H0l0 (talk | contribs)
I've added quite a bit, don't feel like summarizing it all :/
H0l0 (talk | contribs)
m Added the letter s at the end of "Password" & "Phone number",
Line 14: Line 14:
The Legally collected data may also just be diagnostic data or just a way to make things "more convenient"(like with cookies).
The Legally collected data may also just be diagnostic data or just a way to make things "more convenient"(like with cookies).


=== Data that tends to get collected:<ref name=":0" /> ===
===Data that tends to get collected:<ref name=":0" />===


* Username
*Username
* Password
*Passwords
* Email addresses
*Email addresses
* Diagnostic data(how you use their platform, errors & crash reports, logs, etc)
*Diagnostic data(how you use their platform, errors & crash reports, logs, etc)
* Phone Number
*Phone Numbers
* Payment Information
*Payment Information
* Stored videos & photos
*Stored videos & photos
* Metadata of photos & files
*Metadata of photos & files
* Stored documents
*Stored documents
* Contact info from other devices.
*Contact info from other devices.
* Internet-protocol(IP) addresses
*Internet-protocol(IP) addresses
* Browser Type
*Browser Type
* Device Type
*Device Type


==Why it is a problem==
==Why it is a problem==
Line 38: Line 38:
#Info-stealer: This type of spyware takes data from the device, such as recent actions, applications, etc.
#Info-stealer: This type of spyware takes data from the device, such as recent actions, applications, etc.
#Key-loggers: Key-loggers are a type of Info-stealer that gains access to data by observing keystrokes done by a user on an infected machine(This data is then saved onto an encrypted log file).
#Key-loggers: Key-loggers are a type of Info-stealer that gains access to data by observing keystrokes done by a user on an infected machine(This data is then saved onto an encrypted log file).
#Rootkits: Rootkits allow infiltrators extreme levels of access to a device(around administrator level).  
#Rootkits: Rootkits allow infiltrators extreme levels of access to a device(around administrator level).


== Methods used by companies(Legal)<ref>{{Cite web |last=Davis |first=Lakisha |date=11 Apr 2025 |title=Data Harvesting 101: What Companies Know About You (And How They Use It) |url=https://metapress.com/data-harvesting-101-what-companies-know-about-you-and-how-they-use-it/ |access-date=20 Jan 2025 |website=metapress.com}}</ref> ==
==Methods used by companies(Legal)<ref>{{Cite web |last=Davis |first=Lakisha |date=11 Apr 2025 |title=Data Harvesting 101: What Companies Know About You (And How They Use It) |url=https://metapress.com/data-harvesting-101-what-companies-know-about-you-and-how-they-use-it/ |access-date=20 Jan 2025 |website=metapress.com}}</ref>==


# Cookies: Small pieces of data stored in files on your device(s). This type of data may include, but is not limited to: Preferences on websites, login information, & your browser history.
#Cookies: Small pieces of data stored in files on your device(s). This type of data may include, but is not limited to: Preferences on websites, login information, & your browser history.
# Tracking Pixels: Tracking pixels are incredibly small images that are embedded into websites or emails. This method allows companies to see how users interact with their content on the web.
#Tracking Pixels: Tracking pixels are incredibly small images that are embedded into websites or emails. This method allows companies to see how users interact with their content on the web.
# Accounts & Online Forms: Websites typically have users sign up with an account so they can tie data to it. Both account setup and forms similar to it tend to require data such as: Email addresses, phone numbers, Names, & sometimes data that should be optional(like your location).
#Accounts & Online Forms: Websites typically have users sign up with an account so they can tie data to it. Both account setup and forms similar to it tend to require data such as: Email addresses, phone numbers, Names, & sometimes data that should be optional(like your location).
# Device & location tracking: Some websites will request access to your geographical position(which can be declined), but what tends to be collected more often are IP addresses(tends to be outside of your control).  
#Device & location tracking: Some websites will request access to your geographical position(which can be declined), but what tends to be collected more often are IP addresses(tends to be outside of your control).


== See also ==
==See also==


* [[Anti-privacy legislation]](Extremely undeveloped article, but still on the topic of privacy)
*[[Anti-privacy legislation]](Extremely undeveloped article, but still on the topic of privacy)
* [[Data brokers]]
*[[Data brokers]]
* [[Device fingerprint]]
*[[Device fingerprint]]


==References==
==References==