It's Your Privacy

Why you should be concerned about your privacy in the digital world

  • Home
  • About
  • Facebook
  • VPN’s For Dummies
  • The Dangers of the Amazon Echo
  • What Google Knows About You.
  • How to Install and Use a VPN
  • Improving Your Data Security and Privacy Online

Powered by Genesis

The Dangers of the Amazon Echo

December 28, 2016 by Will Leave a Comment

What is the Amazon Echo and what does it do?

For anyone who has been living under technological rock, the Amazon Echo is a small smart device that is listening to you at all times. It uses Alexa- a voice activated, ‘bootlegged’ version of Siri to perform many astoundingly useful activities such as “play music, control smart home devices, provide information, read the news, set alarms and more.” All things well worth sacrificing your privacy for right?

Basically, the idea of one of these is to save the user all the trials and tribulations that comes with having to use a smart phone. Aside from the clear necessity of the product (sarcasm), it does have to be noted that in terms of innovation, it is an impressive piece of technology, with the Amazon Echo being well received by much of the public for its remarkable speech recognition and its functionality.

However, the Amazon Echo has come under much scrutiny due to the fact it “Hears you from across the room with 7 microphones for far-field hands-free voice control, even in noisy environments or while playing music” (Amazon’s own product description). Now whilst this is pretty incredible, it’s worth considering the huge potential for Amazon to spy on their users, as part of the product description states; “Alexa updates through the cloud automatically and is continually learning, adding new features and skills.” Therefore it wouldn’t be unfair to assume that Amazon might just be recording the things people are saying in order to push Alex to ‘learn,’ meaning Amazon must be recording interactions with Alexa, leading to the removal of millions of unsuspecting users privacy.

 

Imagine having these bad boys listening in on you at all times. Basically the same as having the Amazon Echo

 

The Problem

In fact this problem is so bad that some critics have called the Echo; “little more than a spying tool for government surveillance.” Now whilst this might sound suspiciously like a shady conspiracy theory you might find in the dark realms of the internet, you can keep your tin foil hats off for this one because many of these claims are justified. Experts who have investigated the capability of the Amazon Echo to spy on people, whether it be through hackers, or even the government itself, have warned potential buyers who value their privacy to avoid this piece of tech. Also, upon investigation of Amazon’s transparency reports about the Echo, it was found that they fail to list everywhere the data from the device is sent listing only Amazon’s cloud services as a source of data storage. This leads to some important questions that need to be asked: is Amazon selling your personal data to the government? In short: probably.

The worst part is however, is that there is some pretty strong evidence that this might be occurring. Matt Novak, writing for Paleo Future writes: “In many ways the Echo is a law enforcement dream,” so how could the government pass up on such an opportunity to receive such an overwhelming amount of private data from millions of their citizens? Way back in March of 2016, Novak filed a Freedom of Information Act request with the FBI back in March to find out if they had ever wiretapped an Amazon Echo, to which the agency responded that it could “neither confirm nor deny.” Sounds horribly suspicious, doesn’t it?

It’s crazy to think how much the field of spy craft has changed and evolved alongside new technologies. Many years ago, in order to spy on someone, an agency would physically need to enter someone’s home in order to wiretap them or place bugs on the walls. Nowadays all that is needed is a simple piece of software and a device that’s always listening, such as the Amazon Echo, and voila, you have yourself a 24/7 listening device and the user is clueless.

No need for this guy to plant microphones with the rise of the Echo

 

Despite all of this, Amazon have still sold millions of copies of the echo to unsuspecting users who don’t seem to mind that they are effectively paying around 50 quid for one of the largest multinational corporations in the world to spy on them, possibly handing over private conversations and other information such as music tastes and purchase information, which advertisers would undoubtedly love to get their hands on. Glad to see people have their priorities in order.

Thanks for reading.

Will.

Sources: https://www.amazon.co.uk/Amazon-Echo-Dot-Generation-Black/dp/B01DFKBL68/ref=pd_lpo_451_bs_t_2?_encoding=UTF8&psc=1&refRID=TFBV0WEH4KZY1FFP2DWN

http://paleofuture.gizmodo.com/the-fbi-can-neither-confirm-nor-deny-wiretapping-your-a-1776092971

https://www.amazon.co.uk/Amazon-Echo-Dot-Generation-Black/dp/B01DFKBL68/ref=sr_1_1?s=digital-text&ie=UTF8&qid=1485116754&sr=1-1&keywords=echo+dot

Filed Under: Uncategorized Tagged With: BACOM

VPN’s For Dummies

December 22, 2016 by Will Leave a Comment

What is a VPN?

A Virtual Private Network, or VPN, is a group of computers privately networked together over the public network of the internet, allowing users to remotely access this network from their personal device. They are akin to a firewall protecting data on your computer, except a VPN protects it online.

Because of the security and anonymity they offer, VPN’s are hugely popular with businesses and corporations as a means of securing sensitive data. What makes them so secure is a combination of dedicated connections and encryption protocols to generate virtual peer-to-peer connections. This basically means that all data sent and received over the VPN is encrypted, meaning that even if a snooper were to access your data, they would be unable to see it due to the encryption. There are a wide variety of VPN services to choose from, be it in the form of a program on a computer, or even an app on your phone, meaning they are incredibly easy to use and access.

 

Fairly accurate interpretation of a VPN. Shows how your signal pings through so many servers, hiding your IP address and more.

 

What makes a VPN so secure?

There are many security protocols built into a VPN to ensure your privacy, and your security whilst using the internet. Most VPN’s will include at the very least, some of these features:

  • IP security (IPSec): IPSec is a form of data encryption often utilised in securing internet communications by encrypting data packets. IPSec transport mode will encrypt the message within the data packet itself, whilst tunnelling mode will encrypt the entire thing, data packet and all! IPSec is often used with other security protocols to increase the total security level of the VPN.
  • Layer 2 Tunneling Protocol (L2TP): The L2TP is often used by VPN’s in collaboration with the IPsec protocols to create an incredibly secure VPN client. Since L2TP doesn’t actually encrypt the data, it instead creates a tunnel for the data to travel in, while the IPSec protocol encrypts the data. It’s sort of a double-whammy in terms of protecting your data. The L2TP also provides greater channel security, and performs data integrity checks to ensure all of the packets have arrived and that there hasn’t been a breach in the channel, leading to your data being compromised.
  • Point-to-Point Tunnelling Protocol (PPTP): PPTP is a VPN protocol used almost unanimously in every VPN, partially due to the fact that it and can be installed on most operating systems has been around since what seems like forever (since Windows 95). However, similarly to L2TP, it doesn’t encrypt the data, it simply tunnels it. Whilst the level of security PPTP provides has of course been utterly eclipsed by newer, and more current methods, the protocol is still widely used, and has still proven to be effective. For the most part.
  • Secure Shell (SSH): SSH basically creates the VPN tunnel for the data to travel through, as well as the encryption that protects your data from any snoopers who come across it. This allows users to exchange data by routing the traffic from remote fileservers hosted by the VPN through an encrypted channel. Now the data itself isn’t encrypted but the channel its moving through is. This adds an extra layer of security to the VPN.

 

Why you should be using a VPN

If it isn’t obvious by the emergence of the independent powers bill, more commonly, and somewhat more accurately known as the ‘snoopers charter,’ and the controversy surrounding the NSA and their tendency to spy on their citizens, you should be using a VPN. It’s not just the government you should be concerned about noseying through all your personal data, it’s remarkably easy for hackers to hack into your internet connection and view all of your search history and personal information. Whilst using a VPN isn’t going to solve all of your privacy woes, it certainly adds an extra step for any would be perpetrator to go through if they want to access your personal data.

Thanks for reading.

Will.

Sources:

http://searchmidmarketsecurity.techtarget.com/definition/IPsec

http://searchenterprisewan.techtarget.com/definition/Layer-Two-Tunneling-Protocol

http://searchnetworking.techtarget.com/definition/Point-to-Point-Tunneling-Protocol

http://searchsecurity.techtarget.com/definition/Secure-Shell

 

Filed Under: Uncategorized Tagged With: BACOM

  • « Previous Page
  • 1
  • 2