Blog

Archive for Uncategorized

Focus your email to protect your privacy and stay safe online.

Focus your email to protect your privacy and stay safe online.

If you are concerned about identify theft and other privacy/security concerns there is a simple email precaution you can take to protect yourself. How about – never give out your personal or business email to someone or business you don’t know?

Sounds like common sense, does it not – yet, we do it all the time! Every day we sign up for newsletters; give our email to a point of sale clerk; register for online dating; use it to get WiFi at the coffee shop or airport; register for coupons, daily deal sites and freely hand out our email address in many other situations where we don’t know the people or business. Don’t do it! Protect your privacy and stop identity theft.

Never give your personal or business email address to people or businesses you don’t know. Privacy invasions and identity theft, in most cases, start with an email address. Your personal or business email address is the key to the front door of your digital house.  Why would you ever share that key with every supplier you can think of and risk identity theft?

Little Known Fact About the Selling of Email Addresses.

Many companies have no problem selling email addresses while at the same time agreeing not to spam you. You unsubscribe from their mailing list but not from their selling list! Conclusion: Protect your privacy, don’t let your personal email get on their list in the first place

However easy it is to say, ‘never share your email with people and businesses you don’t know’, in reality we actually need to maintain a digital communications with many of these folks. Many of us simply create another email address, ‘our spam address’, in gmail, yahoo or hotmail.  We end up with another inbox that is full of spam and also contains lots of legitimate communication.

Dodoname – Privacy by Design.

Enter Dodoname, which was designed specifically for when you don’t want to use your regular email address and also want a way to start, manage and stop all these ‘other emails’.

Remember, stop identity theft, never give out your regular email address again to someone to don’t know – use a Dodoname.

Posted in: Anonymity, Data breach, Email, Fraud, Identity, Privacy, Uncategorized

Leave a Comment (0) →

The Right to Know When I Am Not Left Alone – Is Not Enough.

The Right to Know When I Am Not Left Alone – Is Not Enough.

Our online privacy is continuously compromised with the scanning, skimming and scraping of our emails and our browsing behavior.

A recent study concluded that 92% of the population believes “that collecting the content of emails is unacceptable”. How many consumers understand that virtually every email is scanned, skimmed and scraped for information and their privacy is breached every day? A recent article in The Economist describes how people do not protect their right to privacy and anonymity.

Google scans the content of all emails on its servers as well as all emails sent or received by a gmail account. Google considers that users have no ‘reasonable expectation’ of privacy. This stance flies in the face of the predominant and consistent research about consumers’ ‘privacy expectations’.

Rami Essaid recently wrote in TechCrunch that, “The truth is, people will never achieve true privacy and anonymity online.” He concludes that tracking is here to stay and that it is getting more pervasive and sophisticated. His main thesis is that our discussion should not be about absolute the right to privacy or anonymity but about transparency.

If Essaid is correct, the horse has left the barn in terms of protecting our privacy and anonymity. Instead, he proposes focusing on making it visible and transparent about how our online privacy will be accessed or ripped off.  It is OK to to invade our privacy as long as it is transparent! Should consumers simply give up that they have any expectation for online privacy? This is almost Orwellian in concept – a dark road that we must not travel as this means that others have the right to observe us without our consent!

The Right to Privacy

In 1890, Warren and Brandeis wrote The Right to Privacy and their key argument was the “right to be let alone”. Here we are 100 years later. Do we really want to change the right to be left alone to the “the right to know when I am not left alone?” Transparency is an important need but we must not give up the fight for the right to privacy.

Posted in: Anonymity, Data breach, Email, Fraud, Identity, Phishing, Privacy, Uncategorized

Leave a Comment (0) →

Identity theft and who has the keys to your virtual house?

Identity theft and who has the keys to your virtual house?

We were moving out of the neighborhood where we have lived for the past 23 years. Tracy, our neighbor, invited us over for a farewell dinner.  Tracy knows that I have been in technology for a long time and related the story of her recent identity theft where the thieves came very close to emptying her bank account. It started with the bad guys phishing and finding her personal email address. This data breach and cybercrime was incredibly invasive to Tracy as she now had to get rid of the personal email address she had used for over twenty years.

 

The front door to our virtual house, hence our privacy, is our personal email address. It seems we give this email address to everybody. Concerned about their privacy, many consumers simply get a second or third email they use as their ‘spam address’ – typically a Hotmail or Gmail address. So now we have two or three front doors to our virtual house. Susie Baszkeiwicz blogged in January about 9 reasons you should have more than one email address. Avoid spam & hackers, protect yourself, have a disposable email, have an alias and have a backup are 5 of her 9 reasons that we built Dodoname.

How many of us would hand out the keys to our front, side and back door of our regular house to every merchant or supplier who said, “I won’t sell to you unless you give me the keys to your house.” If that seems a little insane in the real world then why do we do it in the virtual world?

Consider that identify theft is a Type I invasion of our privacy and that spam is a Type II invasion of our privacy. Clearly a Type I privacy breach is more serious than Type II privacy breach.

For Type I protection most consumers continue to use their personal email address – the less secure email address. Why? Because there is no easy way to manage our secondary emails, which are filled with spam, and not really the place we want to collect and manager our ‘good’ communications. We shrug our shoulders and continue to use our personal email addresses for the really important stuff. The phishers know this. Consumers should understand what phishing is and how to protect themselves. Read this article from the Safety & Security Center at Microsoft for more information about how to protect yourself.

Using a Dodoname for key confidential registrations would eliminate much of the risk because a Dodoname can only ever be used by that one service. Moreover, the managed email system in Dodoname provides users with a powerful way to store and manage confidential communications. Finally, Dodoname is also designed as a marketplace where merchants and consumers can meet, sell and buy with confidence that the consumer’s private information is protected. Privacy with Personalization is the core architectural feature of Dodoname. Everyone should have a Dodoname.

Posted in: Uncategorized

Leave a Comment (0) →

Dodoname Fast Facts

Dodoname Fast Facts

Company name: Dodoname

Website: www.www.dodoname.com

Facebook: www.facebook.com/pages/Dodoname/696004550490500

Twitter: www.twitter.com/mydodoname

Instagram: www.instagram.com/dodoname

Pinterest: www.pinterest.com/dodoname/

Founded: 2014

Company overview: Because of Dodoname, consumers will never again have to give their real email address to anyone.

Consumers sign up for a Dodoname, which they can use much like an email address when interacting with an online merchant, signing up for news feed, accessing wifi in coffee shop or hotel, scheduling a webinar, using a dating site, downloading a white paper, registering a product warranty, receiving a receipt by email, accessing an offer either online or in store, or countless other scenarios where they might be reluctant to provide their real email address.

Consumers can spawn new Dodonames on the fly, both at their desktop and on their mobile devices, to sign up for new offers, promotions or any other type of interaction.

Any Dodoname can be programmed to go extinct after a single use, after a specific period, or on command at any time. In this way, consumers retain complete control over how, when, where – or even if – merchants can communicate with them, and can drop merchants at any time with an absolute guarantee they will never hear from them again.

Technology: Dodoname consists of iOS and website apps that consumers can use to create Dodonames that enable interactions online without divulging personal data. Users can create Dodonames that can be used once or over a period of time. The privacy control is in the hands of the user and there is no exposure to potential spam or privacy breaches.

Market statistics and trends:

In September 2014, Verizon agreed to pay a $7.4M settlement with the Federal Communications Commission for improper use of personal consumer information for marketing purposes. This is the largest settlement of its kind to date.

According to a CNNMoney/Ponemon Institute study, 47 percent of U.S. adults had their personal information exposed by hackers between May 2013 and May 2014.

The Bureau of Justice Statistics reports “Identity-theft victims reported a total of $24.7 billion in direct and indirect losses attributed to all incidents of identity theft experienced in 2012.These losses exceeded the $14 billion victims lost from all other property crimes (burglary, motor vehicle theft, and theft) measured by the National Crime Victimization Survey in 2012.”

According to Securelist, “the percentage of spam in total email traffic during the first quarter [of 2014] came to 66.34%.”

On July 1, 2014, Canada enacted Canadian Anti-Spam Legislation to protect consumers from unwanted commercial electronic messages. Consent is now required for any organization to send such messages to any Canadian address and stiff penalties will be enforced on any sender that isn’t compliant with the law.

The September 2014 CivicScience report Consumer Sentiment Toward Data Privacy stated “Nearly half (49 percent) of U.S. adults say they are ‘very concerned’ about their privacy when using the Internet… Among U.S. adults, being ‘very concerned’ increases to 56 percent when asked about people you don’t know obtaining personal information about you from Internet activity.”

On September 17, 2014, Apple CEO Tim Cook, in an open letter, explained that “Apple takes a very different view” of privacy than its Silicon Valley brethren, which often make a business out of collecting and leveraging consumer information from email content and Web browsing habits – without the explicit approval of consumers.

August 2014: a “big data” lobbyist posits that it’s unlikely that U.S. Congress will pass legislation about how online marketers can use consumers’ personal data.

Posted in: Uncategorized

Leave a Comment (0) →

Backgrounder

Backgrounder

Backgrounder: Get the best from the web without ever revealing who you are.

Dodoname (www.dodoname.com) is the world’s first privacy-marketing platform that reconciles the seemingly opposing forces of Internet personalization and protection of personal data. Dodoname’s goal is to make online interactions authentic, transparent, controlled – and private.

Users can create a unique Dodoname, which they can use much like an email address to interact online. The difference is that no personal information is collected about the user and there are no linkages between their Dodoname and their actual contact information. Gone are the risks of spam, data breaches and privacy hacks.

Users can spawn new Dodonames on the fly, both on the desktop and through our mobile app, to sign up for new deals, register a warranty, download a white paper, subscribe to a magazine or transact any other type of interaction – all while retaining complete control and privacy. Any Dodoname can be programmed to go extinct after a single use, after a specific period, or on command at any time.

Many people have come up with clumsy workarounds to the problem of having to give away more personal information than they’d like when interacting online. These workarounds include creating multiple burner email addresses for which login details and passwords need to be remembered, or providing dummy information that is of no use to the recipient.

The company is launching the iOS app and web application in October 2014. A follow-up release with additional functionality is planned for November 2014.

For more information about Dodoname, visit www.www.dodoname.com.

 

Like Dodoname on Facebook: https://www.facebook.com/pages/Dodoname/696004550490500

Follow Dodoname on Twitter: https://twitter.com/mydodoname

Follow Dodoname on Instagram: http://instagram.com/dodoname

Follow Dodoname on Pinterest: http://www.pinterest.com/dodoname/

-30-

For more information or to arrange for interviews, please contact:

Leo Valiquette

Phone: +1 613 769 9479

Email: leo@leovaliquette.com

Twitter: @leovaliquette

Posted in: Uncategorized

Leave a Comment (0) →