Cookies help us display personalized product recommendations and ensure you have great shopping experience.

By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
SmartData CollectiveSmartData Collective
  • Analytics
    AnalyticsShow More
    data analytics
    How Data Analytics Can Help You Construct A Financial Weather Map
    4 Min Read
    financial analytics
    Financial Analytics Shows The Hidden Cost Of Not Switching Systems
    4 Min Read
    warehouse accidents
    Data Analytics and the Future of Warehouse Safety
    10 Min Read
    stock investing and data analytics
    How Data Analytics Supports Smarter Stock Trading Strategies
    4 Min Read
    predictive analytics risk management
    How Predictive Analytics Is Redefining Risk Management Across Industries
    7 Min Read
  • Big Data
  • BI
  • Exclusive
  • IT
  • Marketing
  • Software
Search
© 2008-25 SmartData Collective. All Rights Reserved.
Reading: Should the Entire Internet Be Encrypted?
Share
Notification
Font ResizerAa
SmartData CollectiveSmartData Collective
Font ResizerAa
Search
  • About
  • Help
  • Privacy
Follow US
© 2008-23 SmartData Collective. All Rights Reserved.
SmartData Collective > Big Data > Data Mining > Should the Entire Internet Be Encrypted?
Data MiningLocationSecurity

Should the Entire Internet Be Encrypted?

Shawn Gordon
Shawn Gordon
6 Min Read
SHARE

I recently wrote a piece about the Heartbleed vulnerability in OpenSSL that affected the security of about two thirds of all websites. Yahoo just announced that it is going to join Google and Microsoft in securing its email traffic via PGP encryption.

I recently wrote a piece about the Heartbleed vulnerability in OpenSSL that affected the security of about two thirds of all websites. Yahoo just announced that it is going to join Google and Microsoft in securing its email traffic via PGP encryption.

In a recent Wall Street Journal story, Google just confirmed that it is planning to give sites secured through HTTPS a higher search ranking than their unsecured counterparts.

More Read

The Data Analytics of St. Patrick’s Day
Hospitals are increasingly relying on electronic tracking…
What topics would you like to see covered at a KDD conference?
Phone Hacking Scandal Reinforces the Value of Basic Information Security
Is the IRS’s E-File Security Ready for Prime Time?

 What ties all these headlines together? Your online presence is being tracked, monitored, intercepted, evaluated, and compromised. With something like Heartbleed, you would pretty much be helpless if the online assets of a company that you were working with were compromised. You can mitigate your online footprint slightly by using features like “Incognito” mode in Google Chrome, or a “Private” tab in Opera web browsers, but these options really only eliminate local tracks.

This is where the IceBrowser comes in. One of the best ways to cover your tracks and secure your Internet usage is through a VPN (Virtual Private Network). However, for your typical user, this can be a fairly complex and expensive process to set up and use. Some users are not familiar with VPNs, but virtually everyone understands how to use a browser, and IceBrowser aims to be just as  simple to setup and use. IceBrowser is cheaper than most VPNs for storing cookies, search history, and other metadata in an encrypted cloud offshore in a country like Iceland, where laws are more stringent around Internet security.

IceBrowser is a Firefox plugin VPN. By routing all of your browsing data through its servers in Iceland and storing it there, too, IceBrowser aims to make the Internet safer and keep your information private. Iceland might sound like an odd choice, but it has been consistently rated best in terms of online privacy laws. IceBrowser is making use of the Cocoon cloud-based browser platform from Virtual World Computing.

Online Browsing Protection Features   IceBrowser.png

The VWC platform is much more all-encompassing than just web browsing, and it is likely more than a lot of people need to maintain basic security. But for the more advanced user, let’s explain a VPN and why you might care to use it.

Gerald Barton, the CEO of IceBrowser had these comments: “The one thing I can tell you we don’t know, is to what extent the NSA is looking at personal data. What we do know is that the goal is to find terrorists. What seems to have  happened in the government, is they’ve decided that everyone who uses Google, or any of the big search engines, will have that information stored, and it is being done indiscreminently.

This is the big concern, the goverment sweeping up and storing all this data and what the might try to use it for, or the impact when/if it gets breached as what happened wit Snowden. We’re not out to hurt the government, were just want the government to leave good citizens alone.”

A virtual private network (VPN) extends a private network across a public network, such as the Internet. It allows a computer to operate over a public network as if it directly connected to a local network. This means that there are no prying eyes.

A VPN is set up by creating a virtual point-to-point connection through the use of dedicated protocols. IceBrowser deals with all of this for you, and as mentioned, routes through their servers in Iceland (they are currently beta testing with servers in the United States).

Some of you might be thinking, “but I don’t use Firefox.” If that’s the case, you might decide to use your favorite browser, like Chrome, to read Slashdot, then use the IceBrowser to read Foxnews or Drudgereport or to do your online banking. VWC is starting to work with other browsers and platforms, so I can envision IceBrowser following suit at some stage.

Twitter   ForbesTech  A California company is offering ....png

Until the entire Internet is encrypting all its traffic, solutions like IceBrowser are a good way to protect yourself online. This isn’t about things as mundane as pornography; this is about protecting every piece of information and every footprint you leave out there. You ever notice how you search for shoes and then suddenly, when you’re on a sponsored news site, you begin to see ads for those same shoes? Maybe that is truly useful for you, or maybe not — in the end, it is just a simple example of how quickly your data is analyzed and used.

TAGGED:data encryption
Share This Article
Facebook Pinterest LinkedIn
Share

Follow us on Facebook

Latest News

Edge Computing in IoT
Unique Capabilities of Edge Computing in IoT
Exclusive Internet of Things
Turning Geographic Data Into Competitive Advantage
The Rise of Location Intelligence: Turning Geographic Data Into Competitive Advantage
Big Data Exclusive
AI Recruitment Software Solution
The Best AI Recruitment Software Solution: Transforming Hiring with Smarter Tech
Artificial Intelligence Exclusive
real estate data
How Big Data Is Changes How We Buy and Sell Real Estate
Big Data Exclusive

Stay Connected

1.2KFollowersLike
33.7KFollowersFollow
222FollowersPin

You Might also Like

4 Million Patient Records Stolen in Second Largest HIPAA Data Breach

3 Min Read

Encrypting Backup Data for HIPAA and PCI Compliance

6 Min Read
Image
Big DataData ManagementPrivacy

Encrypting Data for Data Breach Prevention

3 Min Read
data encryption for data security
Security

Contrasting the Different Data Encryption Techniques for Optimal Security

7 Min Read

SmartData Collective is one of the largest & trusted community covering technical content about Big Data, BI, Cloud, Analytics, Artificial Intelligence, IoT & more.

AI and chatbots
Chatbots and SEO: How Can Chatbots Improve Your SEO Ranking?
Artificial Intelligence Chatbots Exclusive
ai is improving the safety of cars
From Bolts to Bots: How AI Is Fortifying the Automotive Industry
Artificial Intelligence

Quick Link

  • About
  • Contact
  • Privacy
Follow US
© 2008-25 SmartData Collective. All Rights Reserved.
Welcome Back!

Sign in to your account

Username or Email Address
Password

Lost your password?