Skip to main content

How your personal information becomes public on the internet Part 2

In part 2 of exploring how your actions online translate into your information being stored and used by unknown parties. Here are a few more ways. 

Cookies:  When users visit different Web sites, most of the sites deposit data about the user visit, called "cookies," on the user’s hard drive. Cookies are then used to send pieces of information by the Web server to a user's browser for purposes of identification, authentication, marketing, shopping cart information or browsing history etc. Cookies may include information such as login or registration identification, user preferences, online "shopping cart" information, and so on. The browser saves all the information, and sends it back to the Web server whenever the user returns to the Web site. The Web server may use the cookie to adapt the information, content or format that it sends to the user, or it may preserve tracking of the different pages within the site that the user accesses.
If a user uses the Internet to buy a product or download a service, the user’s details, credit card information or address are all stored in a cookie.  Cookies that are used by websites to advertise products and services are called first-party cookies.
Other cookies, called third-party cookies, transfer data about users to advertising clearinghouses which in turn shares that data with other online marketers.  Many websites have begun to utilize a new type of cookie called a "flash cookie" (sometimes also called a "supercookie") that is more persistent than a regular cookie. 

Fingerprinting: A device fingerprint is the software and hardware settings collected from a computer.  When a computer goes online, it broadcasts these details to other computers that it communicates with. These details can be collected and patched together to form a distinctive "fingerprint" for that specific device. This fingerprint is allocated an identifying number and used in the network to define that specific device to track the computer or mobile device. This is a very useful technique in tracing cyber criminals.

GPS and data capture: Many GPS and location based services companies work all the time to capture locations, draw maps and places of interest the world over thus collecting data about places and intermittently people. In the much recent case of Google Street View case, Google was fined $25,000 for obstructing an FCC investigation into whether Google violated user privacy by collecting Wi-Fi data during its Street View project. The examination involved Google capturing data from its Street View car which provided a photograph of what users were doing at the time. Google initially denied the charge, and then submitted that it was only "fragmented data," before finally confessing that full emails, URLs, and even passwords were captured and stored. Data was only taken from open networks with no security.

a               Websites, Interactive Chat and Social Networks
Domain names: Many internet users own a website for their self or their businesses by booking a Web site address or URL (Uniform Resource Locator), called the domain name.  Domain registrations are public information unless you pay an additional fee to make your domain name private through Domain Registrants and resellers. The Domain ownership is easily searched through tracking the URL’s Whois. Many people or establishments try to keep domain ownership information private for reasons of privacy.
Blogs:  Journals and blogs or newsletters where content is frequently updated to update the clients of the business or group of interested people on the business or personal apprises are called Blogs.  Depending on the blog service used to post the blog, the user’s private information may be available. Generally blog services, through their service agreements and personalized controllable setting allow the amount of information that the user may be able to make public. Comments on the blogs or newsletter can also be controlled by settings in the blog. Blogs record IP addresses and the identity of the person updating the blog or commenting on it can be fairly easily traced.
Social Networks like Facebook, Twitter: The social networks have come under a lot of flak for weak privacy since a lot of user information is available on these servers. Users on Facebook link to people (known and unknown) and share their personal data, pictures, location and details about their activities through the social site leaving quite a few personal security loopholes in the process. Recently a home was robbed in Australia because one of the family members uploaded a picture of cash at home on facebook.

 Financial Transactions and Bill Payments Online
             Online banking:  Online banking is extremely prevalent in the finance and it has moved on to mobile banking as well. Customers are able to check balances,transfer money between accounts, and track transactions online. Using online banking, customers transmit a huge amount of private and sensitive financial and personal data through online website channels. Though most online banking systems use a high degree of encryption technologies and authentication techniques, a lot of information does get stored intermittently in cookies.  


Popular posts from this blog


We have been fighting a religion defined definition of “ when did the life of a fetus begin”. It is a trap. The debate around this whole concept is so ridiculous that when you see pages of theories being written about the exact time “life took a birth”

Why I call this entire argument ridiculous is because technically everything is life. A cell is a life. An ant is a life, a plant is a life. Zygotes are life too. However, if you choose to mourn the zygote the same way you chose to mourn taking the dead cells off the bottom off your feet- is a decision you need to make with yourself.

All of these arguments around “life” distract from the actual issue, which is that no human should be required to share their organs with another human. No human should be required to sacrifice their life for another human. The intention or reason behind abortion is irrelevant in the context of the right to bodily autonomy.
I would argue that the Liberal “pro-choice” people who aggressively insist that abortio…


It's about firing the 2020 base. And the mainstream media is helping Trump

When Trump spewed his most preposterous lie about abortion in a rally about how full-term babies were killed by Doctors; do you think no one in the crowd was grown up enough to know that it was a lie? These are full grown people who make more important and logical decisions in their lives every day- what to buy; what to do, where to spend, how to earn a living. Do you think they do not know that Trump was concocting imagery for the benefit of creating a national debate about disgust towards the concept of “abortion”? Abortion is painful. Emotionally, it never leaves a woman. I aborted in 1998, then miscarried in 2008 and 2011. Each time, I named those cells and fetuses, celebrate their lives and created a story for their absence in mine, those cells, which could not find viability, for one reason or the other. So for someone, and these 25 white men, and several others, who have never been through that life-…

The Clock is Ticking : BACKWARD FOR WOMEN

Sometimes it is just a customary sound; but a movement that takes us backward; instead of steering us forward.

2017 and 2018 have been the most regressive years in the progress of women. 

Since Trump became the President of the United States of America, a new culture of suppression of women rights has unleashed worldwide.  He has slowly degraded Women Rights by attacking fair pay legislation, defunding reproductive rights and changing the definition of violence against women. His attitude towards women is evident from the way he treats women and his objectification of the whole gender. In response, the women rights movement has revived itself, only to become negative and vicious.

No one wins when we have to fight. It is still a pity that we have to wave flags, march, hoist posters and commemorate each other on this day every year. We should not have to. 

The global economy could be enriched by about $160tn (£120tn) if women earned as much as men. 

No Zaghari-Ratcliffe should have to be in …