People with only a casual concern for Internet privacy need not achieve total anonymity. Internet users may protect their privacy through controlled disclosure of personal information. The revelation of IP addresses, non-personally-identifiable profiling, and similar information might become acceptable trade-offs for the convenience that users could otherwise lose using the workarounds needed to suppress such details rigorously. On the other hand, some people desire much stronger privacy. In that case, they may try to achieve Internet anonymity to ensure privacy — use of the Internet without giving any third parties the ability to link the Internet activities to personally-identifiable information of the Internet user. In order to keep their information private, people need to be careful with what they submit to and look at online. When filling out forms and buying merchandise, that becomes tracked and because the information was not private, some companies are now sending Internet users spam and advertising on similar products.
There are also several governmental organizations that protect individual's privacy and anonymity on the Internet, to a point. In an article presented by the FTC, in October 2011, a number of pointers were brought to attention that helps an individual internet user avoid possible identity theft and other cyber-attacks. Preventing or limiting the usage of Social Security numbers online, being wary and respectful of emails including spam messages, being mindful of personal financial details, creating and managing strong passwords, and intelligent web-browsing behaviours are recommended, among others.[9]
Posting things on the Internet can be harmful or in danger of malicious attack. Some information posted on the Internet is permanent, depending on the terms of service, and privacy policies of particular services offered online. This can include comments written on blogs, pictures, and Internet sites, such as Facebook and Twitter. It is absorbed into cyberspace and once it is posted, anyone can potentially find it and access it. Some employers may research a potential employee by searching online for the details of their online behaviours, possibly affecting the outcome of the success of the candidate.
Information Sourced from;
https://en.wikipedia.org/wiki/Internet_privacy
Outro Song From; Meadows Of World Peace
@MeadowsoOfWorldPeace
https://soundcloud.com/meadowsofworldpeace/up-high
Body Sourced From:
Code 2600 - Computer History, Hacking and Surveillance Documentary
https://youtu.be/F8uuRSfDqiU
Public Access America
PublicAccessPod Productions
Footage edited by PublicAccessPod
producer of Public Access America
Podcast Links
Stitcher: goo.gl/XpKHWB
iTunes: goo.gl/soc7KG
GooglePlay: goo.gl/gPEDbf
YouTube goo.gl/xrKbJb