Note
Access to this page requires authorization. You can try signing in or changing directories.
Access to this page requires authorization. You can try changing directories.
Microsoft's Approach to Helping Protect Privacy and Safety Online
Non-Personal Information - like where you live?
Kim Cameron of Microsoft writes on his Identity Blog: Non-Personal Information - like where you...
Author: David Burt Date: 08/25/2010
A Guide to Data Governance for Privacy, Confidentiality and Compliance Part 5: Moving to Cloud Computing
Javier Salido, Senior Program Manager, Trustworthy Computing Group and Doug Cavit, Principal...
Author: David Burt Date: 08/17/2010
NCSA Survey Finds Americans as Concerned about Losing Data as their Jobs
The National Cyber Security Alliance (NCSA) and the Anti-Phishing Working Group (APWG) have released...
Author: David Burt Date: 08/10/2010
Online privacy, Tracking, and IE8’s InPrivate Filtering
Dean Hachamovitch, Microsoft General Manager for Interent Explorer writes on the Interent Explorer...
Author: David Burt Date: 08/04/2010
Using Consumer Identities for Business Interactions
Microsoft's Kim Cameron writes on his Identity Blog: Using Consumer Identities for Business...
Author: David Burt Date: 07/14/2010
How the bad guys use Search Engine Optimization
Jimmy Kuo, Principal AntiVirus Researcher writes on the Microsoft Malware Protection Center blog:...
Author: David Burt Date: 07/14/2010
Doing it right: Touch2Id
Microsoft's Kim Cameron writes on his Identity blog: And now for something refreshingly different:...
Author: David Burt Date: 07/07/2010
Outsmarting social engineering threats with SmartScreen
John Scarrow, General Manager – Safety Services for Windows Live writes on the Windows Live...
Author: David Burt Date: 07/07/2010
Windows Live Messenger Connect – Making your data more portable while retaining control over its use
Angus Logan on the Windows Live Blog writes: Last week Omar Shahine blogged about our new privacy...
Author: David Burt Date: 06/29/2010
Windows Live Identity (authentication, profile & relationships)
Angus Logan writes on the Windows Live Blog: There are over 500 million Windows Live IDs that are...
Author: David Burt Date: 06/28/2010
National Strategy for Trusted Identities in Cyberspace
The report understands the spectrum of use cases and specifically calls out the need for identity...
Author: David Burt Date: 06/27/2010
Apple giving out your iPhone fingerprints and location
The company says it may now collect, use, transfer, and disclose our iPhone, iPad or computer...
Author: David Burt Date: 06/26/2010
ID used to save “waggle dance”
Tiny RFID tags used to track movements of bees
Author: Anonymous Date: 06/21/2010
Harvesting phone and laptop fingerprints for its database
Google says the user’s device sends a request to its location server with a list of all MAC...
Author: Anonymous Date: 06/20/2010
Trip down memory lane
There is a difference between understanding something theoretically and right in the gut.
Author: Anonymous Date: 06/20/2010
Windows Live is giving you more meaningful choices to control your privacy
From the Windows Live Blog: by Omar Shahine A few months ago I authored a post that sets the context...
Author: David Burt Date: 06/17/2010
A New Tool in the Fight against Fraud
Posted by Nancy Anderson Corporate Vice President and Deputy General Counsel on the Microsoft on the...
Author: David Burt Date: 06/17/2010
Does the non-content trump the content?
Google knew about the collection of MAC addresses, and has never said otherwise or stated that their...
Author: Anonymous Date: 06/16/2010
Title 18 - Part II - Chapter 206 - § 3121
§ 3121. General prohibition on pen register and trap and trace device use; exception
Author: Anonymous Date: 06/16/2010
Privacy in the Era of Social Media and Cloud Computing
Posted by Peter Cullen, Chief Privacy Strategist from the Microsoft on the Issues Blog: I have been...
Author: David Burt Date: 06/15/2010
Education and Empowerment: Making the Internet Safer For Children
Reposted from the Microsoft on the Issues blog: Posted by Caroline Curtin Policy Counsel, U.S....
Author: David Burt Date: 06/15/2010
Conor changes his mind
Conor: Google has clearly stepped into the arena of doing something that could be detrimental to the...
Author: Anonymous Date: 06/13/2010
Identityblog Information Card registration working again
Leave comments by logging in with an Information Card or by sending me an email
Author: Anonymous Date: 06/13/2010
Why location services have to be done right…
49% of testers said privacy and security concerns were the top reason they don’t use check-in...
Author: Anonymous Date: 06/12/2010
Claims based identity tops IT security concerns
Gartner: Identity management projects rank first in the top five priorities for IT's security...
Author: Anonymous Date: 06/12/2010
Latitude privacy policy doesn’t fess up to what Google stores
Simply untrue: "If you hide in Latitude, we don't store your location."
Author: Anonymous Date: 06/12/2010
Rethink things in light of Google’s Gstumbler report
The report indicates Google has been purposely collecting a lot of information its defenders...
Author: Anonymous Date: 06/11/2010
Gstumbler tells all
Google's new report on its activities states, "All available MAC addresses are... written to disk...
Author: Anonymous Date: 06/10/2010
It is all Metcalfe’s fault
But the problem of network addresses is "really hairy when dealing with a high mobility...
Author: Anonymous Date: 06/10/2010
“We could all be wrong about the way 802.11 works…”
Even many experts don't understand that with network encryption enabled, the sender's and...
Author: Anonymous Date: 06/10/2010
The core of the matter at hand
All the brooms have started dancing. I wonder if Mickey will get out of this one?
Author: Anonymous Date: 06/07/2010
More input and points of view
Some comments from readers
Author: Anonymous Date: 06/07/2010
There is a fundamental problem here
Collection of the MAC addresses of phones and laptops is especially worrisome
Author: Anonymous Date: 06/06/2010
How to prevent wirelesstapping
What the &#$#&^$ is going on with encrypting WIFI and not encrypting the MAC addresses?
Author: Anonymous Date: 06/06/2010
MAC addresses will be used to reveal where you live
Once you have snooped peoples' MAC addresses, and put them into a database linking them to a street...
Author: Anonymous Date: 06/06/2010
What harm can possibly come from a MAC address?
What are the implciations of living in a world where it is legal and socially acceptable to drive up...
Author: Anonymous Date: 06/06/2010
Are SSIDs and MAC addresses like house numbers?
Do people consciously try to advertise their SSIDs and MAC addresses to the world by running to the...
Author: Anonymous Date: 06/05/2010
Microsoft helps Kentucky Department of Education to keep student data private
From the Microsoft Security Tips Blog: The Kentucky Department of Education announced today that it...
Author: David Burt Date: 06/04/2010
Ben Adida releases me from the theatre
Stealing one part of the WiFi packet is as bad as stealing another.
Author: Anonymous Date: 06/03/2010
New Videos on How to Use Windows Parental Controls
Microsoft has created a series of videos featuring real Microsoft parents. In How to use Parental...
Author: David Burt Date: 06/02/2010
Privacy is Not Dead
Omar Shahine, Lead Program Manager on the Windows Live Social Networking team writes on the Windows...
Author: David Burt Date: 04/05/2010
Happy Birthday IAPP!
The International Association of Privacy Professionals (IAPP) turns ten years old today. In...
Author: David Burt Date: 03/16/2010
RSA 2010: The Need for Workable Cross-Border Regulatory Frameworks
Last week, Scott Charney, corporate vice president for Microsoft Trustworthy Computing, gave a...
Author: David Burt Date: 03/08/2010
Identity Metasystem and the Trusted Stack
Guest Blog Post from Dan Schutzer, CTO Financial Services Technology Group, Division of the...
Author: David Burt Date: 03/02/2010