Cookies help us display personalized product recommendations and ensure you have great shopping experience.

By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
SmartData CollectiveSmartData Collective
  • Analytics
    AnalyticsShow More
    predictive analytics risk management
    How Predictive Analytics Is Redefining Risk Management Across Industries
    7 Min Read
    data analytics and gold trading
    Data Analytics and the New Era of Gold Trading
    9 Min Read
    composable analytics
    How Composable Analytics Unlocks Modular Agility for Data Teams
    9 Min Read
    data mining to find the right poly bag makers
    Using Data Analytics to Choose the Best Poly Mailer Bags
    12 Min Read
    data analytics for pharmacy trends
    How Data Analytics Is Tracking Trends in the Pharmacy Industry
    5 Min Read
  • Big Data
  • BI
  • Exclusive
  • IT
  • Marketing
  • Software
Search
© 2008-25 SmartData Collective. All Rights Reserved.
Reading: Should the Entire Internet Be Encrypted?
Share
Notification
Font ResizerAa
SmartData CollectiveSmartData Collective
Font ResizerAa
Search
  • About
  • Help
  • Privacy
Follow US
© 2008-23 SmartData Collective. All Rights Reserved.
SmartData Collective > Big Data > Data Mining > Should the Entire Internet Be Encrypted?
Data MiningLocationSecurity

Should the Entire Internet Be Encrypted?

Shawn Gordon
Shawn Gordon
6 Min Read
SHARE

I recently wrote a piece about the Heartbleed vulnerability in OpenSSL that affected the security of about two thirds of all websites. Yahoo just announced that it is going to join Google and Microsoft in securing its email traffic via PGP encryption.

I recently wrote a piece about the Heartbleed vulnerability in OpenSSL that affected the security of about two thirds of all websites. Yahoo just announced that it is going to join Google and Microsoft in securing its email traffic via PGP encryption.

In a recent Wall Street Journal story, Google just confirmed that it is planning to give sites secured through HTTPS a higher search ranking than their unsecured counterparts.

More Read

AOL Advertising on the Need for Speed in Yield Optimization
Calling All Federal Cybersecurity Practitioners: Contribute ideas and actions to enhance the community
Overcoming Tradition with Analytics – Baseball’s Mindshift
What is Cloud Computing
Should Online Companies Be Forced To Forget?

 What ties all these headlines together? Your online presence is being tracked, monitored, intercepted, evaluated, and compromised. With something like Heartbleed, you would pretty much be helpless if the online assets of a company that you were working with were compromised. You can mitigate your online footprint slightly by using features like “Incognito” mode in Google Chrome, or a “Private” tab in Opera web browsers, but these options really only eliminate local tracks.

This is where the IceBrowser comes in. One of the best ways to cover your tracks and secure your Internet usage is through a VPN (Virtual Private Network). However, for your typical user, this can be a fairly complex and expensive process to set up and use. Some users are not familiar with VPNs, but virtually everyone understands how to use a browser, and IceBrowser aims to be just as  simple to setup and use. IceBrowser is cheaper than most VPNs for storing cookies, search history, and other metadata in an encrypted cloud offshore in a country like Iceland, where laws are more stringent around Internet security.

IceBrowser is a Firefox plugin VPN. By routing all of your browsing data through its servers in Iceland and storing it there, too, IceBrowser aims to make the Internet safer and keep your information private. Iceland might sound like an odd choice, but it has been consistently rated best in terms of online privacy laws. IceBrowser is making use of the Cocoon cloud-based browser platform from Virtual World Computing.

Online Browsing Protection Features   IceBrowser.png

The VWC platform is much more all-encompassing than just web browsing, and it is likely more than a lot of people need to maintain basic security. But for the more advanced user, let’s explain a VPN and why you might care to use it.

Gerald Barton, the CEO of IceBrowser had these comments: “The one thing I can tell you we don’t know, is to what extent the NSA is looking at personal data. What we do know is that the goal is to find terrorists. What seems to have  happened in the government, is they’ve decided that everyone who uses Google, or any of the big search engines, will have that information stored, and it is being done indiscreminently.

This is the big concern, the goverment sweeping up and storing all this data and what the might try to use it for, or the impact when/if it gets breached as what happened wit Snowden. We’re not out to hurt the government, were just want the government to leave good citizens alone.”

A virtual private network (VPN) extends a private network across a public network, such as the Internet. It allows a computer to operate over a public network as if it directly connected to a local network. This means that there are no prying eyes.

A VPN is set up by creating a virtual point-to-point connection through the use of dedicated protocols. IceBrowser deals with all of this for you, and as mentioned, routes through their servers in Iceland (they are currently beta testing with servers in the United States).

Some of you might be thinking, “but I don’t use Firefox.” If that’s the case, you might decide to use your favorite browser, like Chrome, to read Slashdot, then use the IceBrowser to read Foxnews or Drudgereport or to do your online banking. VWC is starting to work with other browsers and platforms, so I can envision IceBrowser following suit at some stage.

Twitter   ForbesTech  A California company is offering ....png

Until the entire Internet is encrypting all its traffic, solutions like IceBrowser are a good way to protect yourself online. This isn’t about things as mundane as pornography; this is about protecting every piece of information and every footprint you leave out there. You ever notice how you search for shoes and then suddenly, when you’re on a sponsored news site, you begin to see ads for those same shoes? Maybe that is truly useful for you, or maybe not — in the end, it is just a simple example of how quickly your data is analyzed and used.

TAGGED:data encryption
Share This Article
Facebook Pinterest LinkedIn
Share

Follow us on Facebook

Latest News

microsoft 365 data migration
Why Data-Driven Businesses Consider Microsoft 365 Migration
Big Data Exclusive
real time data activation
How to Choose a CDP for Real-Time Data Activation
Big Data Exclusive
street address database
Why Data-Driven Companies Rely on Accurate Street Address Databases
Big Data Exclusive
predictive analytics risk management
How Predictive Analytics Is Redefining Risk Management Across Industries
Analytics Exclusive Predictive Analytics

Stay Connected

1.2KFollowersLike
33.7KFollowersFollow
222FollowersPin

You Might also Like

data encryption for security
Best PracticesBig DataData ManagementITPrivacySecurity

Why, What and How to Encrypt: Security Expert Insights

7 Min Read
data encryption importance
Risk Management

Encryption Importance in the Age of Data Breaches

6 Min Read

4 Million Patient Records Stolen in Second Largest HIPAA Data Breach

3 Min Read
Image
Big DataData ManagementPrivacy

Encrypting Data for Data Breach Prevention

3 Min Read

SmartData Collective is one of the largest & trusted community covering technical content about Big Data, BI, Cloud, Analytics, Artificial Intelligence, IoT & more.

giveaway chatbots
How To Get An Award Winning Giveaway Bot
Big Data Chatbots Exclusive
ai chatbot
The Art of Conversation: Enhancing Chatbots with Advanced AI Prompts
Chatbots

Quick Link

  • About
  • Contact
  • Privacy
Follow US
© 2008-25 SmartData Collective. All Rights Reserved.
Go to mobile version
Welcome Back!

Sign in to your account

Username or Email Address
Password

Lost your password?