Posted by Nick Clarke 3 on 24/10/2022 10:31:12:
…
I am a little bemused sometimes regarding the 'privacy' issue as … there is no information I would really be worried about anyone else seeing on the computer. …
No sensitive information such as passwords or card details is stored on the computer.
Others may have a philosophical objection to non-sensitive information being seen by others – but personally if they can do no harm with it, I just get on with life.
…
Not a philosophical objection in my case Nick, it's based on a career in IT that included several years in and around computer security.
For example how do you know that no sensitive information is stored on your computer? You may not have put it there yourself, but the computer runs programs that store data and websites store cookies on your machine that might include login information. And much else besides.
I first became aware of the possibilities when asked as a junior programmer if I could analyse the data held on my employers mainframe computer to help pin down where a type of stock was going missing. I wrote a program that reviewed 5 years worth of transactions – millions of them – and was able to show that it, and other items not previously suspected, were going missing from particular warehouse (out of nearly 20) and at particular dates. From the dates the police were able to identify an individual, who went to jail after a conventional enquiry confirmed he was a wrong 'un. To this day I doubt he knows that he was caught because a computer correlated 5 years worth of data and picked his discreet thieving out of a very busy data-set. Far too time-consuming and labour intensive to do manually and the computer did it in about half an hour. He'd been careful and thought he was anonymous. He wasn't. By modern standards the mainframe I used was a joke – the same job could be done today on an ordinary laptop in about 20 seconds.
The bad guys work in a similar way. They collect and analyse data too, also over long periods. They look for the weaklings in the herd rather than juicy individuals. A computer with poor security is always worth investigating and even if completely clean on entry can be used as a springboard. Turning on the webcam and microphone; installing a key logger; or using the machine and it's network connection to host porn or distribute spam. Worst risk of all I think is collecting enough personal data to to pull off an identity theft or run a convincing major con-trick.
Most bother can be circumvented by taking reasonable precautions, for example on the forum I use a pseudonym rather than my real name and avoid leaking personal data in posts. A number of forum members know who I really am, but it's not easy (I hope) for an outsider to get my name and address by scanning the forum. Thus I avoid unwanted adverts, and perhaps a visit from a ne'er do well who's identified my workshop as a valuable source of scrap metal!
The more I learned about computer security the more I realised that hackers can be seriously clever. It pays not to leave obvious loop-holes for them to exploit, and the loop-hole could be on your machine, or Microsoft's, or |Facebook's, or any of the others who collect data for sale, or might be hacked themselves. I certainly don't what to be hacked by a 'Script Kiddy', that is an individual who knows how to probe with certain software tools, but isn't talented enough to come up with an original exploit.
For the same reason I try hard not to leave my keys lying on the drive, and don't hide them under the door mat!
Dave