Spyware: Difference between revisions
I've added quite a bit, don't feel like summarizing it all :/ |
m Added the letter s at the end of "Password" & "Phone number", |
||
| Line 14: | Line 14: | ||
The Legally collected data may also just be diagnostic data or just a way to make things "more convenient"(like with cookies). | The Legally collected data may also just be diagnostic data or just a way to make things "more convenient"(like with cookies). | ||
=== Data that tends to get collected:<ref name=":0" /> === | ===Data that tends to get collected:<ref name=":0" />=== | ||
* Username | *Username | ||
* | *Passwords | ||
* Email addresses | *Email addresses | ||
* Diagnostic data(how you use their platform, errors & crash reports, logs, etc) | *Diagnostic data(how you use their platform, errors & crash reports, logs, etc) | ||
* Phone | *Phone Numbers | ||
* Payment Information | *Payment Information | ||
* Stored videos & photos | *Stored videos & photos | ||
* Metadata of photos & files | *Metadata of photos & files | ||
* Stored documents | *Stored documents | ||
* Contact info from other devices. | *Contact info from other devices. | ||
* Internet-protocol(IP) addresses | *Internet-protocol(IP) addresses | ||
* Browser Type | *Browser Type | ||
* Device Type | *Device Type | ||
==Why it is a problem== | ==Why it is a problem== | ||
| Line 38: | Line 38: | ||
#Info-stealer: This type of spyware takes data from the device, such as recent actions, applications, etc. | #Info-stealer: This type of spyware takes data from the device, such as recent actions, applications, etc. | ||
#Key-loggers: Key-loggers are a type of Info-stealer that gains access to data by observing keystrokes done by a user on an infected machine(This data is then saved onto an encrypted log file). | #Key-loggers: Key-loggers are a type of Info-stealer that gains access to data by observing keystrokes done by a user on an infected machine(This data is then saved onto an encrypted log file). | ||
#Rootkits: Rootkits allow infiltrators extreme levels of access to a device(around administrator level). | #Rootkits: Rootkits allow infiltrators extreme levels of access to a device(around administrator level). | ||
== Methods used by companies(Legal)<ref>{{Cite web |last=Davis |first=Lakisha |date=11 Apr 2025 |title=Data Harvesting 101: What Companies Know About You (And How They Use It) |url=https://metapress.com/data-harvesting-101-what-companies-know-about-you-and-how-they-use-it/ |access-date=20 Jan 2025 |website=metapress.com}}</ref> == | ==Methods used by companies(Legal)<ref>{{Cite web |last=Davis |first=Lakisha |date=11 Apr 2025 |title=Data Harvesting 101: What Companies Know About You (And How They Use It) |url=https://metapress.com/data-harvesting-101-what-companies-know-about-you-and-how-they-use-it/ |access-date=20 Jan 2025 |website=metapress.com}}</ref>== | ||
# Cookies: Small pieces of data stored in files on your device(s). This type of data may include, but is not limited to: Preferences on websites, login information, & your browser history. | #Cookies: Small pieces of data stored in files on your device(s). This type of data may include, but is not limited to: Preferences on websites, login information, & your browser history. | ||
# Tracking Pixels: Tracking pixels are incredibly small images that are embedded into websites or emails. This method allows companies to see how users interact with their content on the web. | #Tracking Pixels: Tracking pixels are incredibly small images that are embedded into websites or emails. This method allows companies to see how users interact with their content on the web. | ||
# Accounts & Online Forms: Websites typically have users sign up with an account so they can tie data to it. Both account setup and forms similar to it tend to require data such as: Email addresses, phone numbers, Names, & sometimes data that should be optional(like your location). | #Accounts & Online Forms: Websites typically have users sign up with an account so they can tie data to it. Both account setup and forms similar to it tend to require data such as: Email addresses, phone numbers, Names, & sometimes data that should be optional(like your location). | ||
# Device & location tracking: Some websites will request access to your geographical position(which can be declined), but what tends to be collected more often are IP addresses(tends to be outside of your control). | #Device & location tracking: Some websites will request access to your geographical position(which can be declined), but what tends to be collected more often are IP addresses(tends to be outside of your control). | ||
== See also == | ==See also== | ||
* [[Anti-privacy legislation]](Extremely undeveloped article, but still on the topic of privacy) | *[[Anti-privacy legislation]](Extremely undeveloped article, but still on the topic of privacy) | ||
* [[Data brokers]] | *[[Data brokers]] | ||
* [[Device fingerprint]] | *[[Device fingerprint]] | ||
==References== | ==References== | ||