From: Geoff Berrow on
On Mon, 1 Feb 2010 19:44:25 +0000,
real-address-in-sig(a)flur.bltigibbet.invalid (Rowland McDonnell) wrote:

>Geoff Berrow <blthecat(a)ckdog.co.uk> wrote:
>
>> real-address-in-sig(a)flur.bltigibbet.invalid (Rowland McDonnell) wrote:
>>
>> >> Cookies can be very useful to the user as well as the site operator.
>> >
>> >Can be *slightly* useful to the user, not *very* useful - except for
>> >those sites where the site controller, being evil, sets things up so
>> >that you've got to have cookies on to permit them to track you more
>> >readily and gather more detailed information on you, a behaviour that I
>> >find most odious.
>>
>> Well I must declare an interest here, in that, as a web developer I'm
>> responsible for the odd cookie, though mostly nothing more than
>> session variables.
>
>Which means `usually a breach of personal privacy' - and sometimes very
>much worse than that.
>
>`Session variables' - like a username and password pair in some cases,
>for example. Hardly harmless, these session variables you mention.
>Especially when they're available between sessions and to anything that
>cares to look 'em up.

Rubbish. OK, technically I could store a username and password pair
but that would be ridiculous and unnecessary. If you send me
information, I would store it in a database. If you ask me to
remember you, I may store something that identifies you, or your last
visit in a cookie. And they are not 'available between sessions and
to anything that cares to look 'em up'. Cookies are sent along with
http requests to the site that created them.
>
>> >The problem with cookies generally is that the user doesn't know and
>> >can't find out what they are for, in general, nor what information is in
>> >them, nor how that information might be used.
>>
>> Pretty easy to find out.
>
>I've never been able to figure out how, so I'm certain that you're wrong
>about that.

In Firefox you can view the cookies and their content.
>
>> >The user must trust those who put cookies on their computer - which,
>> >obviously, only the very stupid would do. The sane user doesn't trust
>> >the operators because we know that they're up to no good trying to
>> >exploit us to the max.
>>
>> Up to a point, Lord Copper.
>
>Your meaning?

There is little if any exploitation going on with cookies. If I have
personal information on you that I wish to exploit, I'll store it
myself not trust it to your machine where it can be deleted at any
moment.
>
>> >So we have methods of dealing with cookies - i.e., not letting them
>> >persist beyond browser sessions.
>>
>> Suits me. :)
>
>But since the average user has no idea these Flash cookies exist, it's
>not possible for the typical user to even contemplate doing anything
>about 'em.

Flash cookies? When did we start talking about Flash?
>
>I'd spotted that Flash stores persistent data somewhere, and I've been
>meaning to track the place down for some time. Now I know, and I'm
>hopping mad at what's been going on behind my back.

I'd suggest you vent your anger someplace where it really matters.
>
>> >> Some cookies are simply stored in memory and disappear when the
>> >> browser is closed. It's wrong to treat them all as works of the
>> >> devil.
>> >
>> >It's a big mistake to assume attitudes like that, because you end up
>> >having a totally wrong view of the world.
>> >
>> >The point is that cookie-like entities *are* the work of the devil when
>> >they're totally out of the users control, totally out of sight of the
>> >user, and are *NOT* removed when the browser is closed.
>>
>> Well there /are/ constructive uses of a persistent cookie, usually for
>> storing user preferences. Mostly, deleting them will result in a loss
>> of functionality. You takes your choice.
>
>The point is that we have no /informed/ choice, meaning that we have no
>real choice at all.

Well several here have been trying to inform you but you have it in
your head that cookies are evil and so there is no hope really, is
there?
>
>The only sane user response is to deny all Websites the ability to store
>cookies at all, unless doing so renders it unusable - and in such cases,
>cookies must be deleted after each session.
>
>Nothing else is sane - the cookie-planters and -users cannot be trusted,
>because we don't know who they are or what they are doing.

Here's what you do right. See that Internet cable? Yank it right
out. It's the only sane thing to do.

>
>> >And I had 255 of the bloody things!
>>
>> So what? They are tiny and are extremely unlikely to have been doing
>> any harm.
>
>So you claim - but how could I confirm that they are in fact all utterly
>benign, not breaching my privacy in any way I object to, and will all of
>them always prove to be so at absolutely all times in the future?
>
>I know *nothing* about what's in them - your judgement that it's
>`extremely unlikely' that they're harmful is meaningless and useless.
>The risk exists, no data on the degree of risk exists, they are a
>totally unknown quantity.
>
>That's `So what'.

Yank the cable out and close your account. Think of the money you'll
save.

<snip>

I can't be bothered any more.
--
Geoff Berrow (Put thecat out to email)
It's only Usenet, no one dies.
My opinions, not the committee's, mine.
Simple RFDs www.4theweb.co.uk/rfdmaker

From: Pd on
James Taylor <usenet(a)oakseed.demon.co.uk.invalid> wrote:

> Even if you tell people they're totally insecure and their privacy is at
> risk, most people are too preoccupied with other priorities to spend any
> time looking into what they'd need to understand to know what they'd
> need to understand. Life's too short. Indeed some people prefer to
> believe they're using a secure computing platform (eg. Apple) because to
> entertain the possibility that it might not be secure is inconceivable
> to their puny minds.

Damn straight. *I* don't want to have to be a computer security expert.
I'm not as clever as those bright young hackers in their basement flat
in Dnepropetrovsk, weedling their way into my Facebook profile. I want
the brilliant champions of the capitalist market driving to work in
their Porsches to figure out how I can get my mail, browse a few
websites, ogle some naked ladies, watch a movie, download the latest
knitting pattern, all without having my bank account cleaned out by the
black hats. It's not my job to be a security expert - that's the
computer people's job.

In short, I *like* the way the iPad/iPhone is locked down so that Apple
has control, and hopefully doesn't let the bad guys screw me over.
And yes, they should apply the same effort to making sure my iMac is
secure from attack, cos I don't have the time, knowledge or skill to do
it myself with my puny mind.

--
Pd
From: Geoff Berrow on
On Tue, 2 Feb 2010 10:08:20 +0000, peterd.news(a)gmail.invalid (Pd)
wrote:

>In short, I *like* the way the iPad/iPhone is locked down so that Apple
>has control, and hopefully doesn't let the bad guys screw me over.
>And yes, they should apply the same effort to making sure my iMac is
>secure from attack, cos I don't have the time, knowledge or skill to do
>it myself with my puny mind.

I must admit, I would have been very wary about installing (and
configuring) the NatWest app had it not come from the appstore.
--
Geoff Berrow (Put thecat out to email)
It's only Usenet, no one dies.
My opinions, not the committee's, mine.
Simple RFDs www.4theweb.co.uk/rfdmaker

From: Jack Campin - bogus address on
>>>> The problem with cookies generally is that the user doesn't know and
>>>> can't find out what they are for, in general, nor what information is in
>>>> them, nor how that information might be used.
>>> Pretty easy to find out.
>> I've never been able to figure out how, so I'm certain that you're
>> wrong about that.
> In Firefox you can view the cookies and their content.

The content is usually a string of gibberish and there is no publicly
documented way to find out what it means.

The commonest kinds of cookie I see are called "_utma" and "_utmz".
Lots of sites leave them, so I presume they are usually in some
standard format, but I've never seen it described even for this simple
case. And there's nothing to stop a site from using those filenames
to store whatever it wanted.

(I have cookies enabled for sites I have reason to trust, and I draw
that boundary quite widely - I'm not messianic about this).


>>>> So we have methods of dealing with cookies - i.e., not letting them
>>>> persist beyond browser sessions.
>>> Suits me. :)
>> But since the average user has no idea these Flash cookies exist, it's
>> not possible for the typical user to even contemplate doing anything
>> about 'em.
> Flash cookies? When did we start talking about Flash?

Flash cookies are not subject to management by the browser - they will
always persist indefinitely. And since they're stored somewhere rather
obscure, they provide a much better trace of what the user has been
looking at than the browser's own caches.

I've no idea what sort of data Flash cookies encode, anybody know?
I'd bet a police forensics team could call on somebody who does.

-----------------------------------------------------------------------------
e m a i l : j a c k @ c a m p i n . m e . u k
Jack Campin, 11 Third Street, Newtongrange, Midlothian EH22 4PU, Scotland
mobile 07800 739 557 <http://www.campin.me.uk> Twitter: JackCampin
From: James Taylor on
Pd wrote:

> James Taylor wrote:
>
>> Even if you tell people they're totally insecure and their privacy is at
>> risk, most people are too preoccupied with other priorities to spend any
>> time looking into what they'd need to understand to know what they'd
>> need to understand. Life's too short. Indeed some people prefer to
>> believe they're using a secure computing platform (eg. Apple) because to
>> entertain the possibility that it might not be secure is inconceivable
>> to their puny minds.
>
> Damn straight. *I* don't want to have to be a computer security expert.
[...]
> It's not my job to be a security expert - that's the computer
> people's job.

I totally understand that and would support anyone in claiming the right
to use their computers constructively without having to worry about
security. Even as a security specialist, or perhaps *especially* as a
security specialist, I see the security arms race as a never ending
struggle and waste of productivity for all concerned. Sadly, this is the
world we live in and while there is money in it there will always be bad
guys out to exploit the unwary and unprepared. It's human nature.

> I want the brilliant champions of the capitalist market driving to
> work in their Porsches to figure out how I can get my mail, browse a
> few websites, ogle some naked ladies, watch a movie, download the
> latest knitting pattern, all without having my bank account cleaned
> out by the black hats.

Then I fear you will be waiting in vain. There's plenty of money in
hacking, but very little in selling security and privacy because so few
of the potential customers fully understand the threat, or really care
about it enough to pay for it. Furthermore, no automated security
defence is 100% foolproof. It is always necessary for users to be
somewhat aware of the ways they can be tricked, and most people, quite
rightly, have better things to do with their time.

> In short, I *like* the way the iPad/iPhone is locked down so that Apple
> has control, and hopefully doesn't let the bad guys screw me over.

If you believe that, you're being naive. Apple, of all the computer
system producers, is the least proactive about security. Don't think
that just because a product such as the iPhone or iPad is restrictive
from a user's point of view that a hacker can't exploit it easily.

--
James Taylor