{"id":858,"date":"2010-12-27T10:00:57","date_gmt":"2010-12-27T16:00:57","guid":{"rendered":"http:\/\/thepizzy.net\/blog\/?p=858"},"modified":"2011-01-22T17:46:27","modified_gmt":"2011-01-22T23:46:27","slug":"privacys-a-joke-introduction","status":"publish","type":"post","link":"https:\/\/thepizzy.net\/blog\/2010\/12\/privacys-a-joke-introduction\/","title":{"rendered":"Introduction to Privacy&#8217;s a Joke"},"content":{"rendered":"<figure id=\"attachment_861\" aria-describedby=\"caption-attachment-861\" style=\"width: 300px\" class=\"wp-caption alignleft\"><br \/>\n<img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" data-attachment-id=\"861\" data-permalink=\"https:\/\/thepizzy.net\/blog\/2010\/12\/privacys-a-joke-introduction\/dreamstime_4473313hello-my-name-iscropped1\/\" data-orig-file=\"https:\/\/i0.wp.com\/thepizzy.net\/blog\/wp-content\/uploads\/2010\/12\/dreamstime_4473313hello-my-name-iscropped1.jpg?fit=480%2C326&amp;ssl=1\" data-orig-size=\"480,326\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;1&quot;}\" data-image-title=\"Secure Identity\" data-image-description=\"\" data-image-caption=\"&lt;p&gt;Source: blog.joeandrieu.com&lt;\/p&gt;\n\" data-medium-file=\"https:\/\/i0.wp.com\/thepizzy.net\/blog\/wp-content\/uploads\/2010\/12\/dreamstime_4473313hello-my-name-iscropped1.jpg?fit=300%2C204&amp;ssl=1\" data-large-file=\"https:\/\/i0.wp.com\/thepizzy.net\/blog\/wp-content\/uploads\/2010\/12\/dreamstime_4473313hello-my-name-iscropped1.jpg?fit=480%2C326&amp;ssl=1\" class=\"size-medium wp-image-861\" title=\"Secure Identity\" src=\"https:\/\/i0.wp.com\/thepizzy.net\/blog\/wp-content\/uploads\/2010\/12\/dreamstime_4473313hello-my-name-iscropped1-300x203.jpg?resize=300%2C203\" alt=\"\" width=\"300\" height=\"203\" srcset=\"https:\/\/i0.wp.com\/thepizzy.net\/blog\/wp-content\/uploads\/2010\/12\/dreamstime_4473313hello-my-name-iscropped1.jpg?resize=300%2C203&amp;ssl=1 300w, https:\/\/i0.wp.com\/thepizzy.net\/blog\/wp-content\/uploads\/2010\/12\/dreamstime_4473313hello-my-name-iscropped1.jpg?resize=150%2C101&amp;ssl=1 150w, https:\/\/i0.wp.com\/thepizzy.net\/blog\/wp-content\/uploads\/2010\/12\/dreamstime_4473313hello-my-name-iscropped1.jpg?w=480&amp;ssl=1 480w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><figcaption id=\"caption-attachment-861\" class=\"wp-caption-text\">Source: blog.joeandrieu.com<\/figcaption><\/figure>\n<p>Privacy&#8217;s a joke. Security is not.<\/p>\n<p>After dealing with online harassment for the first time on a third-party site, and with a person whose IP and other information I didn&#8217;t readily have available as the Administrator of the site, I learned a lot from how they operate to how one should respond.<\/p>\n<p>At the end of 2 months the ordeal was finally resolved. The person never confessed to the actions, and instead denied it to his family when I presented them with it, and cooperated in removing any mention of it on his social network sites. Whether the person I tracked down was the actual offender or a highly\u00c2\u00a0coincidental\u00c2\u00a0bystander, it makes little difference. The real issue, however, was the wealth of information I ended up finding about this individual combined with how easy it was to get it all.<\/p>\n<p>I decided I would start a blog post series to help others less privacy-savvy internet users make sure they aren&#8217;t broadcasting tons of personal information out to the world at large, and also how to deal with online harassment &#8211; the correct way (not the\u00c2\u00a0vigilante\u00c2\u00a0methods I used).<\/p>\n<p>The first post will be <a href=\"http:\/\/thepizzy.net\/blog\/2011\/01\/how-to-handle-online-harassment-cyber-stalking\/\">how to deal with online harassment<\/a>, and what courses of action are available. After that, I&#8217;ll show you what information is available about you on the internet, and just how easy it is to mess up an otherwise clean online identity through something as simple as Favorite-ing a Youtube video, posting an update to Twitter, or even running a website under a pseudonym. There will be a new post every Monday, starting January 3rd, 2011 @ 10:00am CST, and the series will continue as long as I have content to write about.<\/p>\n<p>The series is called &#8220;Privacy&#8217;s a Joke&#8221; because when it come to online actions, everything is\u00c2\u00a0traceable. And unless you jump through some major technical hoops (as most users don&#8217;t) then everything you do provides a little more information about who you are. However, there are things you can do to minimize what information gets put online, and who has access to it.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Privacy&#8217;s a joke. Security is not. After dealing with online harassment for the first time on a third-party site, and with a person whose IP and other information I didn&#8217;t readily have available as the Administrator of the site, I learned a lot from how they operate to how one should respond. At the end [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":false,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[706,528,3],"tags":[722,717,718,721,719,716,713,720,714,712,715,200],"class_list":["post-858","post","type-post","status-publish","format-standard","hentry","category-privacys-a-joke","category-security-tech","category-tech","tag-anti-stalking","tag-cyber-bullying","tag-cyber-harassment","tag-identity-theft","tag-online-bullying","tag-online-harassment","tag-online-privacy","tag-online-safety","tag-online-security","tag-privacy","tag-privacys-a-joke-2","tag-security"],"jetpack_publicize_connections":[],"jetpack_featured_media_url":"","jetpack_likes_enabled":false,"jetpack_shortlink":"https:\/\/wp.me\/prOO4-dQ","jetpack-related-posts":[{"id":933,"url":"https:\/\/thepizzy.net\/blog\/2011\/01\/how-to-find-yourself-online\/","url_meta":{"origin":858,"position":0},"title":"How to find yourself online","author":"[[Neo]]","date":"January 10, 2011","format":false,"excerpt":"I'm sure at one point or another, everyone has done the \"ego search.\" You go to Google, type in your name, and see what comes up about you. From what I'm told, there's even a fun ranking system based on the number of pages that show up about you. It's\u2026","rel":"","context":"In &quot;How To&quot;","block_context":{"text":"How To","link":"https:\/\/thepizzy.net\/blog\/category\/how-to\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/thepizzy.net\/blog\/wp-content\/uploads\/2011\/01\/ID-1001605881.jpg?resize=350%2C200&ssl=1","width":350,"height":200},"classes":[]},{"id":881,"url":"https:\/\/thepizzy.net\/blog\/2011\/01\/how-to-handle-online-harassment-cyber-stalking\/","url_meta":{"origin":858,"position":1},"title":"How to Handle Online Harassment &#038; Cyber Stalking","author":"[[Neo]]","date":"January 3, 2011","format":false,"excerpt":"About 15 years ago, having an email address and\/or an instant messenger screen name meant you were riding the cutting edge of the internet. A couple of years after that, the hot trend was having a MySpace profile. Today, it's generally assumed that everyone has at least a Twitter account\u2026","rel":"","context":"In &quot;How To&quot;","block_context":{"text":"How To","link":"https:\/\/thepizzy.net\/blog\/category\/how-to\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/thepizzy.net\/blog\/wp-content\/uploads\/2011\/01\/griefer.png?fit=720%2C540&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/thepizzy.net\/blog\/wp-content\/uploads\/2011\/01\/griefer.png?fit=720%2C540&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/thepizzy.net\/blog\/wp-content\/uploads\/2011\/01\/griefer.png?fit=720%2C540&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/thepizzy.net\/blog\/wp-content\/uploads\/2011\/01\/griefer.png?fit=720%2C540&ssl=1&resize=700%2C400 2x"},"classes":[]},{"id":1227,"url":"https:\/\/thepizzy.net\/blog\/2011\/03\/att-begins-service-to-text-users-in-certain-locations-nytimes-com\/","url_meta":{"origin":858,"position":2},"title":"AT&#038;T Begins Service to Text Users in Certain Locations","author":"[[Neo]]","date":"March 1, 2011","format":false,"excerpt":"According to the New York Times,\u00c2\u00a0AT&T is going to launch a text-message service to send SMS messages to customers in certain locations. Um, hell no! It's called \"ShopAlerts\" and is designed to allow \"brand-partners\" (i.e. HP, Kmart, JetBlue, S.C. Johnson, etc.) to send advertisements and coupons to customers who happen\u2026","rel":"","context":"In &quot;Privacy's a Joke&quot;","block_context":{"text":"Privacy's a Joke","link":"https:\/\/thepizzy.net\/blog\/category\/security-tech\/privacys-a-joke\/"},"img":{"alt_text":"Source: nytimes.com","src":"https:\/\/i0.wp.com\/thepizzy.net\/blog\/wp-content\/uploads\/2011\/03\/28Ads-blog4801.jpg?fit=480%2C304&ssl=1&resize=350%2C200","width":350,"height":200},"classes":[]},{"id":1095,"url":"https:\/\/thepizzy.net\/blog\/2011\/02\/using-friend-lists-for-facebook-privacy\/","url_meta":{"origin":858,"position":3},"title":"Using Friend Lists for Facebook Privacy","author":"[[Neo]]","date":"February 7, 2011","format":false,"excerpt":"To achieve a more granular level of privacy on Facebook, you can create Custom Friend Lists and use them in your privacy settings","rel":"","context":"In &quot;How To&quot;","block_context":{"text":"How To","link":"https:\/\/thepizzy.net\/blog\/category\/how-to\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/thepizzy.net\/blog\/wp-content\/uploads\/2011\/02\/2011-02-02_1531.png?fit=1002%2C636&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/thepizzy.net\/blog\/wp-content\/uploads\/2011\/02\/2011-02-02_1531.png?fit=1002%2C636&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/thepizzy.net\/blog\/wp-content\/uploads\/2011\/02\/2011-02-02_1531.png?fit=1002%2C636&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/thepizzy.net\/blog\/wp-content\/uploads\/2011\/02\/2011-02-02_1531.png?fit=1002%2C636&ssl=1&resize=700%2C400 2x"},"classes":[]},{"id":977,"url":"https:\/\/thepizzy.net\/blog\/2011\/01\/how-to-plug-your-personal-information-leaks\/","url_meta":{"origin":858,"position":4},"title":"How to plug your personal information leaks","author":"[[Neo]]","date":"January 17, 2011","format":false,"excerpt":"If you don't know where your personal information could be leaked, you'll never know where to plug it. Here's some of the common holes.","rel":"","context":"In &quot;How To&quot;","block_context":{"text":"How To","link":"https:\/\/thepizzy.net\/blog\/category\/how-to\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/thepizzy.net\/blog\/wp-content\/uploads\/2011\/01\/4199131336_63c0e1d1621-225x300.jpg?resize=350%2C200","width":350,"height":200},"classes":[]},{"id":1058,"url":"https:\/\/thepizzy.net\/blog\/2011\/01\/configuring-your-facebook-application-security-settings\/","url_meta":{"origin":858,"position":5},"title":"Configuring your Facebook Application Security Settings","author":"[[Neo]]","date":"January 25, 2011","format":false,"excerpt":"One of the least-checked settings on Facebook, is the permissions you've given every app\/game\/quiz you've ever used with the site.","rel":"","context":"In &quot;How To&quot;","block_context":{"text":"How To","link":"https:\/\/thepizzy.net\/blog\/category\/how-to\/"},"img":{"alt_text":"Facebook Security Logo - Source: allfacebook.com","src":"https:\/\/i0.wp.com\/thepizzy.net\/blog\/wp-content\/uploads\/2011\/02\/facebook-sec-logo1-116x150.jpg?resize=350%2C200","width":350,"height":200},"classes":[]}],"jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/thepizzy.net\/blog\/wp-json\/wp\/v2\/posts\/858","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/thepizzy.net\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/thepizzy.net\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/thepizzy.net\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/thepizzy.net\/blog\/wp-json\/wp\/v2\/comments?post=858"}],"version-history":[{"count":16,"href":"https:\/\/thepizzy.net\/blog\/wp-json\/wp\/v2\/posts\/858\/revisions"}],"predecessor-version":[{"id":1054,"href":"https:\/\/thepizzy.net\/blog\/wp-json\/wp\/v2\/posts\/858\/revisions\/1054"}],"wp:attachment":[{"href":"https:\/\/thepizzy.net\/blog\/wp-json\/wp\/v2\/media?parent=858"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/thepizzy.net\/blog\/wp-json\/wp\/v2\/categories?post=858"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/thepizzy.net\/blog\/wp-json\/wp\/v2\/tags?post=858"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}