Please create an account to participate in the Slashdot moderation system

 



Forgot your password?
typodupeerror
×
Privacy Your Rights Online

Which ISPs Are Spying On You? 160

firesquirt sends us an article from Wired about a survey they conducted to determine major ISPs' data retention and other privacy practices. Over a period of two months, four national ISPs would not give Wired the time of day; and another four answered some of their questions in a fashion not altogether reassuring.
This discussion has been archived. No new comments can be posted.

Which ISPs Are Spying On You?

Comments Filter:
  • Re:All of them (Score:5, Insightful)

    by froggero1 ( 848930 ) on Monday June 11, 2007 @07:34PM (#19472193)
    All of them (in the world) have the potential to spy on you. But in the US, thanks to government privacy lobbyists, we get the privilidge of full disclosure and an open forum to debate what privacy we'd like to see from a government.
  • Noisy clickstream (Score:5, Insightful)

    by mstrcat ( 517519 ) * on Monday June 11, 2007 @07:42PM (#19472265)
    Here's an idea: Develop a web browser extention that does a random web crawl. I don't mind letting my ISP sell marketeers, give to the government, keep on file, ect a clickstream that is 99% chaff and 1% my actuall surfing. Yes, I realize that if someone puts in enough effort and analysis, they could probably sift out the false signal, but it's that very effort that makes it cost prohibitive to do it across a broad scale. And of course there is always the defense: I didn't visit that web site, my computer constantly does a random walk of the internet. And to help keep the ISPs in line, it ups the volume of records they have to keep by 500 fold.
            As for the other things such as IM's, emails, torrents, ect I can encrypt those should I feel the need. Yes, I could start using TOR, but it's slow and watching a web crawler do a random walk can be entertainment all by itself.
  • by planckscale ( 579258 ) on Monday June 11, 2007 @07:43PM (#19472277) Journal
    So ultimately the ISP's are afraid they'll be fined or shut down due to the negligence of the users and/or refusing to submit evidence? I just don't understand how a user's nefarious actions could be blamed on the ISP...

    I would think all they need to do is show they warned their users they are 1. being watched 2. downloading illegal data. Actually providing the authorities with a history of the data is not their job and should only be the acquired by the authorities with their own equipment and only under a court order.

    At the least the ISP's should give their users the ability to opt-out of their "data retention" programs.

  • ....the US, Great Britain, Australia, Ireland, etc, etc...

    The net is being reined in by those who don't like it. There's little anyone who cares can do to stop it.
  • Re:That's easy (Score:5, Insightful)

    by SeaFox ( 739806 ) on Monday June 11, 2007 @07:57PM (#19472421)

    Even easier if you live in the US...it's your own government.

    Somewhere, there are lobbyists laughing at this comment.
  • That's true... (Score:5, Insightful)

    by Atario ( 673917 ) on Monday June 11, 2007 @08:20PM (#19472571) Homepage
    As far as you know.
  • by Ungrounded Lightning ( 62228 ) on Monday June 11, 2007 @08:43PM (#19472771) Journal
    Its time to encrypt EVERYTHING. ( at least until the government bans it )
    Sure they know where you went, but not what you viewed or 'said' while there.


    Back when I was operating a mailing list on a controversial topic on my home machine, I had a couple rules:
      - No postings soliciting or admitting to breaking laws.
      - No encrypted traffic (not just on the list: All traffic (except passwords) to-from the machine was in the clear).

    The thinking was like this:

      - Police, other government investigative agencies, and various unofficial snoops have a long track record of ignoring laws against various kinds of eavesdropping. So you have to assume that the line might be tapped.

      - If the police became interested they could always get a warrant and tap the line. (Or illegally tap the line without a warrant to see what's going on, then (if it looked interesting) get a warrant to tap it legally.)

      - If the data was encrypted they could STILL get it - by getting a warrant and seizing the computer (and everything else of interest in the house).

      - If the data was UNencrypted they would want to keep a low profile to avoid scaring off any "bad guys", would eventually see that there was nothing to go after, and thus would probably switch to hunting real bad guys elsewhere and go away WITHOUT breaking in and trashing stuff.

    "Encrypt everything" seems like a nice solution. But if only a few are doing it, just the fact that their traffic is encrypted makes them targets. It's easy to trump up enough stuff to get a warrant and go after the machine.

    Once a LOT of people are all swapping lots of encrypted traffic (as the default way of "sealing" the "envelope" on the datagrams) the fact of encryption will stop making the users targets. (The police can still get a warrant and grab the machines. But with so many potential machines to grab they'll have to find some other way to pick the ones to hit - like by bothering to dig up real "probable cause" from other evidence, like they're supposed to.)

    Fortunately we don't need to construct a "shelling point" for this: The internet is gradually moving toward pervasive encryption, as the legitimate need to encrypt for personal and corporate security becomes broadly understood. Once that becomes the norm our electronic "papers" will be about as secure as our physical ones. We're starting to get there. But IMHO we're not there yet.

    Unfortunately we WON'T be fully safe using encryption until the typical machine configurations are such that, if the machines are seized, it will be impossible to recover incriminating data from them - even with passwords browbeaten out of their owners. Until that time it will still be useful to bypass encryption by raiding one of the machines at the endpoints.

    = = = =

    Re the list and "no encrypted traffic": When one of the regulate-the-internet laws was about to make it too much hassle to continue, we closed down the list (after finding volunteers to run its successor and - since the participants hadn't agreed to have their info forwarded - announcing the successor on the original list and giving people time to sign up.

    Now I regularly use SSH to telecommute or to access the primary house machine from the vacation house. But that's still low-profile: It's clear from the IP addresses that the SSH connections are going to the company, coming from it, or coming from a single external dialup machine via a particular service provider.
  • by digitalderbs ( 718388 ) on Monday June 11, 2007 @08:55PM (#19472873)
    fdD87d

    64F5F6sAS4Dd46KJfUYd0NsafH54UJ6Y35U135KdYUsU1Jf35W Q544ASdf455saSA1dfF3AS5D5WQsEa5dr413L50fSAdDsA3QW5 DsfDfdALJd99AD09asdfK9J00aUIOsdfOU9I0dIaOU46IOsCVd Xf61S DF325eLJw5LKljLk3kjl18dfaw3F3DSADFsdfYDOewrs313aSS dfADuy5SA135D1H155yipHoiSDAjnkml51151LHHkmfSASd217

    JD3hFdJf8o

    SD45uio5K2o
  • Re:Time to encrypt (Score:2, Insightful)

    by Eli Gottlieb ( 917758 ) <eligottlieb.gmail@com> on Monday June 11, 2007 @09:49PM (#19473199) Homepage Journal
    It would certainly help if many websites (including Slashdot) didn't refuse logins or postings from users running Tor.
  • by number11 ( 129686 ) on Monday June 11, 2007 @10:57PM (#19473593)
    However, we absolutely, positively refused to provide subscriber information without a court order of some kind, however. I would like to think that most ISPs operate to the same standards we did

    I would like to think that no ISP would ever spy on me or keep records of my activities. I would like to think that no ISP would provide data without a court order. Unfortunately, what I would like to think bears little relation to what actually is. And my understanding is that the (US) government no longer requires a court order to demand such things.
  • Re:That's true... (Score:3, Insightful)

    by OriginalArlen ( 726444 ) on Tuesday June 12, 2007 @12:45AM (#19474359)
    None of the ISPs (or NSPs) are spying on you; they merely provide the lawful intercept functionality are required by CALEA, PATRIOT, and other legislation. It's the CIA/ TIA / NSA that do the actual spying.
  • by Anonymous Coward on Tuesday June 12, 2007 @02:21PM (#19480635)
    ...gives you 164 words that can be boiled-down to two: "pound sand".
    ______________
    How long does Charter maintain personally identifiable information?

    "Charter will maintain personally identifiable information about Customer only as long as Customer is a subscriber to Charter's services, or as long as necessary for the purpose for which it was collected. If Customer is no longer a subscriber to Charter's services and the information is no longer necessary for the purpose for which it was collected, Charter will only keep personally identifiable information as long as necessary to comply with laws governing our business. These laws include, but are not limited to, tax and accounting requirements that require record retention. Charter will also maintain personally identifiable information to satisfy pending requests or orders for access by a subscriber to his/her information or pursuant to a court order. Charter will destroy Customers' personally identifiable information when the information is no longer necessary for the purpose for which it was collected, when there are no longer pending requests for such information, and when it is no longer necessary to retain the information under applicable laws."

People will buy anything that's one to a customer.

Working...