Feeds

Microsoft: Worried about web privacy? Tell us everything...

Redmond wants to look at your privates

Internet Security Threat Report 2014

Microsoft has launched a drive to stop people splurging their personal information all over the internet - by asking them to splurge their personal information all over the internet.

As well as series of telly commercials, Microsoft have designed a special questionnaire designed to discover whether visitors are “carefree surfers, digital veterans or somewhere in-between”.

Visitors to the new privacy microsite are asked to share details of which social networks they use, what sort of information they share publicly and how much care they take to cover their tracks online. This data is then harvested by Edelman, the company commissioned to carry out the survey, along with details of the IP address of whoever fills in the survey.

Although the website expressly states that it “does not request or collect any personal information”, this claim appears to be contradicted by the later statement:

This survey collects information about your response such as the Internet Protocol (IP) address through which you access the Internet and the date and time you access the survey. This information is used to help improve the survey, analyze trends, and administer the survey.

Microsoft's research indicates that 85% of Americans are concerned about their privacy online, indicating a clear need for privacy-invading questionnaires to help clear the problem up.

In a blog post, Ryan Gavin, Windows general manager, wrote: “Very few of us believe that sharing some personal data online is a bad thing. It’s part of our everyday routines to fill out profiles, login to sites, and oftentimes provide personal information like our credit card or phone numbers in order to take advantage of all the web has to offer. In fact, the more personal and relevant the web gets, the better it can get.

“Yet, at some point, we all draw a line where we are uncomfortable sharing more. And when we think we’re being tracked, particularly by those we may not have a direct relationship with, our tolerance drops," Gavin said, apparently with a straight face.

And while tracking isn’t bad per se, we typically reach our information-sharing breaking point with very personal data, like items related to our kids or our health.” ®

Internet Security Threat Report 2014

More from The Register

next story
George Clooney, WikiLeaks' lawyer wife hand out burner phones to wedding guests
Day 4: 'News'-papers STILL rammed with Clooney nuptials
Shellshock: 'Larger scale attack' on its way, warn securo-bods
Not just web servers under threat - though TENS of THOUSANDS have been hit
Apple's new iPhone 6 vulnerable to last year's TouchID fingerprint hack
But unsophisticated thieves need not attempt this trick
PEAK IPV4? Global IPv6 traffic is growing, DDoS dying, says Akamai
First time the cache network has seen drop in use of 32-bit-wide IP addresses
Oracle SHELLSHOCKER - data titan lists unpatchables
Database kingpin lists 32 products that can't be patched (yet) as GNU fixes second vuln
Who.is does the Harlem Shake
Blame it on LOLing XSS terroristas
Researchers tell black hats: 'YOU'RE SOOO PREDICTABLE'
Want to register that domain? We're way ahead of you.
prev story

Whitepapers

Forging a new future with identity relationship management
Learn about ForgeRock's next generation IRM platform and how it is designed to empower CEOS's and enterprises to engage with consumers.
Storage capacity and performance optimization at Mizuno USA
Mizuno USA turn to Tegile storage technology to solve both their SAN and backup issues.
The next step in data security
With recent increased privacy concerns and computers becoming more powerful, the chance of hackers being able to crack smaller-sized RSA keys increases.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.
A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.