255
edits
No edit summary |
No edit summary |
||
| Line 8: | Line 8: | ||
* There are different degrees of privacy. I can (or should be able to) make choices about what information I share with whom. | * There are different degrees of privacy. I can (or should be able to) make choices about what information I share with whom. | ||
* The internet is transparent. You can view source to see how it works (???). | * The internet is transparent. You can view source to see how it works (???). | ||
* Email addresses and increasingly URLs are core to your identity online. It would be tremendously helpful if people understood the tradeoffs in using 3rd parties for this (e.g. gmail.com, wordpress.com, posterous.com, etc). | * Email addresses and increasingly URLs are core to your identity online. It would be tremendously helpful if people understood the tradeoffs in using 3rd parties for this (e.g. gmail.com, wordpress.com, facebook.com, posterous.com, etc). | ||
* There are a variety of ways that websites can store passwords. Some do a lousy job. If you reuse passwords and yours is compromised, you may have other accounts compromised (e.g. paypal.com, ebay.com, google docs, etc). | |||
* If someone compromised your email, they have tremendous power to compromise your identity elsewhere. Never give out your email password and always use strong passwords for email. | |||
* if someone's offering a service for free, there's usually a reason -- sometimes it's because they're just being nice; sometimes they're making money (or hoping to) off of your use somehow. understanding that is a good idea. | * if someone's offering a service for free, there's usually a reason -- sometimes it's because they're just being nice; sometimes they're making money (or hoping to) off of your use somehow. understanding that is a good idea. | ||
edits