See the top rated post in this thread. Click here

Results 1 to 5 of 5

Thread: Some info on Internet Privacy

  1. #1
    Random number herder Norm's Avatar
    Join Date
    Dec 2011
    Location
    The mote in God's eye
    Posts
    12,461
    Blog Entries
    59


    4 out of 4 members found this post helpful. Did you find this post helpful? Yes | No

    Some info on Internet Privacy

    A recent post elsewhere made a comment that there is no way that I can tell someone is accessing the site from a library, and even if I could, I wouldn’t know if the person was using a library desktop, or sitting outside using WiFi. Now, this post isn’t about false claims. It just occurred to me that misinformation about privacy is more rampant than I had thought. And, since APs tend to be on the paranoid side (for good reason), perhaps a bit of clarification may be useful.

    Forums have elementary tracking functionality, like IP logging and lookup, to deal with SPAM and trolling. However, if you have your own full-access webserver, you also have access to the logs. In my case, IIS logs. These logs exist for legitimate purposes and I can’t remember a report of where they have been used otherwise. But, they do exist in great detail. As an example, of course a forum moderator can tell if you are in a library, or university, a mid- or large- company, or some other fair-sized organization. But, via the logs, not only can I tell if you are using a mobile device – I can tell you the color of your smartphone or tablet.

    Sounds ridiculous. But, realize that app developers and larger website hosts require a great deal of information. They need to know whether their users are Mac, UNIX, or Windows users. They need to know if you are a mobile user; and if you use Android, iOS, Blackberry, Windows, whatever. They need to know how many users are on XP or older, or the version of Android or iOS. They need to know what browsers their users use, and what releases. They need to know the resolution of screens. There are several reasons:

    • Where to focus development
    • What hardware/software still needs to be supported
    • Trends in user device screen sizes
    • Code to distinguish between different browsers and browser releases because of different functionality
    • Code to handle known OS and device aberrations

    Webpages, desktop software, and mobile apps often contain code to distinguish between any number of details about devices and operating software to handle environments differently. So, among other things, every hit on a website can produce a log entry which includes the operating system, and it’s exact sub-release number, the browser used, and it’s exact sub-release number, the device used, and it’s full model number, and various other info about the device. Remember my silly claim made earlier? The color of a smartphone is included in the full model number. There are many other fields, some of which I use for stats. For example, there are three IP fields. I use the original-IP as it is traced through reverse proxies.

    Now, most of what I’ve outlined above isn’t particularly dangerous, unless you are up to something nefarious yourself. But, while I’m at it, there is an area with mobile apps that many do not fully understand. When you build an app, you specify sensitive features that the app requires. For example, my apps ask for one such access, access to the network, which I use to check for updates and to download strategies. When you install an app, you will be informed of the requested accesses and must approve them. Now, there exist legitimate apps to organize and deal with e-mail and contacts. They will ask for e-mail and contact access. Realize that if an app asks for e-mail, contacts, and network access, it can steal your e-mail and contact list and upload them to a server. For an AP, that could include the member names and phone numbers of other APs, which could be used to link a member name to a person’s name and address. So, if you are installing a casino game, and you are warned that it wants such access, no way you should provide it.

    One further note. There exist many services and applications that claim to hide some or all of this info. Some of these are legit. A growing number are not. What better way to hack someone than purport to be protecting them from hackers.

    With some of this technology comes extremely annoying concepts like targeted ads based on what you looked at on some site. That’s life. When technology advances; someone finds a way to use it for purposes we don’t like. I just thought people would like a better understanding of what is tracked. And, this post is not meant to be all-inclusive. Be careful out there.
    Last edited by Norm; 09-26-2016 at 11:21 AM.
    "I don't think outside the box; I think of what I can do with the box." - Henri Matisse

  2. #2
    Banned or Suspended
    Join Date
    Dec 2011
    Location
    Eastern U S A
    Posts
    6,830


    Did you find this post helpful? Yes | No

    KUDOS to Norm. A very fine comprehensive and informative post.

    *****************************************************************

    Incidentally, I run software that not only will intercept an application

    "phoning home" as we say, but intercepts applications, (including my

    O.S.), as it performs various actions. Utilizing these would be very

    tedious indeed, but for the fact that I can grant OR block permanent

    or temporary permission for each action or process!

  3. #3


    Did you find this post helpful? Yes | No
    Nice update Norm, we do need to stay aware of the status of information and how it is used.

    Thanks
    Luck is nothing more than probability taken personally!

  4. #4
    Senior Member
    Join Date
    Aug 2012
    Location
    heaven or hell
    Posts
    243


    Did you find this post helpful? Yes | No
    Thanks Norm,very informative.

  5. #5


    Did you find this post helpful? Yes | No
    Does Anyone Know IF VPN's or Proxy Servers are very useful or effective in keeping your Anonymity or identity concealed these days?

Similar Threads

  1. Replies: 3
    Last Post: 10-27-2014, 06:38 AM
  2. Internet Privacy Overseas
    By johnvic in forum Software
    Replies: 2
    Last Post: 12-19-2013, 06:49 AM
  3. Privacy
    By Norm in forum Announcements
    Replies: 5
    Last Post: 04-17-2013, 05:42 AM
  4. Bettie: Need Info on IDs, Privacy, Hiding Money?
    By Bettie in forum Blackjack Main
    Replies: 9
    Last Post: 04-29-2003, 05:34 PM

Bookmarks

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •  

About Blackjack: The Forum

BJTF is an advantage player site based on the principles of comity. That is, civil and considerate behavior for the mutual benefit of all involved. The goal of advantage play is the legal extraction of funds from gaming establishments by gaining a mathematic advantage and developing the skills required to use that advantage. To maximize our success, it is important to understand that we are all on the same side. Personal conflicts simply get in the way of our goals.