Microsoft “Dirty Tricks” Archive

(Image used under: Creative Commons 2.0 [SRC])

The Register has been following the story of a massive archive of "dirty tricks" that Microsoft performed during a lawsuit. Recently, the archive disappeared from the Internet, but now it's back in the form of torrents.

Tags: , ,

Smart Cameras Spell Privacy Disaster

(Image is in the Public Domain)

So now they're using smart cameras to analyze you based on your not just appearance, but the way you walk, and your actions.

A student walked into the middle of the room, dropped a laptop case, then walked away. On the laptop screen, a green box popped up around him as he moved into view, then a second focused on the case when it was dropped. After a few seconds, the box around the case went red, signaling an alert.

In another video, a car pulled into a parking lot and the driver got out, a box springing up around him. It moved with the driver as he went from car to car, looking in the windows instead of heading into the building.

In both cases, the camera knew what was normal – the layout of the room with the suspicious bag and the location of the office door and parking spots in the parking lot. Alerts were triggered when the unknown bag was added and when the driver didn't go directly into the building after parking his car.

Yes technology has a lot of potentially legitimate uses, but total surveillance has far more potential for abuse.

And the cameras can only see so much - they can't stop some threats, like a bomber with explosives in a backpack. They can't see what you are wearing under your jacket - yet.
Tags: , ,

EPIC Hosts Independent Review of Citizen Trust In Government Agencies

(Image is used under the Pixabay license)

In an independent study, Ponemon (not to be confused with Pokemon) conducted a survey of over 7000 people accross the nation as to what their trust level was for various government agencies. Specifically, do we trust the government to safeguard our personal information?

Not surprisingly, once you're out of the top 5, the trust level is in the 60% range or lower. Considering that there are a lot more than 5 government agencies, it seems there's not a lot of trust in government. Anyway, the report is very short so give it a quick read.

Tags: , ,

IRS Looks at eBay Users’ Earnings

(Image used under: Creative Commons 2.0 [SRC])

Ars Technica has an article about the IRS wanting eBay to turn over information on its users' earnings. This pretty much sums up the issue:

With so many people making part or all of their living through eBay, the government wants its cut. This isn't an issue of any new taxes, but an attempt to collect the income tax that is already required. Because eBay does not report information about its sellers to the government, income reporting is left up to individuals, and the temptation not to list eBay revenue as income can be a strong one—and in some cases, it's not always clear when one has to do so.
And,
eBay isn't the only Internet business that has been feeling the heat in recent months. The government is also considering how to apply tax laws to virtual worlds and goods, and it faces some of the same problems that it does with eBay. While some sellers can make a good living out of hawking such items, few report the profits as taxable income, and Uncle Sam wants its cut.
Tags: , ,

Simple Attack Against Home Routers

(Image used under: Creative Commons 2.0 [SRC])

Schneier writes about a recent attack against home routers that takes advantage of the fact that most people never change the default passwords on their equipment.

One of his commenters said it best:

It has long been standard security practice that when logging in to a new system with a default password, the first required step is to have the user create a new password. If routers did this and refused to function until a customized password was set, none of these problems would occur.

Or more simply put, it's a problem that would never exist and would disappear tomorrow if router manufacturers would bother to make a simple and practically free programming change before shipping them out.

Tags: ,

“Violent Games = Violence” Studies Come Under Fire

(Image used under: Creative Commons 2.5 [SRC])

In an analysis of studies done showing violent video games leading to real world violence, Dr. Christopher Ferguson explains that current work doesn't take into account real-world situations and other violence factors such as family life.

The overall conclusion is that there does appear to be a connection between violent games and violent thoughts in a laboratory setting. But the connections between such thoughts and violent behavior in the lab or elsewhere are tenuous at best. The studies that try to address those questions currently suffer from a lack of a standardized measure of violent behavior and a lack of sufficient background on other potential influences on the test subjects' tendencies towards violence, such as family environment.

So… what if people who are violent already are drawn to violent video games?

Tags: ,

TSA’s Backscatter X-Ray Goes to Phoenix’s Sky Harbor International Airport

Privacy.org points to an article explaining that the backscatter x-ray will be fielded in Phoenix. This X-ray device can penetrate clothes, but not skin making a pornographic video of them. Yes this allows the TSA to see if you're carrying bombs or guns, but it also removes your clothing.

Update 5/22/2008

It turns out that the technology can be used as described, but the TSA has made taken very good steps towards handling much of the concern. Details in my post here.
Tags: , , ,

Windows Vista Recommended RAM Size – Wrong Again

(Image used under: Fair Use doctrine)

When XP came out, I noticed that the cheapies (the really skanky brands) had 256MB of RAM while all the others came with 512. This is because 256 was the minimum recommended RAM size from Microsoft so it was technically "acceptable". The fact is, just because it runs doesn't mean it runs well. Well Vista is the same, only worse. The minimum recommended RAM size is a laughable 512 MB. I just recently upgraded to 1GB in my home XP machine and have been very seriously considering at least another 1GB for performance.

This Computerworld article recommends 4GB for Vista and explains why. From the article:

For instance, Dell offers a Windows Vista Capable configuration that isn't capable of much, according to what Dell says about it on its Web site: "Great for ... Booting the Operating System, without running applications or games."

To coin a phrase: lol.

Tags: , ,

Hacking an Airplane Entertainment System

Goofy software error drops in-flight entertainment system
(Image is in the Public Domain)

Here's another case of fielding a new product without fully evaluating it first. A computer programmer played with a "in-flight game system" finding out that due to common programming mistakes, he was able to crash the system. Every seat has a small screen that can be used to play games or watch movies and every screen went blank when he did this.

Most interestingly, he says that he's glad the crash didn't affect the flight system to which a commentor posted:

as an airplane avionics technician, i can tell you that any and all navigation and control electronics are totally isolated into themselves. anything that can work on it's own, does, and anything that needs to share info does it through solid hard-wiring. There are common data busses to reduce weight from too much wiring, but again, totally isolated. Airlines know better than to link everything together in a network.
Tags:

Top 10 Worst Consumer Privacy Infringers

Companies just can't seem to mind their own business
(Image is in the Public Domain)

This is a damn funny article explaining who is the worst of the worst and why:

America Online

America Online's privacy intrusion efforts are so aggressive and offensive, that the only explanation seems to be that AOL thought its clientele was so naïve they would never catch on to the company's privacy invasions.
and…

Amazon.com

Amazon.com is currently among the world leaders in distributing information about its users to advertisers, and if they continue this practice the recent advancements in data mining by Amazon threaten to make shopping online with any form of anonymity a thing of the past.
and (not surprisingly)…

Microsoft

Perhaps the most insidious method of privacy invasion Microsoft employs is the “Windows Live ID ? (formerly Microsoft .NET Passport). The Windows Live ID collects data from the majority of Microsoft networks including MSN, Hotmail, and Xbox Live, and stores them in a central database.

Most of the others were data-brokering companies like ChoicePoint and Acxiom which have already been in the news for the way they treat consumer information. Some that I didn't expect, but am not surprised about are Yahoo and Google.

Thanks to the EFF newsletter for the link! Tags: , , , , , ,

Loading...

If you want to learn more about my professional background, click here to learn more.

Check out one of my guides/tutorials:

goodbye identity theft Tutorial
|INDEX|next: Credit Freeze

Too Late!

If you've already become a victim, here is a list of things you should do.

Solving ID Theft

Lock your credit reports with a Credit Freeze to prevent credit-based ID theft (90% of ID theft risk).
Learn to protect your information to prevent not only ID theft, but many other kinds of problems (the rest of ID theft risk).

Save Time and Money

cancel credit-monitoring services.
Cancel id-theft-insurance

Who is Responsible?

Sometimes you just have to wonder why it's so easy to steal identities in the first place.

... or check out any of my other guides and tutorials by clicking here!

The Identity Theft Victim's Mini-Guide to Recovery

If you've already experienced ID theft, here are some tips of what to do next.

[Click for full description]

Credit Freeze

Setting a credit report freeze is the fastest and most effective way to actually block and reduce your risk of ID Theft. And it's free.

[Click for full description]

Out and About Defense

The best defense against non-credit ID Theft and a variety of other risks is to adopt a mindset of protection: Data Defense. Learn how to protect your information with simple and sometimes free countermeasures all based on a simple philosophy that the less people who have your information, the safer you are.

[Click for full description]