Why so many web sites are plain lying when they say "We Respect Your Privacy" ?
Well... simple ... Ask at yourself the following question :
- Say you establish a rule.
If people do not understand that rule, can you expect they will respect it ?
... dare to bring up, with any of you friends, the "privacy" matter ...
❝... I don't care, |
So... If "Privacy" is not related with "hidding something", 2 questions pops up : 1) Why so many people are induced in a wrong believe ? 2) and ... What really is "privacy" ? |
click here to keep reeding ...
Autopsy of the World Biggest Lie ever × CLOSE
Dictionaries are usually handy : Privacy - The state of being apart from company or observation. Secrecy - The act of keeping information hidden.
...I do not know about you, but me, I am feeling happy, because, now, I know how to spell it ...
Let us try an alternative a better approach. |
From Latin, Confidentia, Confido, for short ... "done with trust" ... but trust in what ?
Well, simply put, trust in that it1) will not be used in a non agreed way or for a non agreed purposes, which, unmistakably, implies and requires a prior and fully enlightened consent. But, perhaps, the why "I have nothing to hide" is so dumb, lays it the following explanation. Assume you have a car, assume you are a very very nice person, so nice, that you opted to let anyone use your car any time, |
any place, you even leaves the keys "there" to ease it ! Then, one day, some one use your car, hit in a fatal accident, a mother and her child, and run. Simply put, you will be charged, legally, to have provided the murder weapon, and then, you will discover further the notion off blind niceness there is the notion os responsibility. So "hidding" or not, your car, is a silly thought. What instead is expected you to do, is : prevent unwanted use to help to avoid unwanted consequences. |
❝... Come on ! ... my data... Wrong ! The same way "your car" – from the former example – is not used directly against you, your data are not going to be used directly against you. But they are going to be used, together with the data of others, and by the power their conjunction provides, to re shape a world, an economy, which give a extraordinarily crushing advantage to a few priviledged one, and, eventually prevent the you and me, normal, people to find fair products and services, decent jobs, and affordable housing. |
The painful question is : "If such dishonest intent would have been made clear to you before ticking Not trying to offend anyone here. But, am I the only one feeling offended by the so small prints, sentences so foggy that it is impossible to the normal human to get through without physically falling asleep ? Finally, the real question to me is: Am I able to do a web site 100% fair for the users rights ? I have worked without doing compromises for it, and I think, yes, it is ! |
❝ - But I like to share ... It do not want to stay alone ... ! ❞ |
... Come on ... No one likes to be alone. Everyone needs some sharing... |
click here to keep reeding ...
I am designing this web site and service in a manner where every user can share with other users, without removing from them any control and decision about where the data are allowed to go. For example, this web site do not use cookies at all ! The users preferences, like the chosen language, are information which never leaves the user computer and are stored in a sqlite3 file local to their computer.
That file can be read and modified freely by the user, using tools like "DB Browser for SQLite", available for Linux Windows and Mac,
http://sqlitebrowser.org/dl/
For the user not IT erudite but nonetheless curious, here is an easy "how to see it", Windows users, download the zip (no need to install), unzip, click on "DB Browser for SQ lite.exe"
Linux users, (debian) |
Linux users, (rpm)
Linux users, (rpm new)
then type sqlitebrowser [ENTER] In "DB Browser for sqlite :" "File Open", navigate in your system to the file "webappstore.sqlite"
Linux:
Windows:
Mac: |
Lookup then in 2nd column "Browse Data"
On top field "Filter", write the web site address in backward Look now in columns 4 and 5, "key" and "value". You can see in the used and stored information. This information never leaves your computer to go outside in internet. Further, some information, like language, is left stored in this file, other informations are stored temporarily and removed at each session ends, and some information are not stored at all. For the more technically inclined, the mechanism use a new API from HTML version 5, offering 2 methods, localStorage.setItem() and localStorage.getItem() and is 100% w3 standard compliant. On the next panel, you can see exactly which data are used. |
Remember:
I am working to provide here the sharing tools you do want/need. You are not kinda some silent actor. Feel free to let me know your wish or request and I will openly talk with you about it.
Thank you very much for your time and your attention.
Click here to see which data are used and how.
data | use | where | then |
---|---|---|---|
Internet Address from where you connect (IP) | Only to manage the current connection with you | Web-server logs | Auto-erased after session, except in abuse cases. |
Connection (date/time/duration) |
Only to manage current connection with you | Web-server logs | Auto-erased after session, except in abuse cases. |
Connection status (connected/active/...) | Not used | -- | -- |
Geo localisation | Not used | -- | -- |
Visited pages | Only to manage current connection with you | Web-server logs | Auto-erased after session, except in abuse cases. |
User behaviour | Not used | -- | -- |
User performance | Not used | -- | -- |
Requests of not anymore existing pages | Used to create redirections to possible update pages | Web-server logs - maintenance logs | Manually erased |
Username (login) | To map against matching password hash | Web-server logs | Erased when session ended |
Password (login) | If matched with hash - authorizing session | Web-server logs | Erased from hash lists when user unregistered |
Cookies | Not used | -- | -- |
Unexpected URL requests GET/POST/CONNECT/... | Analysed to define abuse severity | Web-server logs (3 y) | Severity depending |
Repeated attempts to flood reach unpublished resources (scanning) | Analysed to define abuse severity | Web-server logs/security logs (3 y) | Severity depending |
localStorage userPrefLang |
user prefered Language remembered for next session |
user computer kept |
-- |
localStorage E2D |
Element 2 Download |
user computer sessionOnly |
-- |
localStorage selectedOS |
Element 2 Download by OS | user computer kept |
-- |
localStorage activeTable |
Table to display in Element 2 Download |
user computer sessionOnly |
-- |
- no cdn (cross development networked scripts) leaking IPs or other data to third parties ;
- all scripts and css' are download prior and are then internal to this website!
Powered by w3css
all rights yet reserved