Tuesday, May 17, 2011

Blog 18: Sleep Dealer; privacy in the Internet age.

                                                                                                                                                         



The transmission of data via the Internet requires the control or mandate of privacy of who might access the information. A large number of experts within the field of Internet security and privacy believe that such privacy doesn't exist. Actually, we might think that our private information is being broadcast on purpose. As a matter of fact, the risk of displaying your information through the Internet is increasing due to the quantity of gadgets and social pages that require our private information in order to allow us to become members or join them.

Everyone must pay attention to Internet privacy for several reasons. We conduct part of our live online, we go shopping, banking and socializing online. All this involves introducing our personal information onto the Internet. Theft online is growing at an alarming rate, because we transmit so much personal information. The simple fact that the internet’s success has been built on a protocol called HTTP (Hyper Text Convey Protocol) which is very simple, quick and efficient it unfortunately transmits everything into clear text. This particular issue makes  anyone who intercepts this data can easily monitor our movements. The big question is:  How do we keep our privacy intact while we surf? There are critical points that we must pay attention to: 

Cookies: 

Small text files that are stored on our computers to record accounts and improve browsing. If we are concerned about Internet privacy we just need to erase these records, temporary Internet files and images stored on our personal computers. 

Hiding Internal Protocol address (IP) :

Every time we visit a web site it will record our IP address in specifics logs. Everything we ԁο, download and look at in the Internet is recorded in a log that саn be tracked down to a specific computer via the IP address. To solve this we need an anonymous deputy server. Setting the deputy server between our PCs and the web sites we visit will hide our IP addresses so it cannot be recorded.

Encrypting Web Browsing: 

This is the mοѕt vital for real privacy during surfing. All browsing is conducted in clear text, in fact the most detailed and complete list of all our online activities exists in our ISP. Because of this, governments in all Europe ensure having access to logs anԁ ISPs. They are legally bound to store them for up to two years. But if we encrypt our connection these anԁ all other logs browsed are unreadable. 


E-mails:
Do not open any emails you receive from unknown persons. Sometimes you may receive links to click; there is a chance of losing your privacy if you click on the link. Try to get the details of the website you receive or do a research in Google about the site.

Log-out:
Remember to log out of you online accounts after you have completed your work; this will help you to keep your privacy online.


So far, through the Internet it is fairly easier to find someones home address and telephone number, the closest relatives, and where we work with a bit of Internet detecting. Therefore, we neglect our privacy when we disclose information on social sites such as face book or tweeter. We use to inform people when we go on vacation, go to zip a coffee and how long we are going to stay, making it easier for someone who wants to robe us or assault us. Sometimes we divulge our personal information just for pleasure, ignoring the risks we are attracting.

No comments:

Post a Comment