Safer Internet: What Do You Have to Hide?

Quotes

Summary

  • dogEveryone is at risk, more so if you're a high-profile target: celebrity, politician, business, investigative journalist, political dissident, whistleblower -- or an easy mark (poor security/privacy practices)
  • Contact information: home address, phone, email -- yours and family
  • Vital Statistics: your birthday, birthplace, family members
  • [Refs]: "How Many Times Has Your Personal Information Been Exposed to Hackers?" [quiz]
  • [Refs:Identity]: "Here's what your stolen identity goes for on the internet's black market"
  • [Refs:Identity]: "Five Common Scams Directed at Seniors"
  • Your current and past locations
  • [Refs:Vehicles]: "Chevy Malibu 'Teen Driver' Tech Will Snitch if You Speed"
  • Photos
  • [Refs]: "California becomes first state to convict someone for operating a revenge porn website"
  • Medical information
  • [Refs:Health]: "29 million US health records exposed by data breaches between 2010 and 2013"
  • [Refs:Health]: "Ancestry.com DNA Privacy Statement: advertising relevant to genotype"
  • circus guessFinancial information: SSN, credit cards, purchases, tax returns, bank statements
  • [Refs:Identity]: "Sign Up at irs.gov Before Crooks Do It For You"
  • Email, chat, and other communication history
  • Browsing behavior -- current and historical {List. TCYOP-3: 73-74; TCYOP-2: 58-60; TCYOP-1: 58-60}; browser 'footprint'
  • closed captioning google glassPersonally-identifiable vs. anonymously-aggregated information; content vs. metadata
  • Data across different sites via cookies or IP address can reveal patterns, and lead to individuals
  • [Refs]: "Why You Should Protect Even Your Most Unimportant Data"
  • Other devices: voting systems, (smart)TV, set-top/streaming box, game console, smart watch, health/fitness trackers, home automation, car; section: "Internet of Things" (IoT)
  • Others' devices: cameras, wearable technology

References

Attacks

Financial

Home

Health

Identity Theft

Vehicles

Voting