TechCentralTechCentral
    Facebook Twitter YouTube LinkedIn
    Facebook Twitter LinkedIn YouTube
    TechCentral TechCentral
    NEWSLETTER
    • News

      Moves afoot to fix Eskom’s debt problem

      4 July 2022

      Audi South Africa to offer free connectivity upgrades

      4 July 2022

      Shock fuel price increase announced

      4 July 2022

      Wiocc’s data centre business, OADC, appoints CEO

      4 July 2022

      Google’s Equiano cable lands in Namibia

      3 July 2022
    • World

      Tether fails to calm jittery nerves

      4 July 2022

      EU to impose wide-ranging new rules on the crypto industry

      3 July 2022

      Crypto hedge fund Three Arrows files for bankruptcy

      3 July 2022

      Meta girds for ‘fierce’ headwinds

      1 July 2022

      Graphics card prices plummet as crypto demand dries up

      30 June 2022
    • In-depth

      The NFT party is over

      30 June 2022

      The great crypto crash: the fallout, and what happens next

      22 June 2022

      Goodbye, Internet Explorer – you really won’t be missed

      19 June 2022

      Oracle’s database dominance threatened by rise of cloud-first rivals

      13 June 2022

      Everything Apple announced at WWDC – in less than 500 words

      7 June 2022
    • Podcasts

      How your organisation can triage its information security risk

      22 June 2022

      Everything PC S01E06 – ‘Apple Silicon’

      15 June 2022

      The youth might just save us

      15 June 2022

      Everything PC S01E05 – ‘Nvidia: The Green Goblin’

      8 June 2022

      Everything PC S01E04 – ‘The story of Intel – part 2’

      1 June 2022
    • Opinion

      South Africa can no longer rely on Eskom alone

      4 July 2022

      Has South Africa’s advertising industry lost its way?

      21 June 2022

      Rob Lith: What Icasa’s spectrum auction means for SA companies

      13 June 2022

      A proposed solution to crypto’s stablecoin problem

      19 May 2022

      From spectrum to roads, why fixing SA’s problems is an uphill battle

      19 April 2022
    • Company Hubs
      • 1-grid
      • Altron Document Solutions
      • Amplitude
      • Atvance Intellect
      • Axiz
      • BOATech
      • CallMiner
      • Digital Generation
      • E4
      • ESET
      • Euphoria Telecom
      • IBM
      • Kyocera Document Solutions
      • Microsoft
      • Nutanix
      • One Trust
      • Pinnacle
      • Skybox Security
      • SkyWire
      • Tarsus on Demand
      • Videri Digital
      • Zendesk
    • Sections
      • Banking
      • Broadcasting and Media
      • Cloud computing
      • Consumer electronics
      • Cryptocurrencies
      • Education and skills
      • Energy
      • Fintech
      • Information security
      • Internet and connectivity
      • Internet of Things
      • Investment
      • IT services
      • Motoring and transport
      • Public sector
      • Science
      • Social media
      • Talent and leadership
      • Telecoms
    • Advertise
    TechCentralTechCentral
    Home»In-depth»Time users protected their identity online

    Time users protected their identity online

    In-depth By The Conversation24 July 2015
    Facebook Twitter LinkedIn WhatsApp Telegram Email

    hacker-640

    If anybody is still labouring under the mistaken belief that anything online can remain private and secure, this week should have seen them finally admit defeat. In the US, UCLA Health reported that 4,5m health records had been compromised. UCLA Health runs four hospitals and 150 offices in Southern California, based at the University of California in Los Angeles.

    The security breach joins a long list of recent hacks of health insurance, and health services, companies, including that of health insurance company Anthem that had up to 80m customer records illegally accessed earlier this year.

    More poignantly, and also this week, international dating site Ashley Madison admitted that hackers had accessed its systems and stolen details of its 37m customers. The particular twist in this hack is that the site encouraged people in existing relationships to “cheat” on their partners and have casual affairs. Among information stolen by the hackers were details of customers’ sexual fantasies, which the hackers threatened to publish if demands to close down the site completely were not met.

    Companies that have been hacked normally follow up these events by announcing the increased security measures that they have taken, including hiring dedicated security staff. It is perhaps surprising that these companies didn’t believe that they needed these measures before they were forced to by someone breaking in. This comes despite organisations like the Electronic Frontier Foundation warning that online dating sites weren’t implementing basic minimal security standards on their sites.

    For the customers affected, however, companies implementing security measures after the fact will bring little comfort, as they face the serious consequences of having financial and personal information leak into the criminal and public spheres.

    As a consequence of these and many other large scale hacks of public and private organisations, it is fair to assume that any information that is provided online can, and will, eventually end up in the hands of cybercriminals. This has to lead to a rethink of how we are handling identity on the Internet and consequences for organisations that not only ask for inappropriate levels of detail about their customers, but also fail to implement stringent security measures to guard against the loss of unencrypted data that they do hold.

    Consumers can, of course, take steps themselves to limit the amount of information they provide when sites ask for it. This can extend from saying “no” to sites wanting to store credit card information for future use, through to providing a fake name and address when asked for contact details.

    For shopping online, the benefit of using services like PayPal, Apple Pay or Android Pay is that sites don’t store any information about credit cards on their own systems. Using one of these services means that the site also doesn’t have to know the customer’s address, and certainly there would be no reason to provide their real address.

    Parcels can be delivered to parcel delivery points offered by a range of companies, again not using a home address.

    Even disposable phone numbers can be bought from companies like France’s onoff app (there are equivalent services in most countries) so that a person’s actual phone number doesn’t have to be disclosed.

    Likewise, disposable e-mail addresses can also be used with sites.

    The reality is, though, that most people will consider taking these steps too much effort and will just ignore the risks or live with them. Ultimately, it will need the sites themselves to change how they do business.

    Alternatively, there would be a significant market for a new anonymising service to provide a way for customers to have a virtual profile that could be used on sites that only links back to a real identity for payment and delivery purposes. Of course, this would break a site’s ability to track users and serve advertising to them and so there will be a ongoing conflict of interest where companies strive for real names, and customers increasingly battle against providing them.The Conversation

    • David Glance is director of UWA Centre for Software Practice at the University of Western Australia
    • This article was originally published on The Conversation
    Ashley Madison David Glance EFF Electronic Frontier Foundation UCLA Health
    Share. Facebook Twitter LinkedIn WhatsApp Telegram Email
    Previous ArticleNeotel to give Vodacom ‘unfair advantage’
    Next Article 5 gadgets to smarten up your home

    Related Posts

    The NFT party is over

    30 June 2022

    The great crypto crash: the fallout, and what happens next

    22 June 2022

    Goodbye, Internet Explorer – you really won’t be missed

    19 June 2022
    Add A Comment

    Comments are closed.

    Promoted

    The MSP value proposition has evolved – here’s why it matters

    4 July 2022

    Presenting the cloud finance in South Africa survey with AWCape and Sage

    4 July 2022

    The Equiano cable has landed

    4 July 2022
    Opinion

    South Africa can no longer rely on Eskom alone

    4 July 2022

    Has South Africa’s advertising industry lost its way?

    21 June 2022

    Rob Lith: What Icasa’s spectrum auction means for SA companies

    13 June 2022

    Subscribe to Updates

    Get the best South African technology news and analysis delivered to your e-mail inbox every morning.

    © 2009 - 2022 NewsCentral Media

    Type above and press Enter to search. Press Esc to cancel.