The Path to Privacy
The path your information follows as you use various technologies leaves many points of access open to information compromise. On the Internet, submitting your information to a Web site, such as when applying for a brokerage account, sends your information through a variety of public channels. All along the way, system administrators or hackers can track down and even watch your information. When you use your wireless laptop to connect to your office, anyone in your vicinity can attempt to capture your wireless traffic and hack into your wireless network with your information. All your data being stored along these access paths will linger for years and be accessible by many people. Different companies have different strategies ...
Get Privacy Defended: Protecting Yourself Online now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.