Archive

Archive for September, 2012

Facebook Putting Your Personal Data at Risk in Their Aim to Generate Ad Revenue

September 28, 2012 Leave a comment

Ever since Facebook became popular, one of their biggest sources of revenue has been advertising and it has taken the company from strength to strength. While their existing ad strategy has been generating a steady stream of revenue, the ambitions of the company have also grown with its size. Facebook has now come up with a new advertising strategy that will not only revolutionize the way companies promote their products but also generate high number of consumers.

Although this is all impressive and sounds very advanced, there is a high risk that the common man is pushed into. Your online shopping habits are being tracked and this will put a lot of your personal data and privacy at risk. The information not only includes your authentication codes for different sites but also your online bank account credentials and credit card details.

Facebook Has Associated With Datalogix, a Controversial Online Tracking Company

The news that has been bothering security experts from the past few weeks is Facebook’s association with Datalogix. Datalogix is a company that will track and collect data about online users so that they can sell that data to advertising companies and make revenue. The company also tracks consumers in case a company or an advertising agency asks them to do so, for a fee of course. While this is all fine, Datalogix has a very bad reputation of stepping over the privacy boundary time and again. The company has been involved in a number of controversies where it has not only violated the privacy of consumers openly but also vehemently denied it on the face.

What Is Facebook’s New Ad Strategy?

According to the new strategy, Facebook is now tracking the users who click on the advertising links that are shown on the site. But the data gathering does not stop there. They will also follow you into the site and verify if you are purchasing the product or not. When you ignore the privacy issue and look at this purely as a marketing strategy, it is a stroke of genius.

This not only gives an idea to Facebook about which ads are effective and which are not, but also helps them in forming a strategy to promote the not so popular products more effectively, thus increasing their sales. But there is a clear boundary that Facebook is stepping over in this case. The only way to verify if you have made the purchase or not is through tracking your log in the product site also. This log also includes the details of your bank account number and credit card details, depending on what you used to make the purchase.

What Is Datalogix’s Role?

Facebook will collaborate with Datalogix and compare data that it has collected to the data Datalogix collected. They will use email IDs as a reference and compare if ads on Facebook are successful or ads on other ad boards are successful. This will give them valuable insight using which they can review their strategy and make changes where necessary.

How to Avoid This Tracking?

It is common knowledge that every online shopper wants to shop without being tracked and it is disturbing that the trusted Facebook is also not reliable now. Never make a purchase on a site that you visited through Facebook. If you see a product that you fancy, make a note of the site it is available on and visit it when your secure browsing mode is on. Also, close the browser window in which Facebook is open while you are shopping. This will ensure that tracking cookies will be disabled when you visit the site on which you wish to make the purchase.

Categories: Our Products

Torrentheads Know How To Identify Trackers

September 27, 2012 Leave a comment

It is now a well established fact that torrent files are the primary suspects in any sort of copyright infringement case. This is why the authorities and several private tracking agencies have come up with a way to monitor popular files on the internet and identify if they are in violation of copyright laws or not. If found to be illegal, the copyright holder has all the freedom to take any course of action that he/she feels is necessary. Copyright laws are very strict and legal procedure will most likely mean the shutting down of the torrent site.

However, researchers in a leading state university, the University of Birmingham, have come up with a way of identifying the trackers, or monitors, from the downloader group. Although this is a good way of ensuring that copyright laws are not broken, we can see that this finding benefits the pirates more.

Download IP is Logged In a Database Within Three Hours Of A Download

Researchers identified in their study that IP addresses of the users of file sharing sites are stored in a database for a number of reasons including targeting, email DB building, number tracking, etc. These are not necessarily intrusion of privacy as there is no record of the logs being used for other purposes.

While you may feel that this is a cause of concern for torrent sites as their data is being collected somewhere and might be used against them, it is in fact an advantage for them. The researchers said that in what apparently is the ‘arms race’ between the copyright law enforcers and the pirates, this procedure benefits the pirates more.

Security Monitors Pose As Downloader But There Are Apparent Differences

Although this is not a very well known fact, security monitors that are responsible for tracking illegal torrent files actually pose as downloader. They will log into the torrent site and download the data through the torrent clients for verifying is copyright laws are being broken. This is a definitive way of establishing that the law is broken with evidence. But there is a catch here.

Researchers got their hands on the data of some of the leading torrent sites, like The Pirate Bay, and found out that there are many distinguishable differences in regular leechers and trackers. The primary difference that they noticed was that trackers never downloaded the full file. Obviously, this seems like the logical thing to do as all they need is a clip and not the whole file.  Another noteworthy difference was the high frequency of the same IP appearing on multiple latest torrents. This is also a fairly logical thing to do for the security agencies as they have to monitor all the files. But these two differences, along with many other minor ones, have provided a way for the pirates to protect themselves.

If Smart, Pirates Can Protect Themselves

The conclusion of this study was that if pirates were smart enough to notice these trends, they could effectively protect themselves from the tracking computers. These worry free torrents sites have all the liberty to either bar that IP, or redirect it to a mirror site, feed it fake data, or any other means of stealth technique can be employed.

It is clear from this research that the techniques used by the tracking companies are not foolproof and there is a lot of work to be done in developing a more comprehensive monitoring system. Piracy still continues in spite of all these efforts by the government and copyright holders and there is a good chance that it has grown to a level where it cannot be brought down.

Categories: Our Products

Europe More Serious Than The US About Online Privacy

September 26, 2012 Leave a comment

There was news about how the Irish Data Commissioner had conducted an inquiry into the facial recognition software that is used by Facebook. This inquiry was a result of the complaint lodged with the Irish Data Commissioner from its member states, about how this software was posing a risk to the online privacy of its users. Following this inquiry, Facebook made an official announcement that the site would be discontinuing the use of facial recognition software on all its European users.

The same issue is valid worldwide, including the US . But even though the Electronic Information Privacy Center or the EPIC as it is popularly called, has lodged a complaint with the FTC (Federal Trade Commission) about this, the complaint is still waiting to be processed and there is no communication on when it will be dealt with. This shows an apparent laxity that US citizens and officials have about online privacy. It is now only a matter of time before it comes back to haunt them.

‘Patchwork’ Of Laws Protecting Online Privacy

The major difference between online privacy enforcement in the US and Europe is the laws that govern it. While there are a number of laws which are not effectively compiled to  ensure that matters regarding online privacy are dealt with effectively, in Europe, the Data Protection Directive is the bible of online privacy protection. This law book or a bill, provides all the member nations with a basic framework of how online privacy must be enforced and maintained.

It also has sections that guide the member nations on dealing with issues relating to online privacy. A noticeable fact in all these laws is that the end user or the citizen has a measure of control and a sense of direction on how to go about if his/her online privacy is compromised. That is very unlike the US where citizens have to go through elaborate procedures to file a report in  case of a breach in their online privacy.

European Regulations Set To Become More Robust

To make the online privacy regulations even more stringent, there is a proposed amendment in the online privacy law. According to the reports, the newly proposed regulation will empower the citizens more by forming laws that are above the national jurisdiction. This will mean that all the companies that are directly or indirectly processing the data of European nationals will be included under the law and in case there is any irregularity, they are answerable to the authorities.

Another important factor that will ensure that the companies are extremely careful while processing the data from EU zone is the penalty that can be imposed. The law states that you can impose up to a 2% portion of the global revenue of the offending companies, if proved guilty, as a penalty.

Recently, Google paid a penalty of five hours of its revenue that was imposed by the Federal trade commission. If the penalty was handed out by the Euro zone laws, then it would have amounted to 175 hours of revenue.

Americans As Worried As Europeans About Their Online Privacy

A recent study by the European Commission showed that more than 70% of the people in Europe are worried about their online privacy. Similarly, American Life Project, a survey, showed that 73% of Americans are also worried about online privacy. This shows that people want to shop without being tracked, or browse without being targeted. Only the authorities are not too bothered about beefing up the rules that govern online privacy issues. It is high time that things are set right or there will be a lot of unevenness in the systems of US and EU zones.

Categories: Our Products

Facebook Officials Deny Message Bug On Their Site

September 25, 2012 Leave a comment

Of all the social networking sites that we have seen over the years, Facebook has probably been the best in ensuring the privacy and security of its users. Although it was pretty simple initially, they developed advanced privacy options over the years and today, they have a very good reputation. But recently, the arguably best social networking site in the world had a glitch. Some of the users claimed that the private messages they sent a few years ago were being displayed on the wall (or timeline as it is called now) as public posts and this was causing a lot of privacy problems to them. But Facebook has denied this bug and said that the privacy options of the site have been as safe as it has been over the years.

US And French Users Seem To Be The Only Ones Affected

One of the reasons why Facebook might be right about their claim is because the users in most parts of the world are not affected by the bug. According to an observation made by an online security agency, the users who seem to be affected by this bug are mainly based in the United States and France. The main issue is this. Users who had sent some private messages in 2009 are seeing the same messages on their wall as wall posts. Also, the privacy settings for the wall posts had been set to public which meant that anyone on Facebook could view these messages. There is a reason why the users used private messaging to send those messages and publicizing those messages on the wall is a very serious issue indeed.

Facebook’s Explanation

Facebook officials issued an official statement that the problem was extensively investigated by their engineers and they found no such issue in users from US and France, and also in users’ profiles around the world. However, an interesting fact that can be noticed here is that Facebook did not completely deny that there was a problem. They just said that all the profiles’ security has been satisfactory and there has not been any sort of compromise in the privacy of the users. Facebook officials also provided an explanation about the glitch by saying that the users who reported the problem had themselves posted the messages on their timelines (then known as ‘the wall’) and had forgot about it.

Facebook’s Attempts To Compete With Google Reason For This Glitch?

While some people were ticking off Facebook as only a social networking site, the engineers at Facebook are working around the clock to integrate search engine services into the social networking site. This is probably Facebook’s attempt to draw some of the search engine users from Google. Mark Zuckerberg had recently commented that the position of Facebook is so unique that it can answer the queries of the users more comprehensively than any other search engines.

Implications Of This Privacy Issue

As Facebook’s reputation for privacy has increased, we have become increasingly lax about the discretion we use while on Facebook. We tend to use it for personal and possibly sensitive conversation which can be used against us if miscreants get their hands on it. Recent studies have shown that some users use Facebook as a platform to watch adult content in private also. What we should be aware of is that Facebook is also a site like any other and it is also vulnerable to mistakes. So, we should not do the mistake of overly trusting Facebook with a lot of sensitive or confidential information. A little user discretion is all that is needed to ensure that we can use Facebook without any serious problems even if Facebook security measures fail.

Categories: Our Products

Microsoft Discovers Malware On Brand New Computers

September 24, 2012 Leave a comment

It is not uncommon for us to find malicious software on our computer even though we have the latest security measures in place. The cyberspace that we access on a regular basis is teeming with malicious software and even if we have the latest security measures in place, our computers are bound to have one or more of these codes. But that does not mean the virus, botnet, malware, spyware, or any other type of malicious software on our computers will be active. The anti-virus and other security measures will ensure that they are dormant and will not cause any problem.

However, malicious software on a new computer is a very dangerous and tricky issue. This is exactly what officials from Microsoft are faced with. They have found that brand new computers from a supply chain in China are infected with potentially dangerous software even before the consumers use it for the first time.

A Botnet Called Nitol

Microsoft officials found that the virus on the new computers was a something that they could not instantly identify as its behavior was a little unpredictable. For this reason, they shipped one of the computers to their research centers where, after weeks of study and analysis, researchers revealed that this was a type of botnet. This was not all and the researchers believed that they had come across this type of botnet previously and this particular type was code named ‘Nitol’.

Findings Of Operation B70

Officials from Microsoft said that they were already suspicious of new computers being infected by potentially dangerous software even before they were turned on for the first time by consumers. That is the reason why they undertook the sting operation, code named operation B70. The objective of this operation was simple. Officials from the company would visit the stores or dealerships which were in question and purchase computers from them.

This operation started out way back in August, 2011. The culprits here were the dealers as they installed fake and non legitimate software on the computer to bring down the overall cost they bore on each model and yet sell it for the retail price. This increased their profit margins. The officials involved in operation B70 purchased 10 pieces of laptop and desktop computers from the suppliers in question.

What Is A Botnet?

A botnet is a type of malicious software that will turn your computer into a part of a larger network of computers and give the hacker who planted them control over all these computers. The same botnet will be installed on hundreds, if not thousands, of similar computers and the miscreant will have significant control over this network.

The applications of this methodology are many and varied. The miscreant can use this network to attack a secure network and hack through it. The advantage of having so many computers is that the hacker can use the combined computing power of all the computers on the network to hack, thus substantially reducing the time and effort required for a hack. There is also the possibility of using your computers to hack into banks and to perform other online crimes. When investigators try to find the perpetrator, they will zero in on your computer even though you have no idea about it.

Safeguarding Yourself Against Botnets

Botnets disguise themselves very well and you must make sure that your regular system scan includes all the sectors of your hard drive. It is not enough if you stop cookies/tracking online. Also, never visit sites that you feel might be dangerous. Another important lesson that we can learn from operation B70 is that you should always approach the official or authorized dealers to buy our computers to ensure that they are legal and most importantly, safe.

Categories: Our Products

Latest Child Privacy Issues: More Than 5 Million Kids On Facebook

September 21, 2012 Leave a comment

There was a time when internet usage was strictly monitored and kids were not allowed to use computers like they do today. Although those kids were not as knowledgeable as today’s kids (and much more innocent too), we did not have to worry every minute about how their online privacy and security. A recent study was conducted about the kind of victims hackers target online and not surprisingly, 39% of the hackers preferred kids as they are easy targets and also quite valuable when it comes to revealing confidential information.

This is very disturbing and we should take more measures to protect our kids. Facebook is probably the most popular hunting grounds for hackers and kids under the age of 13 are not allowed on Facebook. But surveys conducted in the past few weeks report that there are over 5 million kids under the age of 13 on Facebook.

Facebook Policy States Under-13 Kids Not Allowed

The official policy of the most popular social networking site in the world states that kids under the age of 13 are not allowed on Facebook. Although this is a part of the site’s official policy, there are no measures to ensure that kids don’t slip through the verification net. The site only asks to enter your date of birth in the initial stages of the registration process. If you alter your year of birth in such a way that you seem more than 13 years old, the site has no qualms about accepting you as a user even if you are under the age of 13. This is exactly what the excess of 5 million kids on Facebook have done.

FB’s Effort To Block Children Ineffective But The Site Refuses To Acknowledge It

These numbers suggest that there is clearly something wrong in Facebook’s age verification system but the administrators of the social networking site do not seem to realize it. They are of the opinion that they are screening the profiles regularly and they do eliminate the profiles which are verified as belonging to under-13 kids. The company’s administrators also had some numbers to show when questioned about this particular apparent fallacy with the site. They said that every year, they are eliminating more than 800,000 accounts which they believe belong to kids. But the company refuses to disclose any information on the system they use to verify the age of the user. For all we know, the system might be flawed.

This Problem Will Escalate To Serious Proportions Unless Dealt With Immediately

Some might feel that online security experts are overreacting as Facebook is just a harmless social networking site. But clearly, there are serious implications. Kids are easy to manipulate because of their innocence and this is exactly the tactics that hackers use. They use a technique called social engineering which will attract the kids to their devious plots and this will not only put the kids’ privacy at risk, but also their parents’ and siblings’. The kids also get to watch adult content in private through Facebook pages even if you have blocked the adult content in their computers.

Parents Should Not Encourage Kids To Use Facebook

The survey that counted the number of pre teens on Facebook also interviewed parents about their tolerance towards their kids using Facebook. More than 60% of parents confessed that they helped their pre teen kids to open accounts. This is a bad idea and the main reason for this is social pressure. When a kid doesn’t have a Facebook account, he or she will be ridiculed by the kids who have one and this will lead to emotional distress. But parents must understand that there is something more at risk and exercise discretion while dealing with their kids.

Categories: Our Products

Blocking Torrent Sites Have No Effect on Online Piracy

September 20, 2012 Leave a comment

If you are not aware of the recent developments in the world of torrents, there has been a massive breakthrough for companies who provide music and videos. They have finally managed to convince the government, and consequently the search engine companies, that torrent sites are the major source of pirated intellectual property. The team, led by Hollywood bigwigs, has managed to pull the right strings and use its immense power and reach to ensure that torrent sites can be blocked even on the basis of reasonable doubt.

All the company has to do is provide circumstantial evidence to the court and the court will order the site to be blocked or taken down immediately, without even waiting to verify the claims or giving a chance for the torrent site to plead their side of the case. This seems to be harsh but it did give the record companies some satisfaction that they were doing something.

However, all this has been disproved by a recent survey. The survey has identified that torrent downloading continues to thrive and pirated content is still being downloaded indiscriminately.

No Evidence of Reduced Piracy

During the survey, the researchers managed to unearth hardcore evidence that blocking sites did not have any effect in reducing the number of copyright files being downloaded. Sites like PirateBay, Mononova, Torrenthound, etc were blocked in several key demographics but that has not stopped people from downloading torrents. MusicMetric, a leading music company was responsible for compiling this data and they released the data only for the United Kingdom. That data showed that people who are looking out for worry free torrents are using other sites to download files through torrents. The number of new sites that offers torrent files keeps coming up on a daily basis and this is why there has been no effect in the number of people who still use torrents.

Pirate Party Fails To Agree With the Data

Contrary to the conclusions of MusicMetric, the pirate party group has not agreed to the conclusions drawn from this data set. Loz Kaye, the leader of Pirate Party, said that just because people are using technology (in this case, torrents) does not mean that there is large scale piracy still going on. He said that the only plausible conclusion that one can draw from this data is that the people of the United Kingdom are very much music oriented and that they are using torrents to download it actively. He said that MusicMetric has not come up with any data that exclusively shows that the data which is downloaded is intellectual property or copyrighted data only.

Points Out To Other Torrent Trends

Kaye also added in his statement that if the company manages to gather data about the type of files that the people download, then a vast majority of those files are non copyrighted material. He adds that these were the files that people have bought by paying money and they are just sharing it with their fellow torrent users. That does not come under piracy and that is exactly the reason why torrents were established in the first place.

The Argument is Doing Nothing to Curb Online Piracy

Mr. Kaye finished his statement by saying that people are raising an issue about this data because they are not able to do anything effective to ensure that online piracy is reduced significantly. He said that we should stop arguing about these sterile topics and try to make a concerted effort to ensure that piracy is nipped at the bud rather than trying to stop it from growing. Although the solution is not apparent today, we will find one in the near future.

Categories: Our Products

Protecting Your Online Privacy

September 19, 2012 Leave a comment

Online privacy is probably the biggest issue that the IT world is facing today. There have been a number of debates about how you can fortify yourself against online threats. It does not help that every day the number of cases where the privacy of a person is compromised is increasing. There have been a number of approaches taken by different companies to ensure that their customers are not victimized. Experts have warned that in future, the new security measure will only end up confusing users more than increasing the security of their privacy. This particular point was highlighted by Microsoft when they announced the launch of their latest version of Internet Explorer browser with Windows 8. The new browser reportedly has a pre-activated ‘do not track’ option and users don’t even have to bother turning it on.

The New Internet Explorer Browser

When the launch of the latest version of their Windows operating system was held, Microsoft officials also brought up this apparent ‘step up’ in the security features of the new OS through the pre-activated ‘do not track’ option on the browser. This is said to ensure that the users activity is nether logged not tracked, the cookies are not enabled and also the browsing history is not stored. When the OS is installed for the first time and the browser is also installed, there will be an option for the user to enable this option by default. If they click on that check box, they will not have to worry about activating the ‘do not track’ option again.

Implications of This Option

It is a readily accepted fact that this feature will definitely protect the users from hackers and other cyber criminals. But there is also another industry that completely depends on tracking for their business – the marketing industry. Targeted marketing is so common today that almost every company use it. Targeted marketing is a technique in which the companies track the sites that you vast through your IP address and cookies and then allow pop ups of those relevant sites to appear on your browser. A study has shown that this technique increases the efficiency of marketing strategies by almost 47%.

With this option pre-enabled, these companies will have to come up with new ways of targeting potential customers. Target marketing was ‘once in a century’ idea and it is probably going to affect the marketing of some major companies. Let us not forget that Microsoft is also a predominantly product based company and their fortunes also rely heavily on successfully marketing their products.

How are Other Browsers Offering ‘Do Not Track’ Feature

Most leading browsers like Chrome and Firefox also have their own ‘do not track’ options. However, the companies allow the user to have control of this option. If the user wants to stop cookies/tracking online or allow it, they can do so. This approach is in contrast to what Microsoft has set out to do where the company is deciding for us.

What Does this Mean for the Future?

Experts in the online security arena believe that this is probably how companies will approach online security in the coming days. Mozilla’s privacy leader, Alex Fowler, said that the companies will adopt this policy in the future. He is of the opinion that although privacy is a matter of choice, there is no one who is trying to highlight the fact that users should be asked before their privacy is beefed up. He said that no one cared how this issue is dealt with as long as the security measures are in place. But this does raise a question of how far this will go when companies will take matters into their own hands and design products with features that users are not aware of. All we can do for now is just wait and see.

Categories: Our Products

Is Google’s Online Censorship Methodology Fair and Flawless?

September 18, 2012 Leave a comment

Online censorship has always been a debatable subject and the way companies like Google approach online censorship has been under constant scrutiny. While there is a protocol that Google has to deal with cases pertaining to online censorship, the whole process is not transparent. We are not aware of what happens behind the closed doors and only the verdict about a particular link is banned or not will be made public. Most people do not find this acceptable, especially the ones who are put under loss by this censorship. The reason why this issue has surfaced again is due to a video that has hurt the sentiments of the Muslim community of the world.

Why Was The Video Censored?

This video was titled ‘The Innocence Of Muslims’ and was filmed by a person who deliberately wanted to hurt the feelings of the Muslim community. The video contains content that makes fun of the Muslim way of life and other aspects of the religion in a vulgar way. The video went viral within hours of it being released and recorded a very high number of hits before people started raising their voices about its content and how it is hurting the emotions of people. There were a lot of abuse reports on YouTube (which is a property of Google) and after a few days, Google put up a disclaimer saying that the video was removed due to a court order.

Was There A Real Court Order?

Reliable sources from within Google state that the company buckled under the sheer pressure of powerful people and removed the video and there was no court order. There have also been reports of how the US government was worried that this video can cause mass hysteria and violent public protests and thus, instructed the site to plan the video.

Although this video deserved to be taken down, this raises a question about how online censorship is exactly carried out. The fact that the US government can make a multinational company such as Google censor its contents mean that the government can do this in the future also. For example, if there is a serious protest against the government that is held and if the protestors want to use YouTube as their platform for expression, there will be a risk of the government banning it stating the name of national security.

Curtailing The Freedom of Expression

The constitutions of all democratic nations have a section that speaks about the citizens’ right to the freedom of expressing themselves. This means that a citizen can express anything that they feel if it is not abusive, insensitive, inappropriate, or something that is against the society. But the current day’s online censorship procedure practically ridicules these rights. There have been instances of Google blocking sites offering worry free torrents just on the basis of suspicion. So, if the government feels that an activity or a site or a protest is suspected to be a threat to national security also, they can order Google to block everything about the subject, thus denying the citizens their right to freedom of expression.

What Are The Consequences?

The internet is one of the most widely used platforms of modern day and Google practically rules the search engine world. If Google has the power to indiscriminately censor topics, then they can virtually control the success or failure of an event. The event can be social, political, or of any other type. This might have some grave consequences, if not presently, at least in the foreseeable future. We will have no hold on our protests and rallies for our rights and demands. It is high time that someone took this matter seriously and demand an overhaul in the system to ensure that all rights are protected.

Categories: Our Products

Is Private Browsing Really Private and Secure?

September 17, 2012 Leave a comment

Online security and privacy is one of the major concerns of modern day internet users. That is the reason why we use a wide range of software and hardware tools to ensure that our data is secure from the multitude of cybercriminals who are out there looking for opportunities to hack. Although none of the tools are comprehensive enough to ensure that the protection is 100%, a combination of these tools and a little bit of user discretion will ensure that we stay reasonably safe when we are browsing on the world wide web. One such tool is the private browsing option. This is available in almost all browsers today and is indeed extensively used by internet users on a regular basis. Before we go into the effectiveness of this option, let us take a quick look at what private browsing really is.

What Exactly Is Private Browsing?

Almost all the leading browsers today have a browser in-built option that will allow you to browse privately. All browsers have separate names of their own for this option, but essentially, the technicality behind all is the same. While Mozilla guys call it the private browsing option in their Firefox browsers, Microsoft calls it the In Private browsing in their Internet Explorer browser and folks at Google refer to it as the Incognito mode in their browser, Chrome. When you activate this option, what essentially happens is that the browser will not record the history of the sites you visited, the cookies will not be activated and any sort of auto fill history will not be recorded by the browser. This will ensure that no user who logs on to your computer and uses the same browser will get a whiff of what you were doing with the browser. All you need to is access the menu bar and click on the option that will enable the private browsing. There will also be a keyboard shortcut for some browsers that you can use. However, the feature is not fool proof and has its own limitations.

Limitations of Private Browsing

One of the main things that you must understand about private browsing is that it will ensure only secrecy, not increase security. Of course, there is an indirect increase in the security by a small margin because you will have the luxury of visiting that sites you want without worrying about the other users accessing that information. This will come in handy especially when you are using a public computer. But this does not mean that you will not be visible to the destination sites. When you visit a site, your IP address will be logged into the website’s log. Unlike the other security options that will use a different IP address to your own, the private browsing option will not allow you that luxury. Also, do not assume that stop cookies/tracking online is disabled. Some websites require the usage of cookies and some browsers will ask you if cookies should be enabled. You will have no option but to do it if you want to visit those sites.

Tracking Cannot Be Disabled

Online tracking is a completely different issue. There are different techniques that online stalkers use to track their targets. The secure browsing option will not do anything that will help you protect yourself against online tracking. It is recommended that you use some of the tools that are exclusively meant for preventing others from tracking you online if you wish to secure yourself against that problem.

Another issue with private browsing is that it doesn’t protect you against malicious software such as spyware, malware and computer viruses. Be careful of the sites you visit with the private browsing option turned on.

Categories: Our Products