Life has changed there is no doubt and we wanted to reach out to see how you are doing.
As we go through this interesting time, we are trying to look at this as an opportunity to focus on our family and on friends like you. Let us use this extra time to catch up and talk more. Let us cook food that is not fast, but interesting and satisfying. Let us learn to enjoy a time to try new things. Let us find ways to enjoy time at home!
Computer Security
If my client base is any experience, anyone can be a victim of a Ransomware, Malware or Virus attack.
What can you do about it?
I conduct audits of your entire computer infrastructure and apply best practice solutions to plug the security holes on your computers, Smartphones and networks.
Now offering consultations to give you the best protection possible:
404.229.0839
carlthorne@hthcatlanta.com
Jack of All Trades, Master of Many
Jack of All Trades, and Master of Many
We provide technical support for:
Homes and small businesses
Windows and the Mac OS platform
iPhones and Android Smartphones
Wireless and wired networks
New device setup
Old device upgrade or repair
One-on-one training
Remote assistance
How To Stop Malware
Home
»
Safety
» Your ISP might not be spying on you now — but you’d be crazy not to worry that it will by Rob Pegoraro
7:09 AMHigh Tech House Calls, Expert Computer Consulting
The good news: Your Internet provider can’t tell you’re reading this story.
The
bad news: It still has other ways to track what you’re interested in.
And — given the history of Internet providers tracking their users’
travels around the Web and then selling that information to advertisers —
it wouldn’t be surprising if your ISP wanted to figure out more ways to follow you online.
So far, the commission has mainly looked for — in the words of a May 2015 notice — “reasonable, good-faith steps” by ISPs to follow those rules. (The Federal Trade Commission already
exercises roughly that level of oversight, taking action when it thinks
Internet providers are being deceptive or unfair.)
Beyond their customary response — relentless litigation —
to overthrow the Net-neutrality regime, major Internet providers have
recently offered another reason not to adopt such regulations: They say
they can’t see that much of what you do, anyway.
The amount of time we spend on those other networks isn’t news. But some numbers about encryption cited in the 125-page paper did catch my eye.
Authors Peter Swire
(a longstanding privacy professional and veteran of the Clinton and
Obama administrations), Justin Hemings, and Alana Kirkland say that the
data — from the network-analysis firm Sandvine and the Center for Applied Internet Data Analysis (CAIDA),
a public/private research organization — suggest that Internet
providers are blind to half or more of the traffic they carry because
that traffic is encrypted.
Sandvine, for example, forecast last month that 70 percent of global Internet traffic will be encrypted this year. (But
the same report found that in North America in February, only 38
percent of wired-broadband traffic was encrypted.) CAIDA’s research,
meanwhile, shows the share of encrypted traffic rising from 13 percent
in April 2014 to 49 percent in February 2016.
The
paper’s conclusion: “There clearly can be no ‘comprehensive’ ISP
visibility into user activity when ISPs are blocked from a growing
majority of user activity.”
Image from CADIA site
Why you should worry
But
even when you visit encrypted sites, your Internet provider can still
see their domain names (unless you also employ a virtual-private-network
connection). As New America’s Open Technology Institute pointed out in a January paper,
your mere presence at the domains of Planned Parenthood, cash-advance
services, or the National Rifle Association can reveal volumes about
you, regardless of whether or not the specific pages they send you are
encrypted.
Swire,
Hemings, and Kirkland are right that search engines, social networks,
app developers, and ad networks can gather far more data about you than
your ISP and then leverage that information to follow you wherever you go on whatever device you use.
If
you skip to page 102 of their paper, you’ll see a graphic outlining how
many parts of today’s “online ecosystem” 10 companies participate in
(see above). None have a lock on all 10 core functions (from Internet
access to online video), and the Internet providers listed look
relatively weak.
Companies
that don’t want any more regulation like to throw around data like that
to argue that, hey, it’s the other guys that need more rules. But
there’s a simpler way to read them: as a reminder that one of the better
ways to protect your privacy is to spread your business around. It
might be easier to let one company serve all of your online needs, but
that also gives that one company a much bigger magnifying glass to hold
over your online activities.
For your convenience Venmo and Zelle are also accepted for payment.
Fed up with Windows based computers?
Think an Apple Computer might be what the doctor ordered?
We can help you with that decision for free! Give us a call so we can discuss your computing needs!
Gift Certificates
What will you use your certificate for?
Making the move to an Apple laptop? My business has been running on an Apple laptop for 6 years.
You bought an iPhone. Now what? We have been working on iPhone problems since they came out and we can help.
Summer will be here before you know it. You want to surf on the internet on your wireless network from your pool. We are wireless network experts in both design and deployment.
Or you can use this gift card for any help needed (including training) for the computers in your home or small business.
The perfect present for any occasion:
Available in one hour increments.
No expiration date.
Can be used for service calls or training.
Giving a technology gift that requires setup or training? Why not add a gift certificate?