About the Book
Many internet users are aware of the risks when signing up to services provided by companies such as Google, Facebook, Twitter, and that Internet Service Providers (ISPs) have the ability to store data. Some may even know that cellphone carriers store all text (SMS) messages sent.
The awareness has been raised thanks to Wikileaks, the SOPA bill, firewalls in countries like China and now western countries (Australia and New Zealand have had firewalls for quite a while), and country-specific legislation which enables rights holders to request ISPs disconnect their customers with little proof of copyright infringement.
But when you talk with friends or family about this, quite often response is “I’ve got nothing to hide” or “I’m not special.” Of course, you may not be special now, but who knows what might be considered “special” in the future?
It doesn’t take much to accidentally stumble across something you shouldn’t on the web, log files are stored with ISPs and cloud services that don’t have an expiry date. It’s easy for governments to cherry pick information that’s been collated through no fault of your own, and construct a story that fits their interest.
Every log file stored around the world will tell a story about you.
About the Author
Richard White @digitaleranet
He regularly writes about privacy related issues and is hard at work on The Art of CLI, a collection of command line, open-source software.
Richard White is a geek, programmer, freelancer, and technology enthusiast.