Skype User, Beware

Another company in the bag for the Chinese government?

Skype’s China Spying Sparks Anger

Savvy Internet users in China began avoiding the version of Skype offered by its Chinese partner two years ago, but news it filtered and recorded text messages has sparked new worries about the global firm’s commitment to privacy.

The U.S.-owned Web communications firm faces a backlash at home and in China for apparently allowing core principles to be compromised in order to meet the demands of Chinese censors, analysts warned.

“We may never know whether some of those people whose conversations were logged have gone to jail or have had their lives ruined in various ways as a result of this,” said Rebecca MacKinnon, an Internet expert at Hong Kong University.

“This is a big blow to Skype’s credibility, despite the fact that Skype executives are downplaying it as not such a big deal.”

Skype, with its promises of total security and privacy, has long been popular with Chinese looking to keep their conversations away from the prying eyes of government censors.

But the eBay-owned firm had to apologize on Thursday after a report revealed that its Chinese service not only monitors text chats with sensitive keywords, which it had earlier admitted, but also stores them along with millions of personal user records on computers that could easily be accessed by anybody.

FYI: Border Crossing

U.S. tracking citizens’ border crossings

The U.S. government has been using its border checkpoints to collect information on citizens that will be stored for 15 years, raising concern among privacy advocates, the Washington Post reported on Wednesday.

[…]information may be shared with federal, state and local governments to test “new technology and systems designed to enhance border security or identify other violations of law,” the Post reported.

[…]

Information on international air passengers has long been collected this way but Customs and Border Protection only this year began to log the arrivals of all U.S. citizens across land borders, the Post said.

Privacy advocates raised concerns about the expanded collection of personal data and said safeguards are needed to ensure the system is not abused.

[…]

DHS spokesman Russ Knocke told the paper that the retention period was justified.

“History has shown, whether you are talking about criminal or terrorist activity, that plotting, planning or even relationships among conspirators can go on for years,” he said. “Basic travel records can, quite literally, help frontline officers to connect the dots.”

Six Degrees of Separation

Instant messaging world confirms six degrees of separation

A social graph derived from billions of instant messages validates folklore that there are about six degrees of separation between any two strangers on the planet.

Any two? 😯

So Bin Laden isn’t all that far removed from President Bush after all. And neither of them is so far from me. Weird.

A research team at US software giant Microsoft studied 30 billion instant messages sent by 240 million people in June of 2006 and determined that, on average, any two could be linked in 6.6 steps.

"Weve been able to put our finger on the social pulse of human connectivity – on a planetary scale – and weve confirmed that its indeed a small world." Microsoft researcher Eric Horvitz told AFP on Monday.

[…]

Horvitz and colleague Jure Leskovec estimate that the Microsoft Messenger chats they studied amount to half of the instant messages sent worldwide in June two years ago.

That’s a staggering amount of messages!

(What a boring job.)

The researchers stress that they were not privy to the contents of messages and that information indicating peoples identities was removed.

Yeah. Sure. 🙄

WWW: Wild Wild Web

I use the Internet.

I depend on the Internet.

But I’m very wary of it. Or if not of it, of the way it can be used and is used by people (as individuals, as corporations, as governments, as other people groupings).

So three headlines caught my attention earlier this morning:

Congress studies how people track your online use

Executives from major Internet players — Microsoft Corp., Google Inc. and Facebook Inc. — are due for a grilling about online privacy in a Senate committee Wednesday, but the company likely to get the most scrutiny is a small Silicon Valley startup called NebuAd Inc.

NebuAd has drawn fierce criticism from privacy advocates in recent weeks for working with Internet service providers to track the online behavior of their customers and then serve up targeted banner ads based on that behavior.

[…]

“This is analogous to AT&T listening to your phone calls all day in order to figure out what to sell you in the middle of dinner,” said Robert Topolski, a technology consultant to Public Knowledge and Free Press, two other public interest groups that have raised concerns about NebuAd.

[…]

Besides NebuAd, Wednesday’s hearing in the Senate Commerce Committee may also examine Facebook’s “Beacon” monitoring tool, which tracked online purchases made by Facebook members and sent alerts to their friends on the site.

For the record: Congressional hearings don’t rank highly with me either. 🙂

Anyway, I’ll say it again: Trusting the Web to maintain privacy requires the willing suspension of disbelief.

OK, on to Story Number Two:

Internet flaw could let hackers take over the Web

Computer industry heavyweights are hustling to fix a flaw in the foundation of the Internet that would let hackers control traffic on the World Wide Web.

Major software and hardware makers worked in secret for months to create a software “patch” released on Tuesday to repair the problem, which is in the way computers are routed to web page addresses.

“It’s a very fundamental issue with how the entire addressing scheme of the Internet works,” Securosis analyst Rich Mogul said in a media conference call.

“You’d have the Internet, but it wouldn’t be the Internet you expect. (Hackers) would control everything.”

The flaw would be a boon for “phishing” cons that involve leading people to imitation web pages of businesses such as bank or credit card companies to trick them into disclosing account numbers, passwords and other information.

Attackers could use the vulnerability to route Internet users wherever they wanted no matter what website address is typed into a web browser.

[…]

On Tuesday the US Computer Emergency Readiness Team (CERT), a joint government-private sector security partnership, issued a warning to underscore the serious of so-called DNS “cache poisoning attacks” the vulnerability could allow.

[…]

“Consequently, web traffic, email, and other important network data can be redirected to systems under the attacker’s control.”

[…]

Automated updating should protect most personal computers. Microsoft released the fix in a software update package Tuesday.

[…]

Hackers using the vulnerability to attack company computer networks would also be able to capture email and other business data.

And “they” want me to trust the Internet for data storage and data back-up?! Ha!

And “they” think I’m paranoid for warning even about plain ole email communications?! Hmph!

And “they” still think I’m a TechnoPetriefied Kook. Fine. Here’s Story Number Three:

Google ventures into virtual reality with ‘Lively’

…Google Inc. hopes to orchestrate more fantasizing on the Web.

[…]

Google thinks Lively will encourage even more people to dive into alternate realities….

The Lively application already works on Facebook, one of the Web’s hottest hangouts, and Google is working on a version suitable for an even larger online social network, News Corp.’s MySpace.

[…]

Lively’s users will be able to sculpt an avatar that can be male, female or even a different species. An avatar can assume a new identity, change clothes or convey emotions with a few clicks of the mouse.

The service also enables users to create different digital dimensions to roam, from a coffeehouse to an exotic island. The settings can be decorated with a wide variety of furniture, including large-screen televisions that can be set up to play different clips from YouTube.com, Google’s video-sharing service.

Lively users can then invite their friends and family into their virtual realities, where they can chat, hug, cry, laugh and interact as if they were characters in a video game.

As a precaution, Google is requiring Lively’s users to be at least 13 years old — a constraint that hasn’t been enough to prevent young children from running into trouble on other social spots on the Web.

“As a precaution…” — oh, please!

Anyway, Lively is further good news for those wishing to exploit and expand the depravity of man. Stay away from it!

OK, now you may virtually stick your virtual head back in the virtual sand.

Above all, love God!