This week’s sensational Wikileaks revelations about CIA hacking tools has raised all sorts of questions about the US intelligence agency’s hacking arsenal. Here’s my take on the matter.
These 10 privacy threats are explained in the form of stories of fictitious individuals.
If a hacker extracts your username and password from, say, Hotmail, Yahoo mail or any of the other hundreds of businesses that get hacked every day, how lucky would he be when he visits a banking site, or mortgage company, or healthcare company where you’ve used that same username and password?
Using the Internet for online voting seems like a perfect way to increase participation in the democratic process. It is much easier for computer savvy societies to vote online rather than face the crowds and long lines at physical polling places.
As you access a website you can pass a surprising amount of information to its remote servers. The website operators know your ISP, your IP address (either the unique address of your computer or the home router in front of it), and as a result your approximate geographic location.
Attempts by the federal government to constrain the collection of data, and the ability to tailor offers based on this data, is a case of the government meddling in areas where it has no place. Interference with the free market serves only to punish those companies that know how to efficiently mine their data and so is the worst form of government interference with the free market.