{"id":7701,"date":"2014-06-11T08:22:52","date_gmt":"2014-06-11T12:22:52","guid":{"rendered":"http:\/\/thundercloud.net\/infoave\/new\/?p=7701"},"modified":"2014-06-11T08:24:12","modified_gmt":"2014-06-11T12:24:12","slug":"how-much-data-do-we-leak-online","status":"publish","type":"post","link":"https:\/\/www.thundercloud.net\/infoave\/new\/how-much-data-do-we-leak-online\/","title":{"rendered":"How Much Data Do We Leak Online?"},"content":{"rendered":"<blockquote>\n<h1>Ars tests Internet surveillance\u2014by spying on an NPR reporter<\/h1>\n<h2><em>A week spent playing NSA reveals just how much data we leak online.<\/em><\/h2>\n<p>On a bright April morning in Menlo Park, California, I became an Internet spy.<\/p>\n<p>This was easier than it sounds because I had a willing target. I had partnered with National Public Radio (NPR) tech correspondent Steve Henn for an experiment in Internet surveillance. For one week, while Henn researched a story, he allowed himself to be watched\u2014acting as a stand-in, in effect, for everyone who uses Internet-connected devices. How much of our lives do we really reveal simply by going online?<\/p>\n<p>Henn let me into his Silicon Valley home and ushered me into his office with a cup of coffee. Waiting for me there was the key tool of my new trade: a metal-and-plastic box that resembled nothing more threatening than an unlabeled Wi-Fi router. This was the PwnPlug R2, a piece of professional penetration testing gear designed by Pwnie Express CTO Dave Porcello and his team and on loan to us for this project.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone\" src=\"http:\/\/cdn.arstechnica.net\/wp-content\/uploads\/2014\/06\/selfiehenn.jpeg\" alt=\"\" width=\"960\" height=\"1280\" \/><\/p>\n<p><em>(NPR&#8217;s Steve Henn in his home office and studio, with the Pwnie Express PwnPlug R2 that collected his Internet traffic for a week.)<\/em><\/p>\n<p>The box would soon sink its teeth into the Internet traffic from Henn&#8217;s home computer and smartphone, silently gobbling up every morsel of data and spitting it surreptitiously out of Henn&#8217;s home network for our later analysis. With its help, we would create a pint-sized version of the Internet surveillance infrastructure used by the National Security Agency. Henn would serve as a proxy for Internet users, Porcello would become our one-man equivalent of the NSA\u2019s Special Source Operations department, and I would become Henn&#8217;s personal NSA analyst&#8230;<\/p><\/blockquote>\n<h3><span style=\"text-decoration: underline;\"><em><a href=\"http:\/\/arstechnica.com\/security\/2014\/06\/what-the-nsa-or-anyone-can-learn-about-you-from-internet-traffic\/\" target=\"_blank\">SOURCE: ARSTECHNICA<\/a><\/em><\/span><\/h3>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Ars tests Internet surveillance\u2014by spying on an NPR reporter A week spent playing NSA reveals just how much data we leak online. On a bright April morning in Menlo Park, California, I became an Internet spy. This was easier than it sounds because I had a willing target. I had partnered with National Public Radio (NPR) tech correspondent\u2026 <span class=\"read-more\"><a href=\"https:\/\/www.thundercloud.net\/infoave\/new\/how-much-data-do-we-leak-online\/\">Read More &raquo;<\/a><\/span><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1426,1670,1656],"tags":[],"_links":{"self":[{"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/posts\/7701"}],"collection":[{"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/comments?post=7701"}],"version-history":[{"count":2,"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/posts\/7701\/revisions"}],"predecessor-version":[{"id":7704,"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/posts\/7701\/revisions\/7704"}],"wp:attachment":[{"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/media?parent=7701"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/categories?post=7701"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/tags?post=7701"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}