« What's missing from security awareness programs? Human awareness | Main | Cracking daddy's iPad »

Friday, 14 October 2011


Feed You can follow this conversation by subscribing to the comment feed for this post.

Brendan hello,

You raise an important point. FB, Twitter, and other social networks can also track your browser activities from pages that have "like", "+1" and "Tweet" buttons. There are sufficient passive collection techniques to go well beyond presuming one's existence.

Bear in mind that I've tried to lay out a "first" principle, i.e., what you should assume before you even begin to use other techniques to protect your privacy. And I'm not suggesting that this is all you should do, or that private/public sector actors shouldn't be obliged to meet stronger accountability and transparency standards than they do today. Non disclosure is indeed not sufficient. It's the starting point.

Explain LinkedIn/Facebook
Whether you like it or not when you have been pinged by enough other people they can presume your existence. Non disclosure is not sufficient.

There is only ONE true Internet privacy threat. Corporate greed.

Verify your Comment

Previewing your Comment

This is only a preview. Your comment has not yet been posted.

Your comment could not be posted. Error type:
Your comment has been saved. Comments are moderated and will not appear until approved by the author. Post another comment

The letters and numbers you entered did not match the image. Please try again.

As a final step before posting your comment, enter the letters and numbers you see in the image below. This prevents automated programs from posting comments.

Having trouble reading this image? View an alternate.


Post a comment

Comments are moderated, and will not appear until the author has approved them.

Your Information

(Name is required. Email address will not be displayed with the comment.)

Find me on Mastodon and Facebook
My Photo