Gentoo Archives: gentoo-user

From: Chris Walters <cjw2004d@×××××××.net>
To: gentoo-user@l.g.o
Subject: Re: [gentoo-user] Google privacy changes
Date: Sun, 29 Jan 2012 23:58:59
Message-Id: 4F25DD02.50201@comcast.net
In Reply to: Re: [gentoo-user] Google privacy changes by Mick
1 -----BEGIN PGP SIGNED MESSAGE-----
2 Hash: SHA512
3
4 On 1/29/2012 02:47 PM, Mick wrote:
5 > On Sunday 29 Jan 2012 19:12:17 Dale wrote:
6 > As far as I can tell all that is changing with Google is they are going to
7 > join up in terms of user authentication, hitherto separate portals or apps
8 > they had. I do not see a material difference to what is there now.
9 >
10 > Fastmail, Google, Yahoo!, Yandex, et al, are all public ISPs and are making
11 > their money one way or another. It is in their benefit to respect users
12 > privacy, but don't for a minute think that your info while in their systems
13 > can be deemed as private. Unless you use encryption they can probe it,
14 > analyse it, read it, categorise it, etc. Whether it is Google ads bureau, or
15 > CIA, or FSB, there is not much of a difference between them as far as the
16 > privacy of your data is concerned.
17 >
18 > I think that you are worrying yourself unnecessarily, although there is no
19 > harm in being cautious all the same.
20
21 In the age of the corporate Internet, it is wise to understand that information
22 is a commodity that is bought and sold and that anything that goes through you
23 ISP and public providers (like Yahoo, Google, etc.) is available for sale, with
24 the exceptions of bank account numbers and the like.
25
26 In short, it is wise to assume that there is no reasonable assumption of
27 privacy for any of your activity on the Internet.
28
29 Using encryption is a good policy, especially if you use the Internet to buy
30 and sell things - otherwise your credit card numbers, bank accounts, and so on,
31 can be compromised. However, one should also read the terms of use and terms
32 of service for all services they use. For example, it violates the Yahoo terms
33 of use to use proxy servers or networks (e.g. Tor) to obscure one's location
34 and IP address.
35
36 Governments, as you bring up, also monitor Internet traffic, though they are
37 mainly looking for what they deem as threats to their security.
38
39 I agree that there is no harm in being cautious.
40
41 Chris
42 -----BEGIN PGP SIGNATURE-----
43
44 iQIcBAEBCgAGBQJPJdz/AAoJEFHj8CHvnA9YulkP/3CPtJncbOkCueYhXM9W8ieq
45 Pn2pwrrCo8l4ctqstlnRxpG96Q3ju/oInW3RijB3GBDJjhZMZPXfmxZMLYNF76J+
46 nN3eyNEmos/GYTE2dY/8Ywzu+hoJoQBk/mzsH+aumPTc3JTSkxGLOZtA1Y0pdLd7
47 cZff2I8PgMrAI6ejQ7/Ot/Bt/YUDlQtPwzlYxhCxjfS4VV9E3a4gz5kt1/MVMO0Y
48 7EcaIppoUoXBgUbr+rtZX1db4KaVgiiOs9FROL8LJNMdW5vhWx4UA1MKORRzjBpl
49 6ByPbFjs8c08uO761WcmeFo5Ija7mdR+DzGyDDj0CC2zQ94drWPhREszahTULmED
50 4UJpGmFk/ZHk6rgZZOAIxsEGaJ0Fi6MeVa5HzZvhD2X6dGdatQTuGYJn4z6vn9iT
51 NKjoz9LmI97XoUo4FJ8/rASeVk0n7WyrzlbJV6MMM+QVd7qUaU62T3/XZwO3xEWp
52 LKHFh3T8BYzqmMRgWsurXp1v1/crWaKnB5TC8jeCeRhuo8e7ox+tmjgDp0hoifGc
53 FdlfwXNWep+DYdX1g3X9xV92Z8g2moWwDLGEeiDFkA/kMr28cJCbR5lFLXGPmChH
54 T1r4nPl6PbV6g3UxdBnkzJ5OSeudiSpkLLmNGkrra+Olz4qWi6yNKjmkHWMdn3HT
55 qT+BglTRdVTKKsIxnt1J
56 =qB49
57 -----END PGP SIGNATURE-----
58
59
60 ---
61 avast! Antivirus: Outbound message clean.
62 Virus Database (VPS): 120129-1, 01/29/2012
63 Tested on: 1/29/2012 6:57:54 PM
64 avast! - copyright (c) 1988-2012 AVAST Software.
65 http://www.avast.com