USEUROPEAFRICAASIA 中文雙語Fran?ais
    China
    Home / China / Life

    Covering your tracks for internet privacy

    By Kate Murphy | The New York Times | Updated: 2012-06-10 08:02

    Covering your tracks for internet privacy

    While it's probably impossible to cloak your online activities fully, you can take steps to ensure more privacy. The trick is to find the right balance between cost and convenience.

    There are hackers hanging around Wi-Fi hot spots, to be sure. But security experts and privacy advocates said more worrisome were Internet service providers, search engine operators, e-mail suppliers and Web site administrators.

    And if a single entity acts in more than one capacity, like Google, Yahoo, Facebook and AOL, they can easily match your e-mails with your browsing history, as well as figure out your location and identify the devices you use to connect.

    "The worst part is they sell this extremely creepy intrusion as a great boon to your life because they can tailor services to your needs," said Paul Ohm, an associate professor at the University of Colorado Law School in Boulder who specializes in information privacy and computer crime. "But do most people want to give that much away? No."

    He advised logging off sites like Google and Facebook as soon as practicably possible and not using the same provider for multiple functions. "If you search on Google, maybe you don't want to use Gmail for your e-mail," he said.

    If you do not want the content of your e-mail messages examined or analyzed at all, you may want to consider lesser-known free services like HushMail, RiseUp and Zoho, which promote no-snooping policies.

    Or you can forgo trusting others with your e-mail correspondence altogether and set up your own mail server. It is an option that is not just for the paranoid, according to Sam Harrelson, a middle-school teacher in Ashville, North Carolina, who switched to using his own mail server this year using a $49.99 OS X Server and $30 SpamSieve software to eliminate junk mail.

    "The topic of privacy policies and what lies ahead for our digital footprints is especially fascinating and pertinent for me, since I work with 13- and 14-year-olds who are just beginning to dabble with services such as Gmail and all of Google's apps, as well as Facebook, Instagram, social gaming," he said. "I have nothing to hide, but I'm uncomfortable with what we give away."

    But even with your own mail server, Google will still have the e-mails you exchange with friends or colleagues with Gmail accounts, said Peter Eckersley of the Electronic Frontier Foundation, a digital rights advocacy group in San Francisco.

    "You're less exposed," he said. "But you can't totally escape."

    Another shrouding tactic is to use the search engine DuckDuckGo, which distinguishes itself with a "We do not track or bubble you!" policy. Bubbling is the filtering of search results based on your search history.

    Regardless of which search engine you use, security experts recommend that you turn on your browser's "private mode," usually found under Preferences, Tools or Settings. When activated, it ensures that tracking cookies are deleted once you close your browser, clearing your history.

    However, that private mode does not conceal your internet protocol address, which identifies your access point to the Internet, probably letting Web sites know who you are, where you are and when and how long you viewed their pages.

    Shielding your I.P. address is possible by connecting to what is called a virtual private network, or V.P.N., such as those offered by WiTopia, PrivateVPN and StrongVPN. These services, whose prices range from $40 to $90 a year, route your data stream to what is called a proxy server, where it is stripped of your I.P. address before it is sent on to its destination.

    There is also Tor, a free service with 36 million users. Tor encrypts data and bounces it through a series of proxy servers so no single entity knows the source of the data. The only drawback is that with all that bouncing around, it is very slow.

    "Companies like Google are creating these enormous databases using your personal information," said Paul Hill, senior consultant with SystemExperts, a network security company in Sudbury, Massachusetts. "They may have the best of intentions now, but who knows what they will look like 20 years from now, and by then it will be too late to take it all back."

    The New York Times

    Editor's picks
    Copyright 1995 - . All rights reserved. The content (including but not limited to text, photo, multimedia information, etc) published in this site belongs to China Daily Information Co (CDIC). Without written authorization from CDIC, such content shall not be republished or used in any form. Note: Browsers with 1024*768 or higher resolution are suggested for this site.
    License for publishing multimedia online 0108263

    Registration Number: 130349
    FOLLOW US
    亚洲AV无码国产精品色午友在线| 亚洲AV无码精品色午夜果冻不卡| 亚洲AV无码精品无码麻豆| 最近中文字幕大全免费版在线| 亚洲AV无码乱码在线观看富二代 | 亚洲中文字幕不卡无码| 无码中文字幕日韩专区视频| 亚洲日本中文字幕一区二区三区 | 亚洲成?Ⅴ人在线观看无码| 亚洲AV无码一区东京热久久| 最近免费字幕中文大全视频 | 中文字幕51日韩视频| 中文字幕无码久久人妻| 狠狠躁天天躁无码中文字幕图| 最近更新免费中文字幕大全| 99久久超碰中文字幕伊人| 免费A级毛片无码鲁大师| 精品无码人妻夜人多侵犯18| 无码少妇一区二区| 亚洲AV永久青草无码精品| 久久久久av无码免费网| 亚洲精品一级无码中文字幕 | 波多野结衣中文字幕在线| 久久无码人妻精品一区二区三区 | 久久人妻少妇嫩草AV无码专区 | 亚洲精品无码午夜福利中文字幕 | 中文字幕亚洲图片| 国产中文字幕在线观看| 亚洲中文字幕日产乱码高清app | 精品久久久久久中文字幕人妻最新| 无码任你躁久久久久久老妇| 精品无码三级在线观看视频| 国产乱人无码伦av在线a| 国产乱子伦精品无码码专区| 国产精品无码素人福利| 精品久久久久久无码中文字幕| 国产Av激情久久无码天堂| 久久精品无码专区免费| 欧日韩国产无码专区| 日韩一本之道一区中文字幕| 日韩成人无码中文字幕|