Microsoft Privacy & Safety
Microsoft's Approach to Helping Protect Privacy and Safety Online
Non-Personal Information - like where you live?
Kim Cameron of Microsoft writes on his Identity Blog: Non-Personal Information - like where you...
Author: David Burt Date: 08/25/2010
A Guide to Data Governance for Privacy, Confidentiality and Compliance Part 5: Moving to Cloud Computing
Javier Salido, Senior Program Manager, Trustworthy Computing Group and Doug Cavit, Principal...
Author: David Burt Date: 08/17/2010
NCSA Survey Finds Americans as Concerned about Losing Data as their Jobs
The National Cyber Security Alliance (NCSA) and the Anti-Phishing Working Group (APWG) have released...
Author: David Burt Date: 08/10/2010
Online privacy, Tracking, and IE8’s InPrivate Filtering
Dean Hachamovitch, Microsoft General Manager for Interent Explorer writes on the Interent Explorer...
Author: David Burt Date: 08/04/2010
Using Consumer Identities for Business Interactions
Microsoft's Kim Cameron writes on his Identity Blog: Using Consumer Identities for Business...
Author: David Burt Date: 07/14/2010
How the bad guys use Search Engine Optimization
Jimmy Kuo, Principal AntiVirus Researcher writes on the Microsoft Malware Protection Center blog:...
Author: David Burt Date: 07/14/2010
Doing it right: Touch2Id
Microsoft's Kim Cameron writes on his Identity blog: And now for something refreshingly different:...
Author: David Burt Date: 07/07/2010
Outsmarting social engineering threats with SmartScreen
John Scarrow, General Manager – Safety Services for Windows Live writes on the Windows Live...
Author: David Burt Date: 07/07/2010
Windows Live Messenger Connect – Making your data more portable while retaining control over its use
Angus Logan on the Windows Live Blog writes: Last week Omar Shahine blogged about our new privacy...
Author: David Burt Date: 06/29/2010
Windows Live Identity (authentication, profile & relationships)
Angus Logan writes on the Windows Live Blog: There are over 500 million Windows Live IDs that are...
Author: David Burt Date: 06/28/2010
National Strategy for Trusted Identities in Cyberspace
The report understands the spectrum of use cases and specifically calls out the need for identity...
Author: David Burt Date: 06/27/2010
Apple giving out your iPhone fingerprints and location
The company says it may now collect, use, transfer, and disclose our iPhone, iPad or computer...
Author: David Burt Date: 06/26/2010
ID used to save “waggle dance”
Tiny RFID tags used to track movements of bees
Author: Anonymous Date: 06/21/2010
Harvesting phone and laptop fingerprints for its database
Google says the user’s device sends a request to its location server with a list of all MAC...
Author: Anonymous Date: 06/20/2010
Trip down memory lane
There is a difference between understanding something theoretically and right in the gut.
Author: Anonymous Date: 06/20/2010
Windows Live is giving you more meaningful choices to control your privacy
From the Windows Live Blog: by Omar Shahine A few months ago I authored a post that sets the context...
Author: David Burt Date: 06/17/2010
A New Tool in the Fight against Fraud
Posted by Nancy Anderson Corporate Vice President and Deputy General Counsel on the Microsoft on the...
Author: David Burt Date: 06/17/2010
Does the non-content trump the content?
Google knew about the collection of MAC addresses, and has never said otherwise or stated that their...
Author: Anonymous Date: 06/16/2010
Title 18 - Part II - Chapter 206 - § 3121
§ 3121. General prohibition on pen register and trap and trace device use; exception
Author: Anonymous Date: 06/16/2010
Privacy in the Era of Social Media and Cloud Computing
Posted by Peter Cullen, Chief Privacy Strategist from the Microsoft on the Issues Blog: I have been...
Author: David Burt Date: 06/15/2010
Education and Empowerment: Making the Internet Safer For Children
Reposted from the Microsoft on the Issues blog: Posted by Caroline Curtin Policy Counsel, U.S....
Author: David Burt Date: 06/15/2010
Conor changes his mind
Conor: Google has clearly stepped into the arena of doing something that could be detrimental to the...
Author: Anonymous Date: 06/13/2010
Identityblog Information Card registration working again
Leave comments by logging in with an Information Card or by sending me an email
Author: Anonymous Date: 06/13/2010
Why location services have to be done right…
49% of testers said privacy and security concerns were the top reason they don’t use check-in...
Author: Anonymous Date: 06/12/2010
Claims based identity tops IT security concerns
Gartner: Identity management projects rank first in the top five priorities for IT's security...
Author: Anonymous Date: 06/12/2010
Latitude privacy policy doesn’t fess up to what Google stores
Simply untrue: "If you hide in Latitude, we don't store your location."
Author: Anonymous Date: 06/12/2010
Rethink things in light of Google’s Gstumbler report
The report indicates Google has been purposely collecting a lot of information its defenders...
Author: Anonymous Date: 06/11/2010
Gstumbler tells all
Google's new report on its activities states, "All available MAC addresses are... written to disk...
Author: Anonymous Date: 06/10/2010
It is all Metcalfe’s fault
But the problem of network addresses is "really hairy when dealing with a high mobility...
Author: Anonymous Date: 06/10/2010
“We could all be wrong about the way 802.11 works…”
Even many experts don't understand that with network encryption enabled, the sender's and...
Author: Anonymous Date: 06/10/2010
The core of the matter at hand
All the brooms have started dancing. I wonder if Mickey will get out of this one?
Author: Anonymous Date: 06/07/2010
More input and points of view
Some comments from readers
Author: Anonymous Date: 06/07/2010
There is a fundamental problem here
Collection of the MAC addresses of phones and laptops is especially worrisome
Author: Anonymous Date: 06/06/2010
How to prevent wirelesstapping
What the &#$#&^$ is going on with encrypting WIFI and not encrypting the MAC addresses?
Author: Anonymous Date: 06/06/2010
MAC addresses will be used to reveal where you live
Once you have snooped peoples' MAC addresses, and put them into a database linking them to a street...
Author: Anonymous Date: 06/06/2010
What harm can possibly come from a MAC address?
What are the implciations of living in a world where it is legal and socially acceptable to drive up...
Author: Anonymous Date: 06/06/2010
Are SSIDs and MAC addresses like house numbers?
Do people consciously try to advertise their SSIDs and MAC addresses to the world by running to the...
Author: Anonymous Date: 06/05/2010
Microsoft helps Kentucky Department of Education to keep student data private
From the Microsoft Security Tips Blog: The Kentucky Department of Education announced today that it...
Author: David Burt Date: 06/04/2010
Ben Adida releases me from the theatre
Stealing one part of the WiFi packet is as bad as stealing another.
Author: Anonymous Date: 06/03/2010
New Videos on How to Use Windows Parental Controls
Microsoft has created a series of videos featuring real Microsoft parents. In How to use Parental...
Author: David Burt Date: 06/02/2010
Privacy is Not Dead
Omar Shahine, Lead Program Manager on the Windows Live Social Networking team writes on the Windows...
Author: David Burt Date: 04/05/2010
Happy Birthday IAPP!
The International Association of Privacy Professionals (IAPP) turns ten years old today. In...
Author: David Burt Date: 03/16/2010
RSA 2010: The Need for Workable Cross-Border Regulatory Frameworks
Last week, Scott Charney, corporate vice president for Microsoft Trustworthy Computing, gave a...
Author: David Burt Date: 03/08/2010
Identity Metasystem and the Trusted Stack
Guest Blog Post from Dan Schutzer, CTO Financial Services Technology Group, Division of the...
Author: David Burt Date: 03/02/2010