What's In Your Registry?
,----[ Quote ]
| My Vista registry search uncovered my name, address and phone number, which
| were associated with online registration for photography software from a
| well-known software company and long-time Microsoft partner. The online
| account information chilled me. From the information contained in the
| registry about the accounts, someone could have gotten at least one password
| with some thoughtful social engineering. Could my, or your, privacy be
| compromised by such a registry entry?
|
| Absolutely, Jaquith warned: "Because [the registry] centralizes application
| configuration information and user preferences, it also becomes a natural
| target for malicious parties who want to mine the registry for information,
| install 'run keys' that execute spyware when the computer starts up and the
| like."
`----
http://www.microsoft-watch.com/content/security/whats_in_your_registry.html
Privacy bombs from Microsoft. Many of them exist. Recent examples below. At the
same time, being the hypocrite that Microsoft is, it uses privacy as FUD
against Google.
Related:
Yahoo!, Microsoft ink web pact with Chinese government
,----[ Quote ]
| Microsoft and Yahoo! have signed a pact with the Chinese government
| that "encourages" the big name web players to record the identities of
| bloggers and censor content. So says Reporters Without Borders, an
| organization that fights for journalistic rights across the globe.
`----
http://www.theregister.co.uk/2007/08/24/yahoo_and_microsoft_ink_chinese_blogging_pact/
Microsoft, Yahoo Tailor Ads To Users' Behavior
,----[ Quote ]
| Google will remain on the sidelines — at least for now. But its Web portal
| rivals are stepping up their efforts to use behavioral targeting to make
| display, or banner, ads more relevant to Web site visitors.
`----
http://investors.com/editorial/IBDArticles.asp?artsec=17&issue=20070823
,----[ Quote ]
| Vista--Microsoft’s latest operating system--may prove to be most
| appropriately named, especially for those seeking evidence of how a
| computer was used.
`----
http://www.abanet.org/journal/ereport/jy13tkjasn.html
http://news.softpedia.com/news/Forget-about-the-WGA-20-Windows-Vista-Features-and-Services-Harvest-User-Data-for-Microsoft-58752.shtml
Microsoft patents the mother of all adware systems
,----[ Quote ]
| The adware framework would leave almost no data untouched in its quest to
| sell you stuff. It would inspect "user document files, user e-mail files,
| user music files, downloaded podcasts, computer settings, computer status
| messages (e.g., a low memory status or low printer ink)," and more. How could
| we have been so blind as to not see the marketing value in computer status
| messages?
`----
http://arstechnica.com/news.ars/post/20070717-microsoft-patents-the-mother-of-all-adware-systems.html
New software can identify you from your online habits
,----[ Quote ]
| That is the spectre raised by new research conducted by Microsoft.
| The computing giant is developing software that could accurately
| guess your name, age, gender and potentially even your location,
| by analysing telltale patterns in your web browsing history. But
| experts say the idea is a clear threat to privacy - and may be
| illegal in some places.
`----
http://www.newscientisttech.com/article.ns?id=mg19426046.400&feedId=being-human_rss20
http://tinyurl.com/2lrazk
Microsoft could be teaching police to hack Vista
,----[ Quote ]
| Microsoft may begin training the police in ways to break the
| encryption built into its forthcoming Vista operating system.
`----
http://www.vnunet.com/vnunet/news/2150555/microsoft-teaching-police-hack
UK holds Microsoft security talks
,----[ Quote ]
| "UK officials are talking to Microsoft over fears the new version of
| Windows could make it harder for police to read suspects' computer files."
`----
http://news.bbc.co.uk/1/hi/uk_politics/4713018.stm
Data Protection Commissioner criticizes search of private PCs online
,----[ Quote ]
| "In the case of a search via the Internet a police officer covertly,
| without the person knowing about it, accesses a person's computer."
| During such an operation he or she might copy data and obtain all
| kinds of personal documents; the police officer was acting as a "state
| hacker," so to speak. Mr. Schaar observed. "Such an approach is in
| conflict with the legal obligation to protect the core of
| individuals' privacy," Mr. Schaar stated emphatically.
`----
http://www.heise.de/english/newsticker/news/82529/from/rss09
|
|