Cookies help us display personalized product recommendations and ensure you have great shopping experience.

By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
SmartData CollectiveSmartData Collective
  • Analytics
    AnalyticsShow More
    data analytics in ecommerce
    Analytics Technology Drives Conversions for Your eCommerce Site
    5 Min Read
    CRM Analytics
    CRM Analytics Helps Content Creators Develop an Edge in a Saturated Market
    5 Min Read
    data analytics and commerce media
    Leveraging Commerce Media & Data Analytics in Ecommerce
    8 Min Read
    big data in healthcare
    Leveraging Big Data and Analytics to Enhance Patient-Centered Care
    5 Min Read
    instagram visibility
    Data Analytics Plays a Key Role in Improving Instagram Visibility
    7 Min Read
  • Big Data
  • BI
  • Exclusive
  • IT
  • Marketing
  • Software
Search
© 2008-23 SmartData Collective. All Rights Reserved.
Reading: Should the Entire Internet Be Encrypted?
Share
Notification Show More
Font ResizerAa
SmartData CollectiveSmartData Collective
Font ResizerAa
Search
  • About
  • Help
  • Privacy
Follow US
© 2008-23 SmartData Collective. All Rights Reserved.
SmartData Collective > Big Data > Data Mining > Should the Entire Internet Be Encrypted?
Data MiningLocationSecurity

Should the Entire Internet Be Encrypted?

Shawn Gordon
Last updated: August 19, 2014 5:03 pm
Shawn Gordon
6 Min Read
SHARE

I recently wrote a piece about the Heartbleed vulnerability in OpenSSL that affected the security of about two thirds of all websites. Yahoo just announced that it is going to join Google and Microsoft in securing its email traffic via PGP encryption.

I recently wrote a piece about the Heartbleed vulnerability in OpenSSL that affected the security of about two thirds of all websites. Yahoo just announced that it is going to join Google and Microsoft in securing its email traffic via PGP encryption.

In a recent Wall Street Journal story, Google just confirmed that it is planning to give sites secured through HTTPS a higher search ranking than their unsecured counterparts.

More Read

IBM Launches New Advanced Analytics Center In New York,…

Online survey research – how accurate?
Life Inside a Cell (via PsyoP1)
VPNs Are Crucial Privacy Protection Tools in the Age of Big Data
Data Scientists Should Be the New Factory Workers

 What ties all these headlines together? Your online presence is being tracked, monitored, intercepted, evaluated, and compromised. With something like Heartbleed, you would pretty much be helpless if the online assets of a company that you were working with were compromised. You can mitigate your online footprint slightly by using features like “Incognito” mode in Google Chrome, or a “Private” tab in Opera web browsers, but these options really only eliminate local tracks.

This is where the IceBrowser comes in. One of the best ways to cover your tracks and secure your Internet usage is through a VPN (Virtual Private Network). However, for your typical user, this can be a fairly complex and expensive process to set up and use. Some users are not familiar with VPNs, but virtually everyone understands how to use a browser, and IceBrowser aims to be just as  simple to setup and use. IceBrowser is cheaper than most VPNs for storing cookies, search history, and other metadata in an encrypted cloud offshore in a country like Iceland, where laws are more stringent around Internet security.

IceBrowser is a Firefox plugin VPN. By routing all of your browsing data through its servers in Iceland and storing it there, too, IceBrowser aims to make the Internet safer and keep your information private. Iceland might sound like an odd choice, but it has been consistently rated best in terms of online privacy laws. IceBrowser is making use of the Cocoon cloud-based browser platform from Virtual World Computing.

Online Browsing Protection Features   IceBrowser.png

The VWC platform is much more all-encompassing than just web browsing, and it is likely more than a lot of people need to maintain basic security. But for the more advanced user, let’s explain a VPN and why you might care to use it.

Gerald Barton, the CEO of IceBrowser had these comments: “The one thing I can tell you we don’t know, is to what extent the NSA is looking at personal data. What we do know is that the goal is to find terrorists. What seems to have  happened in the government, is they’ve decided that everyone who uses Google, or any of the big search engines, will have that information stored, and it is being done indiscreminently.

This is the big concern, the goverment sweeping up and storing all this data and what the might try to use it for, or the impact when/if it gets breached as what happened wit Snowden. We’re not out to hurt the government, were just want the government to leave good citizens alone.”

A virtual private network (VPN) extends a private network across a public network, such as the Internet. It allows a computer to operate over a public network as if it directly connected to a local network. This means that there are no prying eyes.

A VPN is set up by creating a virtual point-to-point connection through the use of dedicated protocols. IceBrowser deals with all of this for you, and as mentioned, routes through their servers in Iceland (they are currently beta testing with servers in the United States).

Some of you might be thinking, “but I don’t use Firefox.” If that’s the case, you might decide to use your favorite browser, like Chrome, to read Slashdot, then use the IceBrowser to read Foxnews or Drudgereport or to do your online banking. VWC is starting to work with other browsers and platforms, so I can envision IceBrowser following suit at some stage.

Twitter   ForbesTech  A California company is offering ....png

Until the entire Internet is encrypting all its traffic, solutions like IceBrowser are a good way to protect yourself online. This isn’t about things as mundane as pornography; this is about protecting every piece of information and every footprint you leave out there. You ever notice how you search for shoes and then suddenly, when you’re on a sponsored news site, you begin to see ads for those same shoes? Maybe that is truly useful for you, or maybe not — in the end, it is just a simple example of how quickly your data is analyzed and used.

TAGGED:data encryption
Share This Article
Facebook Twitter Pinterest LinkedIn
Share

Follow us on Facebook

Latest News

trusted data management
The Future of Trusted Data Management: Striking a Balance between AI and Human Collaboration
Artificial Intelligence Big Data Data Management
data analytics in ecommerce
Analytics Technology Drives Conversions for Your eCommerce Site
Analytics Exclusive
data grids in big data apps
Best Practices for Integrating Data Grids into Data-Intensive Apps
Big Data Exclusive
AI helps create discord server bots
AI-Driven Discord Bots Can Track Server Stats
Artificial Intelligence Exclusive

Stay Connected

1.2kFollowersLike
33.7kFollowersFollow
222FollowersPin

You Might also Like

data encryption and security
Data Management

Why You Must Leverage Encryption for Data Protection in the Digital Transformation Era

7 Min Read
data encryption importance
Risk Management

Encryption Importance in the Age of Data Breaches

6 Min Read
data center encryption
Security

Strategies for Ensuring Security in Hyperconverged Infrastructure

8 Min Read
Image
Big DataData ManagementPrivacy

Encrypting Data for Data Breach Prevention

3 Min Read

SmartData Collective is one of the largest & trusted community covering technical content about Big Data, BI, Cloud, Analytics, Artificial Intelligence, IoT & more.

ai is improving the safety of cars
From Bolts to Bots: How AI Is Fortifying the Automotive Industry
Artificial Intelligence
ai in ecommerce
Artificial Intelligence for eCommerce: A Closer Look
Artificial Intelligence

Quick Link

  • About
  • Contact
  • Privacy
Follow US
© 2008-24 SmartData Collective. All Rights Reserved.
Go to mobile version
Welcome Back!

Sign in to your account

Username or Email Address
Password

Lost your password?