- Category: September 2010
From the moment it was founded in 1990, the Electronic Frontier Foundation (EFF) has championed the public interest in every critical battle affecting digital rights and listed their Top 12 ways to protect your online privacy which Asian e-Marketing is repeating in our current issue:
1. Do not reveal personal information inadvertently
You may be leaving a trail of personal details, including email addresses and other contact information, without even knowing it unless you properly configure your Web browser. In your browser's "Setup", "Options" or "Preferences" menus, you may wish to use a pseudonym instead of your real name, and not enter an email address, nor provide other personally identifiable information that you do not wish to share. When visiting a site you trust you can choose to give them your information, in forms on their site; there is no need for your browser to potentially make this information available to all. Be on the lookout for system-wide "Internet default" programs on your computer. While they are useful for various things, like keeping multiple Web browsers and other Internet tools consistent in how they treat downloaded files and such, they should probably also be anonymized just like your browser itself, if they contain any fields for personal information.
2. Turn on cookie notices in your Web browser, and/or use cookie management software or infomediaries
"Cookies" are titbits of information that Web sites store on your computer, temporarily or more-or-less permanently. In many cases, cookies are useful and innocuous. They may be passwords and user IDs, so that you do not have to keep retyping them every time you load a new page at the site that issued the cookie. Other cookies, however, can be used for "data mining" purposes, to track your motions through a Web site, the time you spend there, what links you click on and other details that the company wants to record, usually for marketing purposes. Most cookies can only be read by the party that created them, but some others that manage online banner advertising are in essence cookie sharing rings. They can track which pages you load, which ads you click on, etc., and share this information with all of their client Web sites (who may number in the hundreds, even thousands.) Some examples of these cookie sharing rings are DoubleClick, AdCast and LinkExchange. Thus, always be on the lookout for cookies whose function is not apparent, which go to sites other than the one you are trying to load, or which are not temporary.
Browsers are starting to allow user control over cookies. Netscape, for example, allows you to see a notice when a site tries to write a cookie file to your hard drive, and gives you some information about it, allowing you to decide whether or not to accept it. It also allows you to automatically block all cookies that are being sent to third parties (or to block all cookies, entirely, but this will make some sites inoperable). Internet Explorer has a cookie management interface in addition to Netscape-like features, allowing you to selectively enable or disable cookies on a site-by-site basis, even to allow cookies for a site generally, but delete a specific cookie you are suspicious about. With Internet Explorer you can also turn on cookies for a site temporarily then disable them when you no longer need them (e.g., at an online bookstore that requires cookies to process an order, but whom you don't want to track what books you are looking at, what links you are following, etc., the rest of the time.) Turning on cookie warnings will cause alert boxes to pop up, but after some practice you may learn to hit "Decline" so fast that you hardly notice them anymore. The idea is to only enable cookies on sites that require them AND whom you trust.
You may also wish to try out "alternative" browsers like Firefox (Windows, Mac, Linux), Opera (Windows, Mac, Linux), Konqueror (Linux), or Safari (Mac), which may offer better cookie management. You can also use cookie management software and services or use an infomediary, which is a kind of personal agent that works on behalf of consumers to help them take control over information gathered about them for use by marketers and advertisers. But keep in mind not to confuse honest infomediaries with "identity management services" like Microsoft's Passport service. While you may gain some temporary convenience at sites that support them, you'll lose essential privacy, because these services are not there to serve you but to serve marketing purposes by collecting a vast array of information about you and then selling it. Unfortunately, there isn’t a perfect solution around yet, which means cookie management abilities built into the browsers themselves. Only increased user pressure on Microsoft and other browser makers can make this happen. Users should ultimately be able to reject cookies on a whole-domain basis, reject all third-party cookies by default, reject all cookies that are not essential for the transaction at hand, receive notice of exactly what a cookie is intended for, and be able to set default behaviors and permissions rather than have to interact with cookies on a page-by-page basis. This just isn't possible yet.
3. Keep a "clean" e-mail address
When mailing to unknown parties; posting to newsgroups, mailing lists, chat rooms and other public spaces on the Net, or publishing a Web page that mentions your e-mail address, it is best to do this from a "side" account, some pseudonymous or simply alternate address, and to use your main or preferred address only on small, members-only lists and with known, trusted individuals. Addresses that are posted (even as part of message headers) in public spaces can be easily discovered by spammers (online junk mailers) and added to their list of targets. If your public "throw away" address gets spammed enough to become annoying, you can simply kill it off, and start a new one. Your friends, boss, etc., will still know your "real" address. You can use a free (advertising-supported) e-mail service provider like Gmail, Yahoo Mail or Hotmail for such "side" accounts. It is best to use a "real" Internet service provider for your main account, and to examine their privacy policies and terms of service, as some "freemail" services may have poor privacy track records. You may find it works best to use an e-mail package that allows multiple user IDs and addresses (a.k.a. "personalities", "aliases") so that you do not have to switch between multiple programs to manage and use more than one e-mail address (though you may have to use a Web browser rather than an e-mail program to read your mail in your "throw away" accounts - many free-mail providers do not allow POP or IMAP connections). If you are "required" to give an e-mail address to use a site (but will not be required to check your mail for some kind of access code they send you), you can use "email@example.com " (example.com is a non-existent site, set up by the Internet standards to be used as an example that will never accidentally coincide with anyone's real e-mail address, which is always a danger if you just make up one off the top of your head.)
4. Don't reveal personal details to strangers or just-met "friends"
The speed of Internet communication is often mirrored in rapid online acquaintanceships and friendships, but it is important to realize that you don't really know who these people are or what they are like in real life. A thousand miles away, you don't have friends-of-friends or other references about this person. Be wary of face-to-face meetings. If you and your new e-friend wish to meet in person, do it in a public place. Bringing a friend along can also be a good idea. One needn't be paranoid, but one should not be an easy mark, either. Some personal information you might wish to withhold until you know someone much better would include your full name, place of employment, phone number, and street address (among more obvious things like credit card numbers, etc.) Needless to say, such information should not be put on personal home pages. For this and other reasons, many people maintain two personal home pages, a work-related one, and an "off duty" version. In the commercial sector, too, beware of "fast-met friends". A common "social engineering" form of industrial espionage is to befriend someone online just long enough to get them to reveal insider information.
5. Realize you may be monitored at work, avoid sending highly personal emails to mailing lists, and keep sensitive files on your home computer
In most countries, employees have little if any privacy protection from monitoring by employers. When discussing sensitive matters in email or other online media, be certain with whom you are communicating. If you replied to a mailing list post, check the headers - is your reply going to the person you think it is, or to the whole list? Also be aware that an increasing number of employers are monitoring and recording employee Web usage, as well as email. This could compromise home banking passwords and other sensitive information. Keep private data and private Net usage private - at home.
6. Beware sites that offer some sort of reward or prize in exchange for your contact information or other personal details
There's a very high probability that they are gathering this information for direct marketing purposes. In many cases your name and address are worth much more to them because they can sell it to other marketers than what you are (supposedly) getting from them. Be especially wary of sweepstakes and contests. You probably won't win, but the marketer sure will if you give them your information.
7. Do not reply to spammers, for any reason
“Spam", or unsolicited bulk email, is something you are probably already familiar with and tired of. If you get a spam advertisement, certainly don't take the sender up on whatever offer they are making, but also don't bother replying with "REMOVE" in the subject line, or whatever unsubscribe instructions you've been given. This simply confirms that your address is being read by a real person, and you'll find yourself on dozens more spammers' lists in no time. If you open the message, watch your outgoing mail queue to make sure that a "return receipt" message was not generated to be sent back to the spammer automatically. If you have a good Internet service provider, you may be able to forward copies of spam e-mail to the system administrators who can route a complaint to the ISP of the spammer. Or if you know a lot about mail headers and DNS tools, you can probably contact these ISPs yourself to complain about the spammer.
8. Be conscious of Web security
Never submit a credit card number or other highly sensitive personal information without first making sure your connection is secure (encrypted). In Netscape, look for a closed lock (Windows) or unbroken key (Mac) icon at the bottom of the browser window. In Internet Explorer, look for a closed lock icon at the bottom (Windows) or near the top (Mac) of the browser window. In any browser, look at the URL (Web address) line - a secure connection will begin "https://" instead of "http://". If you are at page that asks for such information but shows "http://" try adding the "s" yourself and hitting enter to reload the page (for Netscape or IE; in another browser, use whatever method is required by your browser to reload the page at the new URL). If you get an error message that the page or site does not exist, this probably means that the company is so clueless and careless with your information and your money that they don't even have Web security. Better take your business elsewhere.
Your browser itself gives away information about you, if your IP address can be tied to your identity (this is most commonly true of DSL and broadband users, rather than modem users, who are a dwindling minority). For a demo of how much detail is automatically given out about your system by your browser, see: http://privacy.net/analyze/ .
Also be on the lookout for "spyware" - software that may be included with applications you install (games, utilities, whatever), the purpose of which is to silently spy on your online habits and other details and report it back to the company whose product you are using. One MS Windows solution for disabling spyware is the Ad-aware program (shareware, from http://www.lavasoft.de/ ), which can remove spyware from your computer; it is based on a large collaboratively maintained database of information about spyware. Linux and Mac products of this sort are likely to appear soon.
9. Be conscious of home computer security
On the other side of the coin, your own computer may be a trouble spot for Internet security. If you have a DSL line, broadband cable modem or other connection to the Internet that is up and running 24 hours, be sure to turn your computer off when you are not using it. Most home PCs have pitifully poor security compared to the workstations that power most commercial Web sites. System crackers search for vulnerable, unattended DSL-connected home computers, and can invade them with surprising ease, going through files looking for credit card numbers or other sensitive data, or even "taking over" the computer and quietly using it for their own purposes, such as launching attacks on other computers elsewhere - attacks you could initially be blamed for. Firewall hardware and software is another option that can protect you from these kinds of attacks
10. Examine privacy policies and seals
11. Remember that YOU decide what information about yourself to reveal, when, why, and to whom
Don't give out personally-identifiable information too easily. Just as you might think twice about giving some clerk at the mall your home address and phone number, keep in mind that simply because a site asks for or demands personal information from you does NOT mean that you have to.
12. Use encryption!
Last but certainly not least, there are other privacy threats besides abusive marketers, nosy bosses, spammers and scammers. Some of the threats include industrial espionage, government surveillance, identity theft, disgruntled former associates, and system crackers. Relatively easy-to-use e-mail and file encryption software is available for free, such as Pretty Good Privacy (http://www.pgpi.org/), which runs on almost all computers and even integrates seamlessly with most major e-mail software. Good encryption uses very robust secret codes that are difficult if not impossible to crack, to protect your data. You can also use specialized services (some free, some pay) that go beyond infomediary services, including running all connections through a securely encrypted "tunnel", anonymous dialup, even anonymous Web publishing.
Hopefully sometime soon, good encryption and computer security will simply be included in all ISP services and operating systems, but for now you have to actively seek out good service providers and add-on products.
By Stanton McCandlish, EFF Technology Director (shortened version)