To improve application reliability, Windows 10 collects anonymous “telemetry data” like device IDs, device types and application crash data — which does not include content or files. Windows 10 also remembers the common words you type into text messaging conversations to provide completion suggestions. Microsoft claims that Windows 10 does not scan the content of your email, files or other communications for targeted advertising purposes. Nonetheless, the company is collecting […]
Offline Privacy & Security
UN Special Rapporteur on Privacy Joseph Cannataci has described Britain’s oversight of surveillance as a “bad joke” and said the situation is worse than anything author George Orwell imagined in his dystopian novel “Nineteen Eighty-Four.” Cannataci said the UK has the weakest oversight of surveillance in the western world. He called for a Geneva Convention-style law for the internet to safeguard privacy and combat the threat of digital surveillance.
If you want to communicate really securely, you may assume you need some government level spy training, a high tech encrypted phone, or at least a custom operating system. Nope. Not at all. It turns out the most secure communications device available to anyone, anywhere, right now is the humble iPod Touch. At least, that’s what Joseph Cox reports in Wired. After reading the article, I suspect he is correct. […]
Good advice from Steven J. Vaughan-Nichols at http://www.zdnet.com/article/sick-of-windows-spying-on-you-go-linux. he writes, “You can try to turn Windows 10’s data-sharing ways off, but, bad news: Windows 10 will keep sharing some of your data with Microsoft anyway.” By the way, this web server runs on Linux. I also use a Linux system for accessing my bank account, investment account, and for a few other online services where I want very high security.
I disagree with the title of this article but will suggest it be required reading for anyone concerned about their own privacy. Karol Markowicz writes about her recent experience from an online dating service. She also mentions several ways in which your private information becomes public, perhaps with your realizing it. See http://nypost.com/2015/07/27/the-myth-of-online-privacy.
Top 10 Ways Your Privacy Is Being Invaded (and Sold, Traded, Auctioned, Analyzed, Repackaged, and Retargeted)
An interesting article that is suggested reading for everyone: Top 10 Ways Your Privacy Is Being Invaded (and Sold, Traded, Auctioned, Analyzed, Repackaged, and Retargeted) by Tom McNichol in Wired at http://www.wired.com/2015/07/top-10-ways-privacy-invaded-sold-traded-auctioned-analyzed-repackaged-retargeted/.
A secret US tribunal ruled late Monday that the National Security Agency is free to continue its bulk telephone metadata surveillance program—the same spying that Congress voted to terminate weeks ago. See http://arstechnica.com/tech-policy/2015/06/secret-us-court-allows-resumption-of-bulk-phone-metadata-spying.