Cookies help us display personalized product recommendations and ensure you have great shopping experience.

By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
SmartData CollectiveSmartData Collective
  • Analytics
    AnalyticsShow More
    big data analytics in transporation
    Turning Data Into Decisions: How Analytics Improves Transportation Strategy
    3 Min Read
    sales and data analytics
    How Data Analytics Improves Lead Management and Sales Results
    9 Min Read
    data analytics and truck accident claims
    How Data Analytics Reduces Truck Accidents and Speeds Up Claims
    7 Min Read
    predictive analytics for interior designers
    Interior Designers Boost Profits with Predictive Analytics
    8 Min Read
    image fx (67)
    Improving LinkedIn Ad Strategies with Data Analytics
    9 Min Read
  • Big Data
  • BI
  • Exclusive
  • IT
  • Marketing
  • Software
Search
© 2008-25 SmartData Collective. All Rights Reserved.
Reading: Should the Entire Internet Be Encrypted?
Share
Notification
Font ResizerAa
SmartData CollectiveSmartData Collective
Font ResizerAa
Search
  • About
  • Help
  • Privacy
Follow US
© 2008-23 SmartData Collective. All Rights Reserved.
SmartData Collective > Big Data > Data Mining > Should the Entire Internet Be Encrypted?
Data MiningLocationSecurity

Should the Entire Internet Be Encrypted?

Shawn Gordon
Shawn Gordon
6 Min Read
SHARE

I recently wrote a piece about the Heartbleed vulnerability in OpenSSL that affected the security of about two thirds of all websites. Yahoo just announced that it is going to join Google and Microsoft in securing its email traffic via PGP encryption.

I recently wrote a piece about the Heartbleed vulnerability in OpenSSL that affected the security of about two thirds of all websites. Yahoo just announced that it is going to join Google and Microsoft in securing its email traffic via PGP encryption.

In a recent Wall Street Journal story, Google just confirmed that it is planning to give sites secured through HTTPS a higher search ranking than their unsecured counterparts.

More Read

Cloud Storage
Dropbox or Box – Which Cloud Storage For Small Businesses
Business Intelligence and Analytics News [VIDEO]
Companies encountering a data engineering talent vacuum
SAS commits $70 million to Cloud Computing
Planning for ROI in Text Analytics

 What ties all these headlines together? Your online presence is being tracked, monitored, intercepted, evaluated, and compromised. With something like Heartbleed, you would pretty much be helpless if the online assets of a company that you were working with were compromised. You can mitigate your online footprint slightly by using features like “Incognito” mode in Google Chrome, or a “Private” tab in Opera web browsers, but these options really only eliminate local tracks.

This is where the IceBrowser comes in. One of the best ways to cover your tracks and secure your Internet usage is through a VPN (Virtual Private Network). However, for your typical user, this can be a fairly complex and expensive process to set up and use. Some users are not familiar with VPNs, but virtually everyone understands how to use a browser, and IceBrowser aims to be just as  simple to setup and use. IceBrowser is cheaper than most VPNs for storing cookies, search history, and other metadata in an encrypted cloud offshore in a country like Iceland, where laws are more stringent around Internet security.

IceBrowser is a Firefox plugin VPN. By routing all of your browsing data through its servers in Iceland and storing it there, too, IceBrowser aims to make the Internet safer and keep your information private. Iceland might sound like an odd choice, but it has been consistently rated best in terms of online privacy laws. IceBrowser is making use of the Cocoon cloud-based browser platform from Virtual World Computing.

Online Browsing Protection Features   IceBrowser.png

The VWC platform is much more all-encompassing than just web browsing, and it is likely more than a lot of people need to maintain basic security. But for the more advanced user, let’s explain a VPN and why you might care to use it.

Gerald Barton, the CEO of IceBrowser had these comments: “The one thing I can tell you we don’t know, is to what extent the NSA is looking at personal data. What we do know is that the goal is to find terrorists. What seems to have  happened in the government, is they’ve decided that everyone who uses Google, or any of the big search engines, will have that information stored, and it is being done indiscreminently.

This is the big concern, the goverment sweeping up and storing all this data and what the might try to use it for, or the impact when/if it gets breached as what happened wit Snowden. We’re not out to hurt the government, were just want the government to leave good citizens alone.”

A virtual private network (VPN) extends a private network across a public network, such as the Internet. It allows a computer to operate over a public network as if it directly connected to a local network. This means that there are no prying eyes.

A VPN is set up by creating a virtual point-to-point connection through the use of dedicated protocols. IceBrowser deals with all of this for you, and as mentioned, routes through their servers in Iceland (they are currently beta testing with servers in the United States).

Some of you might be thinking, “but I don’t use Firefox.” If that’s the case, you might decide to use your favorite browser, like Chrome, to read Slashdot, then use the IceBrowser to read Foxnews or Drudgereport or to do your online banking. VWC is starting to work with other browsers and platforms, so I can envision IceBrowser following suit at some stage.

Twitter   ForbesTech  A California company is offering ....png

Until the entire Internet is encrypting all its traffic, solutions like IceBrowser are a good way to protect yourself online. This isn’t about things as mundane as pornography; this is about protecting every piece of information and every footprint you leave out there. You ever notice how you search for shoes and then suddenly, when you’re on a sponsored news site, you begin to see ads for those same shoes? Maybe that is truly useful for you, or maybe not — in the end, it is just a simple example of how quickly your data is analyzed and used.

TAGGED:data encryption
Share This Article
Facebook Pinterest LinkedIn
Share

Follow us on Facebook

Latest News

big data analytics in transporation
Turning Data Into Decisions: How Analytics Improves Transportation Strategy
Analytics Big Data Exclusive
AI and fund manager software
AI And The Acceleration Of Information Flows From Fund Managers To Investors
Artificial Intelligence Exclusive
sales and data analytics
How Data Analytics Improves Lead Management and Sales Results
Analytics Big Data Exclusive
ai in marketing
How AI and Smart Platforms Improve Email Marketing
Artificial Intelligence Exclusive Marketing

Stay Connected

1.2kFollowersLike
33.7kFollowersFollow
222FollowersPin

You Might also Like

data encryption for security
Best PracticesBig DataData ManagementITPrivacySecurity

Why, What and How to Encrypt: Security Expert Insights

7 Min Read
data encryption for data security
Security

Contrasting the Different Data Encryption Techniques for Optimal Security

7 Min Read
data encryption importance
Risk Management

Encryption Importance in the Age of Data Breaches

6 Min Read

Encrypting Backup Data for HIPAA and PCI Compliance

6 Min Read

SmartData Collective is one of the largest & trusted community covering technical content about Big Data, BI, Cloud, Analytics, Artificial Intelligence, IoT & more.

ai is improving the safety of cars
From Bolts to Bots: How AI Is Fortifying the Automotive Industry
Artificial Intelligence
data-driven web design
5 Great Tips for Using Data Analytics for Website UX
Big Data

Quick Link

  • About
  • Contact
  • Privacy
Follow US
© 2008-25 SmartData Collective. All Rights Reserved.
Go to mobile version
Welcome Back!

Sign in to your account

Username or Email Address
Password

Lost your password?