background preloader

Six Tips to Protect Your Search Privacy

Six Tips to Protect Your Search Privacy
By Peter Eckersley, Seth Schoen, Kevin Bankston, and Derek Slater. Google, MSN Search, Yahoo!, AOL, and most other search engines collect and store records of your search queries. If these records are revealed to others, they can be embarrassing or even cause great harm. Would you want strangers to see searches that reference your online reading habits, medical history, finances, sexual orientation, or political affiliation? Recent events highlight the danger that search logs pose. Disclosures like AOL's are not the only threats to your privacy. Search companies should limit data retention and make their logging practices more transparent to the public,4 while Congress ought to clarify and strengthen privacy protections for search data. The Electronic Frontier Foundation has developed the following search privacy tips. 1. Don't search for your name, address, credit card number, social security number, or other personal information. 2. 3. 4. 5. 6. Conclusion September 2006 2 See

Related:  PRIVACY

Scroogle, Privacy-First Search Engine, Shuts Down for Good Couldn't take the DDoS. By Adrianne Jeffries 2/21/12 8:52am Share this: (Gerard Paardekam via Virginia Mataix) The Future of Reputation View Professor Solove speaking about The Future of Reputation at Google, Inc. (Mountainview, CA) on YouTube: Click here to view the video on YouTube in a larger size. Professor Solove also spoke about The Future of Reputation at Google, Inc.'s New York City office. 5 free Android security apps: Keep your smartphone safe Review By Eric Geier February 21, 2012 06:00 AM ET Computerworld - There's been much controversy over mobile OS security, especially where Android is concerned. HTTPS and Tor: Working Together to Protect Your Privacy and Security Online This week EFF released a new version its HTTPS Everywhere extension for the Firefox browser and debuted a beta version of the extension for Chrome. EFF frequently recommends that Internet users who are concerned about protecting their anonymity and security online use HTTPS Everywhere, which encrypts your communications with many websites, in conjunction with Tor, which helps to protect your anonymity online. But the best security comes from being an informed user who understands how these tools work together to protect your privacy against potential eavesdroppers. Whenever you read your email, or update your Facebook page, or check your bank statement, there are dozens of points at which potential adversaries can intercept your Internet traffic. By using Tor to anonymize your traffic and HTTPS to encrypt it, you gain considerable protection, most notably against eavesdroppers on your wifi network and eavesdroppers on the network between you and the site you are accessing.

Not just Google: Facebook also bypasses privacy settings in IE Update: Facebook has responded. Facebook to Microsoft: P3P is outdated, what else ya got? Following the news that Google is tricking Apple's Safari browser by including privacy-circumventing code in its ads, Microsoft is now saying that Google bypassed privacy settings in Internet Explorer as well. The story goes deeper than that. Google isn't the only company to blame here: Facebook is doing the same thing, as are tens of thousands of other companies, according to TechPolicy. Veritate et Virtute: Online Safety: Let us be safe, at home, onl This is a continuation of the expansion on the daily tweets I shared via my Twitter account, @BurgessCT, during National CyberSecurity Awareness Month (#NCSAM - October 2009). If you’re reading this blog, you and your family are connected to the internet; your entrée to the internet is via a laptop, desktop PC, smart-phone, or other such devices and you have one, two maybe three separate service providers. Your connected devices allow you and your family the opportunity to literally bring the world to your doorstep. And we want the world to come to our door via the internet – as the internet brings to us knowledge, enhances our ability to communicate, provides us opportunities to share and collaborate with others and of course enables us to conduct commerce and be entertained.

Secret GPS tracker terrifies Ontario man - Canada An Ontario man says he's angry and frightened after discovering someone hid a GPS tracking device under his vehicle, apparently to secretly monitor his movements. "I was doing just a regular inspection on my truck and I found this black box under my truck … with flashing lights inside," Ben Ferrill of Warsaw, Ont., told Go Public. "I didn’t know what it was. I didn’t know if it was a bomb.

New Year's Resolution: Full Disk Encryption on Every Computer You Own The New Year is upon us, and you might be partaking in the tradition of making a resolution for the coming year. This year, why not make a resolution to protect your data privacy with one of the most powerful tools available? Commit to full disk encryption on each of your computers. Many of us now have private information on our computers: personal records, business data, e-mails, web history, or information we have about our friends, family, or colleagues. Encryption is a great way to ensure that your data will remain safe when you travel or if your laptop is lost or stolen. Best of all, it's free. Welcome to Google Data Armageddon March 01, 2012, 11:38 AM — Today is G Day, when Google’s new privacy policy takes effect. What this means is that, starting right now, Google will be combining all of your data eggs in one big basket, the better to serve you targeted ads. That includes the channels you subscribe to on YouTube, the blogs you’ve created in Blogger, the photos you’ve posted to Picassa, the items you’ve +1’d in Google+, your search history, and a lot more. Taken altogether, those eggs could paint a fairly thorough portrait of you, your interests and activities, all tied to your Google identity (ie, your Gmail address). That makes some people nervous. Others are just using it as an excuse to bash Google for their own purposes.

Top Educational Websites For Children That Are Fun There’s something about the phrase “top educational websites for children” that makes my stomach feel ill. It may be because I imagine parents plopping their children in front of a PC and only allowing them to play games that involve solving math problems or answering science questions. The torture! Magid: Latest iPhone and Android app privacy violations deeply troubling By Larry Magid for the Mercury News Posted: 02/19/2012 02:41:00 PM PST0 Comments|Updated: 2 years ago The recent revelations that some iPhone and Android apps are uploading and storing users' phone address books without permission is very troubling. It not only violates the privacy of the person using the phone but, potentially, everyone in that person's address book.

S.F. team wins paper shredder puzzle prize To most people, 10,000 slivers of shredded paper are as good as trash. To three coders in San Francisco, they're a challenge - especially when the jumbled mass of paper once made up five classified government documents. The three were not hackers trying to steal state secrets, but participants in a contest run by the Defense Advanced Research Projects Agency, the government group that funds high-tech military research. In October, DARPA offered $50,000 to the first group to piece together the shredded documents or the one that made the most progress by Dec. 4.