from Afrika!
      Posts
      6,827
      Thumbs Up/Down
      Received: 1/0
      Given: 18/0
      Rep Power
      616

      Arrow


      0 Not allowed! Not allowed!
      Greetings Mjumbewu!

      Great seeing you again. Thanks for stopping in to check out the post.

      You are also Very on point with your comment "Have to be cognizant of the tools that we use and realize that they are not primarily our tools" This is the key to understanding just how dangerous the tools are that yt provides to make our lives more efficient.

      We all have to be aware that if we use their tools that they created, then we are subject or can be subjected to invasion of privacy by them without being able to dispute their intended purpose.

      Thanks again for sharing and allowing me to share with you.
      Last edited by Jahness; 04-18-2005 at 10:00 AM.
      Posted In The Spirit of Learning & Sharing
      One Love & Respect Always

      ***************************************
      The Quest for knowledge stops at the grave.
      HIM Emperor Haile Selassie I.


      If you fail to prepare,
      you are preparing to fail!


      Mind what you want, because someone wants your mind.

      Working together, the ants ate the elephant.


    8. #8
      RecoveringAA's Avatar
      RecoveringAA is offline Warrior

      Join Date
      Feb 2005
      Posts
      1,664
      Thumbs Up/Down
      Received: 2/0
      Given: 0/0
      Rep Power
      197

      0 Not allowed! Not allowed!
      Quote Originally Posted by Ifa
      There is simple software that allows a tech dept to watch everything you do, collect all your emails, watch your screen as you view it, monitor every keystroke, including the ones you delete (so everything you type counts, even if you dont hit save or send) and even watch your instant messenger. with the right software nothing you do on your computer at work is private. absolutely nothing. its stored and then retrieved from the user.
      Does this translate as "trojan horses" infecting pc's?

    9. #9
      RecoveringAA's Avatar
      RecoveringAA is offline Warrior

      Join Date
      Feb 2005
      Posts
      1,664
      Thumbs Up/Down
      Received: 2/0
      Given: 0/0
      Rep Power
      197

      0 Not allowed! Not allowed!
      Error messages can help developers improve their software or send strangers personal data from your PC.
      what should you do when you get them?

    10. #10
      AzaniaSpeaks's Avatar
      AzaniaSpeaks is offline Warrior

      Join Date
      May 2005
      Location
      OmniDimensional -- Here!
      Posts
      533
      Thumbs Up/Down
      Received: 0/0
      Given: 0/0
      Rep Power
      130

      Talking


      0 Not allowed! Not allowed!
      Greetings! ImHotep!

      Great posts! Asante sana! I really needed that reminder cause sometimes I get lax on the slave. . . :roll:
      The KMTK symbol SEBEK is the Crocodile image of the Divine Messenger and embodiment of the 'Word of God' SEBEK RULES COMMUNICATION, COMMUNION AND COMMUTING -- 'WORD/UTTERANCE' AS A CREATIVE FORCE IN FORMING REALITY!

      Azania Speaks - With The Voice of the Crocodile - SEBEK - Divine Utterance! Peace Born of Power!

      http://www.sur-bet.org Some United Responsible Blacks Embracing Togetherness

      "Courage is not the absence of fear -- it is the possession of fortitude!"

    11. #11
      AzaniaSpeaks's Avatar
      AzaniaSpeaks is offline Warrior

      Join Date
      May 2005
      Location
      OmniDimensional -- Here!
      Posts
      533
      Thumbs Up/Down
      Received: 0/0
      Given: 0/0
      Rep Power
      130

      Thumbs up


      0 Not allowed! Not allowed!
      Quote Originally Posted by RecoveringAA
      what should you do when you get them?
      Greetings! ImHotep!

      I simply select "Don't send" and move on. If and/or when the error causes the machine to 'freeze' then I simply reboot!

      I'm fairly well connected to some savy hardware techs for those times when my machine has to be taken apart -- which it has. And although I'm trained in building these things, I don't like practicing on my own box!

      But for the most part, sister Jahness is the absolute genius when it comes to PC matters AND she is so quick to respond! You can't go wrong following her suggestions!
      The KMTK symbol SEBEK is the Crocodile image of the Divine Messenger and embodiment of the 'Word of God' SEBEK RULES COMMUNICATION, COMMUNION AND COMMUTING -- 'WORD/UTTERANCE' AS A CREATIVE FORCE IN FORMING REALITY!

      Azania Speaks - With The Voice of the Crocodile - SEBEK - Divine Utterance! Peace Born of Power!

      http://www.sur-bet.org Some United Responsible Blacks Embracing Togetherness

      "Courage is not the absence of fear -- it is the possession of fortitude!"

    Thread Information

    Users Browsing this Thread

    There are currently 1 users browsing this thread. (0 members and 1 guests)

    Similar Threads

    1. Replies: 0
      Last Post: 05-14-2016, 01:00 AM
    2. Replies: 0
      Last Post: 11-13-2014, 01:00 AM
    3. For many spies, it's not about the money
      By Jahness in forum Afrikan World News
      Replies: 0
      Last Post: 04-07-2008, 05:47 PM
    4. Protecting Your Privacy
      By Jahness in forum P C Tech Advice & Technology
      Replies: 0
      Last Post: 06-12-2006, 12:23 PM
    5. If Bush Gets His Way on Social Security Watch Out
      By JRSWRITER in forum Junious Ricardo Stanton
      Replies: 0
      Last Post: 12-16-2004, 09:59 AM

    Thread Participants: 4

    Posting Permissions

    • You may not post new threads
    • You may not post replies
    • You may not post attachments
    • You may not edit your posts
    •  


    About

      Assata Shakur Speaks is an Forum Devoted To Assata Shakur And All Political Prisoners Around The World.
      Assata Shakur Speaks Is An Oasis Of Pan African Information Geared Towards The Liberation Of Afrikan People.

    Follow Us On

    Twitter Facebook youtube Flickr DavianArt Dribbble RSS Feed



    BACK TO TOP