AVG defends plans to flog user data... industry weights in...

Discussion in 'privacy general' started by TheWindBringeth, Oct 14, 2015.

  1. TheWindBringeth

    TheWindBringeth Registered Member

    Joined:
    Feb 29, 2012
    Posts:
    2,171
    http://www.theregister.co.uk/2015/10/14/avg_anon_data_brokering_analysis/
     
  2. Amanda

    Amanda Registered Member

    Joined:
    Aug 8, 2013
    Posts:
    2,115
    Location:
    Brasil
    I honestly think this is OK for the time being. If I'm getting something for free, why not help the company too? This is why I actually display YouTube ads nowadays, and I can't seem to find anything too absurd about them.

    I'm also using my Youtube account :isay: Better support Google then Facebook.

    Disclaimer: I don't use GMail, just YouTube. My Google account help me sort things out.
     
  3. mirimir

    mirimir Registered Member

    Joined:
    Oct 1, 2011
    Posts:
    9,252
    I don't see how any of that stuff can be "anonymized".
     
  4. RejZoR

    RejZoR Lurker

    Joined:
    May 31, 2004
    Posts:
    6,426
    Client side data stripping.

    For example, malware detected in:
    C:\Users\RejZoR\Local\Desktop\malware.exe

    This string is stripped of user identifiers on user's PC before it's sent to AV vendor cloud and what vendor receives is:
    C:\Users\USERNAME\Local\Desktop\malware.exe

    or

    C:\Users\UNIQUE_USER_ID\Local\Desktop\malware.exe

    In order to keep context while not really knowing what user was that. Sure technically you could dig it out who that was, but in a way they need such behavior in order to know when same system has been getting different infections in the same location.

    This is just one of more obvious examples, but it would be nice if you'd actually know what specifically they collect and how they strip the dataw ith such before and after examples. And then you have to trust them they are actually doing this.
    Some may receive full data and stripp it server side at the entry point so they get the full data, but you have to trust them again that they actually strip the data before it's further processed.
     
  5. mirimir

    mirimir Registered Member

    Joined:
    Oct 1, 2011
    Posts:
    9,252
    There are too many patterns and connections for that to be anonymous.
     
  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.