Best of the Week
Most Popular
1.Gold Price Target of USD 2,300 - GoldCore
2.Greece Banking System Collapse Monday as ECB Pulls the Plug, Capital Controls Ahead of GrExit - Nadeem_Walayat
3.Why British Muslims Are Leaving Elysium Paradise for Syrian Hell - Nadeem_Walayat
4.Greece BANKRUPT! Financial and Economic Collapse to Follow IMF Debt Default - Nadeem_Walayat
5.Extreme Gold/Silver Shorting - Zeal_LLC
6.European Empire Strikes Back Against Greek Debt Fantasy, Counting Down to GREXIT - Nadeem_Walayat
7.Gold And Silver – Three Choices: Sell, Hold, Hold and Add. A Trading Treatise - Michael_Noonan
8.Gold and Silver Price Headed for Breakdown - Jordan_Roy_Byrne
9.Greece Crisis OXI - Raul_I_Meijer
10.Flatline Investing and Dead End Debt Schemes - Doug_Wakefield
Last 5 days
Financial and Commodity Markets Become Scary: Crash Point Or Turning Point - 5th July 15
A Revolutionary Pope Calls for Rethinking the Outdated Criteria That Rule the World - 5th July 15
Forget 'Haircut', Instead Syriza Plans Beheading of Greek Bank Depositors, Theft of Deposits - 5th July 15
The Pentagon’s 2015 Strategy For Ruling the World Through Endless War - 5th July 15
United States Celebrates the Disastrous Secession From Great Britain - 5th July 15
Greece Referendum Vote Result Forecast Yes Win, But Depression Will Continue - 5th July 15
The Great Greek Economic Depression - 4th July 15
Happy 4th of July Stock Market Analysis - 4th July 15
The Most Pressing Reason Yet You Want to Avoid Investing in Retail Stocks - 4th July 15
Fed’s Full Normalization and the Stock Market - 3rd July 15
The U.S. Dollar's 2014-2015 Rally: Wave 3 in Action - 3rd July 15
Stock Market Where are we? And where are we Going? - 3rd July 15
Xi’s Anti-Corruption Campaign Is Key to China’s Prospects - 3rd July 15
How the New Iranian Nuclear Deal Will Impact Crude Oil - 3rd July 15
China's Stock Market Rollercoaster Ride Continues - 3rd July 15
Gold Stocks Cheap to Buy but Not for Long - 3rd July 15
Capital Controls and a Bank Holiday in Greece… Here’s How You Can Profit - 3rd July 15
Greece's Varoufakis: I will Resign if there's a 'Yes' Vote - 2nd July 15
The Student Loan Bubble: Gambling with America’s Future - 2nd July 15
Inflation Is Lurking, but This Asset Can Protect You - 2nd July 15
Three Total Wealth Stock Investor Tactics You’ll Need Because Greece Isn’t Over - 2nd July 15
Why This $5.6 Trillion Investor Profit Boom Is Set To Take Off - 2nd July 15
Greek Debt Crisis: "Too late to prepare now" - Video - 2nd July 15
Guaranteed US Dollar Death Dynamics - 2nd July 15
The Greek Stress Test & The Reality Of Incremental Changes - 2nd July 15
Forget Drachmas Greece Syriza Government Could Instruct Central Bank to Print Euros! - 2nd July 15
Greece Debt Crisis Trigger for Stock Market Crash or Bull Rally? Video - 1st July 15
Gold Stocks Break Below 2008 Low - 1st July 15
SPX Stock Market Retracement May be Over - 1st July 15
Silver Tunnel Vision 'Experts' - 1st July 15
Gold And Silver - Monthly, Quarterly Ending Analysis - 1st July 15
Europe’s Controlled Demolition - 1st July 15
The End of Dow 18,000; Bailouts No Longer Extended  - 1st July 15
Athens Mayor: Greek Government Should Resign - 1st July 15
China Stocks - This Is What a Bubble Looks Like - 30th June 15
Stocks Plunge on Greece Euro-Zone Financial Armageddon Blackmail - 30th June 15
Greece Crisis Shows Importance of Gold as Europeans Buy Coins and Bars - 30th June 15
Stock Investors Express Route to Profits in the Healthcare Sector - 30th June 15
Beyond the Greek Impasse - 30th June 15
Gold GDXJ : Impulse Move Pending - 30th June 15
Fed Interest Rate Increase Could Be Best Thing to Happen to Gold - 30th June 15
Marc Faber - Greece is Basically Bankrupt - 30th June 15

Free Instant Analysis

Free Instant Technical Analysis


Market Oracle FREE Newsletter

China Stocks - Where are they going?

The Government's Most Dangerous Threat to Your Privacy

Politics / US Politics Dec 26, 2012 - 12:57 AM GMT

By: DailyWealth

Politics

Three powerful forces have come together to dismantle the privacy of U.S. citizens...

First, government programs and regulations have formed the foundation of a massive tracking grid for all individuals. It has passed laws that give it sweeping "snooping" authority... It can now legally peer deeper into our daily lives than ever before.


Second, corporations collect huge amounts of our personal data to aid in marketing. The government can also force them to hand over customer records. In essence, banks, Internet service providers, airlines, car-rental agencies, cell-phone companies, and more have become proxy agents of the government's domestic intelligence apparatus.

Third, we live in a hyper-connected technological age... Smartphones, "cloud" computing, and credit cards have made it easier than ever to rob someone's resources... even his or her identity. This provides unprecedented opportunity for crooks to use your data against you.

This "new" America is a dangerous place. But there are simple steps you can take to protect yourself and your family. I'll share several with you today...

In a recent Wired article, one of the magazine's senior writers described how a hacker "dissolved" his online data:

In the space of one hour, my entire digital life was destroyed. First my Google account was taken over, then deleted. Next my Twitter account was compromised, and used as a platform to broadcast racist and homophobic messages. And worst of all, my AppleID account was broken into, and my hackers used it to remotely erase all of the data on my iPhone, iPad, and MacBook.

Among the casualties in this "digital massacre" was every digital photo he had of his newborn daughter's first year of life.

The hacker exploited a weakness in Apple's security measures. But as the writer discovered, he could have prevented the worst of the damage...

The No. 1 way people's accounts are hacked has nothing to do with the actual password. It has everything to do with the password "recovery tools." These are systems e-mail providers and online stores have in place to help you if you've forgotten your password.

It turns out, every day, folks are providing hackers an easy way to exploit these recovery tools... They're signing credit-card receipts.

Credit card receipts "X out" all but the last four digits of your credit card number. You may think this provides a strong degree of security. Think again. In Apple's case, the recovery tools require the last four digits of the credit card linked to the account and the account holder's billing address.

Addresses are easily attainable via public record searches. Combine this with the last four digits of a credit card and voila, you have taken over access to someone's AppleID. And it's not just Apple that works like this... any number of corporations have similar programs.

But there is a solution...

From now on, whenever you use your credit card, always black out the last four digits on your receipt. Do this on the business copy as well as your own. If anyone hassles you, explain you have a legal right to do so. The digital transaction has already occurred... you are just keeping your personal data private.

Another major weakness in password "recovery tools" is the "security questions." These are often mundane questions like "What town were you born in?" or "What is your mother's maiden name?"

A simple search of public records and social networking sites (like Facebook) should yield these answers. At the very least, it will give a hacker a short list from which to deduce the correct answers.

But there is a solution...

Do NOT supply answers to these easily identifiable questions.

If you're given the option to choose your own recovery question, make it a tough one. Make it nonsensical. Make it something that only you would know. And if you have no choice but to use the stock questions provided, give false answers.

For example, if the question asks for your mother's maiden name, make up a name like "MacSmithowitz." Keep the answers written down on paper (never in digital form), in a secure location that only you can access.

Finally, the biggest "recovery tool" weakness is your primary e-mail account. That's because on the Internet, all "roads" lead to your e-mail address. It's the nexus of your online environment.

A hacker with access to your e-mail can immediately gain access to your other accounts by resetting their passwords. (The confirmation e-mails for these are sent to your primary account, which he now has control over.)

He can also change the password and shut you out from it... peruse financial data and gain partial account numbers, like the last four digits of your credit card and Social Security numbers... rummage through all your private data, including photos, videos, and more... gain access to your cloud-based files and devices... and delete things of value to you.

This is exactly what happened to the Wired writer.

But there is a solution...

First, NEVER "daisy chain" your passwords. This means do NOT use the same password for every account you own. A compromise of one means a compromise of all.

Also, NEVER select "remember me" or "keep me signed in" on your e-mail website. (This allows others who use the same computer to access your e-mail without needing a password at all.)

And if it's offered, ALWAYS use "two-factor" authentication. For example, in order to log in, you might need your password plus a code sent to an alternate e-mail or mobile device that is associated with your account.

All these steps may take a little extra time and effort. But think about it this way... Let's say you own a rare, jeweled necklace. Would you leave this out on a table in your front yard, just so others could admire its beauty? Or would you take steps to keep it safe?

In the modern age, your personal information is more valuable than exquisite jewelry. And the strategies I showed you today are a few easy ways to keep it safe. You should put them into practice immediately.

Here's to our health, wealth, and a great retirement,

Dr. David Eifrig

P.S. This is just a small sampling of the privacy techniques I've been researching recently. I've also figured out a way to make sure no one can track what you are doing online, for example. And I even learned a very clever trick supposedly used by terrorists and cheating spouses to send messages that can never be traced, even if someone has access to your e-mail account. To learn more of these techniques, see my full presentation here.

http://www.dailywealth.com

The DailyWealth Investment Philosophy: In a nutshell, my investment philosophy is this: Buy things of extraordinary value at a time when nobody else wants them. Then sell when people are willing to pay any price. You see, at DailyWealth, we believe most investors take way too much risk. Our mission is to show you how to avoid risky investments, and how to avoid what the average investor is doing. I believe that you can make a lot of money – and do it safely – by simply doing the opposite of what is most popular.

Customer Service: 1-888-261-2693 – Copyright 2011 Stansberry & Associates Investment Research. All Rights Reserved. Protected by copyright laws of the United States and international treaties. This e-letter may only be used pursuant to the subscription agreement and any reproduction, copying, or redistribution (electronic or otherwise, including on the world wide web), in whole or in part, is strictly prohibited without the express written permission of Stansberry & Associates Investment Research, LLC. 1217 Saint Paul Street, Baltimore MD 21202

Disclaimer: The above is a matter of opinion provided for general information purposes only and is not intended as investment advice. Information and analysis above are derived from sources and utilising methods believed to be reliable, but we cannot accept responsibility for any losses you may incur as a result of this analysis. Individuals should consult with their personal financial advisors.

Daily Wealth Archive

© 2005-2015 http://www.MarketOracle.co.uk - The Market Oracle is a FREE Daily Financial Markets Analysis & Forecasting online publication.


Post Comment

Only logged in users are allowed to post comments. Register/ Log in

Biggest Debt Bomb in History