1 |
-----BEGIN PGP SIGNED MESSAGE----- |
2 |
Hash: SHA512 |
3 |
|
4 |
On 1/29/2012 02:47 PM, Mick wrote: |
5 |
> On Sunday 29 Jan 2012 19:12:17 Dale wrote: |
6 |
> As far as I can tell all that is changing with Google is they are going to |
7 |
> join up in terms of user authentication, hitherto separate portals or apps |
8 |
> they had. I do not see a material difference to what is there now. |
9 |
> |
10 |
> Fastmail, Google, Yahoo!, Yandex, et al, are all public ISPs and are making |
11 |
> their money one way or another. It is in their benefit to respect users |
12 |
> privacy, but don't for a minute think that your info while in their systems |
13 |
> can be deemed as private. Unless you use encryption they can probe it, |
14 |
> analyse it, read it, categorise it, etc. Whether it is Google ads bureau, or |
15 |
> CIA, or FSB, there is not much of a difference between them as far as the |
16 |
> privacy of your data is concerned. |
17 |
> |
18 |
> I think that you are worrying yourself unnecessarily, although there is no |
19 |
> harm in being cautious all the same. |
20 |
|
21 |
In the age of the corporate Internet, it is wise to understand that information |
22 |
is a commodity that is bought and sold and that anything that goes through you |
23 |
ISP and public providers (like Yahoo, Google, etc.) is available for sale, with |
24 |
the exceptions of bank account numbers and the like. |
25 |
|
26 |
In short, it is wise to assume that there is no reasonable assumption of |
27 |
privacy for any of your activity on the Internet. |
28 |
|
29 |
Using encryption is a good policy, especially if you use the Internet to buy |
30 |
and sell things - otherwise your credit card numbers, bank accounts, and so on, |
31 |
can be compromised. However, one should also read the terms of use and terms |
32 |
of service for all services they use. For example, it violates the Yahoo terms |
33 |
of use to use proxy servers or networks (e.g. Tor) to obscure one's location |
34 |
and IP address. |
35 |
|
36 |
Governments, as you bring up, also monitor Internet traffic, though they are |
37 |
mainly looking for what they deem as threats to their security. |
38 |
|
39 |
I agree that there is no harm in being cautious. |
40 |
|
41 |
Chris |
42 |
-----BEGIN PGP SIGNATURE----- |
43 |
|
44 |
iQIcBAEBCgAGBQJPJdz/AAoJEFHj8CHvnA9YulkP/3CPtJncbOkCueYhXM9W8ieq |
45 |
Pn2pwrrCo8l4ctqstlnRxpG96Q3ju/oInW3RijB3GBDJjhZMZPXfmxZMLYNF76J+ |
46 |
nN3eyNEmos/GYTE2dY/8Ywzu+hoJoQBk/mzsH+aumPTc3JTSkxGLOZtA1Y0pdLd7 |
47 |
cZff2I8PgMrAI6ejQ7/Ot/Bt/YUDlQtPwzlYxhCxjfS4VV9E3a4gz5kt1/MVMO0Y |
48 |
7EcaIppoUoXBgUbr+rtZX1db4KaVgiiOs9FROL8LJNMdW5vhWx4UA1MKORRzjBpl |
49 |
6ByPbFjs8c08uO761WcmeFo5Ija7mdR+DzGyDDj0CC2zQ94drWPhREszahTULmED |
50 |
4UJpGmFk/ZHk6rgZZOAIxsEGaJ0Fi6MeVa5HzZvhD2X6dGdatQTuGYJn4z6vn9iT |
51 |
NKjoz9LmI97XoUo4FJ8/rASeVk0n7WyrzlbJV6MMM+QVd7qUaU62T3/XZwO3xEWp |
52 |
LKHFh3T8BYzqmMRgWsurXp1v1/crWaKnB5TC8jeCeRhuo8e7ox+tmjgDp0hoifGc |
53 |
FdlfwXNWep+DYdX1g3X9xV92Z8g2moWwDLGEeiDFkA/kMr28cJCbR5lFLXGPmChH |
54 |
T1r4nPl6PbV6g3UxdBnkzJ5OSeudiSpkLLmNGkrra+Olz4qWi6yNKjmkHWMdn3HT |
55 |
qT+BglTRdVTKKsIxnt1J |
56 |
=qB49 |
57 |
-----END PGP SIGNATURE----- |
58 |
|
59 |
|
60 |
--- |
61 |
avast! Antivirus: Outbound message clean. |
62 |
Virus Database (VPS): 120129-1, 01/29/2012 |
63 |
Tested on: 1/29/2012 6:57:54 PM |
64 |
avast! - copyright (c) 1988-2012 AVAST Software. |
65 |
http://www.avast.com |