I value my privacy. That is one of the reasons I live where I do. (In the country) I don’t have nosy neighbors to deal with every day. My neighbors and I talk when there is a reason to do so.
I also value my online privacy. I don’t want to be a “product” for Google, or Facebook or whoever. So I do things to safeguard my privacy. Google tracks every search you make, back to you as an individual. Facebook tracks you even if you are not logged on to Facebook. (Every site that has a Facebook “Like” button is tracking you.) And they sell that information about you to other companies.
Google and Facebook – not to mention the CIA/NSA/FBI/EIEIO – want you to believe that privacy is impossible. That security is impossible. Because if you think it is impossible, or even just really hard, you won’t even bother to try to secure your technology. But it isn’t that hard to have decent privacy and security. And it isn’t just the .gov or the big corporations that want your information. Hackers are looking too.
So here is a list of things you can do. Some are easy to do; some are a bit harder. Some are free, while some cost a little. While the list isn’t in order of importance, or effect, the first 3 items on this list should take you less than 10 minutes – total. And you only have to do them once (or until you get a new computer or switch to a new browser.) The rest of the items are a bit more complex, but they are not impossible. Do one thing a day for a week. Or do one thing a week if they seem overly complicated. Even if you only do one thing a month, you will have much better security in a fairly short time. Do something.
- Use a Search Engine That Doesn’t Track Every Query.
There are a couple of alternatives to Google. And not Yahoo or Bing. (They aspire to be Google.) DuckDuckGo is the easiest (though you have to install an extension in Chrome to set it as your default search engine because Google REALLY doesn’t want you to have any options). Disconnect is another option. There are probably more choices to cut off the tracking of everything you do. I started using DuckDuckGo when Google stopped answering the queries I typed in and started answering what they THOUGHT I wanted to know. Also Google has a tendency to shortchange any site connected to firearms or the 2nd Amendment. (Which is a subject near and dear to my heart.) There are probably other subjects that Google is downplaying. (That said, I do use Google, Yahoo and Bing on occasion.)
- Disable 3rd Party Cookies in Your Browser.
This isn’t a fool-proof method, but the folks who write tracking software still complain about Apple’s Safari browser – it is the ONLY browser that ships with 3rd party cookies disabled by default. How to turn them off depends on which browser you use. But look under “settings” or “options” for something about content or privacy. The browsers have good help – mostly.
- Install Privacy Protection Extensions in Your Browser.
Privacy Badger from the EFF blocks all kinds of things that are stealing your info – and potentially loading Malware on your system. It is available for Gecko-based browsers (Firefox, Pale Moon, etc.) and Chromium-based browsers (Chrome, Opera, Vivaldi, etc.). I am not sure about Microsoft’s browsers or Safari.
uBlock Origin (not uBlock, uBlockPlus, or any of the others) is a fairly efficient ad-blocker that will shut down tracking-based ads. And the potential spyware, etc. that can come along with ads. Available for Gecko and Chromium browsers as well as Microsoft’s Edge. (Some of these may be available for your mobile devices as well.)
They should be embarrassed. This isn’t 1997, it is 2017. Infrastructure needs to be secured against hacking. But they are all “appalled at the attack.” Hacker Set Off All Dallas Emergency Sirens in Middle of Night, City Says – NBC News
A city spokesman said all 156 emergency sirens were activated at 11:42 p.m. Friday, and the office of emergency management service agency eventually disabled the entire system at 1:17 a.m.
Here is the money quote.
The OEM hopes to have the system back up and running, with safeguards to prevent another hack, by Sunday night.
So the million dollar question is, “Why weren’t those safeguards in place last week?” Here are some other questions: When was the last security audit by an outside firm? (Can you spell “Red Team?”) What amount of the budget is dedicated to security? Are other aspects of the public infrastructure at similar risk? Who is that OEM, and how did they get the contract? (I don’t expect any of these questions to be answered.)
If you think this is only a problem in Dallas, there is probably some Florida swampland still available for purchase.
Security? What’s that? Uber allegedly spied on users, including celebrities like Beyoncé | Fox News
So you think security isn’t an issue? How about stalking? What do you think about that?
Uber employees helped ex-boyfriends stalk ex-girlfriends, and were even able to access trip information for celebrities like Beyonce, Reveal News explains. These revelations come from the company’s former in-house forensic investigator Ward Spangenberg.
Just like in the case of the sexual harassment story, Uber decided to blame the whistle-blower instead of addressing the problem.
Spangenberg objected to the company’s “reckless and illegal practices” and Uber fired him 11 months after he joined the company in March 2015. Uber says it fired Spangenberg because he violated a code of conduct policy and reformatted his computer. The security expert argued that he simply began rebuilding the laptop after a crash.
The only safe information is your credit card data, because Uber doesn’t store that – their bank does. So why does Uber need your Social Security Number?
“When I was at the company, you could stalk an ex or look up anyone’s ride with the flimsiest of justifications,” Michael Sierchio, who was a senior security engineer at Uber, told the site. “It didn’t require anyone’s approval.”
Uber was allegedly more interested in fast growth than enforcing strong security. “Early on, ‘growth at all costs’ was the mantra, so you can imagine that security was an afterthought,” Sierchio added. “One of the things I was told is, ‘It’s not a security company.'”
Uber and their ilk are painted as the future of everything. Technology to rule your life. (Do I hear echos of “One ring to rule them all?”) And these are the people you want to put in charge of security.
Their self-driving cars… How much security is built into that? Will ex-boyfriends be able to crash their ex-girlfriends’ cars, and not just know where they are?
Alone. Nonstop. Around-the-World. No Assistance. That is the Vendée Globe.
The leaders in the Vendée Globe have crossed the equator into the Southern Atlantic.
The video is quite long, and you probably aren’t interested in the whole thing, but the first minutes are interesting, and then there is an interview with Rich Wilson, skipper of Great American IV, which starts at the 14 minute, 20 second mark. Rich Wilson is 66-years-old, and sailing in his 2nd Vendée Globe. He is running a global education program while sailing the race.
The race has been going on long enough that the first mechanical problems are beginning to show up. Rig problems. Hydraulic leaks. Generator problems.
Ranking on 17 November at 17:00 GMT
1. Alex Thomson (Hugo Boss) 20,830.6 miles from the finish
2. Armel Le Cleac’h (Banque Populaire VIII) 84.6 miles behind the leader
3. Sébastien Josse (Edmond de Rothschild) 93 miles back
4. Vincent Riou (PRB) 118.2 miles back
5. Paul Meilhat (SMA) 183.5 miles back
6. Morgan Lagravière (Safran) 204.8 miles back
7. Jérémie Beyou (Maître CoQ) 271.1 miles back
8. Yann Eliès (Queguiner Leucémie Espoir) 414.3 miles back
9. Jean Le Cam (Finistère Mer Vent) 545.4 miles back
10. Jean-Pierre Dick (St Michel-Virbac) 602.9 miles back
There might be some folks who want to hack your car. Researchers hack Tesla Model S with remote attack | PCWorld
This article starts out stating that Tesla – with an actual bug bounty – may be the most security aware car company in existence. It hasn’t helped.
Researchers from Chinese technology company Tencent found a series of vulnerabilities that, when combined, allowed them to remotely take over a Tesla Model S car and control its sunroof, central display, door locks and even the braking system.
Locked that laptop and digital SLR in the trunk? Hackers can open it. Anybody have a violent stalker? A disgruntled employee? How about a bitter ex? Hackers can provide control to the braking system.
If you are using an electronic key fob to open your car, then you are probably giving thieves access to the trunk. OR the interior. (What does an airbag go for these days?)
People continue to insist that security is not a concern to them. They “don’t have anything to hide” from the NSA. But that isn’t the only issue. And the NSA isn’t even universally a bad guy. [Hat tip to Small Dead Animals.