• Create BookmarkCreate Bookmark
  • Create Note or TagCreate Note or Tag
  • PrintPrint
Share this Page URL
Help

Chapter 1. The Quest for Privacy in the ... > Case Study: Online Identity Search

Case Study: Online Identity Search

Debit and credit cards are currently the most convenient forms of purchase. Cybercash-type technologies have not yet made it into the mainstream of Internet technologies, although they eventually will. If all your bank account information is tied to a debit card, how easily can some malicious person gain that information? Let's break down what type of information the malicious attacker (for the rest of this book we will call him/her HackerX) needs to re-create your debit card information or gather every piece of information about you. The first piece of information used to track you down is your name. You might think this is the most important piece of information, but as we will see throughout the book, other information about you is even more important, and your name doesn't even factor into some methods of compromising your privacy.

So, HackerX uses your name to start finding out everything there is to know about you. Literally hundreds of online methods are available to find information about someone using her name. HackerX can be anyone trying to do this, from a credit card company checking your credit history to the system administrator who runs the computer network of your favorite online shopping site. It's pretty simple to gain all your pertinent information the old-fashioned way, by copying your credit card receipt at the checkout stand. However, the online world poses new forms of privacy risks that are far greater than a clerk simply copying your receipt.


PREVIEW

                                                                          

Not a subscriber?

Start A Free Trial


  
  • Creative Edge
  • Create BookmarkCreate Bookmark
  • Create Note or TagCreate Note or Tag
  • PrintPrint