Your private information is probably being sold on the dark web

Welcome to the Precious Metals Bug Forums

Welcome to the PMBug forums - a watering hole for folks interested in gold, silver, precious metals, sound money, investing, market and economic news, central bank monetary policies, politics and more. You can visit the forum page to see the list of forum nodes (categories/rooms) for topics.

Why not register an account and join the discussions? When you register an account and log in, you may enjoy additional benefits including no Google ads, market data/charts, access to trade/barter with the community and much more. Registering an account is free - you have nothing to lose!

searcher

morning
Moderator
Benefactor
Messages
12,425
Reaction score
2,652
Points
238

Your private information is probably being sold on the dark web. How can criminals use it?​

Late last year, a well-known ride share app and a gaming company were hacked using well-crafted social engineering attacks. Many organizations think they’re safe from attacks by employing top-of-the-line security practices, tools and systems. Those will help deter many types of attacks, but social engineering is a stealthy method savvy threat actors can use to circumvent those measures.

And they obviously do it successfully.

 
Number Six: What do you want?
Number Two: Information.
Number Six: Whose side are you on?
Number Two: That would be telling. We want information… information… information.
Number Six: You won't get it.
Number Two: By hook or by crook, we will.
 
It's already happened, and long ago. I was a victim of Identity Theft, and my IDs were used to buy cellular phones in Florida. Back before they became a commodity...it was a regional company (remember THOSE?) and several thousands of dollars run up in unpaid bills.

Since then I've had my credit on lockdown. I've never put any of my ID on a smartphone. I never bought anything on a smartphone or using a public-access computer.

And I use a separate browser when handling ID functions or money. Never for anything else...so, with the browser not running, there's little way thieves can go in and steal.

That, and that I use Linux...
 
For as little as $0.12 per record, data brokers in the US are selling sensitive private data about active-duty military members and veterans, including their names, home addresses, geolocation, net worth, and religion, and information about their children and health conditions.

In a unsettling study published on Monday, researchers from Duke University approached 12 data brokers in the US and asked what would be necessary to buy this kind of information; they ultimately purchased thousands of records about American service members, finding that many brokers offered to sell the data with minimal vetting and were willing to deal with buyers using email domains based in both the US and Asia.

 
It's already happened, and long ago. I was a victim of Identity Theft, and my IDs were used to buy cellular phones in Florida. Back before they became a commodity...it was a regional company (remember THOSE?) and several thousands of dollars run up in unpaid bills.

Since then I've had my credit on lockdown. I've never put any of my ID on a smartphone. I never bought anything on a smartphone or using a public-access computer.

And I use a separate browser when handling ID functions or money. Never for anything else...so, with the browser not running, there's little way thieves can go in and steal.

That, and that I use Linux...
Exact same thing happened to me. My credit is still locked down and have no banking apps on my phone.
 

US and Europe try to tame surveillance capitalism​

The US Federal Trade Commission on Monday warned that data brokers need to rethink how they define sensitive data in light of recent enforcement actions involving antivirus vendor Avast, and location data providers X-Mode and InMarket. Europe too is moving in this area and crackdowns move around the world.

The US trade watchdog has decided that browsing and location data should be considered sensitive, and that – despite the absence of allegations about personally identifiable information (PII) within the datasets of the above businesses – what makes this stuff sensitive is what can be inferred from it.

"Years of research shows that datasets often contain sensitive and personally identifiable information even when they do not contain any traditional standalone elements of PII, and re-identification gets easier every day – especially for datasets with the precision of those at issue in the FTC's proposed complaints against Avast, X-Mode, and InMarket," the commission declared.

Two weeks ago, the agency resolved its complaint against security vendor Avast for $16.5 million based on allegations that the firm used a "a unique and persistent device identifier" with its Jumpshot analytics business to track internet users' activities – including "each webpage visited, precise timestamp, the type of device and browser, and the city, state, and country."

Despite the crackdown, data brokers continue to sell advertising data that threatens people's privacy.

More:

 

Here's How the CIA Plans To Use Your Ad Tracking Data​

For years, the U.S. government has bought information on private citizens from commercial data brokers. Now, for the first time ever, American spymasters are admitting that this data is sensitive—but they're leaving it up to the spy agencies on how to use it.

Last week, Director of National Intelligence (DNI) Avril Haines released a "Policy Framework for Commercially Available Information." Her office oversees 18 agencies in the "intelligence community," including the CIA, the FBI, the National Security Agency (NSA), and all military intelligence branches.

In the 2018 case Carpenter v. United States, the Supreme Court ruled that police need a warrant to obtain mobile phone location data from phone companies. (During the case, the Reason Foundation filed an amicus brief against warrantless snooping.) As a workaround, the feds instead started buying data from third-party brokers.

More:

 
Back
Top Bottom