|This article needs additional citations for verification. (August 2014)|
Privacy software is software built to protect the privacy of its users. The software typically works in conjunction with Internet usage to control or limit the amount of information made available to third parties. The software can apply encryption or filtering of various kinds.
Types of Protection
Privacy software can refer to two different types of protection. One type is protecting a user's Internet privacy from the World Wide Web. There are software products that will mask or hide a user's IP address from the outside world in order to protect the user from identity theft. The second type of protection is hiding or deleting the users Internet traces that are left on their PC after they have been surfing the Internet. There is software that will erase all the users Internet traces and there is software that will hide and encrypt a user's traces so that others using their PC will not know where they have been surfing.
Whitelisting And Blacklisting
One solution to enhance privacy software is whitelisting. Whitelisting is a process in which a company identifies the software that it will allow to and does not try to recognize malware. Whitelisting permits acceptable software to run and either prevents anything else from running or lets new software run in a quarantined environment until the can verify its validty. Whereas whitelisting allows nothing to run unless it is on the whitelist, blacklisting allows everything to run unless it is on the black. A blacklist then includes certain types of software that are not allowed to run in the company environment. For example, a company might blacklist peer-to-peer file sharing on its systems. In addition to software, people, devices, and web sites can also be whitelisted or blacklisted.
Intrusion Detection Systems
Intrusion detection systems are designed to detect all types of malicious network traffic and computer usage that cannot be detected by a firewall. These systems capture all network traffic flows and examine the contents of each packet for malicious traffic.
Encryption is another form for privacy security. When organizations do not have secure channel for sending information, they use encryption to stop unauthorized eavesdroppers. Encryption is the process of converting an original message into a form that cannot be read by anyone except the intended receiver.
Steganography is sometimes used to hide messages from eavesdropping and e-surveillance.
Privacy v Anonymity
Privacy is different from Anonymity in its applicability and usage.
Legal Issues Of Use Of Privacy Software
Uses of privacy software are not free from legal issues. For instance, there are regulations for Export of cryptography from the United States. Similarly, Key disclosure law also requires individuals to surrender cryptographic keys to law enforcement agencies. Encryption laws in India also carry many legal restrictions in diverse situations. Talks are also in pipeline to include cyber security technologies, like encryption related software, under the Wassenaar Arrangement thereby making its export more cumbersome.
- Tox (software)
- GNU Privacy Guard (GPG)
- Portable Firefox
- Pretty Good Privacy (PGP)
- Secure Shell (SSH)
- I2P - The Anonymous Network
- Tor (anonymity network)
- "Encryption Laws In India". Cyber Law, Cyber Security, Telecom Laws And Telecom Security Legal Due Diligence And Statutory Compliance Services In India. 4 June 2014. Retrieved 25 August 2014.
- "India Opposes Proposal To Include Cyber Security Technologies Under The Wassenaar Arrangement". International Legal Issues Of Cyber Attacks, Cyber Terrorism, Cyber Espionage, Cyber Warfare And Cyber Crimes. 20 June 2014. Retrieved 25 August 2014.
- Reset The Net Accessed On 25 August 2014.
- PRISM Break Accessed On 25 August 2014
- Self Defence And Privacy Protection In India Must Be Ensured Dated 12 June 2013, Accessed On 25 August 2014
- Riley v. California, No. 13–132, 573 U. S. (2014)- U.S. Supreme Court’s Case On Search Of Cell Phone Of An Arrested Person Without Warrant Dated 27 June 2014, Accessed On 25 August 2014.