If I’m not doing anything wrong, then you have no cause to watch me. Or does watching people gets you (and Cheney) off…[/quote]tsk tsk tsk…such a repugnant reply. Personal insults seem to be the extant of your discussion abilities. Reasoning and logic combined with a sense of situational awareness is obviously outside your realm. More’s the pity.[/quote]
I was going to reply to this originally, but you (TC) didn’t write enough for me to be sure that was your “official” stance, so I opted out. I think people do/should have something to worry about.
You’re correct that a person doesn’t need to worry about their house being raided if their not doing anything wrong. The thing I think people should be worried about is WHO has access to all this information and WHAT is it exactly that they will do with it. Even if the WHO and the WHAT is something that is totally agreeable and for the good of the human race, what happens when the WRONG people get their hands on this information (which always happens.)
Credit fraud and identity theft are good examples of information collect for one use gone bad. If you do a little reading about Social Engineering/Human Hacking, it gets scary to think about what can be done to most people with a little personal information about them.
[quote=“securityfocus.com”]A True Story
One morning a few years back, a group of strangers walked into a large shipping firm and walked out with access to the firm’s entire corporate network. How did they do it? By obtaining small amounts of access, bit by bit, from a number of different employees in that firm. First, they did research about the company for two days before even attempting to set foot on the premises. For example, they learned key employees’ names by calling HR. Next, they pretended to lose their key to the front door, and a man let them in. Then they “lost” their identity badges when entering the third floor secured area, smiled, and a friendly employee opened the door for them.
The strangers knew the CFO was out of town, so they were able to enter his office and obtain financial data off his unlocked computer. They dug through the corporate trash, finding all kinds of useful documents. They asked a janitor for a garbage pail in which to place their contents and carried all of this data out of the building in their hands. The strangers had studied the CFO’s voice, so they were able to phone, pretending to be the CFO, in a rush, desperately in need of his network password. From there, they used regular technical hacking tools to gain super-user access into the system.
[Continue article here][/quote]
People with access to the kind of information that can/will be collected from the Internet by scanning emails/phone calls/surfing habits/etc. will have “a key to all doors” (yours too.) Assuming that key stayed in the “right hands” I suppose that wouldn’t be so bad, but keys like that never stay in the right hands. I don’t think right hands exist for keys like that (copious amounts of personal information.)