Skip to main content

Home/ StJulians_ITGS/ Group items tagged 1.3_privacy_anonymity;

Rss Feed Group items tagged

The Zhan

Keeping Your Network Secure : CCTV Security Cameras - 2 views

  •  
    A solution to the problem associated to IP security cameras. as seen in: http://www.bbc.com/news/technology-16919664
El Mexicano Pastiche

Google offers secure searching to protect from nosy bosses and ISPs - 4 views

  •  
    Google has enabled encrypted searching using SSL (Secure Sockets Layer) which it says will prevent "employers and internet service providers" from reading what is sent. The possibility that employers and ISPs might be watching peoples' search traffic clearly concerns Google, and it has often concerned employees.
  • ...3 more comments...
  •  
    Might want to rethink those tags Sr Pastiche. Any suggestions anyone?
  •  
    I knew it was privacy and anonymity, I was testing you sir.
  •  
    Did I pass?
  •  
    Essentially what Google is trying to do is to offer people a way of securely navigating their website, using SSL, so that people don't have to worry about being monitored. People can see if they are using the secure version of the google search engine if the web adress cointains "https" rather than just "http". SSL works as follows: 1- The web browser being used checks the websites' certificate to make sure that the client is connecting to the real site and not someone intercepting 2- The encryption types that the browser and the web site server can both use to understand each other are determined 3- Browser and Server each send each other unique codes to use when encrypting the data that will be sent 4- The browser and server start communicating using encryption, leaving the web pages secured. For more information on how SSL works ckeck the following website: http://www.ourshop.com/resources/ssl.html
  •  
    The following article shows how the asymmetric encryption inherent to SSL (Secure sockets layer) and TLS (Transport Layer Security) have been rendered useless by a tool called BEAST (Browser Exploit Against SSL/TLS). It attacks the "AES encryption algorithm" used in the cryptographic protocols. "BEAST is able to grab and decrypt HTTPS cookies once installed on an end user's browser." "While other attacks focus on the authenticity property of SSL, BEAST attacks the confidentiality of the protocol. As far as we know, BEAST implements the first attack that actually decrypts HTTPS requests". "Transaction confidentiality based on the SSL TLS V1.0 protocol (the most used still today) is dead." "The only true defense from fraudulent transactions is to sign the (...) transaction data so that the attacker cannot inject bogus material. This means effectively using a token with a pin pad." "Fixing the vulnerability that BEAST exploits may require a major change to the protocol itself." http://www.itpro.co.uk/636304/ssl-under-threat-as-flaw-exploited
benjon hamal

BBC News - Chemicals and defence firms targeted by hacking attack - 2 views

  •  
    This article presents intellectual property theft of various companies that work for governments. the article raises many ethical issues.
benjon hamal

BBC News - Facebook works with Websense to add phishing safety net - 5 views

  •  
    Don't forget the other tags. You are missing one from section 2 and one from section 3
  • ...1 more comment...
  •  
    Privacy is the main issue being presented as facebook users are exposed to phising. Phising involves 'stealing' a users username and passwords usually through emails or links leading to fake websites which seem to be trustworthy. Phishing attempts give the user a sense of urgency in order to convince them to give their information. (e.g. You need to provide us with your username and password as soon as possible. Not doing so will result in permanent deletion of your account) The relationship between the users and the IT system is that users often use facebook on a day to day basis to perform various activities. This makes facebook a 'profitable' target due to the large number of people that can be tricked at once. The risk is that the stakeholders may be susceptible to is the loss of their username and password, giving the hacker/phisher full acess to ones account which may then lead to other information to be divulged about the user. Facebook is attempting to solve this issue by warning users about suspicious links they may be accessing, although there are already some security options in facebook settings such as the use of HTTPS which provides "encrypted communication and secure identification of a network web server." http://en.wikipedia.org/wiki/HTTP_Secure
  •  
    Seems to be a good solution but what are the limits of this solution?
  •  
    In theory this would be a good solution, due to the fact that as soon as the user read the warning message in detail, they would feel encouraged not to follow the link. However, due to the facebook's nature, in practice, this solution isn't as effective as one would expect. Throughout Facebook's history, when a user clicks a link that leads to an application, a message appears stating that if the user accepts then information from their profile will be accessed. Because of this, when users see this message they will simply think it is one of the usual messages and skip to the link due to habit. Another obvious limitation is the fact that all it does is simply suggest that it MIGHT be malicious, and therefore most users that are unaware of the dangers of phishing might ignore it and choose to follow the link.
Tranny Franny

BBC News - Adidas websites go offline after hacking cyber-attack - 1 views

  •  
    This article refers to the security of the network of various high-profile companies (Adidas, Sony), and the privacy of the consumers. To solve the issue of security, companies should tighten up their security for example, by incorporatibg Secure Sockets Layer protection (SSL) and https network protection. In the past, "sophisticated" has referred to Advanced Persistent Threat (APT) attacks. Defending against APTs was one of the tasks involved in a recent EU-US joint test of cyber attack readiness. http://www.itpro.co.uk/637204/cyber-attack-drives-adidas-websites-offline The companies should also be more cautious of their surroundings by monitorning IP traffic and access to the website. Losing personal and/or sensitive data and having it in the wrong hands could cause serious consequences. (http://www.filetransferplanet.com/cyber-attack-forces-adidas-offline/) This personal information could then be passed on to third party companies who can take advantage of information like address and phone numbers to conduct surveys or distribute advertisements. This would cause widespread discotent due to the invasion of the consumers' privacy.
Fiche Galinha

SOPA: Google, Facebook and Twitter May Go Offline in Protest | Techland | TIME.com - 3 views

  • SOPA: What if Google, Facebook and Twitter Went Offline in Protest?
  •  
    If the proposed blackout were to occur, a greater awareness and understanding could be achieved. This would likely garner more support against SOPA, as websites like Facebook, Google and Twitter are used by millions of people worldwide, most of these people being casual internet users who have no idea what SOPA really is, meaning some would attempt to educate themselves on the subject and try to do something about it. The potential increase in support could lead to more people demanding big companies to 'drop' their support by threatning to boycott said comapnies products/services. As mentioned in an article bookmarked by Tranny Franny (http://www.slashgear.com/sony-and-nintendo-drop-sopa-support-amid-anonymous-threats-03205579), Sony and Nintendo appear to have dropped their suppor after being threatned by Anonymous. Although what Anonymous threatned to do was wrong, it certainly go the point across to both companies meaning a boycott from customers worldwide could change other companies minds on whether or not to support SOPA
  •  
    Although that seems like a good way to reach a wider audience in order for them to understand the severity of how SOPA would affect the internet, it could be seen as quite unethical. These casual internet users could only use websites such as Facebook to get an quick update, so these could be people who would be indifferent after knowing the affect of SOPA. Why should these people be prevented to access a website they use simply because the website feels the need to make a statement. And in terms of big companies dropping their support, is it really correct for them to drop their support? why did they support it in the first place? If they believe that this act should be made official is it correct for them to "drop" their support simply because too many people are going against it? So they would be "changing sides" out of fear, rather than due to their opinion, which in a way goes agaisnt the point of voting or supporting somethis such as SOPA
benjon hamal

BBC News - Google China e-mail hack: FBI to investigate - 5 views

  •  
    The main social and ethical issue in this article is security and privacy. Using a method known as 'spear-phising', hackers were handed users' account information. I find it quite freightning how people, who are supposed to be some of the best minds in the world, as they work in sensitive parts of the US government, fall into the trap of giving their account information to hackers. In my opinion a greater awareness should be raised, on how to protect their privacy, among high-profile government officials in order to protect vital and classified information.
  • ...1 more comment...
  •  
    I agree with Andre as though the consequences of the hack can be dealt with in a relatively short amount of time, the incident reveals a bigger problem with the security of the government's files and questions just how safe confidential information really is from being accessed by the wrong people. The main social and ethical issue is security, as the security of US official's e-mails may have been breached by fishing. The fact that such an incident has occurred in such a place with such important information and with supposedly very high security measures is worrying, and ways to detect and combat the threat of phishing should be publicized.
  •  
    this is racism...
  •  
    In what way is this racism Zhan?
Isy :)

'Anonymous' targets German far-right with Nazi-leaks.net - 7 views

  •  
    The social and ethical issues that relate to this article are that privacy and security and reliablility to a certain extent. What the Anonymous group are doing is basically taking people's personal information such as name, age, adress etc. and putting online for everyone to see, simply becuase they favoured nazi views. This is essentially the invasion of people's privacy as people's information is free for everyone to see. IT is also a security issue as people who feel very strongly against people who favour nazi views, have access to these peoples' adresses and could impose a danger. Reliability is also an issue, as it's mentioned in the article that none of the people that were mentioned in the website were actually confirmed to share Nazi ideals, meaing they are unjustly putting people in danger.
  • ...1 more comment...
  •  
    One of the problems here is the authenticity of data being released. ""This is a lot of data, but there are already some names where it's clear the people are not right-wing extremists." Some people identified in the data had merely been contacted by right-wing publications seeking interviews, she added." Some of the people on the list are not Nazis. What could be a solution to this?
  •  
    The article does raise some rather interesting social and ethical concerns. The main thing here is of course "Anonymous" breaking the Data Protection Act 1998 with their unlawful obtaining of personal information. While one can admire "Anonymous" fight against neo-nazism, the results they are producing are in fact not reliable. Though, as we've seen in the past, "Anonymous" are skilled proper encryption and security should have been able to fend them off and safeguard all information. Looking back, this would have the ideal to avoid the situation the websites are in now. I cannot see a plausible way of undoing this, and again give privacy to those who had it broken, as the information has been linked to multiple other sites - so perhaps this is only to serve as a lesson for others websites containing personal information.
  •  
    Well, to be honest the best solution would just to not post any private information online but seeing as that option wouldn't be considered by the 'anonymous' hacker group they could at least find a way and make sure that the only personal information posted online its authentic and from the main followers and contributors to this Nazi supporting website… but I don't really know how they would be able to do this, sooo if anyone knows please share because now I'm curious aha As much as I don't agree with the Nazi ideals and as much as I believe that supporting them is (sorry for being improper here) idiotic. I still don't agree with posting this private information online because as mentioned above, this does pose a major danger to the people whose information has been posted online by the people who have very strong feelings against these Nazi supporters.
El Mexicano Pastiche

Hackers expose defence and intelligence officials in US and UK - 4 views

  •  
    This article presents intellectual property theft of civil servants. The article raises many ethical issues such as of privacy, anonymity, security etc. The hackers have accessed private information of government officials, (some of them who work in sensitive areas) their details and emails. Some officials fear that their e-mails can be quickly cracked using off the self software. Some companies client's credit card numbers and addresses were also hacked. The hackers, who are an anonymous groups have clearly violated the privacy rights of individuals. Exposing civil servants data can turn out to be of serious problem for the government. New methods should be developed to secure these confidential data.
  • ...2 more comments...
  •  
    Good overview of the issues there Benjon. Intellectual property is not the issue here however so be careful using terminology correctly. You have stated one of the problems can anyone be more specific about that problem and provide a solution?
  •  
    The article depicts how the personal information of various government organisations have been illegally accessed, furthermore these details have been posted on a vast amount of websites and details such as email passwords etc can be easily cracked using off the shelf software. This means that anyone who has seen the exposed data can easily gain further access to credit card details etc. Furthermore, this puts lives at risk for MI6 agents especially as their cover is supposed to maintain secret, if that sort of information gets into the wrong hands the cover of many agents will be blown and their lives will be at risk.
  •  
    There are various different ways in which security could be improved to prevent a similar incident from happening. It is mentioned in the article, and by Benjon that simple of the shelf software would be capable of decrypting the passwrords stored on the Stratfor database. This in my opinion is quite shocking as Stratfor offers its service to government officials all around the world, most likely for a monetary fee, and seem to not care whether or not the information they are MEANT to secure is infact secure. This issues could be easily solved by improving their encryption technology to or close to military grade encryption. It is most likely that the company's reputation has been severely damaged and rightly so.
  •  
    Nice link here explaining basics of military encryption: http://searchsecurity.techtarget.com/definition/Advanced-Encryption-Standard Also I follow this guy's blog and he always has some interesting stories on security and has done a lot of work in the world of cryptography: http://www.schneier.com/
Tranny Franny

BBC News - Police crackdown on fake shopping sites - 3 views

  •  
    This article refers to the authenticity of the identity of web shops, and the security of shoppers' credentials. "DI Hoare said shoppers should also be wary of unsolicited offers that arrive via email." A common scamming tool that cyber thieves resort to in order to "harvest credit card and banking details" is phishing. "Phishing emails usually appear to come from a well-known organization and ask for your personal information - such as credit card number, social security number, account number or password. Often times phishing attempts appear to come from sites, services and companies with which you do not even have an account. In order for Internet criminals to successfully "phish" your personal information, they must get you to go from an email to a website. Phishing emails will almost always tell you to click a link that takes you to a site where your personal information is requested. Legitimate organizations would never request this information of you via email." http://www.phishtank.com/what_is_phishing.php
  •  
    this gives a similar example where they used a real store and created the fake website then... the shop owners would receive all the complaints with out actually knowing what was going on http://voices.washingtonpost.com/securityfix/2009/01/caveat_emptor.html
Morten Nielsen

European draft data law announced: What you need to know | ZDNet - 3 views

  • Right to be forgotten
  • will in effect allow European users to wipe their online slate clean. It will allow users to have their photos, details, and other data removed from websites, social networks, and search engines.
  • Regulation will dictate that a data breach or loss should be reported “if feasible, within 24 hours” of it occurring.
  • ...1 more annotation...
  • The draft rules dictate that serious violations, such as processing sensitive data without the individual’s consent, can be punished by a fine up to €1 million ($1.3 million), or even up to 2 percent of their global annual turnover.
Tranny Franny

BBC News - Backlash over Google move to change privacy settings - 1 views

  •  
    The main stakeholder here is the google, youtube, gmail, etc. user. The change in privacy policy settings in the system affects the stakeholder in these ways, as outlined in the article: In "suggesting search queries, or tailoring search results, based on the interests expressed in Google+, Gmail and YouTube" (mining data to provide "ever more targeted adverts"), the results become limited: "something I am interested in this week, I might not be interested in next week. I use Google's facilities as both a private individual and in my professional life. Which bit are they going to give back to me?" There is no opt-out alternative to the changes in the system. "Google has become a way of life for some people. They can't do without it even if they don't like the direction it is going in". The simplification of policies could lead to graver problems. http://edition.cnn.com/2012/01/27/tech/web/google-privacy-clarified/index.html
Fiche Galinha

BBC News - O2 apology for disclosing mobile phone numbers online - 3 views

  •  
    25 January 2012 Last updated at 12:23 ET O2 has apologised for a technical problem which caused users' phone numbers to be disclosed when using its mobile data. The company said it normally only passed numbers to "trusted partners". A problem during routine maintenance meant that from 10 January numbers could have been seen by other websites.
  • ...5 more comments...
  •  
    Well, the main problem in this story is the privacy of the O2 users in my opinion. The issue is the fact that they've let(intentional or not) websites gain the user's phone number. Even though they "investigated, identified and fixed it this afternoon" - it is still rather disconcerting that it happened. It might have a been an isolated problem, but that does not change the fact that their personal information was shared without their consent. But I may be overreacting, as of now there is no knowing how many will be affected. However, one would expect that there some are legal obligations in terms of notifing the offended costumer and the authorities - this does not seem to be the case in a lot of EU countries. Including the UK as far as I can tell. Last year there was talk of creating data breach notification laws in the EU - but from what I gather has not passed yet.
  •  
    This article writes about the EU data protection act - I guess I was right, there are no laws universal EU law at the moment. http://www.pcworld.com/businesscenter/article/248566/eus_data_protection_proposals_likely_to_include_24hour_breach_notification.html It says that the EU should have made an announcement today about it.
  •  
    http://www.bbc.co.uk/news/magazine-15730499 How much privacy can smartphone owners expect?
  •  
    How much privacy can anyone except these days? It is no only owners of smartphones. Our generation is literally throwing away our privacy. Smartphones, facebook - it seems to be that most mainstream technology items lessen our privacy nowadays. http://www.theatlantic.com/technology/archive/2012/01/use-google-time-to-get-real-about-protecting-your-digital-self/251981/#.TyBIy3wo_AA "Google's decided to integrate the data it has about you, which means you better think about the digital tracks you're leaving. "
  •  
    I agree with Morten and Isy. Privacy is decreasing by the second. Technology is increasing rapidly and many people like these new technologies, such as using smartphones, social networks etc. Yet, are they aware of all these drawbacks? Privacy is lacking, and many people believe that we don't even have privacy anymore since data can be accessed much easily now that technology has evolved. Here's a video about how a smartphone can cause privacy issues. http://www.youtube.com/watch?v=N2vARzvWxwY&feature=fvst With one click on a person's picture, people may obtain their location, where they live and other personal information. This is a cause of technology rising so much in the past years, which has lead to all these privacy issues. People should start to be more aware of this situation, that by only a picture on the internet people can obtain personal information that can lead to severe issues. One of the solutions for this issue could be to turn off the location service on their smartphone in order to not be able to be tracked where hackers can see the exact place where a person is.
  •  
    As mentioned above the the issue concerned about in this article is privacy as peoples information (mobile phone numbers) are displayed on websites without their consent. Obviously the fact of having others know personal information may leave people concerned, however they must be aware that their personal information is spread all over the internet. From pictures on facebook to a gmail/youtube accounts peoples names, adresses and surnames are most likely known by some companies. Google and Facebook holds personal information that belongs to each one of us. What companies like such do to profit from this is sell a list of names, adresses and emails to third party which will then have means of communication with us to advertise their products and this is responsible for some of the spam we receive. The solution for this specific scenario of mobile phones isn't very clear, although it has been fixed no way of how it could of been prevented was suggested. Perhaps a the server could be shut down while it was under maintenance and another one should've been running in the meanwhile. Clearly the issue here had nothing to do with the mobile phone users and there was nothing they could have done as they were unnaware of the situation. I personally believe that privacy does not exist on the internet. It someone wishes to have privacy then the safest way to go do so is to not use/be connected to the internet. http://www.dailyfinance.com/2011/09/30/when-it-comes-to-cell-phone-privacy-youre-an-open-book/ Shows how mobile phones can cause privacy issues and how police officers now have gadgets that allows then to see everything that a person has done in their mobile phone, this clearly violates peoples privacy.
  •  
    I would just like to mention that I posted this, not fiche galinha -.- diigo is trolling me.
Mr Brooke

Ordering Pizza in 2015 | American Civil Liberties Union - 7 views

  •  
    "Ordering Pizza in 2015"
  • ...1 more comment...
  •  
    Scary! After this video I surely don't want to order another pizza. The social and ethical issue here is surely privacy. With only one phone call, people can "wire into the system" and be able to view this type of personal information. Plus, if this is in 2005, nowadays not only we can figure out this information, but also more! Privacy is becoming a great issue as we are seeing that as technology is increasing, the less privacy we have, more people are starting to be able to access people's personal information. Relating to this videos, solutions that could apply could be: 1. When ordering a pizza, instead of calling from your mobile phone or home phone, call from the nearest phone booth to your house an order to somewhere near your house. Yet, don't give any personal information such as home address or mobile phone number. 2. Don't order! Go to the pizzaria and buy your pizza straight from the restaurant. In this way, you surely don't have to give any personal information so that you'll have more privacy than if you called from your phone.
  •  
    The social and ethical issue here is surely privacy. We can see here that there are various databases which are interconnected and the pizza restaurant is able to access all of them. This is a major issue as the pizza restaurant can invade the customers privacy and use the data to exploit the customer e.g. the pizza restaurant may see that the customer is wealthy and charge a higher price. Furthermore, If anyone else can gains access to this information the customers safety can be put at risk for instance, the pizza service knows whether or not you are at home therefore this could increase home robberies.
  •  
    i think this can even be considered dangerous. There could be a scenario where a young and wealth girl places the pizza offer. what could happen then is the person on the phone would know all her private information where she lives, where she works/studies her income and would probably end up with a picture of her. the person on the phone might not be a very reliable person and decide to do something dangerous
1 - 20 of 64 Next › Last »
Showing 20 items per page