Tech Made Simple

Hot Topics: The Best Electric Rice Cooker | 5 Worst Apps to Download | Best Bluetooth Headset | What's Draining Your Android Battery?

Use It

author photo

Can you use technology without risking your privacy?

by on September 19, 2011
in Computers and Software, Cameras and Photography, Phones and Mobile, Tips & How-Tos, Privacy :: 6 comments

woman using laptopWho needs a paper map when smartphones today can find your exact location and give you turn-by turn-directions to your destination? And what’s the harm in shooting a quick photo that can be shared in seconds with friends, family and followers online? These modern marvels make life easier and more gratifying in many ways but their benefits don’t come without a trade-off. Never before has your privacy been more at risk.

Location Tracking
“I think perhaps the hottest issue right now is location. Location, location, location,” says Kevin Bankston, senior staff attorney at the Electronic Frontier Foundation (EFF) in San Francisco.

Indeed, both Microsoft and Google were recently under fire for collecting the locations of millions of laptops, cell phones and other Wi-Fi-enabled devices around the world. The unique identifiers for those devices were then made public, meaning that if a person knew someone’s Media Access Control (MAC) address, he could infer where that person spent time with her phone in tow.

A MAC address is a device’s unique hardware number or physical address, and it allows a cellular carrier to find a phone and link it to its network.

While both Microsoft and Google have since made changes to their databases to assuage privacy concerns, the fact remains that our mobile phones can double as tracking devices.

“[Mobile phones] can reveal information about your location not only to your cell phone carrier but also to the cell phone manufacturer, the developer of the operating system of your phone or location-based service applications on your phone,” Bankston says, adding that some apps have no use for your location but simply want access to it for marketing purposes.

To keep those apps from tracking you, often it’s just a matter of making a few adjustments to your phone settings. On the iPhone, for example, you can turn off location features by going to Settings, General, Location Services. There you can enable or disable location functions for each app on your phone. Android handsets have a similar option in Settings, Location and Security.

But aside from shutting off your phone entirely, your cell phone carrier will always be able to triangulate tower signals to determine your location if law enforcement or some other entity should ask for it.

Geotags in Photos
“Anytime you use an electronic device, depending on what the device is, you’re leaving a data trail, whether it’s GPS meta data in a photograph you take or [the] cookies you pick up when you’re online,” says Rainey Reitman, activism director with the EFF.

She’s right. As we have pointed out, every time you take a photo with your cell phone, there’s a good chance your location is being stored along with the photo. Cell phones with GPS often default to storing this information when GPS is turned on. And some point-and-shoot and dSLR cameras also have GPS built into them.

There are a couple of ways to remove the location information from your photos, which is also called Exchangeable Image File Format (EXIF) data. First, you can download a simple program that strips out the EXIF data. For Windows PCs, try Easy Exif Delete (free on cnet.com) or iPhoto Exif Cleaner for Mac (free on cnet.com) for Macs. These programs will indiscriminately remove all of the EXIF data.

Cookies That Can’t Be Deleted
And the cookies Reitman mentioned are the reason the ads you see online seem to know that you’re old enough to possibly want to buy wrinkle cream, or that you’re in the market for a new car.

In studying the companies and technology behind this targeted advertising, The Wall Street Journal found that the nation's 50 top Web sites on average installed 64 pieces of tracking technology onto the computers of visitors.

“There are third-party tracking cookies on almost every popular commercial site so they’re virtually impossible to avoid,” says Paul Stephens, director of policy and advocacy for the Privacy Rights Clearinghouse in San Diego, Calif.

While tech-savvy Web surfers used to simply delete these tracking cookies from their machines, the WSJ found that “…new tools…scan in real time what people are doing on a Web page, then instantly assess location, income, shopping interests and even medical conditions. Some tools surreptitiously re-spawn themselves even after users try to delete them.”

Understandably, some people think this kind of activity is wrong. Wired recently reported that Web site analytics firm KISSmetrics and more than 20 of its customers, including Spotify, AOL’s About.me, Etsy, Spokeo and the news site Gigaom.com were recently sued on the grounds that KISSmetrics’ tracking technology violated federal and state privacy laws.

All web browsers provide ways to delete cookies from your computer. The Web site ghacks.net gives a good tutorial on doing it in each major browser. You can also visit the Network Advertising Initiative to opt out of the behavioral advertising conducted by its member companies.

Data Mining
It might distress you to know how many Web sites display things like your address, phone number and other personal information.

“The problem is…if a consumer has a severe need to have privacy—if they’re a public defender or a law enforcement officer or the victim of stalking—it is practically impossible to truly keep your privacy online, especially your home address and such, because these information broker web sites don’t have to remove your information,” says Reitman, who adds that some sites such as Spokeo, which at one time posted maps that pointed to people’s houses, now offer an opt-out option.

The Privacy Rights Clearinghouse provides an excellent listing of the scads of online information brokers that may be collecting information about you, as well as links to opt-out pages at those sites if they are available. Unlistmy.info also provides a list of the most popular sites that might be storing data about you, as well as advice for getting off those lists, if an option exists.

To see some of the many sites collecting information about yourself, try searching for your name at Pipl.com. I did and found all sorts of sites gathering my data. Pipl also offered maps to my house as well as a link to my wish list on Amazon, which also lists my birthday.

Online Profiles
While many companies such as Amazon create public profiles for their customers, I find it unnerving that anyone can go snooping around my Amazon profile to find out what kinds of things I’d like to buy. I’ve been using Amazon since the company’s beginning and now can’t remember setting up a profile for myself. The point is that it’s important to check the privacy settings related to any kind of profile a site you use often may be keeping on you.

As another example, Health Month is an online game I occasionally like to play which involves setting health rules—such as “Eat fresh fruit every day”—and you win or lose points for following your own rules. After searching for “Christina DesMarais” and “profile” I realized my Health Month profile—including all my healthy and unhealthy habits—was there for the world to see. I then spent several minutes trying without luck to find some privacy settings at the site that I could adjust. As my only recourse I was forced to change my name, birthday and email address on the site so as to not contribute to the data online brokers are able to glean about me.

I emailed Health Month and received a response within minutes. Buster Benson, who created Health Month (and is a person who’s very sharing with his personal data), said the way I handled it—by changing details on my profile—was the best method for staying hidden, but that he would be letting users adjust privacy settings within the next few weeks.

This goes to show that it often pays to raise your privacy concerns with a company.

Facial Recognition
While Facebook is one of the companies the EFF says has fought for user privacy in Congress, it also makes use of facial recognition software which is actually the opposite of private. Google and Apple also are using it in their respective Picasa and iPhoto products.

What makes facial recognition disturbing is how it could be used in the future as technology progresses. Already in Japan there are billboards that can recognize your gender, approximate age and ethnicity so as to better target ads toward you. And you may have heard that after the recent riots in London police were using facial recognition to identify looters.

While identifying looters sounds like a good idea, think about what it would be like if everywhere you went cameras could determine who you were. Personally, I find the idea appalling. Remember the movie Minority Report, anyone?

And you might have reason to worry about those seemingly harmless Facebook photos that you’re tagged in.

Researchers from Carnegie Mellon University have found that it’s possible to use facial recognition technology to match the photos and real names from publicly available profiles (such as Facebook) to profiles where the user used a pseudonym and wouldn’t want his real name used, such as Match.com.

In a published report the authors wrote, “Hence, face recognition creates the potential for your face in the street (or online) to be linked to your online identity(ies), as well as to the sensitive inferences that can be made about you after blending together offline and online data.”

The LA Times recently posted a guide for disabling Facebook’s facial recognition.

Devices With Memory
If you’ve ever used a digital copy machine there’s a good chance the data you scanned is still saved to the copier’s memory. In fact, this poses such a privacy concern that several states are working on passing laws to require businesses to erase or encrypt stored data from digital copiers before recycling or disposing of them.

Any device with memory, including your PC or phone, should be cleared out before you part with it.

While some people think that deleting files and folders is sufficient before selling or disposing of a computer, they’re wrong. Deleted files can be undeleted. Even reformatting your hard drive can be undone. The most secure way to remove data from your computer is to use one of the wiping or erasing utilities we recommend when prepping your computer for disposal.

It’s also important to erase data from your phone before getting rid of it. With iOS, it’s a just a matter of hitting Settings, General, Reset, Erase All Content and Settings.  For Android, you’ll want to format your microSD card, which you can do through SD Card and Phone Storage, under Settings. Then do a Factory Data Rest, under the Privacy menu in Settings.

The Bottom Line
There’s no doubt that as technology evolves privacy concerns grow.

As a final example, let me share another tidbit. The Air Force is working on tiny spying aircraft that might be as small as a dragonfly. While they’re not sure how the little bugs might be used, the point is that technology is capable of finding more information about people than ever before thought possible.

Subscribe to the Techlicious Daily Email!

Get the Techlicious Guide to Great Photography as your FREE gift!

Discussion loading

gravatar

"Just accept it"

From Chris McCullough on October 10, 2011 :: 9:20 pm

There’s a banking commercial on TV that shows a man pondering whether to accept a bank’s ATM fees, while all these people throughout the commercial tell him ‘It’s what they do, accept it’ in a multitude of ways. Perhaps you’ve seen it (if not, you can go here to watch it: http://bit.ly/rpEK2n).

It’s worth noting because our online lives aren’t much different. There is a way things are done online. You ‘accept it’ or you don’t play, and you know you want to be included… especially when everyone you know, to include your dad, your little sister, even your pet chihuahua, has a Facebook account, posts their thoughts via Twitter, posts their pics to a Flickr account, and shows off their recent antics via YouTube…. you have to wonder if unplugging from the grid is worth it. After all, the internet is how we share our lives today. You don’t want to be left out now, do you?

Think about it… when’s the last time you pulled out a genuine photo album to share pics of little Johnny or Jenny with your mom? But I’m sure she checks out photos of her grandkids via Facebook or Flickr.

It used to be the only time you knew what Uncle Bob was doing was at Christmas time when he sent out his annual holiday letter. Now you can know what he’s up to all year if you want.

Same thing when it comes to Amazon wishlists, and similar lists. If your family checks them, it may be there only way to know WTH you want for Christmas when they’re unsure what to get someone who’s nearly 40 with a wife & kids.

I could go on & on with the examples, but suffice to say, unless you care to unplug from the grid and crawl into a cave (and even there, you’re not immune… even Osama bin Laden had internet wink you’re probably not going to escape the ‘new norm.’

Privacy is dead. At this point all you can control is how much privacy do you sacrifice.

Personally, when I used that pipl.com link provided above, I didn’t find but three places any info about me was listed: Amazon, Facebook and Flickr. And even on those sites I’ve got next to no public information listed on them that I wouldn’t share with you myself.

So you can do as I do, and intentionally limit the info you share using the tools listed in this article (good job btw, Christina) or you can go crazy thinking about all the ways Big Brother has invaded your life. Fact of the matter is, He’s here to stay. How you manage His arrival is up to you.

Reply

gravatar

Are anonymizing tools really useful?

From Ariana on December 02, 2011 :: 3:33 pm

Thank you for addressing this issue.

What about services such as ProXPN? they say it… “works by creating a secure, highly encrypted connection (VPN tunnel) between your computer and the Internet. This protects your identity and activity online by making it impossible for anyone to sniff your data in transit. In addition, no records of your online activity are kept by us (unlike your ISP).”

How much does such a service really mask, considering the article above.

Reply

gravatar

Linkedin Privacy Options

From angele on December 22, 2011 :: 11:32 pm

I recently did a google search on my name to see what information was out there on the web.  Needless to say I found my whole linkedin profile available because I didn’t set the privacy settings for third party use.  I quickly corrected that.  I also found that there is a website called yatedo that displayed the same information, I tried to delete my profile from their but had an issue with those random codes they use.  This also prompted me to delete my twitter account since I rarely use that. I just wanted to share this because it really surprised me.

Reply

avatar

Thanks, understanding your options for

From Josh Kirschner on December 23, 2011 :: 9:24 am

Thanks, understanding your options for each social network is important. Depending on what your goals are, sometimes it is better to keep things public. LinkedIn is primarily a business networking tool and setting your profile private will make it difficult, if not impossible, for business connections to find you.

Reply

gravatar

Your making it sound harder

From havoc on April 08, 2012 :: 10:21 pm

Your making it sound harder than it is to remove info from pictures. On a windows OS pc all you have to do is right click a file and click properties. From there click the tab that says “Details” and towards the bottom you will see a blue link that says “Remove Properties and Personal Information”. That can be used to make a copy of a picture with the personal info removed.

Reply

gravatar

Who

From Bill on June 02, 2013 :: 11:11 am

I presently have an iphone. I am interested in “who” is tracking me.
Is there an appt that can determine who is tracking you?

Reply

© 2014 Techlicious LLC. :: Home | About | Meet the Team | Sponsorship Opportunities | Newsletter Archive | Contact Us :: Terms of Use | Privacy Policy

site design: Juxtaprose