Daily Bulletin


The Conversation

  • Written by The Conversation
imagePromiscuityFlickr/Capes Treasures, CC BY-NC-ND

If anybody is still labouring under the mistaken belief that anything online can remain private and secure, this week should have seen them finally admit defeat. In the US, UCLA Health reported ) that 4.5 million health records had been compromised. UCLA Health runs four hospitals and 150 hospitals in Southern California, based at the University of California and Los Angeles. The security breech joins a long list of recent hacks of health insurance, and health services, companies, including that of health insurance company Anthem that had up to 80 million customer records illegally accessed earlier this year.

More poignantly, and also this week, international dating site Ashley Madison admitted that hackers had accessed their systems and stolen details of their 37 million customers. The particular twist in this hack is that the site encouraged people in existing relationships to “cheat” on their partners and have casual affairs. Amongst information stolen by the hackers were details of customers’ sexual fantasies which the hackers threatened to publish if demands to close down the site completely were not met.

Companies who have been hacked normally follow up these events by announcing the increased security measures that they have taken, including hiring dedicated security staff. It is perhaps surprising that these companies didn’t believe that they needed these measures before they were forced to by someone breaking in. This comes despite organisations like the EFF warning that online dating sites weren’t implementing basic minimal security standards on their sites.

For the customers affected however, companies implementing security measures after the fact will bring little comfort, as they face the serious consequences of having financial and personal information leak into the criminal and public spheres.

As a consequence of these, and many other, large scale hacks of public and private organisations, it is fair to assume that any information that is provided online can, and will, eventually end up in the hands of cybercriminals. This has to lead to a rethink of how we are handling identity on the Internet and consequences for organisations that not only ask for inappropriate levels of detail about their customers but also fail to implement stringent security measures to guard against the loss of unencrypted data that they do hold.

Consumers can of course take steps themselves to limit the amount of information they provide when sites ask for it. This can extend from saying no to sites wanting to store credit card information for future use, through to providing a fake name and address when asked for contact details.

For shopping online, using services like PayPal, Apple Pay or Android Pay is that sites then don’t have to store any information about credit cards on their own systems. Using one of these services means that the site also doesn’t have to know the customer’s address and certainly there would be no reason to provide their real address.

Parcels can be delivered to parcel delivery points offered by a range of companies, again not using a home address.

Even disposable phone numbers can be bought from companies like France’s onoff app (there are equivalent services in most countries) so that a person’s actual phone number doesn’t have to be disclosed.

Likewise, disposable email addresses can also be used with sites.

The reality is, however, that most people will consider taking these steps too much effort and will just ignore the risks or live with them. Ultimately it will need the sites themselves to change how they do business. Alternatively, there would be a significant market for a new anonymising service to provide a way for customers to have a virtual profile that could be used on sites that only links back to a real identity for payment and delivery purposes. Of course, this would break a site’s ability to track users and serve advertising to them and so there will be a ongoing conflict of interest where companies strive for real names, and customers increasingly battle against providing them.

Authors: The Conversation

Read more http://theconversation.com/technolog-hack-of-dating-sites-signals-an-end-to-promiscuous-use-of-online-identity-45134

Writers Wanted

Burnt ancient nutshells reveal the story of climate change at Kakadu — now drier than ever before

arrow_forward

My favourite detective: Jules Maigret, the Paris detective with a pipe but no pretense

arrow_forward

Auf Wiedersehen, 'Mutti': How Angela Merkel’s centrist politics shaped Germany and Europe

arrow_forward

The Conversation
INTERWEBS DIGITAL AGENCY

Politics

Ray Hadley's interview with Scott Morrison

RAY HADLEY: Prime Minister, good morning.    PRIME MINISTER: G’day Ray.   HADLEY: I was just referring to this story from the Courier Mail, which you’ve probably caught up with today about t...

Ray Hadley & Scott Morrison - avatar Ray Hadley & Scott Morrison

Prime Minister's Remarks to Joint Party Room

PRIME MINISTER: Well, it is great to be back in the party room, the joint party room. It’s great to have everybody back here. It’s great to officially welcome Garth who joins us. Welcome, Garth...

Scott Morrison - avatar Scott Morrison

Prime Minister Interview with Ben Fordham, 2GB

BEN FORDHAM: Scott Morrison, good morning to you.    PRIME MINISTER: Good morning, Ben. How are you?    FORDHAM: Good. How many days have you got to go?   PRIME MINISTER: I've got another we...

Scott Morrison - avatar Scott Morrison

Business News

Tips to find the best plastic manufacturing supplier for your needs

Plastics are very much an important part of all of our lives, but they’re particularly valuable to a wide variety of industries that rely on their production for their operations. The industries, ...

News Co - avatar News Co

7 foolproof tips for bidding successfully at a property auction

Auctions can be beneficial for prospective buyers, as they are transparent and fair. If you reach the limit you are willing to pay, you can simply walk away. Another benefit of an auction is tha...

Dominique Grubisa - avatar Dominique Grubisa

Getting Ready to Code? These Popular and Easy Programming Languages Can Get You Started

According to HOLP (History Encyclopedia of Programing Languages), there are more than 8,000 programming languages, some dating as far back as the 18th century. Although there might be as many pr...

News Co - avatar News Co



News Co Media Group

Content & Technology Connecting Global Audiences

More Information - Less Opinion