Close Menu
TechCentralTechCentral

    Subscribe to the newsletter

    Get the best South African technology news and analysis delivered to your e-mail inbox every morning.

    Facebook X (Twitter) YouTube LinkedIn
    WhatsApp Facebook X (Twitter) LinkedIn YouTube
    TechCentralTechCentral
    • News

      Boom gates go hi-tech at South African malls

      17 July 2025

      Megayachts and mansions: the lavish life of 80-year-old Larry Ellison

      17 July 2025

      Mobile money lifts Africa savings to decade high

      17 July 2025

      South Africa loosens media ownership rules – but keeps one hand on the remote

      16 July 2025

      Eskom targets 32GW green energy shift by 2040

      16 July 2025
    • World

      Grok 4 arrives with bold claims and fresh controversy

      10 July 2025

      Samsung’s bet on folding phones faces major test

      10 July 2025

      Bitcoin pushes higher into record territory

      10 July 2025

      OpenAI to launch web browser in direct challenge to Google Chrome

      10 July 2025

      Cupertino vs Brussels: Apple challenges Big Tech crackdown

      7 July 2025
    • In-depth

      The 1940s visionary who imagined the Information Age

      14 July 2025

      MultiChoice is working on a wholesale overhaul of DStv

      10 July 2025

      Siemens is battling Big Tech for AI supremacy in factories

      24 June 2025

      The algorithm will sing now: why musicians should be worried about AI

      20 June 2025

      Meta bets $72-billion on AI – and investors love it

      17 June 2025
    • TCS

      TCS+ | Samsung unveils significant new safety feature for Galaxy A-series phones

      16 July 2025

      TCS+ | MVNX on the opportunities in South Africa’s booming MVNO market

      11 July 2025

      TCS | Connecting Saffas – Renier Lombard on The Lekker Network

      7 July 2025

      TechCentral Nexus S0E4: Takealot’s big Post Office jobs plan

      4 July 2025

      TCS | Tech, townships and tenacity: Spar’s plan to win with Spar2U

      3 July 2025
    • Opinion

      A smarter approach to digital transformation in ICT distribution

      15 July 2025

      In defence of equity alternatives for BEE

      30 June 2025

      E-commerce in ICT distribution: enabler or disruptor?

      30 June 2025

      South Africa pioneered drone laws a decade ago – now it must catch up

      17 June 2025

      AI and the future of ICT distribution

      16 June 2025
    • Company Hubs
      • Africa Data Centres
      • AfriGIS
      • Altron Digital Business
      • Altron Document Solutions
      • Altron Group
      • Arctic Wolf
      • AvertITD
      • Braintree
      • CallMiner
      • CambriLearn
      • CYBER1 Solutions
      • Digicloud Africa
      • Digimune
      • Domains.co.za
      • ESET
      • Euphoria Telecom
      • Incredible Business
      • iONLINE
      • Iris Network Systems
      • LSD Open
      • NEC XON
      • Network Platforms
      • Next DLP
      • Ovations
      • Paracon
      • Paratus
      • Q-KON
      • SevenC
      • SkyWire
      • Solid8 Technologies
      • Telit Cinterion
      • Tenable
      • Vertiv
      • Videri Digital
      • Wipro
      • Workday
    • Sections
      • AI and machine learning
      • Banking
      • Broadcasting and Media
      • Cloud services
      • Contact centres and CX
      • Cryptocurrencies
      • Education and skills
      • Electronics and hardware
      • Energy and sustainability
      • Enterprise software
      • Fintech
      • Information security
      • Internet and connectivity
      • Internet of Things
      • Investment
      • IT services
      • Lifestyle
      • Motoring
      • Public sector
      • Retail and e-commerce
      • Science
      • SMEs and start-ups
      • Social media
      • Talent and leadership
      • Telecoms
    • Events
    • Advertise
    TechCentralTechCentral
    Home » In-depth » Time users protected their identity online

    Time users protected their identity online

    By The Conversation24 July 2015
    Twitter LinkedIn Facebook WhatsApp Email Telegram Copy Link
    News Alerts
    WhatsApp

    hacker-640

    If anybody is still labouring under the mistaken belief that anything online can remain private and secure, this week should have seen them finally admit defeat. In the US, UCLA Health reported that 4,5m health records had been compromised. UCLA Health runs four hospitals and 150 offices in Southern California, based at the University of California in Los Angeles.

    The security breach joins a long list of recent hacks of health insurance, and health services, companies, including that of health insurance company Anthem that had up to 80m customer records illegally accessed earlier this year.

    More poignantly, and also this week, international dating site Ashley Madison admitted that hackers had accessed its systems and stolen details of its 37m customers. The particular twist in this hack is that the site encouraged people in existing relationships to “cheat” on their partners and have casual affairs. Among information stolen by the hackers were details of customers’ sexual fantasies, which the hackers threatened to publish if demands to close down the site completely were not met.

    Companies that have been hacked normally follow up these events by announcing the increased security measures that they have taken, including hiring dedicated security staff. It is perhaps surprising that these companies didn’t believe that they needed these measures before they were forced to by someone breaking in. This comes despite organisations like the Electronic Frontier Foundation warning that online dating sites weren’t implementing basic minimal security standards on their sites.

    For the customers affected, however, companies implementing security measures after the fact will bring little comfort, as they face the serious consequences of having financial and personal information leak into the criminal and public spheres.

    As a consequence of these and many other large scale hacks of public and private organisations, it is fair to assume that any information that is provided online can, and will, eventually end up in the hands of cybercriminals. This has to lead to a rethink of how we are handling identity on the Internet and consequences for organisations that not only ask for inappropriate levels of detail about their customers, but also fail to implement stringent security measures to guard against the loss of unencrypted data that they do hold.

    Consumers can, of course, take steps themselves to limit the amount of information they provide when sites ask for it. This can extend from saying “no” to sites wanting to store credit card information for future use, through to providing a fake name and address when asked for contact details.

    For shopping online, the benefit of using services like PayPal, Apple Pay or Android Pay is that sites don’t store any information about credit cards on their own systems. Using one of these services means that the site also doesn’t have to know the customer’s address, and certainly there would be no reason to provide their real address.

    Parcels can be delivered to parcel delivery points offered by a range of companies, again not using a home address.

    Even disposable phone numbers can be bought from companies like France’s onoff app (there are equivalent services in most countries) so that a person’s actual phone number doesn’t have to be disclosed.

    Likewise, disposable e-mail addresses can also be used with sites.

    The reality is, though, that most people will consider taking these steps too much effort and will just ignore the risks or live with them. Ultimately, it will need the sites themselves to change how they do business.

    Alternatively, there would be a significant market for a new anonymising service to provide a way for customers to have a virtual profile that could be used on sites that only links back to a real identity for payment and delivery purposes. Of course, this would break a site’s ability to track users and serve advertising to them and so there will be a ongoing conflict of interest where companies strive for real names, and customers increasingly battle against providing them.The Conversation

    • David Glance is director of UWA Centre for Software Practice at the University of Western Australia
    • This article was originally published on The Conversation


    Ashley Madison David Glance EFF Electronic Frontier Foundation UCLA Health
    Subscribe to TechCentral Subscribe to TechCentral
    Share. Facebook Twitter LinkedIn WhatsApp Telegram Email Copy Link
    Previous ArticleNeotel to give Vodacom ‘unfair advantage’
    Next Article 5 gadgets to smarten up your home

    Related Posts

    Elon Musk dares the world to take on X

    7 September 2024

    Google will stop sharing user location data with police

    18 December 2023

    Apps that use AI to undress women in photos soaring in use

    8 December 2023
    Company News

    Ransomware in South Africa: the human factor behind the growing crisis

    16 July 2025

    Mental wellness at scale: how Mac fuels October Health’s mission

    15 July 2025

    Banking on LEO: Q-KON transforms financial services connectivity

    14 July 2025
    Opinion

    A smarter approach to digital transformation in ICT distribution

    15 July 2025

    In defence of equity alternatives for BEE

    30 June 2025

    E-commerce in ICT distribution: enabler or disruptor?

    30 June 2025

    Subscribe to Updates

    Get the best South African technology news and analysis delivered to your e-mail inbox every morning.

    © 2009 - 2025 NewsCentral Media

    Type above and press Enter to search. Press Esc to cancel.