VPN – Ways To Bolster Web Privacy

Cloud VPN

Looking at cloud VPN (virtual private networks) as a way to bolster web privacy. Have you ever had the slightly unnerving experience of browsing on a brand’s website or interacting with a company online, only to find a few hours later that the brand is now all over your social media channels, and is targeting ads at you as if it knows exactly who you are? Most of us have had that experience and are almost reaching a point where we take it for granted.

The collection of metadata and the tracking of a user’s browsing history has become an extremely sophisticated business, but a flurry of court decisions in recent weeks may be turning the tide and about to put the brakes on the ambitions of corporations and the seemingly inevitable march away from privacy.

A US federal court ruled in early November that a warrant might be required before a user’s browsing history can be tracked, while almost simultaneously in Belgium, a commercial court ruled that Facebook must stop collecting a user’s browsing history when the user is not logged in.

The Wall Street Journal reports that “The Belgian Privacy Commission had brought the case against Facebook in June, accusing the company of raking in personal data of its users as well as nonmembers without asking for consent or adequately explaining how the data would be used. At issue for the regulator is how Facebook tracks Internet users on external websites through the use of “like” and “share” buttons.”

Both rulings tap into a growing sense of unease amongst consumers about how far they are prepared to go in allowing corporations to monitor their online activity with a goal to targeting products and advertising at them. And it’s not just on the web either where this is happening. Non-profit investigative newsroom ProPublica reports that “Vizio’s Smart TVs track your viewing habits and share it with advertisers, who can then find you on your phone and other devices.” It’s one of the tradeoffs that Vizio justifies as a way to generate revenue while keeping the prices of their hardware more affordable. It’s not just Vizio doing the watching, but the way its tracking behavior is set up is more aggressive than companies like Samsung and LG. both of which track viewing habits only when that feature is specifically turned on.

In its ruling around data collection, the US Federal Court draws some important distinctions that could have far reaching implications for both Government and big business; arguing that it’s not just content that cannot be tracked but URLs as well. This makes sense, due to the fact that it’s easy to see how a specific URL can tell a company as much as the content on that page can do. “A visit to “webmd.com,” for Instance, might count as metadata, as Cato Institute senior fellow Julian Sanchez explains. But a visit to “www.webmd.com/family-pregnancy” clearly reveals something about the visitor’s communications with WebMD, not just the fact of the visit,” writes Andy Greenberg for Wired magazine.

A compromise position needs to be found between governments, large corporations and users where the various parties can agree on the level of access that is acceptable in a world rapidly automating and where the ‘’internet of things’’ looms closer everyday with its potential to make our lives infinitely easier at the risk of our threatened privacy.

Stay tuned as we will touch on a number of cloud VPN services in a future update.

By Jeremy Daniel

Steve Prentice
The Era of Microlearning Becoming employable and then staying employable requires ongoing, up to date knowledge, and this can become something of a dilemma. Many of us grew up with a traditional understanding of the ...
Gilad David Maayan
What is SASE (Secure Access Service Edge)? SASE (Secure Access Service Edge) is a term coined by Gartner to refer to a new architecture for networking and security that combines both functions into a single, ...
Security Breach 10 Useful Cloud Security Tools
Cloud Security Tools Cloud providing vendors need to embed cloud security tools within their infrastructure. They should not emphasize keeping high uptime at the expense of security. Cloud computing has become a business solution for ...
Patrick Melampy
Cloud On-Ramp and Protecting Performance The expansion of remote work and the massive growth in usage of cloud-based applications have stressed existing infrastructure and put a keen focus on the performance of everyone’s network environment ...
Anita Raj
Coronavirus and Telemedicine Technology COVID-19 has brought the world to a near standstill. From NBA to Met Ball and Coachella, all major events and festivals are canceled. Disneyland is shut and movies are postponed. Flights ...
Louis
More CISOs will have to deliver revenue growth to protect their budgets and grow their careers in 2023 and beyond, and a core part of that will be getting multicloud security right. It’s the most common infrastructure strategy for ...
John Peluso
Save Your Organization on Cloud Costs Organizations of all sizes are currently navigating their plans to avoid the recent surge in cyber-attacks and data breaches and preparing for unforeseen setbacks. Building a sensible backup and ...
Stacey Farrar
Modern Auth and Exchange Online Migrations Microsoft has phased out Basic Authentication (Basic Auth), replacing it with Modern Authentication (Modern Auth) to provide increased protection and user security. Through this, Microsoft has turned off Basic ...
Cloud For Dummies.png
Holiday Photos.png
It’s Magic
Twitbook.png

PLURALSITE

Pluralsight provides online courses on popular programming languages and developer tools. Other courses cover fields such as IT security best practices, server infrastructure, and virtualization. 

(ISC)²

(ISC)² provides IT training, certifications, and exams that run online, on your premises, or in classrooms. Self-study resources are available. You can also train groups of 10 or more of your employees.

CYBRARY

CYBRARY Open source Cyber Security learning. The world's largest cyber security community. Cybrary provides free IT training certificates. Courses for beginners, intermediates, and advanced users are available.