Feeds

Privacy and anonymity

Just how far does Big Brother's eye see?

The Essential Guide to IT Transformation

Privacy and anonymity on the internet are as important as they are difficult to achieve. Here are some of the the current issues we face, along with a few suggestions on how to be more anonymous.

Online privacy issues are in the news every week now. This is good for us, because when it's newsworthy and notable it means people still care about the privacy of their personal information in some fundamental and important way. Privacy on the internet (or rather, a lack thereof) has been with us for ages, but as technology converges we are all forced to make some important new choices about what we are willing to disclose. Let's start with a few examples.

Recent events have found the Electronic Freedom Foundation warning users not to use Google Desktop's new "search across computers" option, which stores a user's indexed data on Google servers for up to 30 days. It's making headlines, but it's just the tip of the iceberg. In recent weeks we've also heard about government attempts to subpoena information from Yahoo, Microsoft and Google. Perhaps a subpoena for all the files indexed on your Google Desktop is not that far away. Then there are the wiretaps in the US by those three-letter agencies, which we're just hearing about now. First reported by the New York Times, these were wiretaps on US citizens that were sometimes done without requiring court approval at all. I don't know about you, but even when I'm not doing something wrong (which is most of the time), I get very nervous when I hear about privacy issues popping up in this way.

This is on top of all the old news that barely makes headlines anymore: botnet Trojans controlling access to your computer's data and stealing your identity; rampant spyware infections that have been with us for years and are sometimes quite nasty; the fact that only about a third of the public even know what spyware is; and finally, there's even the occasional military breach that exposes the personal information of people who probably value their privacy very much.

Where are we headed with online privacy? Well, perhaps you should publish your darkets secrets in a public blog right now and get it over with. The fact is, we haven't had much, or any, privacy online in quite a while. In the search for privacy, what do we have to do to become anonymous on the internet?

Privacy starts with you

Many people, and security people in particular, value their privacy. We don't like to be tracked and followed. Most of the time this desire does not stem from any malicious intent, but rather from the knowledge of what others who are more malicious than us can do with this information. Our day starts at the office: nothing is private on your office computer, and most people know this already. It is a corporate asset, a tool to conduct business that can (and perhaps, should) be searched at any time. Fine, let's move on to the home computer then. At home one can do "other" things with his computer besides just work.

Most people start with their local system - clearing out their web browser cache, recent URL lists and more with tools of yesteryear like TweakUI. But as broadband connections have become inexpensive and pervasive, we are increasingly being tracked by our IP addresses at home. If you have high speed internet at home, odds are your IP address is relatively static now - cable and DSL modems are often assigned the same IP address for up to a year. Website owners can track your repeat visits much more easily - what time you arrived, how long you stayed, and how often you come back. Nothing new here. Many of us disable cookies in our browsers too, but that semi-static IP address at home can have just as big an impact on your privacy as cookies do.

Often the most anonymous place to surf the web is still with a laptop at a coffee shop with free WiFi, or at an internet cafe. But one day even these places will require a fingerprint for authentication before you're granted access, and you'll have to worry about your fingerprints too. For now however, we have other concerns.

Build a business case: developing custom apps

Next page: Big name privacy

More from The Register

next story
14 antivirus apps found to have security problems
Vendors just don't care, says researcher, after finding basic boo-boos in security software
'Things' on the Internet-of-things have 25 vulnerabilities apiece
Leaking sprinklers, overheated thermostats and picked locks all online
Only '3% of web servers in top corps' fully fixed after Heartbleed snafu
Just slapping a patched OpenSSL on a machine ain't going to cut it, we're told
iWallet: No BONKING PLEASE, we're Apple
BLE-ding iPhones, not NFC bonkers, will drive trend - marketeers
How long is too long to wait for a security fix?
Synology finally patches OpenSSL bugs in Trevor's NAS
Secure microkernel that uses maths to be 'bug free' goes open source
Hacker-repelling, drone-protecting code will soon be yours to tweak as you see fit
Israel's Iron Dome missile tech stolen by Chinese hackers
Corporate raiders Comment Crew fingered for attacks
Roll out the welcome mat to hackers and crackers
Security chap pens guide to bug bounty programs that won't fail like Yahoo!'s
HIDDEN packet sniffer spy tech in MILLIONS of iPhones, iPads – expert
Don't panic though – Apple's backdoor is not wide open to all, guru tells us
prev story

Whitepapers

Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
Backing up Big Data
Solving backup challenges and “protect everything from everywhere,” as we move into the era of big data management and the adoption of BYOD.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.
Why and how to choose the right cloud vendor
The benefits of cloud-based storage in your processes. Eliminate onsite, disk-based backup and archiving in favor of cloud-based data protection.