privacy

Flex: Accessing MXML from class

I have a class that I instantiate at creation complete: public var catalog : AppCollection = new AppCollection (catalogStrip); CatalogStrip is an HBox. In this class, I create a VBox and add it as a child to catalogStrip. Here is the constructor for said class: public function AppCollection (_container : HBox) { this.container =...

How to anonymize new log records without breaking relations between old and new data?

I am generating log records about user actions. For privacy reasons, these need to be anonymized after N days. However, I also need to run reports against this anonymized data. I want all actions by real user A to be listed under fake user X in the anonymized logs - records of one user must still remain records of one (fake) user in the...

Creating cookie onunload (even after deleting browser cache)

Is it possible to create a cookie after a user has deleted his/her browser cache (+cookies) entirely? E.g. Predefined variables loaded into memory var userID = 1337; var IP = 222.222.222.222; var trackingUID = 'LaughingAtDancingFooBars'; If the above method of storing the data doesnt work, perhaps storing the data inside the document...

Security risk when store private data.

I have to handle some sensitive data in my application, such as passwords, credit card information, etc. What are possible security risks I could have and how can I avoid them? ...

Removing all swap files?

Many programs have created a huge amount of swap files. They annoy me, because some of them contain sensitive information. How should I deal with them? Is this command a good idea: find . -iname "*swp*" -exec rm '{}' \; How should good programs handle their swap files? ...

Does Git publicly expose my e-mail address?

The guides I've read so far on Git say that I should go into the config and specify my name and my e-mail address. They don't elaborate; they just say to do it. Why does Git need my e-mail address? And, more importantly, if I make my repo publicly available, via GitHub for example, will my e-mail address be visible to everyone (includin...

Is there standard file names for Terms of Use / Privacy Policy?

Are there standard file names for Terms of Use and Privacy Policies? For some reason, I remember that Internet Explorer and possibly other browsers used to look for them on the current website, and display a little warning icon... ...

How to prove to our users that they are not being cheated?

I have an information theory question about how to prove (or at least give statistical evidence) that an auction website is not shilling its users. We recently launched a pay-per-bid auction website. It is a new type of auction where the users pay to bid on timed auctions. Each bid raises the price and increases the time of the auction...

Google analytics, privacy and latency

Hi, I'm considering putting the Google Analytics tracker on my blog to get better stats (right now I use Summary.net, which is fast but occasionally of questionable accuracy, though way better than awstats). At any rate I have 2 big concerns and though I should ask the community here for opinions: Privacy. In the past I've gone so far...

Practical applications of homomorphic encryption algorithms?

It appears there there were interesting things going on in cryptography: the first homomorphic encryption scheme appeared recently (explanation, HT). Roughly speaking, it is a way of encoding x into f(x) such that you can compute f(x+y) easily knowing f(x) and f(y) even though you can't easily restore x and y (and same for f(x*y)). What...

How could one keep a DOB field private when displaying the user's age in years?

How would one keep a DOB field private from others if it is used to display the users age? For example, how is stackoverflow Birthday field kept private from other users? When is the display field Age changed? Is it changed just on the first of each month or randomly within an random range of Birthday? Or maybe just at the first of each ...

How to implement a secure distributed social network?

I'm interested in how you would approach implementing a BitTorrent-like social network. It might have a central server, but it must be able to run in a peer-to-peer manner, without communication to it: If a whole region's network is disconnected from the internet, it should be able to pass updates from users inside the region to each o...

Is there a way to hide your e-mail address on Google Code projects?

One thing that really bothers me about Google Code is that fact that it puts your Google username up on your projects for the world to view. While it doesn't put the @gmail.com part after the name, it doesn't take a genius spammer to concatenate the part with your user name. Is there any way to hide or obscure your Google username on Go...

How can I auto-generate unique fake names for users?

We would like to give each of users an alias so that we can refer to them in discussions while protecting their identity. These aliases should be unique. The easy way would be to simply use a SERIAL column, but ints aren't memorable. We would like to use real people names so that we can remember the aliases. The other easy way would be...

HTTP Request Log - unique visitors without ip

How can i log Requests to get unique visitors of my webpage but without saving his ip? Hashing? ...

Hiding sensitive/confidential information in log files

How would you go about hiding sensitive information from going into log files? Yes, you can consciously choose not to log sensitive bits of information in the first place, but there can be general cases where you blindly log error messages upon failures or trace messages while investigating a problem etc. and end up with sensitive inform...

Is there a unique ID for each iPhone / iPod Touch?

Hey, Is there a unique ID like the mac address for each iPhone / iPod Touch? Do I have to ask the user for permissions to transmit such a unique id? ...

robots.txt to restrict search engines indexing specified keywords for privacy

I have a large directory of individual names along with generic publicaly available and category specific information that I want indexed as much as possible in search engines. Listing these names on the site itself is not a concern to people but some don't want to be in search results when they "Google" themselves. We want to continue ...

How can I protect my Assembly to being used by someother?

how can I protect my assembly, because once I deploy the setup, assembly will be deployed too, and there are chances that user will get the assembly from Program Files, and may add reference to any other project or create new project based on it ! any solution or help would be appreciated thanks. ...

How Big a Security Risk are Browser Extensions?

One of the more powerful features of modern day browsers is the ability for software developers to write browser extensions to enhance, modify and tweak the pages visited by the user. As more of our lives migrate onto the browser, aren't we potentially exposing ourselves to a massive privacy and security holes created by the installatio...