1 00:00:00,320 --> 00:00:02,880 Speaker 1: Brought to you by the reinvented two thousand twelve camera. 2 00:00:03,240 --> 00:00:08,760 Speaker 1: It's ready. Are you get in touch with technology? With 3 00:00:08,920 --> 00:00:12,600 Speaker 1: tech stuff from how stuff works dot com. This podcast 4 00:00:12,720 --> 00:00:14,840 Speaker 1: is brought to you by Going to Meeting, the best 5 00:00:14,880 --> 00:00:18,160 Speaker 1: way to hold meetings over the Internet, reduce travel expenses, 6 00:00:18,520 --> 00:00:21,800 Speaker 1: saves time. Just told an online meeting with go to Meeting, 7 00:00:22,120 --> 00:00:24,720 Speaker 1: Try it free? Is it go to meeting dot com 8 00:00:25,160 --> 00:00:31,640 Speaker 1: slash tech Stuff. Hi to everybody, Welcome to the podcast. 9 00:00:31,640 --> 00:00:33,680 Speaker 1: My name is Chris Boulett. I'm an editor here at 10 00:00:33,680 --> 00:00:37,519 Speaker 1: how Stuff Works. And next to me, as usual, is 11 00:00:37,560 --> 00:00:41,760 Speaker 1: our senior writer, Jonathan Strickland. Hey there everyone, Actually I 12 00:00:41,760 --> 00:00:45,239 Speaker 1: probably shouldn't have revealed that. Oh yeah, you've you've violated 13 00:00:45,240 --> 00:00:47,840 Speaker 1: my privacy. Yeah, yeah, but I violated my own first, 14 00:00:47,840 --> 00:00:50,559 Speaker 1: so I guess it's okay, right, And and we're online, 15 00:00:50,560 --> 00:00:53,319 Speaker 1: so we're talking about online privacy. Hey you know what 16 00:00:53,360 --> 00:00:55,279 Speaker 1: that seguys right into what we were going to talk 17 00:00:55,320 --> 00:00:59,640 Speaker 1: about today, right, funny that. Yeah, so we're gonna talk 18 00:00:59,640 --> 00:01:03,520 Speaker 1: about is your greatest threat to your to your privacy online? 19 00:01:04,959 --> 00:01:08,840 Speaker 1: Clowns Now that that's just your the greatest threat to 20 00:01:08,880 --> 00:01:13,559 Speaker 1: your sanity online or otherwise? Um no, we're talking about 21 00:01:13,600 --> 00:01:18,360 Speaker 1: actually two big contenders. So if if you'll just permit 22 00:01:18,400 --> 00:01:22,080 Speaker 1: me a little a little uh net cast magic, do 23 00:01:22,120 --> 00:01:24,120 Speaker 1: we do? We need to ring the here we go, 24 00:01:24,200 --> 00:01:29,039 Speaker 1: here we go and this corner we have weighing in 25 00:01:29,160 --> 00:01:34,200 Speaker 1: and who knows how much Internet service providers and their 26 00:01:34,280 --> 00:01:37,520 Speaker 1: opponent in the other corner or in the red trunks 27 00:01:37,640 --> 00:01:42,280 Speaker 1: we've got Google. Yeah, those are the two begins. Wouldn't 28 00:01:42,319 --> 00:01:44,480 Speaker 1: they be like the red and yellow and green and 29 00:01:44,560 --> 00:01:47,240 Speaker 1: blue trunks? Yeah? Pretty much, But I just didn't. I 30 00:01:47,360 --> 00:01:49,800 Speaker 1: kind of wanted to cut it short. I know people 31 00:01:49,800 --> 00:01:51,720 Speaker 1: don't like the hooky stuff so much as I do, 32 00:01:51,800 --> 00:01:55,720 Speaker 1: But so, yeah, those are the two begins. I think 33 00:01:55,960 --> 00:02:01,080 Speaker 1: most people agree that the two major potential threats to 34 00:02:01,120 --> 00:02:06,080 Speaker 1: your online privacy are your internet service provider or internet 35 00:02:06,080 --> 00:02:09,960 Speaker 1: service providers in general and M and Google and other 36 00:02:10,760 --> 00:02:15,600 Speaker 1: advertising agencies online as well. So not just Google. It 37 00:02:15,639 --> 00:02:20,320 Speaker 1: could be Yahoo or but really a double click is 38 00:02:20,320 --> 00:02:23,480 Speaker 1: a big one. But but since Google is kind of 39 00:02:23,520 --> 00:02:29,280 Speaker 1: the dominant uh web advertising company out there right now, 40 00:02:29,320 --> 00:02:32,200 Speaker 1: I mean when we think Google, we think Search, wrote you, 41 00:02:32,280 --> 00:02:34,839 Speaker 1: and I might not just think Search because we work 42 00:02:35,080 --> 00:02:38,760 Speaker 1: on so many other projects that involve Google. But in general, 43 00:02:38,840 --> 00:02:42,840 Speaker 1: you think Google Search, but what companies often think is 44 00:02:42,919 --> 00:02:47,240 Speaker 1: Google ad Sense add words. I mean, it's this online 45 00:02:47,240 --> 00:02:51,160 Speaker 1: advertising that's related to search. That is a very powerful 46 00:02:51,600 --> 00:02:55,360 Speaker 1: tool in the advertising world. Um, but it has some 47 00:02:55,440 --> 00:03:02,000 Speaker 1: pretty serious implications as to the average users privacy. So, 48 00:03:02,560 --> 00:03:05,080 Speaker 1: and if you if you're one of those who only 49 00:03:05,080 --> 00:03:07,880 Speaker 1: thinks of Google is search, and you use something like Gmail, 50 00:03:08,360 --> 00:03:10,040 Speaker 1: if you look to the right of your screen, to 51 00:03:10,080 --> 00:03:13,600 Speaker 1: the right of your email, you'll see ads um and uh, 52 00:03:13,800 --> 00:03:16,079 Speaker 1: that's pretty much the same can be said for a 53 00:03:16,160 --> 00:03:18,480 Speaker 1: lot of their services. Right, you know their texts, so 54 00:03:18,520 --> 00:03:21,760 Speaker 1: they don't you know, capture your eye always, but you 55 00:03:21,760 --> 00:03:24,680 Speaker 1: know they're they are. Yeah, And and here's where the 56 00:03:24,680 --> 00:03:29,320 Speaker 1: privacy thing comes in. Google can track where you go, 57 00:03:30,639 --> 00:03:32,680 Speaker 1: especially when you're using Search. They can see what you're 58 00:03:32,720 --> 00:03:35,440 Speaker 1: searching too. If you're using Google Chrome, they can check 59 00:03:35,720 --> 00:03:38,880 Speaker 1: pretty much everything you're doing, including everything you type into 60 00:03:38,960 --> 00:03:44,800 Speaker 1: the right right exactly. That's how the omnibar knows what 61 00:03:44,840 --> 00:03:48,440 Speaker 1: you're doing, right, I mean, other otherwise it's just magic. 62 00:03:48,640 --> 00:03:51,280 Speaker 1: And we don't cover that in this podcast. We just 63 00:03:51,680 --> 00:03:55,000 Speaker 1: concentrate in the science and texts. So you've got Google 64 00:03:55,040 --> 00:03:58,200 Speaker 1: where they're they're tracking where you're going. And it's not 65 00:03:58,240 --> 00:04:02,200 Speaker 1: necessarily for some sort of you know, nefarious purpose, but 66 00:04:02,200 --> 00:04:04,240 Speaker 1: but it is a concern, I mean it, and it 67 00:04:04,400 --> 00:04:08,720 Speaker 1: what it allows advertisers to do is or actually Google 68 00:04:08,760 --> 00:04:12,080 Speaker 1: itself to do, is to target you for very specific advertising. 69 00:04:12,120 --> 00:04:15,360 Speaker 1: So let's say, if you were like me, um, then 70 00:04:15,400 --> 00:04:18,120 Speaker 1: you may go to a lot of movie related websites. 71 00:04:18,320 --> 00:04:19,720 Speaker 1: Happens to be one of the things I like to 72 00:04:19,800 --> 00:04:22,640 Speaker 1: check out on almost a daily basis, So I tend 73 00:04:22,680 --> 00:04:24,600 Speaker 1: to go to a lot of um, not just the 74 00:04:24,640 --> 00:04:27,920 Speaker 1: Internet Movie Database, but things like chud and aint it 75 00:04:27,960 --> 00:04:30,960 Speaker 1: cool News and dark Horizons and all these other movie 76 00:04:30,960 --> 00:04:34,600 Speaker 1: news sites because I'm a movie news junkie. Well, if 77 00:04:34,640 --> 00:04:37,960 Speaker 1: Google's checking that out, then they can start targeting ads 78 00:04:38,000 --> 00:04:42,200 Speaker 1: to me that specifically relate back to my my apparent 79 00:04:42,320 --> 00:04:45,160 Speaker 1: uh love of movies. So it might be things like 80 00:04:45,839 --> 00:04:49,440 Speaker 1: uh ads for certain DVDs or or even movie clubs 81 00:04:49,520 --> 00:04:54,039 Speaker 1: or whatever. And this again doesn't necessarily sound nefarious, but 82 00:04:54,160 --> 00:04:56,040 Speaker 1: it does mean that what they're doing is they're looking 83 00:04:56,080 --> 00:04:59,880 Speaker 1: at my behavior and they're they're targeting me because of that. 84 00:05:00,720 --> 00:05:05,600 Speaker 1: So there that raises some warning flags. Right, Well, that's true. 85 00:05:05,640 --> 00:05:07,880 Speaker 1: I mean, if you've ever been one of those people 86 00:05:07,920 --> 00:05:10,599 Speaker 1: who looks up at the the banner at at the 87 00:05:10,600 --> 00:05:12,840 Speaker 1: top of the screen and go, wait a minute, that's 88 00:05:12,920 --> 00:05:15,320 Speaker 1: for something in my town. How does it know where 89 00:05:15,360 --> 00:05:17,840 Speaker 1: I am? Right? Well, they can. They can tell from 90 00:05:17,880 --> 00:05:20,599 Speaker 1: your Internet protocol address. They can tell a lot of 91 00:05:20,600 --> 00:05:23,640 Speaker 1: things about you simply by you know, just you're using 92 00:05:23,680 --> 00:05:26,080 Speaker 1: the Internet from where where the because it has to 93 00:05:26,080 --> 00:05:27,800 Speaker 1: send traffic back to you, so they know where you 94 00:05:27,839 --> 00:05:30,440 Speaker 1: are sent right just by being there. And and Google 95 00:05:30,960 --> 00:05:33,560 Speaker 1: tries to frame this as a good thing and that 96 00:05:33,920 --> 00:05:37,080 Speaker 1: what they're doing is they're they're tailoring your search results 97 00:05:37,160 --> 00:05:40,840 Speaker 1: so that they're more relevant to you. And that sounds great. 98 00:05:40,880 --> 00:05:42,599 Speaker 1: I mean, I love the idea of if I'm going 99 00:05:42,640 --> 00:05:44,960 Speaker 1: to search for something, it's gonna really bring back the 100 00:05:45,000 --> 00:05:48,440 Speaker 1: things that I most likely really want to see. But 101 00:05:49,200 --> 00:05:51,920 Speaker 1: that also means that Google knows more about me than 102 00:05:52,640 --> 00:05:56,720 Speaker 1: most of my close friends. I mean, And and there 103 00:05:56,720 --> 00:05:59,040 Speaker 1: comes a point where you say, well, what happens if 104 00:05:59,080 --> 00:06:01,839 Speaker 1: they start to use the information in other ways? The 105 00:06:01,839 --> 00:06:06,880 Speaker 1: whole issue about the putting your your medical records up online, 106 00:06:06,920 --> 00:06:10,000 Speaker 1: I mean, that's a that's got a big can of 107 00:06:10,040 --> 00:06:13,240 Speaker 1: worms there. What happens if an insurance company gets to 108 00:06:13,279 --> 00:06:17,080 Speaker 1: access your medical records, sees that you have some sort 109 00:06:17,320 --> 00:06:21,320 Speaker 1: of family history of something, and then decides to hike 110 00:06:21,400 --> 00:06:24,480 Speaker 1: up your rates because of it or drop your coverage 111 00:06:24,640 --> 00:06:28,240 Speaker 1: because of it. UM. I mean, these are just some 112 00:06:28,400 --> 00:06:31,880 Speaker 1: of many privacy issues that that you really have to 113 00:06:31,880 --> 00:06:34,679 Speaker 1: think about. And the Internet has just kind of made 114 00:06:34,720 --> 00:06:38,360 Speaker 1: this a whole new problem, you know. I mean it's 115 00:06:39,080 --> 00:06:43,760 Speaker 1: it's a huge issue that isn't easily tackled. Yeah, that's 116 00:06:43,800 --> 00:06:48,839 Speaker 1: that's true. UM. Other search engines have tried to to 117 00:06:48,920 --> 00:06:52,920 Speaker 1: do that. Ask dot Com in fact, UM, not too 118 00:06:52,960 --> 00:06:55,560 Speaker 1: long ago. I guess a few months ago now offered 119 00:06:55,600 --> 00:06:59,880 Speaker 1: a way to erase your tracks um as you searched. 120 00:07:00,040 --> 00:07:01,920 Speaker 1: That's that's sort of a help. You could go into 121 00:07:01,920 --> 00:07:05,560 Speaker 1: your web browser and clear your your cookies out, which 122 00:07:05,560 --> 00:07:08,120 Speaker 1: will help. Those are basically cookies are are basically little 123 00:07:08,120 --> 00:07:10,200 Speaker 1: pieces of text that are stored on your computer that 124 00:07:10,600 --> 00:07:15,640 Speaker 1: that help UM. Advertisers and websites track where people are going. UM. 125 00:07:15,720 --> 00:07:19,320 Speaker 1: For example, if you went to the New York Times website, 126 00:07:19,360 --> 00:07:20,960 Speaker 1: they would want to know if you were going to 127 00:07:21,400 --> 00:07:24,520 Speaker 1: the Washington Post, the l A Times, CNN to look 128 00:07:24,560 --> 00:07:27,560 Speaker 1: at other UH companies. They might want to know if 129 00:07:27,560 --> 00:07:30,120 Speaker 1: you shop on Amazon dot com. You know, those kinds 130 00:07:30,120 --> 00:07:34,080 Speaker 1: of information gets sent back to uh the New York 131 00:07:34,080 --> 00:07:36,200 Speaker 1: Times or whomever it is that that's putting that cookie 132 00:07:36,240 --> 00:07:38,200 Speaker 1: on your computer, so you can you can kind of 133 00:07:38,360 --> 00:07:41,240 Speaker 1: do you know, raise your own tracks. So your web 134 00:07:41,240 --> 00:07:45,480 Speaker 1: browser UM and UH Google Chrome their browser and the 135 00:07:45,480 --> 00:07:49,040 Speaker 1: new version of Internet Explorer are offering, uh offering a 136 00:07:49,120 --> 00:07:52,000 Speaker 1: sort of a privacy shroud so that you're searching and 137 00:07:52,440 --> 00:07:57,680 Speaker 1: anonymously theoretically, so UM yeah, so that you can sort 138 00:07:57,680 --> 00:08:00,440 Speaker 1: of mask what you're doing. UM. It's it's similar, I 139 00:08:00,440 --> 00:08:03,080 Speaker 1: guess in a way to uh to tour, which is 140 00:08:03,120 --> 00:08:06,240 Speaker 1: a UM sort of a it's kind of hard to 141 00:08:06,280 --> 00:08:09,000 Speaker 1: explain it, and redirects your certain your traffic, your web 142 00:08:09,000 --> 00:08:11,440 Speaker 1: traffic through servers in other parts of the world to 143 00:08:11,520 --> 00:08:15,640 Speaker 1: sort of hide your tracks. UM. So you know, those 144 00:08:15,640 --> 00:08:18,480 Speaker 1: things are things that you can do, uh to do that. 145 00:08:18,560 --> 00:08:22,160 Speaker 1: But you know, the question is are the sites able 146 00:08:22,200 --> 00:08:25,920 Speaker 1: to track you from that information? And right? And in general, 147 00:08:26,040 --> 00:08:30,360 Speaker 1: cookies don't really let sites track everything you do. UM. 148 00:08:30,360 --> 00:08:34,440 Speaker 1: Cookies mainly allow a website to see how often you 149 00:08:34,559 --> 00:08:38,440 Speaker 1: visit UM, and it allows you to store certain information 150 00:08:38,480 --> 00:08:41,080 Speaker 1: on your computer that makes it easier to load up 151 00:08:41,080 --> 00:08:45,120 Speaker 1: a page. UM, they're not really used to track everywhere 152 00:08:45,160 --> 00:08:49,720 Speaker 1: you go. Although there's a caveat to this. UM. Services 153 00:08:49,800 --> 00:08:53,280 Speaker 1: like double Click, which isn't a web advertising service. Uh, 154 00:08:53,320 --> 00:08:56,200 Speaker 1: they have ads all over the net. And if you 155 00:08:56,240 --> 00:08:58,640 Speaker 1: get a cookie for a double click add on one 156 00:08:58,679 --> 00:09:00,880 Speaker 1: site and then you go to a different site that 157 00:09:00,960 --> 00:09:04,280 Speaker 1: also has double click, then theoretically double click can see 158 00:09:04,559 --> 00:09:06,560 Speaker 1: both of those sites that you've visited, and they can 159 00:09:06,600 --> 00:09:10,720 Speaker 1: actually start to piece together information about a user, you know, 160 00:09:10,760 --> 00:09:15,840 Speaker 1: kind of profile a user based on the multiple visits. UM. 161 00:09:15,880 --> 00:09:18,360 Speaker 1: Whether or not they bothered to do that is another 162 00:09:18,520 --> 00:09:22,600 Speaker 1: question because you have to remember, uh, not everyone's using 163 00:09:22,720 --> 00:09:25,240 Speaker 1: the exact same computer all the time. Like if you're 164 00:09:25,240 --> 00:09:29,120 Speaker 1: talking about say a computer in a computer lab like 165 00:09:29,160 --> 00:09:32,200 Speaker 1: a library or something, you have multiple users all using 166 00:09:32,240 --> 00:09:35,080 Speaker 1: that computer. You can't really build a comprehensive profile on 167 00:09:35,160 --> 00:09:39,040 Speaker 1: someone if it's really you know, a hundred different individuals 168 00:09:39,080 --> 00:09:41,320 Speaker 1: who are using that computer throughout the course of a week. 169 00:09:42,000 --> 00:09:45,480 Speaker 1: So uh so cookie tracking, I mean you it is 170 00:09:45,480 --> 00:09:48,560 Speaker 1: a good idea to clear out your cookies regularly, UM, 171 00:09:48,600 --> 00:09:51,440 Speaker 1: if you want to try and protect your online privacy. Uh, 172 00:09:51,480 --> 00:09:56,800 Speaker 1: it's probably not the most important factor to take into consideration. 173 00:09:56,840 --> 00:09:59,360 Speaker 1: But it's definitely something that you have control over yourself. 174 00:09:59,440 --> 00:10:02,319 Speaker 1: So that's a that's a positive and if nothing else, 175 00:10:02,360 --> 00:10:05,120 Speaker 1: there's nothing worse than stale cookies. Right, let's let's move 176 00:10:05,120 --> 00:10:08,040 Speaker 1: on to Internet service providers. Um, this is kind of 177 00:10:08,320 --> 00:10:11,120 Speaker 1: just really quickly. I mean, well, well, there are several 178 00:10:11,120 --> 00:10:13,640 Speaker 1: things we need to touch on in this discussion, but 179 00:10:13,640 --> 00:10:15,680 Speaker 1: we've already we've already kind of bashed Google a lot. 180 00:10:16,200 --> 00:10:18,280 Speaker 1: And uh and I like, I like to say, I'm, I, 181 00:10:18,400 --> 00:10:21,480 Speaker 1: for one, welcome our Google overlords. But well, the reason 182 00:10:21,600 --> 00:10:24,199 Speaker 1: the reason we uh sort of pick on Google is 183 00:10:24,280 --> 00:10:27,680 Speaker 1: simply because they are uh, somebody that you will be 184 00:10:27,720 --> 00:10:31,080 Speaker 1: familiar with as a listener and uh, I mean certainly, um, 185 00:10:31,160 --> 00:10:35,000 Speaker 1: but also because they are so involved in the advertising world. 186 00:10:35,480 --> 00:10:40,960 Speaker 1: Um to yeah, yeah, I mean they're they're just big 187 00:10:41,040 --> 00:10:43,920 Speaker 1: enough so that you know, they are able to offer 188 00:10:44,000 --> 00:10:46,440 Speaker 1: a lot of advertising and a lot of search and 189 00:10:46,520 --> 00:10:48,079 Speaker 1: a lot of different kinds of products that you will 190 00:10:48,120 --> 00:10:50,800 Speaker 1: be interested in. But basically it's it's anybody of that 191 00:10:50,920 --> 00:10:55,080 Speaker 1: size that offers those services to you. Um, you know, 192 00:10:55,160 --> 00:10:59,000 Speaker 1: toolbars that you plug in your browser. Basically, these things 193 00:10:59,000 --> 00:11:02,480 Speaker 1: are all ways for them to help get more demographic 194 00:11:02,480 --> 00:11:05,160 Speaker 1: information for their subscribers. So it's not just Google. So no, 195 00:11:05,960 --> 00:11:08,880 Speaker 1: that's just the easiest target in that bunch. But for 196 00:11:09,000 --> 00:11:14,400 Speaker 1: Internet service providers, UM, right, there are a lot of those. Recently, 197 00:11:14,440 --> 00:11:18,000 Speaker 1: an associate professor of law at Colorado Law School UM 198 00:11:18,440 --> 00:11:22,880 Speaker 1: named Paul Ohm mentioned that he believed he actually published 199 00:11:22,880 --> 00:11:26,400 Speaker 1: I think a seventy page something page document on the 200 00:11:26,440 --> 00:11:30,600 Speaker 1: issue that he believed the Internet service providers uh constitute 201 00:11:30,640 --> 00:11:36,680 Speaker 1: the greatest threat to our online privacy. And um, it's 202 00:11:36,720 --> 00:11:41,920 Speaker 1: because they can see everything that we're doing. Because technologies 203 00:11:41,960 --> 00:11:44,760 Speaker 1: now exist they allow i sp s to do deep 204 00:11:44,760 --> 00:11:50,240 Speaker 1: packet inspections on their users. Deep packet inspection it's pretty 205 00:11:50,240 --> 00:11:54,760 Speaker 1: creepy stuff actually, so they can really take a good 206 00:11:54,800 --> 00:11:58,640 Speaker 1: look at what you're doing where you're going online. Um. 207 00:11:59,000 --> 00:12:02,360 Speaker 1: And and technically you would call it spying. They could 208 00:12:02,400 --> 00:12:06,079 Speaker 1: spy on you, now do they, Well, that's another matter. 209 00:12:06,520 --> 00:12:11,800 Speaker 1: The point is that they have that capability at this point. Yeah. Now, UM, 210 00:12:12,040 --> 00:12:16,000 Speaker 1: for the uninitiated, a packet is the way that information 211 00:12:16,040 --> 00:12:18,280 Speaker 1: gets sent around the internet. Uh. It may not seem 212 00:12:18,320 --> 00:12:21,760 Speaker 1: like that to you, but in the background, UH, to 213 00:12:22,080 --> 00:12:26,559 Speaker 1: send information on the Internet, a computer requests uh something 214 00:12:26,600 --> 00:12:29,679 Speaker 1: from another computer, and that computer sends it back. Now 215 00:12:29,679 --> 00:12:31,280 Speaker 1: how does it do that, Well, it breaks it into 216 00:12:31,920 --> 00:12:35,679 Speaker 1: lots and lots of tiny pieces. Um I think Mike 217 00:12:35,720 --> 00:12:38,160 Speaker 1: TV on Willy Wonka if you will, But lots of 218 00:12:38,160 --> 00:12:42,640 Speaker 1: little chunks of information called packets, and the uh, the 219 00:12:42,640 --> 00:12:46,120 Speaker 1: computer send that information to one another on various different 220 00:12:46,200 --> 00:12:49,959 Speaker 1: pieces of the Internet. UM, so that you know, if 221 00:12:49,960 --> 00:12:52,560 Speaker 1: it finds that one computer in between is down, it 222 00:12:52,600 --> 00:12:55,480 Speaker 1: can reroute the traffic to another computer. And that's how 223 00:12:55,640 --> 00:12:57,480 Speaker 1: you know, stuff gets from point A to point B 224 00:12:57,640 --> 00:13:00,000 Speaker 1: and back to point A on the Internet. Well, deep 225 00:13:00,040 --> 00:13:03,800 Speaker 1: pack and inspection. We're talking about the Internet service providers 226 00:13:03,800 --> 00:13:07,240 Speaker 1: ability to look at those chunks of information and this, 227 00:13:07,520 --> 00:13:11,920 Speaker 1: you know, can meet anything that you send, any key stroke, UM, 228 00:13:11,960 --> 00:13:16,719 Speaker 1: any password, emails, anything that's going across the Internet, they 229 00:13:16,760 --> 00:13:19,800 Speaker 1: can take a look at and and uh if they 230 00:13:19,880 --> 00:13:24,600 Speaker 1: really wanted to um. And there are many reasons they 231 00:13:24,679 --> 00:13:28,800 Speaker 1: might do this, one being again kind of selling information 232 00:13:28,840 --> 00:13:32,400 Speaker 1: to advertisers so that advertisers can target consumers. So sort 233 00:13:32,440 --> 00:13:34,200 Speaker 1: of the same thing Google is doing in that sense. 234 00:13:34,320 --> 00:13:36,679 Speaker 1: And uh. The question is whether the I s p 235 00:13:36,840 --> 00:13:39,520 Speaker 1: s view advertising as a major source of revenue or 236 00:13:39,559 --> 00:13:43,400 Speaker 1: if they consider it themselves just to be Internet service providers, 237 00:13:43,440 --> 00:13:47,560 Speaker 1: like they're just selling access to the Internet. Uh, that's true. 238 00:13:47,600 --> 00:13:52,400 Speaker 1: I mean in March two thousand seven, UH, Compete Incorporated 239 00:13:52,960 --> 00:13:56,640 Speaker 1: Chief Technology Officer UM David Cancel said that i sp 240 00:13:56,760 --> 00:14:00,200 Speaker 1: s are selling their click streams. Uh, your customers click 241 00:14:00,280 --> 00:14:08,240 Speaker 1: streams too, different people for revenue, so you know, service provider. Yeah, 242 00:14:08,280 --> 00:14:11,199 Speaker 1: And I mean there there are hundreds of I s 243 00:14:11,280 --> 00:14:14,720 Speaker 1: p s out there and of all different sizes, so 244 00:14:14,800 --> 00:14:18,240 Speaker 1: it's we can't really paint them all with the same brush. 245 00:14:18,320 --> 00:14:21,720 Speaker 1: But the point is that they have the capability. Whether 246 00:14:21,800 --> 00:14:25,880 Speaker 1: or not they have the motivation is another matter. I guess, well, 247 00:14:25,880 --> 00:14:29,000 Speaker 1: they do have other reasons for doing Deep packet inspection 248 00:14:29,040 --> 00:14:33,480 Speaker 1: allows an I s P to see, um where traffic 249 00:14:33,560 --> 00:14:35,600 Speaker 1: is coming from. They can kind of get an idea. 250 00:14:36,120 --> 00:14:39,920 Speaker 1: They I sps can monitor the system traffic and if 251 00:14:39,960 --> 00:14:42,400 Speaker 1: all of a sudden there's a big spike in traffic 252 00:14:42,440 --> 00:14:45,760 Speaker 1: coming from one place, they might, you know, take a 253 00:14:45,760 --> 00:14:48,200 Speaker 1: look at the packets to see what's going on. And 254 00:14:48,240 --> 00:14:52,480 Speaker 1: if it turns out that someone has gotten a you know, 255 00:14:52,560 --> 00:14:55,720 Speaker 1: downloaded a trojan horse and their computer is now part 256 00:14:55,720 --> 00:14:58,680 Speaker 1: of a bot net and ascending out spam uh, as 257 00:14:58,680 --> 00:15:00,640 Speaker 1: part of a denial of service attack, they can shut 258 00:15:00,640 --> 00:15:02,600 Speaker 1: it down, right, so there's there's a good reason to 259 00:15:02,640 --> 00:15:05,120 Speaker 1: do it. They can they can tell exactly what what 260 00:15:05,280 --> 00:15:10,000 Speaker 1: program is used to do that. Um, so you know, 261 00:15:10,200 --> 00:15:14,680 Speaker 1: if you are downloading torrents. Yeah, actually that's only aware 262 00:15:14,720 --> 00:15:16,920 Speaker 1: of that. It's one of the issues that Professor own 263 00:15:17,040 --> 00:15:21,000 Speaker 1: was was talking about these about things like organizations like 264 00:15:21,040 --> 00:15:24,640 Speaker 1: the m p A A or the r I double A. Uh, 265 00:15:24,880 --> 00:15:28,240 Speaker 1: that would be the Motion Pictures Association American Good Old 266 00:15:28,240 --> 00:15:31,640 Speaker 1: Record Industry. Right. So yeah, these guys, they have a 267 00:15:31,800 --> 00:15:35,520 Speaker 1: vested interest in making sure that that they're that intellectual 268 00:15:35,520 --> 00:15:39,160 Speaker 1: property isn't being freely distributed across the Internet without you know, 269 00:15:39,200 --> 00:15:45,120 Speaker 1: the actual without people actually buying it. So they're they 270 00:15:45,160 --> 00:15:48,840 Speaker 1: they've been known to put pressure on I s p 271 00:15:49,040 --> 00:15:52,360 Speaker 1: s to look into that sort of thing. Um. Actually, 272 00:15:52,360 --> 00:15:54,680 Speaker 1: they've been known to put pressure on just about everybody. 273 00:15:54,960 --> 00:15:59,360 Speaker 1: They're kind of like the the mafia of the corporate 274 00:15:59,400 --> 00:16:01,880 Speaker 1: world and in the United States at any rate. So 275 00:16:02,080 --> 00:16:05,320 Speaker 1: they've they've put pressure, both political pressure and corporate pressure 276 00:16:05,360 --> 00:16:08,920 Speaker 1: on these kinds of organizations, um, to try and detect 277 00:16:09,560 --> 00:16:13,280 Speaker 1: this This digital theft essentially is what it is. And 278 00:16:13,360 --> 00:16:16,320 Speaker 1: to cut it off at the source. UM. So that 279 00:16:16,560 --> 00:16:20,640 Speaker 1: constitutes a privacy concern. Um. And of course there's always 280 00:16:20,640 --> 00:16:23,640 Speaker 1: the concern that the government could put pressure on I 281 00:16:23,800 --> 00:16:28,280 Speaker 1: s p s to reveal information about users. Um. And 282 00:16:28,320 --> 00:16:32,000 Speaker 1: you know, they may have reasons that sound perfectly legitimate, 283 00:16:32,040 --> 00:16:36,040 Speaker 1: like trying to battle terrorism, but it still means that 284 00:16:36,720 --> 00:16:39,400 Speaker 1: they're violating your privacy, which is one of those things 285 00:16:39,400 --> 00:16:42,040 Speaker 1: that the Supreme Court said, ages and ages and ages ago. 286 00:16:42,880 --> 00:16:45,360 Speaker 1: It was something that we pretty much have a right to. 287 00:16:45,520 --> 00:16:49,200 Speaker 1: We have the right to be let alone well against 288 00:16:49,320 --> 00:16:53,320 Speaker 1: unreasonable search, unreasonable search and seizure being a big one. 289 00:16:53,360 --> 00:16:57,080 Speaker 1: That would be the fourth Amendment that would be right there. 290 00:16:57,240 --> 00:16:59,600 Speaker 1: What's funny that you should mention the government because an 291 00:16:59,680 --> 00:17:03,320 Speaker 1: article wired on August fifteen, UH, A T and T 292 00:17:04,080 --> 00:17:09,880 Speaker 1: said that Google was more troublesome than their uh, their 293 00:17:09,960 --> 00:17:14,480 Speaker 1: program to install eavesdropping equipment on their network. Um yeah, 294 00:17:14,520 --> 00:17:18,320 Speaker 1: they said Google's advertising is much more serious than anything 295 00:17:18,320 --> 00:17:21,240 Speaker 1: that that we would do and the eavesdropping network. Now, 296 00:17:21,480 --> 00:17:25,159 Speaker 1: of course, A T and T is the UH the 297 00:17:25,200 --> 00:17:27,800 Speaker 1: target of a class action lawsuit for helping the n 298 00:17:27,880 --> 00:17:32,439 Speaker 1: s A and wire tapping wortless wire tapping issues. So 299 00:17:32,440 --> 00:17:34,119 Speaker 1: so yeah, you guys take it with a grain of 300 00:17:34,160 --> 00:17:39,280 Speaker 1: salt um and uh in um. In August two thousand eight, 301 00:17:39,440 --> 00:17:42,600 Speaker 1: it turns out everyone's getting on the Google's worse than 302 00:17:42,640 --> 00:17:44,199 Speaker 1: we are a bandwagon. And this is not an i 303 00:17:44,320 --> 00:17:48,040 Speaker 1: sp but Microsoft said that, uh, they're actually the Peter Cullen, 304 00:17:48,119 --> 00:17:52,920 Speaker 1: the chief privacy strategists, said that Google's privacy standards are 305 00:17:52,960 --> 00:17:54,719 Speaker 1: not up to part There may be seven to ten 306 00:17:54,800 --> 00:17:58,280 Speaker 1: years behind Microsoft's own. According to an article in zd 307 00:17:58,400 --> 00:18:02,320 Speaker 1: Net Australia. So and and just in case you guys 308 00:18:02,359 --> 00:18:04,480 Speaker 1: think that we in the United States have it rough, 309 00:18:04,520 --> 00:18:06,720 Speaker 1: assuming that you know, for those of them, for those 310 00:18:06,720 --> 00:18:09,160 Speaker 1: of you listeners who are in the US, and you're like, wow, 311 00:18:09,240 --> 00:18:12,919 Speaker 1: this is really tough, keep in mind. In June of 312 00:18:12,960 --> 00:18:16,600 Speaker 1: this year over in Sweden, Swedish parliament passed a law, 313 00:18:16,800 --> 00:18:21,800 Speaker 1: very controversial law that allows a government organization to monitor 314 00:18:21,960 --> 00:18:28,040 Speaker 1: and intercept all online traffic that crosses the Swedish border. 315 00:18:28,840 --> 00:18:32,200 Speaker 1: So anything that's going across the border, this this agency 316 00:18:32,400 --> 00:18:37,120 Speaker 1: can intercept and read and track back to whomever sent 317 00:18:37,200 --> 00:18:39,919 Speaker 1: it or received it. And there's also the fear that 318 00:18:40,040 --> 00:18:45,000 Speaker 1: perhaps this agency may even expand its capabilities beyond that 319 00:18:45,080 --> 00:18:47,760 Speaker 1: and be able to monitor all traffic within Sweden, whether 320 00:18:47,800 --> 00:18:52,240 Speaker 1: it crosses the border or not. So it's it's rough here, 321 00:18:52,480 --> 00:18:54,400 Speaker 1: it could be worse. The important thing is to keep 322 00:18:54,400 --> 00:18:56,560 Speaker 1: an eye on it to make sure it doesn't get worse. 323 00:18:57,440 --> 00:19:01,600 Speaker 1: That's true. And the other thing to to remember as 324 00:19:01,600 --> 00:19:06,400 Speaker 1: far as your privacy goes online is people don't really 325 00:19:06,400 --> 00:19:10,239 Speaker 1: have time to read all this stuff. So honestly, you know, 326 00:19:10,359 --> 00:19:12,720 Speaker 1: before you turn off the computer and and you know 327 00:19:12,760 --> 00:19:15,720 Speaker 1: throw it away and you know, freak out because your 328 00:19:15,760 --> 00:19:19,400 Speaker 1: privacy is being violated, it's probably not unless somebody has 329 00:19:19,680 --> 00:19:23,000 Speaker 1: real reason to. Uh. You know, people at I sps 330 00:19:23,200 --> 00:19:26,760 Speaker 1: and and search engines and advertising companies, they really don't 331 00:19:26,800 --> 00:19:29,440 Speaker 1: have time to look at your personal information. They're more interested, 332 00:19:29,880 --> 00:19:32,800 Speaker 1: they're more interested in you and as a number, um 333 00:19:32,880 --> 00:19:35,360 Speaker 1: than as as a person in your personal info. So 334 00:19:36,000 --> 00:19:42,480 Speaker 1: you're probably not seriously under suspicion and to jump off 335 00:19:42,480 --> 00:19:46,720 Speaker 1: the grid yet. No, but don't forget. Basically, anything you 336 00:19:46,760 --> 00:19:49,720 Speaker 1: do can be looked at. So you know, if you 337 00:19:49,920 --> 00:19:52,800 Speaker 1: are concerned about something that might be for it or 338 00:19:52,840 --> 00:19:56,840 Speaker 1: intercepted and might be embarrassing to you, maybe you're better 339 00:19:56,880 --> 00:19:59,600 Speaker 1: off leaving it offline. Right And if you're interested in 340 00:19:59,720 --> 00:20:04,200 Speaker 1: organ zations that that are very much focused on this issue, 341 00:20:04,960 --> 00:20:09,200 Speaker 1: I recommend visiting either the Electronic Frontier Foundation, which has 342 00:20:09,240 --> 00:20:12,840 Speaker 1: some good information on this subject, or the Electronic Privacy 343 00:20:12,920 --> 00:20:16,600 Speaker 1: Information Center also known as EPIC. Both of those have 344 00:20:17,000 --> 00:20:20,800 Speaker 1: a lot of articles and documents on this reports. Um, 345 00:20:20,840 --> 00:20:23,240 Speaker 1: if you feel like you need to get involved, they 346 00:20:23,240 --> 00:20:28,040 Speaker 1: have information where you can look into doing that as well. So, UM, 347 00:20:28,040 --> 00:20:30,120 Speaker 1: it's really up to you. It's better to I think 348 00:20:30,240 --> 00:20:34,800 Speaker 1: better to be informed than not just in general. Well, 349 00:20:34,840 --> 00:20:37,200 Speaker 1: I guess that that pretty much wraps up our our 350 00:20:37,480 --> 00:20:41,600 Speaker 1: cheerful conversation on online privacy. UM as to whose worst 351 00:20:41,720 --> 00:20:43,639 Speaker 1: Google or the I s p S, I think time 352 00:20:43,640 --> 00:20:46,000 Speaker 1: will tell. Right now, it looks like Google's in the lead, 353 00:20:46,080 --> 00:20:48,840 Speaker 1: but uh, I s p S seem to have a 354 00:20:48,920 --> 00:20:52,840 Speaker 1: pretty good potential for UM for mass chaos down the road, 355 00:20:53,680 --> 00:20:57,640 Speaker 1: So cheer up. The world's about the end, right Well, 356 00:20:58,080 --> 00:21:01,320 Speaker 1: on that note, we're gonna take a little break. When 357 00:21:01,359 --> 00:21:05,679 Speaker 1: we come back, I'll tell you about a special place. 358 00:21:06,440 --> 00:21:09,439 Speaker 1: Special place that one might think only exists in fairy tales, 359 00:21:09,480 --> 00:21:14,480 Speaker 1: but in fact is reality. On this podcast is brought 360 00:21:14,560 --> 00:21:17,080 Speaker 1: to you by Go to Meeting, the web based tool 361 00:21:17,200 --> 00:21:19,919 Speaker 1: that lets you hold instant online meetings from your office, 362 00:21:20,160 --> 00:21:23,560 Speaker 1: confidence trim or home office with people anywhere in the world, 363 00:21:24,040 --> 00:21:26,760 Speaker 1: so you can do more and travel less, which means 364 00:21:26,800 --> 00:21:29,600 Speaker 1: you can save money and make more money. Try go 365 00:21:29,680 --> 00:21:33,160 Speaker 1: to meeting free visit go to Meeting dot com slash 366 00:21:33,200 --> 00:21:39,240 Speaker 1: tech stuff. Okay, so what is this special place. Well, 367 00:21:39,280 --> 00:21:42,800 Speaker 1: the special place would be the headquarters of Google, the 368 00:21:42,880 --> 00:21:46,200 Speaker 1: Google Plex. And what makes it so special, Well, it's 369 00:21:46,280 --> 00:21:50,439 Speaker 1: it's got some pretty amazing amenities. Uhwer of them than before, 370 00:21:50,480 --> 00:21:54,560 Speaker 1: Fewer than before, but still pretty pretty amazing. So yeah, 371 00:21:54,640 --> 00:21:57,520 Speaker 1: Google might be violating your privacy, but they're letting their 372 00:21:57,560 --> 00:22:02,840 Speaker 1: their employees swim in in infinity pools. So and some 373 00:22:02,920 --> 00:22:05,240 Speaker 1: free food, some free food. So if you want to 374 00:22:05,320 --> 00:22:07,600 Speaker 1: learn all about google Plex and see where these evil 375 00:22:07,640 --> 00:22:10,960 Speaker 1: geniuses work, you can read How the google Plex Works. 376 00:22:11,080 --> 00:22:16,400 Speaker 1: That's by Hey, it's by me jovin Strickland, and that's 377 00:22:16,480 --> 00:22:20,000 Speaker 1: live at how stuff Works dot com. Right now, we'll 378 00:22:20,040 --> 00:22:24,480 Speaker 1: pause you again, really sick. Let us know what you think. 379 00:22:24,760 --> 00:22:27,680 Speaker 1: Send an email to podcasts and how Stuff Works dot 380 00:22:27,720 --> 00:22:35,359 Speaker 1: Com brought to you by the reinvented two thousand twelve camera. 381 00:22:35,680 --> 00:22:36,880 Speaker 1: It's ready, are you