Linked by Thom Holwerda on Tue 9th Oct 2012 21:18 UTC
Privacy, Security, Encryption As it turns out, new Verizon customers (although there are reports existing customers are getting notified too) have 30 days to opt out of something really nasty: Verizon will sell your browsing history and location history to marketers. Apparently, AT&T does something similar. Doesn't matter what phone - iOS, Android, anything. Incredibly scummy and nasty. I quickly checked my own Dutch T-Mobile terms, and they don't seem to be doing this.
Permalink for comment 538167
To read all comments associated with this story, please click here.
RE[7]: Wow...
by Alfman on Wed 10th Oct 2012 17:54 UTC in reply to "RE[6]: Wow..."
Alfman
Member since:
2011-01-28

Laurence,

"Encrypting your traffic would only hide the content of your traffic, but that data isn't really of interest anyway."

Really? The DPI contents reveals specific search terms, the videos you watch, etc. This is far more personal than knowing which IPs you've connected to. It's the difference between knowing you've connected to ebay, or knowing exactly which products you've been browsing (*).

* Not that I know what ATT & Verizon are actually doing with the data, but there's no doubt the URL/contents can reveal much more about you than the IPs do.


"However, what you can do is run a proxy (VPN, SSH tunnel or even just a straight up web proxy). At least then all of your traffic appears to be going to the same destination (the proxy) and thus their records of you are worthless."

Yes, onion routing tunnels like tor are probably the best defence against ISP tracking today & in the future.

http://www.torproject.org/

A side benefit is that it can be used to work around censorship as well.

Another thing to consider is that one's browser may be "leaky" regardless of the transport encryption. There is a chromium fork designed to strip out identifying bits from packets sent to google.

http://www.srware.net/en/software_srware_iron_chrome_vs_iron.php

Reply Parent Score: 2