Blown To Bits

Net Circumvention Tools are Selling User Data

Monday, January 12th, 2009 by Harry Lewis
Dr. buy remeron low cost pharmacy Martin Hirsch, professor of medicine at Harvard University and infectious cheap prescription without consultation artane order disease expert, told Medical News Today that mpox "appears to buy discount cialis online be more severe in children, young adults, and the immunocompromised." colchicine prescription NHL is a cancer that develops in a type of (metacam) no rx white blood cells known as lymphocytes, which help the immune compare glyburide prices system fight cancer and microbes. If people inhale allergens through purchase cheap erythromycin sale dangers the nose, these can reach the adenoid tissue and cause petcam (metacam) oral suspension no prescription inflammation. They will become immune to the specific virus that discount viagra caused it, though they will not be immune to the buy generic viagra no prescription usa other three viruses. People who are prone to this behavior buy cheap cephalexin may need to wear a mouthguard to prevent damage to the.

Several commercial products make it possible to avoid leaving footprints and fingerprints as you browse the Web. These products are especially valuable in China, where Internet browsing is tracked and many requests are blocked by the “great firewall of China.” FirePhoenix, for example, displays these promises on its home page:

Protect Your Online Activities

FirePhoenix (FP) is a software to protect your privacy and identity when you surf the Internet. It effectively encrypts all your Internet traffic and anonymizes your IP address. In addition, it provides you with unrestricted access to Internet when your Internet connection is filtered, monitored or blocked by your company, your institution, your ISP or your country.

In a remarkable and frightening blog post this morning, Hal Roberts reports that FirePhoenix and two other major circumvention tool companies are selling data on users’ browsing histories. As the example of the release of AOL searches (chapter 2 of Blown to Bits) showed, search histories can often identify the users — and in this case, the users are likely dissidents living under repressive regimes with a history of imprisoning dissidents. Here is the sort of offer Hal points out:

Q: I am interested in more detailed and in-depth visit data. Are they available?
A: Yes, we can generate custom reports that cover different levels of details for your purposes, based on a fee. But data that can be used to identify a specific user are considered confidential and not shared with third parties unless you pass our strict screening test. Please contact us if you have such a need.

Now there is a protocol vulnerable to mistakes in human judgment with potentially tragic consequences.

Comments are closed.