Tuesday, October 14, 2008

The Patriot Hack - Great Title for a Great Post

I just read a really great blog post. It's actually an article reprinted on one of my favorite blogs, that isn't mine ;) In short the article written by Martin Eberhard, a co-founder of Tesla Motors, details some very useful tips on protecting your privacy online. Some of the comments after the article are quite thought provoking as well. Follow the link at the bottom of this post to the Blog of Tim Ferriss, author of my current favorite book The 4 Hour Work Week.

Click here for Martin Eberhard's article on privacy!

Tuesday, September 30, 2008

Hidden Safes

I'm sure everyone has seen those wonderful hidden safes, things like beer cans, shaving creme containers and fake electrical outlets...
Well, I have just seen one of the most innovative and hilarious 'hidden safes' EVER! I couldn't seem to get the picture to load here so click on this link --> http://www.spyville.com/brief-safe-underwear.html for a "brief" look at what I'm talking about.
I will do a real 'how to' post on hiding things around the house, but for now a giggle will have to do.

Monday, September 22, 2008

Fake Spyware Detectors and Government Traps

Who do you trust?

According to some people, everyone is in on "it". Is that software really deleting that file? Are proxy servers really anonymous or did the government publish that website?

Good question and I wish I had a convincingly definitive answer. Many businesses and law enforcement agencies employ what are known as "honey pots" - websites, servers or other computers intentionally left with weaknesses in their security in the hope of luring hackers and others of nefarious intent into trying to break in and then the website can glean intelligence on who's been trying to sneak in. This practice is legal and probably necessary in the fight against the criminal element. However, sometimes a hiker might step in the bear trap, so to speak. If you find yourself in a situation where you think you might run afoul of "The Man", get the hell outa there QUICK! Follow the tips elsewhere in this blog to clear your cache and wipe your file slack and swap/page file.

It is relatively well known that there is now spyware out there disguised as privacyware, so it's not too big of a stretch to think that, just maybe, that the proxy server you are using is actually some government shadow operation tricking people into giving them easy access to their comings and goings on the net. What better way to catch people trying to hide something than to offer them a free or easy way to hide it?

I don't necessarily subscribe to this theory but it is reason for pause. So you ask...

Who can you trust?

Since there are so many people out there concerned with their privacy these days it's hard to believe that any "spy" sites could last for very long on the net before somebody "outs" it, and spyware programs disguised as anti-spyware are exposed pretty quickly. Try to keep up to date on Usenet postings, bulletin boards, and blogs. Don't take any ONE persons word for something. If you want to surf anonymously use a proxy server such as Anonymizer, AND a free or pre-paid ISP.

I would be very suspicious of any website that sells privacyware and spyware at the same time. Look for companies that have been around for awhile. If you suddenly see a popup window screaming that you have spyware and it's not from a program that you installed yourself, DO NOT click any of the buttons on the popup. Use Windows Task Manager to close your browser. To do this in Windows 9X and XP, simultaneously hold and release the "Ctrl" "Alt' and "Delete" keys. Select the "Applications" tab, select the program to close and click the "End Task" button. Next scan your computer with a spyware detector that you do trust, you do have one installed already, don't you? My favorites are always the free versions, I like Spybot Search and Destroy and Adaware Personal. Sometimes it's too late for a spyware detector, or worse, you didn't install one until it's too late... ouch!

Unfortunately if that's the case it's beyond the scope of this article but there are a LOT of people that post instructions for getting rid of these atrocities. Just Google the name of the offending program or call a tech.

There are many blogs and forums dedicated to these topics and the privacy community is a generous bunch. The real die-hards still frequent privacy newsgroups and bulletin boards, and you can ask the folks there what they think of a particular solution. There's always someone out there willing to help, just to further the cause of our privacy. But remember not to take any ONE
person's word on a subject, even mine. After someone posts a reply to your query check back again in a day or so to see if anyone else has something to say. And if it sounds too go to be true........

Monday, August 25, 2008

Hide Your Identity With a Pseudonym and Free Email Accounts

Make no mistake, you can be tracked down by the information you leave behind on the internet. For instance if your email address is yourname-and-birthday@yourisp.com (face it LOTS of people include their birthday) and you let this email address out into the wild, say in a comment to a blog post, a chat room, online forum, or even a résumé/job post etc, it can be quite easy to find even more of your personal information. Think about it, many Internet Service Providers only serve a specific geographic location, if you exclude the big guys like SBC (even the big guys have subdivisions that someone might be able to find out about). Someone of nefarious intent can do a simple online search and find out what area your ISP serves. Just like that they have narrowed there search to a specific area. Next they just search for your name in that area. Kinda scary and that’s just from your email address.

Here’s the problem with all those great websites: Many of them require that you “Sign Up” to gain full access to what they have to offer. This “Sign up” process may require as little as an email address while others may want a lot more including your name, address, phone number, and first born male child. Ok, maybe that last one is a bit of a stretch but I think you can see where I’m going with this.

Just because someone asks you for information does not mean that you have to give it to them or that it be 100% true. Let me pose this scenario: You meet someone in a club while out of town on business and they are very nice, in fact you spend quite some time having intelligent conversation. Finally when it’s time to go home to your family (let’s say you’re married) and this nice person asks you for your number. The thought of your jealous spouse answering a call from strange man/women you met in a club just isn’t very appealing to you, but you don’t want to reject your new friend either. So you give him/her your cell number, or as happens more than you might think, you give him/her a fake number reasoning that you will most likely never see this person again.

This same strategy works marvelously with those annoying website “sign ups” only without the hurt feelings 2 days later when your new ‘friend’ realizes you gave them a bogus number. Unless I am purchasing a product or service from a website or creating some type of business relationship, I always use a pseudonym (fake name) and an email address from an online provider such as Yahoo or Hotmail. I generally use a real email address that I have set up with one of the online providers so that I can receive the information I requested and because many of these sites have gotten wise to this trick so they only grant you access or allow you to download the requested file after you confirm your email address by clicking a link in an email that the website sends you.

Don’t use your real name. Use a nickname or even a fake one. Do not make your name part of your email address except the one used for real business contacts and friends/family. The same goes for including your birthday or other private information. Remember your email address is seen by anyone you send mail to from that address.

By using a pseudonym and a free email account you not only protect your privacy but you are also creating a buffer from spam. If one of your free email accounts begins to get completely out of hand with spam you can always ‘throw it away’ and create a new one. If you have cultivated any real contacts with your ‘throw away’ account that you wish to keep you can always provide them with your new ‘throw away’ email address.

The Day We Fight Back