AVG defends plans to flog user data... industry weights in...

Discussion in 'privacy general' started by TheWindBringeth, Oct 14, 2015.

  1. TheWindBringeth

    TheWindBringeth Registered Member

    Joined:
    Feb 29, 2012
    Posts:
    2,084
    http://www.theregister.co.uk/2015/10/14/avg_anon_data_brokering_analysis/
     
  2. amarildojr

    amarildojr Registered Member

    Joined:
    Aug 8, 2013
    Posts:
    1,959
    Location:
    Brasil
    I honestly think this is OK for the time being. If I'm getting something for free, why not help the company too? This is why I actually display YouTube ads nowadays, and I can't seem to find anything too absurd about them.

    I'm also using my Youtube account :isay: Better support Google then Facebook.

    Disclaimer: I don't use GMail, just YouTube. My Google account help me sort things out.
     
  3. mirimir

    mirimir Registered Member

    Joined:
    Oct 1, 2011
    Posts:
    6,024
    I don't see how any of that stuff can be "anonymized".
     
  4. RejZoR

    RejZoR Registered Member

    Joined:
    May 31, 2004
    Posts:
    6,426
    Client side data stripping.

    For example, malware detected in:
    C:\Users\RejZoR\Local\Desktop\malware.exe

    This string is stripped of user identifiers on user's PC before it's sent to AV vendor cloud and what vendor receives is:
    C:\Users\USERNAME\Local\Desktop\malware.exe

    or

    C:\Users\UNIQUE_USER_ID\Local\Desktop\malware.exe

    In order to keep context while not really knowing what user was that. Sure technically you could dig it out who that was, but in a way they need such behavior in order to know when same system has been getting different infections in the same location.

    This is just one of more obvious examples, but it would be nice if you'd actually know what specifically they collect and how they strip the dataw ith such before and after examples. And then you have to trust them they are actually doing this.
    Some may receive full data and stripp it server side at the entry point so they get the full data, but you have to trust them again that they actually strip the data before it's further processed.
     
  5. mirimir

    mirimir Registered Member

    Joined:
    Oct 1, 2011
    Posts:
    6,024
    There are too many patterns and connections for that to be anonymous.
     
Loading...