Sunteți pe pagina 1din 6

AUGUST TUTOR ■

INTERNET PRIVACY

internet
privacy
You may not be a “number” like Patrick McGoohan in the 60’s TV series The Prisoner, but you are an IP or
email address that’s being stored, processed an analysed by almost every commercial Internet site that
you visit. How do these sites get your information, and more importantly, how can you fight back. PC Mag-
azine Middle East tells you how to remain an anonymous user on the Net.

f you use the Internet, your pri- “DART (Dynamic Advertising Reporting consumers’ personal information:

I vacy is under attack. Every time


you view a Web page with an ad-
vertising banner, submit your
and Ta rgeting) insures that advertisers
reach their ideal consumers from among
the tens of millions on the
“At the heart of e-List Services is Na-
viant’s High Tech Household File, the
largest and only 100-percent-verified re-
name to a site, or enter registration data I n t e r n e t . It c a n t a rg e t source for today’s most dynamic buying
into software that works with the Inter- prospective customers by market of Internet-enabled house-
net, the information you provide can be dozens of characteristics, holds. With access to over 17.5 mil-
catalogued, compiled, correlated with your including geographic re- lion households already, and hun-
movements throughout the Internet, and gion, language, and busi- dreds of thousands more com-
sold to any number of willing buyers. In ness.” ing on file each month, it’s
this article, we’ll explain what you can do By reading individ- the only source you need to
to preserve your privacy. ual users’ IP (Internet meet your future marketing
P rotocol) addre s s e s , and targeting possibilities
PERSONAL DATA: A BIG BUSINESS DoubleClick’s D A RT with precision.”
Before we discuss how your personal in- program anonymously In short, these Internet ad-
formation is gathered and what you can do delivers targeted adver- vertising firms pride them-
about it, you should understand the rea- tising to consumers and then selves on being able to collect
sons why this data is being collected in the provides comprehensive cam- precise, detailed information
first place. Who is after your personal data? paign reports to monitor the ef- about you. They may then sell
And why is it valuable to them? To find out, fectiveness of the ads. For example, this information to other
you need look no farther than the Web D A RT allowed I B M’s corporate re- companies, use it to identify
sites of the many advertising firms that cruiters to reach college students nation- you as you browse the Web, or
post banner ads throughout the Internet. wide—with messages targeted specifical- use it to select what sorts of ad-
DoubleClick, a huge online advertising ly to each college. vertising to display on your screen. (In the
network, reported the following in its 1998 Naviant, another Web marketing com- example of IBM mentioned above, the ad
annual report: pany, claims even greater knowledge of agency could even recognize college stu-

84 August 2000 www.DITnet.co.ae ■ www.pcmag-mideast.com


■ AUGUST TUTOR
INTERNET PRIVACY

dents and cozy up to them by customiz-


ing ads with their schools’ colors, sym-
bols, or mascots.)
Advertisers will pay more for space if COOKIE MANAGERS
they believe—rightly or wro n g l y — t h a t
t h e y ’ re more likely to show up on the AdSubtract SE 1.64 Cookie Server 1.03
screens of potential customers. Unfortu- AdSubtract blocks both ads and cook- Implemented as a proxy server that
nately, this means that someone—either ies in real time. The free download fea- runs behind the scenes on your com-
the advertiser, the site, or the agency that tures selective blocking for cookies puter, Cookie Server ($30 list) filters and
delivers the ads—needs to know sensi- and it can log its activities. Because it’s handles cookies in real time. Because
tive information about you: your age, implemented as a proxy server, it’s Cookie Server is a proxy, it can perform
where you live, your spending habits, your browser-agnostic. (Unfortunately, it filtering for any Internet application
marital status, whether you have kids, and cannot block AOL’s internal ads.) A Pro that can run through a proxy—in short,
other information you’d probably feel un- version with more features was re- nearly everything you’ll find on a typi-
comfortable revealing to strangers. leased in April 2000. This is a great cal Windows system except the internal
choice for users who would like to AOL browser. Supports IE (all),
DIRECT MAIL: BETTER THAN SPAM? block ads and stop cookies with one Netscape (all). Newfangled Software
Another reason why companies want to product. Supports AOL 3+, IE 3+, w w w. n ew fa n g le d . sa n -j o s e . c a . u s .
know not only what Web sites you visit but Netscape 3+. AdSubtract.com, www ÅÅÅÅ
who you are stems from Internet users’ .adsubtract.com. ÅÅÅÅ
nearly universal distaste for spam, or junk IEClean, NSClean
e-mail. Advertisers realize that if they send Cookie Cruncher 2.11 IEClean and NSClean ($40 each) purge
spam messages to potential customers, This free, straightforward application cookies from your cookie file selective-
they’re likely to turn them off—perma- lets you view, edit, and delete cook- ly or completely with one click. They
nently—rather than get a sale. But many ies—and that’s about all. It’s a good can also wipe out your browser cache,
Netizens who abhor spam are nowhere choice if all you need is a no-frills cook- history files, and other records of your
near as resistant to paper junk mail (or ie editor. Version 2.12 was in beta test- browsing activities. These products do
direct mail advertising, as it’s called in the ing as of this writing. Supports AO L3 + , not block cookies in real time but can
trade). If a company sees that you’re IE 3+, Netscape 3+. RBA Software, be invoked with a single click. As the
browsing its Web site and it can find out www.rbaworld.com. ÅÅÅÅ names suggest, there are separate ver-
your mailing address, it can send you a sions for Internet Explorer and for
snail mail sales pitch, which you may be Cookie Crusher 2.5d Netscape, and there are both 16-bit
less likely to reject out of hand. Cookie Crusher ($15 list) can accept or amd 32-bit versions for each browser.
reject cookies by site in real time. As Unfortunately, if you use both I Ea n d
HOW THEY DO IT you surf, an innovative analysis fea- Netscape (Quicken, AOL, and many
How do sites snoop on your browsing ture tries to determine the purpose of mail clients use IE even if Netscape is
habits and identify you online? One of the an incoming cookie (such as for track- your main browser), you must get ver-
simplest methods is via your IP address— ing or for a shopping cart) auto- sions for both browsers to be com-
a 32-bit number that serves as your com- matically—a nice touch. Like Cookie pletely protected. Privacy Software also
puter’s telephone number on the Inter- Pal, it features a friendly interface and offers a unique, free utility called Ze-
net. Whenever your computer sends a includes activity logging and cookie roClick, which is designed to defeat
packet of information across the Net, it file editing. It can also remove itself tracking by DoubleClick. Supports AOL,
includes its IP address so that the recipi- from memory when your browser is IE (all), Netscape (all). Privacy Software,
ent will know where to send a response. closed. Supports AOL with IE 4+, I E4 + , www.nsclean.com. ÅÅÅÅ
If your system has a permanent connection Netscape 3+. The Limit Software,
to the Internet—for example, via a cable www.thelimitsoft.com. ÅÅÅÅÅ Window Washer, v. 3.0
modem—its IP address is likely to be con- There are separate versions of Window
stant. So, as you move through the Net, Cookie Pal 1.5e Washer ($15 each) tailored for specific
snoops can follow your every step. Cookie Pal ($15 list) features an intu- browsers. Each deletes the cache, his-
Although the IP address is a good way itive interface that should be comfort- tory, and selected cookies. The pro-
to identify some Web users, it isn’t fool- able even for beginners. It features au- grams can be scheduled to run fre-
proof. Users with dial-up connections to tomatic, real-time control of cookie quently but do not intercept cookies in
the Internet may get a different IP address acceptance and can filter cookies by real time. We recommend that you
each time they call, depending on which expiration date; most of the others shell out the extra $15 for the full ver-
of the ISP’s phone lines they happen to can’t. Don’t want to be distracted by a sion of Window Washer, which sup-
reach. And all the machines behind a fire- dialog? Audio cues can alert you when ports all browsers and also cleans up
wall—a device designed to keep intruders cookies are accepted or rejected. detritus left by other programs.
out of a network—sometimes appear to Cookie Pal can also log cookie activity Anonymizer Window Washer is a ver-
have the same IP address. (This happens and remove itself from memory when sion customized for users of the Anony-
if a mechanism called Network Address you shut down your browser. Supports mizer anonymous-browsing service.
Translation, or N AT, is used.) So, to AOL 3+, IE 3+, Netscape 3+. Kookabur- Supports AOL 4+, IE 3+, Netscape 3+.
uniquely identify users and their comput- ra Soft wa re, www.kburra.com. Webroot Software, www.webroot
ers in these situations, Web sites use cook- ÅÅÅÅÅ .com. ÅÅÅÅ
ies.

www.DITnet.co.ae ■ www.pcmag-mideast.com August 2000 85


AUGUST TUTOR ■
INTERNET PRIVACY

COOKIES: THE GOOD, THE BAD, AND and what you’ve selected so far. Each time you move to a new stage of
THE SNEAKY Because the server would need massive your online transaction, the merchant’s
Cookies were originally designed to solve amounts of storage to keep this informa- server asks your computer to send back
a practical problem that arises from the de- tion around for tens of thousands of shop- the cookie that’s been stored on your ma-
sign of the World Wide Web. When you pers (an estimated 75 percent of whom chine. This reminds the server of who you
browse a Web site, your computer does- will leave their carts in the virtual aisles are and what you were doing, and the
n’t really stay connected to the site for the and never check out), it’s best to have the conversation continues where it left off.
entire time you’re there. Instead, your PC client, rather than the server, store infor- Cookies are handy for many legitimate
makes a request, receives an answer (usu- mation about the state of the transaction. purposes—for example, to allow a Web
ally in the form of a Web page), and dis- So the server may place a cookie—a bit of site to recognize you as an authorized
connects right away. If, after reading the text identifying you and describing the user without requiring you to log on every
page, you decide to click on a link or a but- transaction—on your machine. The cook- time you access the site. But they can also
ton, your computer makes a new con- ie also contains bookkeeping inform a- be used for nefarious purposes, as we’ll
nection to carry out your request. Because tion, such as the domain from which it see below.
the connection doesn’t stay open, the Web was sent and an expiration date. There
server doesn’t need to devote resources to are two kinds of cookies: session cookies, WEB PAGES AS “PA ST E -U PS”
keeping it alive while you—the slow hu- which vanish each time you shut down One thing about the Web that isn’t obvi-
man—decide what to do next. your bro w s e r, and persistent cookies, ous—except to techies and Web page de-
The downside of this method is that car- which can stay around for months or years. signers—is that a single Web page can be
rying on an ongoing conversation be- An e-commerce site might use both kinds; composed of material that comes from
comes tricky. Let’s suppose you’re making for instance, it might use a session cook- many servers throughout the Internet. A
an online shopping trip in which you place ie to remember information about a par- page on your favorite news site might
half a dozen items in your cart and then ticular shopping trip, and a persistent have text from one server, pictures from
check out. Each time you click, the Web cookie to recognize you when you come a second, and ads from several more. The
server needs to remember who you are back another day. HyperText Markup Language (HTML) in

86 August 2000 www.DITnet.co.ae ■ www.pcmag-mideast.com


■ AUGUST TUTOR
INTERNET PRIVACY

which the page is written tells your Web tain Web bugs—tiny images that are only plaints about tracking by providing users
browser how to call for the images from one or two pixels in size and are designed with the ability to opt out of their data-
different places and paste them up to make to blend into the page’s background. Why bases. But others have not—and many
the page that appears on your screen. are these invisible images there? Because users believe that trusting any such firm to
Trouble is, unless you’ve installed cook- they allow Web servers to log your access protect privacy is akin to allowing the fox
ie management software or turned off to the page and to place cookies on your to guard the henhouse. Your best bet,
cookies altogether, any machine that sup- computer. therefore, is to take matters into your own
plies any part of a Web page is capable of hands.
feeding your machine a cookie and re- SPECIAL DELIVERY: A The most foolproof way to keep your-
trieving it later. Thus, if you visit two COOKIE self from being tracked via cookies
pages—even on different sites—that con- Snooping via cookies isn’t is to disable them entirely. In
tain ads from the same advertising com- limited to the World Wide Netscape, you can do this by se-
pany, that company can see via its cook- Web. Because the re n- lecting Edit | Preferences and
ies that you traveled from one to the oth- dering engine that’s selecting the Advanced
er. What’s more, if the advertising firm used in Web browsers item in the left-hand col-
has acquired personal information about is also woven into e- umn. In Internet Explorer,
you from the owner of any one of those mail clients and Usenet select Tools | Intern e t
sites (perhaps because you filled in a form news readers, it’s pos- O pt i ons a n d di s ab l e
or made an online purchase), it can apply sible for someone who cookies by customizing
that information when you visit the other. sends you e-mail or posts the security settings.
Sometimes, an image that allows you to an HTML article to a news- Unfortunatel y, disabling
be tracked is not even visible to the naked group to cause your machine to c ooki es can p revent you
eye. Last year, computer security expert access images on his or her site f r om using many e-com-
Richard Smith, founder of Phar Lap Soft- when you read the mail or article. (If merce Web sites. And ask-
ware, reported that many Web pages con- the program has a preview window, the ing your browser to prompt
access may occur automatically before you before accepting or send-
you can stop it.) Instantly, the sender’s ing a cookie can be equally annoying. A
Web server can tell that you read the mes- single Web page may contain dozens of
sage. What’s more, if the sender cus- images, each of which may come with a
tomizes the URL in the message so that it cookie; you may have to click dozens of
contains your e-mail address, he or she will times just to get past all of the prompts and
also know exactly who you are. (This see the page.
technique has been used by spammers to A better approach, therefore, is to in-
verify e-mail addresses.) Finally, unless stall third-party software that blocks or
you have a very recent browser that clos- disables cookies more selectively. Soft-
es this security hole, the server can leave ware that blocks advertising banners, such
and retrieve a cookie—again, possibly as WebWasher (free download, www.web-
containing your e-mail address. washer.com), has the pleasant side effect
Even software you install on your com- of blocking cookies associated with ads
puter can gather information and place it while not affecting cookies from other
in cookies for later retrieval. The Regis- sites. The powerful Internet Junkbuster
tration Wi z a rd in Windows 98 places Proxy (www.junkbusters.com) is a com-
unique ID numbers that identify you and bination advertising blocker and cookie
your computer into cookies without your b l o c k e r, and has many useful feature s .
knowledge or consent. When you later This product lets you block or allow cook-
log onto the Internet and invoke Internet ies by domain name and gives you the
Explorer, the browser jumps to Microsoft’s power to feed sites vanilla wafers (cook-
Web site, which retrieves the cookies. ies set by you rather than by the site).
Each time you visit Microsoft’s site there- None of these programs is foolproof,
after, the cookies are sent again, letting the though. Although the Internet Junkbuster
company know you’re back. More worri- Proxy blocks cookies that are sent direct-
some still is the fact that the Registration ly by a Web server, it doesn’t stop cook-
Wizard ActiveX control has a bug that al- ies from being sent via JavaScript, Java
lows any Web site to retrieve your regis- p rograms, or HTML constructs called
tration information at will. (The ZDNet metatags. And each time a method of set-
Help Channel, at www.zdnet.com/zdhelp/ ting and retrieving cookies is blocked,
stories/main/0,5594,919119,00.html, ex- you can be sure that enterprising adver-
plains how to plug this and other securi- tisers and Web page designers begin a
ty holes related to the Windows 98 Regis- hunt for more.
tration Wizard.) Other utilities also let you choose which
sites can feed your browser cookies, and
COOKIE COUNTERMEASURES some can help you sort through your
Some Web advertising firms, such as cookie files and eliminate cookies from
DoubleClick, have responded to user com- sites you do not want to track you. See the

www.DITnet.co.ae ■ www.pcmag-mideast.com August 2000 85


AUGUST TUTOR ■
INTERNET PRIVACY

sidebar “Cookie Managers” for descrip-

ANONYMOUS
tions of some of the best of these utilities.
If you want to avoid cookies that are fed
to your machine via e-mail, do not use an

BROWSING SERVICES e-mail program that automatically invokes


the rendering engine of a Web browser
when you view mail. If you use Outlook
or Outlook Express, you have no choice
Anonymizer anonymize FTP. Alas, there’s no AOL but to use Internet Explorer’s rendering
Anonymizer is the oldest and most support. Cookies can be managed engine; the two are inextricably tied to-
popular anonymous-browsing ser- on a per-persona basis or by the soft- gether. But Eudora, one of the most pop-
vice on the Internet. The service costs ware on a client PC. Freedom works ular e-mail clients, gives you a choice. If
$15 per quarter or $49 a year. It only with Microsoft Windows 95 and you uncheck the box marked Use Micro-
blocks cookies, Java, and Javascript, 9 8 a n d su p po rt s I E 4 . 0+ an d soft’s Viewer in Eudora’s Tools | Options
and conceals your identity. It re- Netscape 4.0+. Zero-Knowledge Sys- | Viewing Mail dialog box, IE will not be
quires no browser reconfiguration tems, www.freedom.net. ÅÅÅÅÅ invoked to view your mail.
to use, because it rewrites the links If you want more information on cook-
on each Web page that you view so Privada Proxy ies, we recommend the Cookie Central
that they’re anonymized as well. Privada Proxy includes Web Incog- site, at www.cookiecentral.com.
Anonymizer can encrypt URLs in tran- nito and Messaging Incognito for
sit between your computer and its a n o nymous browsing and anony- SOFTWARE THAT SNITCHES
servers, but right now, it can’t do the mous e-mail and newsgroup post- Another threat to your Internet privacy is
same for the data. (A feature that ing. The product, which costs $5 per software that literally spies on your system
does this, called Pipeline, was in the p e rsona per month, is similar to from within, feeding the information to an
works but not yet available at this Zero-Knowledge Systems’ Freedom outside observer. Some viruses, Trojan
writing.) Anonymizer blocks all cook- but for browsing and e-mail only. horses, and worm programs do this. Pret-
ies, but a Preferences feature (in Cookie s can b e blocked befo re tyPark, a Trojan horse program that prop-
beta at this writing) will let you ex- they’re retrieved, or you can delete agates itself via e-mail, is designed to seek
change cookies with selected sites. them from your system, but cookie out sensitive data within your system and
A n o ny m i zer also provides anony- c re ation must be blocked by your transmit it to the program’s creator via
mous e-mail and Web hosting ser- browser or by a third-party utility. Pri- IRC (Internet Relay Chat).
vices. A customized version of Web- vada allows cookie management on Even legitimate applications can gather
root’s Window Washer software is a per-persona basis or by the cook- or reveal personal information about you
available to complement the ser- ie management soft wa re of your under certain circumstances. For example,
v i c e . S u pp or t s al l br ow s e rs . choice. The anonymous e-mail ser- mIRC, a popular IRC client, implements
Anonymizer, www.anonymizer.com. vice randomly delays messages to the identd (Identification Daemon) pro-
ÅÅÅÅÅ prevent correlation of e-mail trans- tocol, which allows any system on the In-
mission with other online activities. ternet to ask your computer who you are.
IDSecure Privada is currently Window s -s p e- Many ISP systems likewise implement
IDzap challenges Anonymizer’s dom- cific, and supports I E 4.0+ and identd.
inance by offering similar services, Netscape 4.0+. It works with AOL Late last year, news came out that the
p lus a few ex t ra fe at u res, at the but can’t support the internal AOL Comet Cursor utility, which changes a
same price ($15 per quarter, $50 a browser. Privada, www.privada.com. Windows system’s cursor according to
year; a free version is also available). ÅÅÅÅ the Web site that it’s browsing, was send-
I Dzap’s paid service includes en- ing information about users’ bro w s i n g
cryption between your browser and Somebody.net habits to its creator. (The vendor claims
its proxy server at no extra charge. Somebody.net rotates proxies and that individual browsing habits are not
Selective blocking of cookies was I Pa d d resses to keep outsiders from logged, but the fact that the program was
not available at this writing. Sup- accessing them. Somebody.net is doing this at all was unsettling to many.)
p o r ts all brow s e rs. I D za p, www significantly more expensive than Similarly, Netscape’s “What’s Related”
.idzap.com. ÅÅÅÅÅ Anonymizer and IDSecure (at $49 f e a t u re sends some information about
per month or $229 per year), but your Internet browsing back to a Netscape
Freedom claims to work in countries where server. (Netscape—now part of AOL—
Freedom is an innovative combina- others are inaccessible. To use Some- claims that it uses the information to com-
tion of software and proxy services body.net, your browser must be con- pile statistics but not to track individual
that lets you establish multiple nyms figured to use a Web proxy. The com- browsing habits. Privacy-conscious users
(personae). The provider claims that pany’s somewhat spooky Web site will want to disable this feature anyway.)
it can’t identify the owner of a nym does not list an address, a phone Consumers harshly rebuked Real Inc.
because of strong encryption. Free- number, or any other company in- when they discovered that the company
dom anonymizes the widest variety formation; it claims to be located was monitoring what they viewed via the
of protocols of any service we tried, o u t si d e t h e U S S u p p o r t s a l l ubiquitous RealPlayer multimedia play-
i n cluding browsing, e-mail, I RC, b row s e rs. S o m e b o d y.net, www back software. (A patch on the company’s
n ews, telnet, and S S H. It cannot .somebody.net. ÅÅÅÅ Web site can disable the snooping.) And
Steve Gibson, of Gibson Research (http:

88 August 2000 www.DITnet.co.ae ■ www.pcmag-mideast.com


■ AUGUST TUTOR
INTERNET PRIVACY

//grc.com/optout.htm), recently discov- place an order on an e-commerce site, browser’s history file can let a subsequent
ered that advertising banner software pub- you’ll almost always see a claim that en- user get back into your electronic mail-
lished by Auriate Media Corp. (now Radi- tering your credit card number and other box—especially if they’re used fairly soon
ate) sends information about which ban- personal information is safe because the after you’ve departed. And depending on
ner ads you click, and the amount of time site is “secure”—that is, the information the browser’s settings, subsequent users
you spend reading them, back to the com- will be encrypted as it travels from your may be able to see what you were doing
pany. keyboard to the merchant’s site. But is it online for days or weeks afterward.
really as secure as the merchant claims it
ANONYMOUS BROWSING is? When you get to the page that requests COMMON SENSE
Because your online privacy is so easy to sensitive information, look carefully at the Other measures you can use to protect
compromise, entire businesses have been tiny lock icon at the bottom of your brows- your privacy are just good common sense.
created to offer anonymous browsing ca- er window and make sure it’s really in the Be stingy with your personal information;
pabilities. Our sidebar “An onymous locked position. (In Netscape Navigator don’t automatically fill in a blank on a
Browsing Services” describes several such and Internet Explorer, the icon turns to a Web form just because it’s there. If you feel
services. The granddaddy of these is gold color when it’s locked.) If the page that the proprietor of a Web site has no
Anonymizer (www.anonymizer. c o m ) . claims that your information is secure but business knowing who you are or some-
Anonymizer runs a proxy server that at- the icon is not in the locked position, thing personal about you, a white lie may
tempts to hide your identity and filter leave the site immediately and shop else- be in order. (Ima Nonymous is a frequent
cookies as you browse. (Unfortunately, where. visitor to many Web sites that require reg-
as with blocking software, enterprising Third, remember that the presence of istration.) Opt out of tracking (Dou-
snoops are constantly striving to find ways encryption doesn’t mean that your data bleClick, for example, lets you obtain an
around these filters. So at any moment, you can’t be monitored before it’s encrypted or OPT_OUT cookie from its Web site) as
can never be 100 percent sure that they’re after it’s decoded again. Let’s say, for ex- often as you can, but do not rely on this
working.) Anonymizer’s service costs $15 ample, that you read your Yahoo! mail at to keep your movements from being
per quarter, and its site offers free trials. the local cybercafe or public library. You watched. If you’re concerned about spam,
The free proxy causes a delay, however, see the little lock icon at the bottom of the or if Web sites insist upon sending you a
and it displays ads at the top of every screen. Think that the encryption in the password only after you’ve furnished an
page. b rowser will protect you? Think again. e-mail address, set up free e-mail accounts
Computers in public places are easily sub- and supply those addresses instead of the
ENCRYPTION: NOT A PANACEA verted by clever hackers, who can install one provided by your ISP. Although noth-
Encryption—scrambling data so unau- programs that monitor your keystrokes ing we’ve mentioned here is foolproof,
thorized parties have a hard time listening before they’re encrypted. These keystrokes you will be able to control—at least some-
in—is a useful process. Virtually every are then sent surreptitiously across the what—who knows how much about you
browser has encryption capabilities. (Most Net to a computer that logs everything— and your loved ones.
e-mail programs don’t have built-in en- including your account names and pass-
cryption, but we strongly rec- words—for later use. For this reason, read- THERE OUGHTA BE A LAW
ommend that you obtain it as ing e-mail on a machine that does not be- Many of us would think—or at least
an inexpensive add-on.) long to you or to someone you trust is hope—that the government would pro-
But it’s not a panacea; you not a good idea. tect consumers from having such dossiers
must understand when to Your personal data can also be compiled about them. But unlike Euro-
trust encryption to protect stolen once it reaches its desti- pean countries, which require citizens to
your privacy. nation. Many e-commerc e give explicit permission before their data
First, you should get sites use custom-built pro- can be shared, bought, or sold, the U.S. has
the most secure ver- grams, or scripts, which are few laws restricting what businesses can
sion of your browser. not carefully audited for do with personal information. And the
Netscape Navigator, for security problems. Some laws that do exist—for example, the Fair
instance, comes in two use software —such as Credit Reporting Act (FCRA)—are notori-
versions—one that uses Windows NT, SQL Server, ously lax. According to the FCRA, anyone
40-bit encryption keys and or I nter net In for m a t i o n who does business with you is entitled to
one that uses 128-bit keys. Server—that have hundreds call a credit bureau and ask for a credit re-
Low-security, 40-bit keys are of well-publicized security port that lists your credit cards, loans,
good enough for mildly sensitive holes that the vendor may home address, telephone number, Social
information, but anyone who has a not have closed. Encryption Security Number, and more. (Even com-
serious desire to break the encryption does little good if the decod- panies that have not done business with
can do so easily. (These weak keys are ed data is filched from a mer- you can obtain some of this information—
used in the default version of the brows- chant’s site. hence the unsolicited credit card offers
er due to U.S. government export restric- Finally, remember to remove your that flood the mailboxes of consumers
tions; the government considers the export browsing history when you finish brows- with good credit records.)
of effective encryption programs to be a ing at a public terminal. (In IE, select Tools Your personal information is your own
threat to national security.) For real secu- | Internet Options, then press the Clear business; how much to divulge, and to
rity, take the time to download a brows- History button on the General tab. In whom, should be your decision. Until and
er with 128-bit keys. Netscape, choose Edit | Preferences and unless the government swings into action
Second, make sure that encryption is re- press the Clear History button in the Pref- to protect consumers, preserving your pri-
ally active when you need it. When you erences dialog. The URLs left behind in a vacy is your own responsibility.

www.DITnet.co.ae ■ www.pcmag-mideast.com August 2000 89

S-ar putea să vă placă și