Previous 1 2 3 Next 31 Replies Latest reply: Nov 7, 2011 10:01 AM by Klaus1 Go to original post
  • ds store Level 7 Level 7 (30,315 points)

    blastpepsi wrote:

     

    pacificblue you are kinda correct. You can secure youre privacy by either splitting up your ip address and using a differnt one (illegal). or use a program to protect you from ip address searches.

     

    Not a chance, you use any electronic device and they can find you and track you, by your MAC address, even by the slight differences your computer keeps time from other computers on the Internet.

     

    I worked with a electronics warfare technician in the military 20 years ago, that same technology has filtered down to just about any cop on the beat, most security firms and unscrupulous marketers.

     

    The entire technological industry has shown they clearly intend to do what ever the heck they want, whenever they want and the only choice you have is not to use anything they make.

     

    You can't use technology at all anymore without everything being recorded for some "helpful" "geewihiz bang" feature and everyone knowing about it in the process.

     

    Google records all your searches along with your IP address, and your computer specifics, like your screen size, your browser type, operating system etc.

     

    Firefox w/Ghostery currently has 667 web bugs in it's database.

     

    Slashdot for Confidential-Data-Not-Safe-On-Solid-State-Disks.

     

    Slashdot: German Politician Demonstrates  Extent of Cell Phone Tracking.

     

    US News: The snitch in your pocket.

     

    ISP's record all your web traffic. Wired: Whistle blower outs NSA spy room.

     

    Slashdot: NSA backdoor creates security hole in Windows.

     

    Apple hires David Rice.

     

    New York Times: New Web Code Draws Concern over Privacy Risks

     

    Browser , Flash, Silverlight, HTML cookies, EverCookies.

     

    Lifehacker: Facebook is tracking your every move on the web

     

    Search Apple: Apple-Q-A-on-Location-Data.html

     

    Cellbrite devices. theNewspaper: Michigan Police Search Cell Phones During Traffic Stops

     

    Thinq_: Creepy app warns of an end to privacy

     

    theguardian: Google may use games to analyze net users

     

    Wikipedia: Remotely activated mobile phone microphones

     

    ABCnews: OnStar reverses privacy policy, won't track non-subscribers

     

    The Australian Financial Review: Peeping TomTom sells your every move.

     

    "Firesheep"

     

    Wall Street Journal: MasterCard and Vista to use your purchases to target ads online.

     

    Threatpost: CIA admits it monitors, analyzes Facebook, Twitter

     

    ThreatLevel: Fed's use of fake cell tower

     

    ThreatLevel: UK Cops use fake mobile phone tower to intercept calls

     

     

    The privacy war is lost, game over.

     

    http://www.whatsmyip.org/more/

  • Klaus1 Level 8 Level 8 (45,615 points)

    It's Android you really have to worry about.

     

    More than 50 applications available via the official Android Marketplace have been found to contain a virus.

    Analysis suggests that the booby-trapped apps may have been downloaded up to 200,000 times. The apps are also known to be available on unofficial Android stores too. Once a booby-trapped application is installed and run, the virus lurking within, known as DroidDream, sends sensitive data, such as a phone's unique ID number, to a remote server. It also checks to see if a phone has already been infected and, if not, uses known exploits to bypass security controls and give its creator access to the handset. This bestows the ability to install any code on a phone or steal any information from it.

    Remote removal of the booby-trapped apps may not solve all the security problems they pose. The remote kill switch will not remove any other code that may have been dropped onto the device as a result of the initial infection.

    Moreover, more than 99% of Android phones are potentially leaking data that, if stolen, could be used to get the information they store online.

     

    http://www.bbc.co.uk/news/technology-13422308

    The data being leaked is typically used to get at web-based services such as Google Calendar.

    The open nature of the Android platform was a boon and a danger, and as Facebook have already discovered it is also a very attractive criminal playground.

    http://www.bbc.co.uk/news/technology-12633923

    How safe is your smartphone?

    Smartphones and social networking sites are likely to become the next big target for cyber criminals, according to a security industry report.

    Symantec's annual threat analysis warns that the technologies are increasingly being used to spread malicious code.

    Users of Facebook, Twitter and Google's mobile operating system, Android, are said to be particularly vulnerable.

    In several cases, the security holes were exploited and used to install harmful software on Android handsets - suggesting that criminals now view smartphone hacking as a potentially lucrative area, and Android is still in the firing line:

    http://www.bbc.co.uk/news/uk-15600697

    At least six different varieties of malware were discovered hidden in applications that were distributed through a Chinese download service.

    Several pieces of malware were also found on iPhones, however only devices that had been "jailbroken" to bypass Apple's security were affected.

    The company's process of pre-vetting all new applications is believed to have spared its devices from a major attack.

Previous 1 2 3 Next