Editorial - Bannerline Communications

 

Bannerline Home
Up
Internet Marketing 101
Pushing Back
Personal Privacy Policy

How they figure out who is a "live" one

Part 2
Pushing Back

If you don't push back against those who want to know more about you all the time, you'll end up as transparent to them as if they lived with you. This is not a joke!

The first thing to do is decide whether you need or want to bother worrying about all this data out there on you. Some people actually like the fact that when they go to their favourite news site it shows them the baseball scores first and never shows them news about foreign countries at all. In this case you have "paid" for your "free lunch" and are happy about it.

This may be fine for one or two sites. It even may be fine for all the sites you normally visit - but you should still be on guard whenever you visit a new site or get sent something by a "friend" to try or see. You should also be aware that not all your "friends" may appreciate your giving their e-mail addresses out to your favourite site so you can send them something interesting (as David did in the case that sparked this article) You have to learn to practice safe Internetting at least enough to not annoy others you deal with.

On the other hand, if you are uncomfortable with "them" knowing all about you, including your underwear size, eye prescriptions, age, occupation, sex, address, place of birth, etc. then you need to do more than just be watchful.

The major thing to recognize is that, as noted above, most of the time your information is dealt with only by computer programs - and computer programs are still not truly "intelligent". Today's "data mining" techniques look for statistical patterns within numbers of records. They look for viewing or purchasing patterns with enough people following them that it makes sense to craft a marketing strategy that matches the pattern and take advantage of it. To do this they apply mathematics that, amongst other things, throws out "bad" or inconsistent data.

Hmmm... maybe there's a way to get our records thrown out - or at least confuse them as to which patterns we really fall into.

To do this we must inject some randomness and/or misleading data into our travels. Not enough that we can't get the services we want, and certainly not enough that we fall afoul of fraud laws or such. Just enough to maintain at least a bit of a curtain of privacy and cast uncertainty on the data.

This can be done in non-Internet activities as well. I have several credit cards but use them in a fairly random fashion. Some months I'll use one for gas and another for miscellaneous purchases and not use another one at all - even for months at a stretch. Same thing with the mix of credit and debit card use. I also use cash in many situations even though I could (and sometimes do) use credit in the same situation. Thus, there are holes in "their" data - no obvious patterns in general.

The same things can be done when giving information to Internet (and software) companies.

Many of these practices are "passive" push-backs. I also actively push back in some cases by letting the organization know my views on their "policies" and letting them know my own policies if necessary and why I have them. The rest of this section deals with some of the details of this pushing back.

Affinity Cards

A good friend of mine makes his money solely as a computer security expert. He's paranoid - a good thing in his industry. One of the things he has found out is that some stores will actually allow you to register anonymously for an affinity card. No personal information on record, but you get the discount and the store can track that "anonymous cardholder 12345... has this purchasing habit" which seems fine with them. So far he's received such cards from a couple of food chain stores and a book chain.

A suggestion he has made to me that I have yet to do anything about is that people register in some fashion to get a card then drop them into a box at the door for later use by anyone else who needs one. In some stores the cardholder earns "instant" rebates over time and the random cards might act almost as a lottery. I'm not sure how the stores would like it but it's a thought.

On the other hand, I have noted above that I actually get a sore back (from the thickness of my wallet - carried in a back pocket and causing me to sit funny in my car - requires a "walletectomy" every few months) if I carry all the cards the various stores want me to use. It used to be that other than the credit cards, I only needed my "Air Miles" card since it crossed many stores. The problem is that for whatever reason, many stores are no longer part of this umbrella and instead run their own card.

My push back to them is to ask if just having the number is enough - in which case I'll enter it into my cell phone or PDA, both of which I have with me at all times anyway. This has worked fairly well for some stores. A couple didn't like the idea and I've run across individual clerks who don't quite understand, but that's their problem and I let them know it.

On the other hand, there are a number of shops I won't deal with any more than I absolutely have to because they require that I present the whole card, and in one case the card itself is thicker than most credit cards are. The manager there just didn't understand when I told him why I wouldn't be back until they changed the policy. The store offers quite a healthy discount for cardholders but their competition does the same and only requires the number.

Other stores are getting the message and creating cards that are very thin, and in once case 1/4 the size of a credit card and designed to hang on your keychain. The push back seems to be working.

Places that use the old "stamp" card (card of empty squares stamped each time you purchase something) will mostly keep the card in their store for you. If they don't, I tell them why I won't be back.

E-mail Software Solutions

The original subject of this discussion is an e-mail sent to me by David. If you don't want the sender or other nefarious web site to know the fact that you've received (and opened) any particular e-mail, you may have to change your software. At minimum you'll have to get into its options and change how it deals with external links from HTML mail.

I'll first of all say that I don't use Windows for my day to day Internet access. I have a Linux box in front of me, the details of which are on my home-office page. About the only thing different from the picture at the moment is the second monitor I mentioned above - beside the one you can seen in the center of the main picture. As you'll note I also have both a separate machine with Windows 2000 on it and a session of Windows 2000 running in a "cage" (VmWare) on my Linux box, so I do have access to the facilities if I can't do things any other way. I'm in fact writing this article using FrontPage 2002 in Windows under VmWare on the main machine.

My E-mail program is Evolution - a Linux-based Outlook look-alike. I've used Outlook in the past as well as Eudora and many other Windows based programs, but I no longer do so, so am a bit rusty on their setup and daily use.

The things I've found out indicate that versions of Outlook older than 2002 and all versions of Outlook Express up to very recently cannot be told not to load images from the outside when e-mail is shown in the preview pane or opened up. Outlook 2002 can be set this way (see link below) and Outlook 2003 comes with this feature set on (don't load external links). Personally I like Evolution's way of doing it at this point - load external links only if the From: address is in my Contacts folder; although the fact that Yahoo spoofed this is disconcerting. I may suggest to the team that is doing the Evolution programming that it also take a look at the Return-path: address (which in this case showed nobody @ Yahoo-inc.com)

If you can't update to a newer Outlook you might want to get Mozilla/Netscape and use It's mail reader instead. Many people like it and there are new features coming all the time. Blocking images is a selection on the "Privacy & Security" menu under "images" where you can select specific sites you'll allow images from or turn their download off completely. Again, no selection for only allowing them in mail from people you know. I use Mozilla 1.5 as my main browser on both Windows and Linux - works fine for most sites now.

If nothing here applies to your situation; you can't change (company policy or financial reasons) or simply don't want to, you should at least understand that you are letting the other end know that their message was received. If you don't like it - push back by telling your vendor and/or company MIS/IP people.

E-mail Source Code Discovery

You can see the "nasty" URLs in e-mail you've received by setting your program to "show e-mail source" and looking for the "img" (upper or lower case) tags. The following one is from my Christmas Greeting, sent out with the pictures included in the e-mail as attachments. This type of IMG is just fine - the whole thing is included in the e-mail and no external reference is needed to view it. The "cid:" portion of the tag string means it is referencing an internal (to the e-mail message) attachment.

<IMG SRC="cid:1071083508.9622.19.camel@pacdat.pacdat.net" ALIGN="bottom" ALT="" BORDER="5">

The following HTML IMG tag came from David's e-mail to me (slightly obfuscated). Note that the tag in this one contains a full URL to an image file, plus the extra ? and database key.

<img src="http://us.f1.yahoofs.com/ xxx/ 3f808b6z_c5e5/ bc/ Yahoo!+Photo+Album /__tn_pers27903z7040.jpg ?BCmegAABvemnfj9H" width="61" height="90" border="0"/>

In most of the e-mail programs in use today, receiving this e-mail would tell Yahoo that you existed, and they already know your e-mail address since your friend gave it to them.

"Yahoo!'s practice is to include web beacons in HTML-formatted email messages (messages that include graphics) that Yahoo!, or its agents, sends in order to determine which email messages were opened and to note whether a message was acted upon." abstract from Yahoo's privacy pages.

So, through no fault of my own, Yahoo now knows that my e-mail address exists and I've seen a picture from their site. Their policy states that they collect personal information "when you visit Yahoo! pages..." which now I have done. Now they seem to think they have implicit permission to pass my e-mail address around their company and associated companies, business partners and other companies. But I didn't knowingly visit their page - I only viewed an e-mail I thought had come from a friend of mine!

Greeting Cards Too

The same thing happens when a friend of yours sends you some electronic greeting cards - you know, the ones that they can have sent out to their whole mailing list on major holidays and to individuals on birthdays and anniversaries. I even sent out a special missive to my own Christmas list this year imploring them not to follow this practice as I would not likely see their card since my system is set not to download the external links.

The point with this and the previous section is that regardless of whether you have decided you don't care about your personal information, decisions you make can affect others you count as friends or associates. I'm not talking about a virus using your contact list to send itself - that you may not have been able to stop, although I can make a case there too.

I'm talking about your use of "free" services that you put information of any kind into that ends up with the service discovering information about your friends and associates despite the fact that they have not been given the opportunity to say no.

Browser Software Solutions

To minimize sites tracking you, you can limit your browser's cookie storage abilities. Interestingly enough, most browsers today allow far more flexibility in these settings than your e-mail programs allow in theirs.

In general, there are two types of cookies - those that last only for a "session" - meaning until you close your browser window (and any clones you have of it) or until you reboot your computer - and those that last between sessions.

In addition there are "first party" cookies and "third party" (you, the viewer being the missing "second" party). Some web sites (and Yahoo says they do this) may set a cookie for one of their advertisers which comes from a completely different web site. This is a third party cookie. First party cookies are from the site you think you're viewing. Some people turn off third party cookies and leave first ones on. Others only allow session cookies.

Some browsers allow you to treat session cookies separately from others. Some don't. Some don't tell you what they're actually doing (MS IE is one unless you go into the "advanced" settings) so you may have to dig a bit on your favourite search engine.

Even if you turn off cookies other than session cookies, some browsers allow you to add a list of sites you'll accept them from in any case. This allows you for instance to allow Google or Yahoo to recognize you when you come back (and track your travels through their pages) but not allow 3rd party cookies (unless Yahoo sets one for Google) - the best of both privacy and utility worlds but sometimes a pain to administer.

On the other hand, nobody said that "Free" didn't come with some pain did they?

Previous - Next "Legislation and a Personal Privacy Policy"

top of page

 
 

Copyright© -2008 Bannerline