Difference between revisions of "Wikispooks:Privacy Policy"
Jump to navigation
Jump to search
(Simplifying and adding "Data Retention" section) |
|||
Line 3: | Line 3: | ||
#'''WikiSpooks undertakes''' not to use any personal private data which it may hold other than for the purposes of operating the WikiSpooks site. Any such data will not be released to third parties other than by order of a court with jurisdiction. Similarly documents and articles posted on the WikiSpooks site will only be taken down by order of a court with jurisdiction. | #'''WikiSpooks undertakes''' not to use any personal private data which it may hold other than for the purposes of operating the WikiSpooks site. Any such data will not be released to third parties other than by order of a court with jurisdiction. Similarly documents and articles posted on the WikiSpooks site will only be taken down by order of a court with jurisdiction. | ||
#'''Any such court order''' will be posted on the WikiSpooks site unless gagged in which case it will hopefully be posted elsewhere. Threats - legal or otherwise - will generally be ignored unless they are funny or otherwise of general interest, in which case they will be posted. | #'''Any such court order''' will be posted on the WikiSpooks site unless gagged in which case it will hopefully be posted elsewhere. Threats - legal or otherwise - will generally be ignored unless they are funny or otherwise of general interest, in which case they will be posted. | ||
− | #'''The | + | |
− | #''' | + | ==Data Retention== |
− | #'''Server logs''' are cleared regularly - currently on a weekly basis. | + | #'''The dates and times of all document creation, editing and uploading are recorded'''. |
+ | #'''IP addresses are ''not'' retained'''. | ||
+ | #'''Server access logs''' are cleared regularly - currently on a weekly basis. | ||
==Notes of Caution== | ==Notes of Caution== | ||
− | #''' | + | #'''Your internet use is being monitored and/or logged''', quite likely by ISPs, by network system operators, the [[NSA]] and/or others. |
− | #''' | + | #'''Retention of logs (especially 'metadata') is endemic'''. Hard drives are cheap and {{TPTB}} have deep pockets and deep packet sniffers. |
#'''"Privacy policy" has, in effect, come to mean''' an assurance of just enough privacy to keep users coming into the spider's web. That is exactly how it is used by government and its agencies whilst assuring the citizenry that it is acting in the public interest. In the same way, employers act in the interest of their employees; corporations act in the interest of their stockholders; religious/educational institutions and professionals act in the interest of their dutiful supporters and fee-payers. | #'''"Privacy policy" has, in effect, come to mean''' an assurance of just enough privacy to keep users coming into the spider's web. That is exactly how it is used by government and its agencies whilst assuring the citizenry that it is acting in the public interest. In the same way, employers act in the interest of their employees; corporations act in the interest of their stockholders; religious/educational institutions and professionals act in the interest of their dutiful supporters and fee-payers. | ||
#'''Those who promise the most protection are out to skin you alive''', those who promise the most privacy are selling your most private possessions. | #'''Those who promise the most protection are out to skin you alive''', those who promise the most privacy are selling your most private possessions. | ||
==So...== | ==So...== | ||
− | #'''You may wish to look at some anonymising software such as [http://www.torproject.org TOR | + | #'''You may wish to look at some anonymising software such as [http://www.torproject.org TOR]''' - This is probably the most widely used anonymizing software, and if [[Edward Snowden]]'s leaked documents are to be believed, makes things difficult for even the [[NSA]] (although it is not a magic bullet, and some people have suggested that it may even be an NSA honeypot). |
{{Main-footer}} | {{Main-footer}} | ||
[[Category:Policies and Rules]] | [[Category:Policies and Rules]] |
Revision as of 16:12, 25 November 2013
WikiSpooks Undertakings
- WikiSpooks undertakes not to use any personal private data which it may hold other than for the purposes of operating the WikiSpooks site. Any such data will not be released to third parties other than by order of a court with jurisdiction. Similarly documents and articles posted on the WikiSpooks site will only be taken down by order of a court with jurisdiction.
- Any such court order will be posted on the WikiSpooks site unless gagged in which case it will hopefully be posted elsewhere. Threats - legal or otherwise - will generally be ignored unless they are funny or otherwise of general interest, in which case they will be posted.
Data Retention
- The dates and times of all document creation, editing and uploading are recorded.
- IP addresses are not retained.
- Server access logs are cleared regularly - currently on a weekly basis.
Notes of Caution
- Your internet use is being monitored and/or logged, quite likely by ISPs, by network system operators, the NSA and/or others.
- Retention of logs (especially 'metadata') is endemic. Hard drives are cheap and The Powers That Be have deep pockets and deep packet sniffers.
- "Privacy policy" has, in effect, come to mean an assurance of just enough privacy to keep users coming into the spider's web. That is exactly how it is used by government and its agencies whilst assuring the citizenry that it is acting in the public interest. In the same way, employers act in the interest of their employees; corporations act in the interest of their stockholders; religious/educational institutions and professionals act in the interest of their dutiful supporters and fee-payers.
- Those who promise the most protection are out to skin you alive, those who promise the most privacy are selling your most private possessions.
So...
- You may wish to look at some anonymising software such as TOR - This is probably the most widely used anonymizing software, and if Edward Snowden's leaked documents are to be believed, makes things difficult for even the NSA (although it is not a magic bullet, and some people have suggested that it may even be an NSA honeypot).