The Privacy BlogPrivacy, Security, Cryptography, and Anonymity

Archive for June 2010

Google Opt Out Feature Lets Users Protect Privacy By Moving To Remote Village | The Onion – America’s Finest News Source | Onion News Network: “” Finally a viable solution to the privacy problem!!!

No tags

Lawmakers To Introduce New Internet Privacy Bill : NPR Rick Boucher (D-VA) has released draft legislation to significantly increase required privacy notifications for Internet users. Many websites are fighting the proposed bill, claiming it would hurt their business. I am unsympathetic to complaint that their business would suffer if people actually knew what they were […]

No tags

The European Parliament appears to be trying to create a regulation to require search engine companies to retain total information about their user’s searches for a period of years. If you are in the EU area, I strongly encourage you to reach out to fight this. Declaration29: “A group of members of European Parliament is […]

No tags

This Article on Wired.com is about an initiative by Juniper Networks in collaboration with Feeva to sell a new tracking technology to ISPs. The enhanced router would be sold to ISPs and will automatically insert your ZIP+4 into HTML headers. This will allow marketers to have much more accurate information about the user’s physical location. […]

No tags

Many sites, including the Los Angeles Times are reporting on a change to Apple’s privacy policy that allows collection and sharing of “anonymous” location information. The only way to prevent this seems to be completely disabling location services on the iPhone. It appears that Google’s privacy policy allows a similar level of information collection. Much […]

No tags

Cnet (among others) reports on Google’s interception of personal information from open WiFi nodes, including passwords and e-mail. Clearly it was poor practice for Google to be capturing and recording such information as they drove around, but the real news should be that the information was there to be captured. The intent of the monitoring […]

No tags

WikiLeaks seeded its database of documents by intercepting traffic through a TOR node they were operating. This article at Wired highlights an almost buried section of this New Yorker interview with one of the founders of WikiLeaks. Before the WikiLeaks site went live, the founders noticed that hackers were transferring stolen government documents over the […]

No tags