<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Spire Security Viewpoint &#187; Privacy</title>
	<atom:link href="http://spiresecurity.com/?feed=rss2&#038;tag=privacy" rel="self" type="application/rss+xml" />
	<link>http://spiresecurity.com</link>
	<description>Risk and Cybersecurity Analysis</description>
	<lastBuildDate>Fri, 14 Nov 2014 00:11:00 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=3.5.1</generator>
		<item>
		<title>Whenever I read a post like this&#8230;</title>
		<link>http://spiresecurity.com/?p=16</link>
		<comments>http://spiresecurity.com/?p=16#comments</comments>
		<pubDate>Mon, 14 Sep 2009 15:37:23 +0000</pubDate>
		<dc:creator>Pete Lindstrom</dc:creator>
				<category><![CDATA[Highlights]]></category>
		<category><![CDATA[Identity Management]]></category>
		<category><![CDATA[Privacy]]></category>

		<guid isPermaLink="false">http://spiresecurity.com/blog/?p=16</guid>
		<description><![CDATA[
<p class="more-link-p"><a class="more-link" href="http://spiresecurity.com/?p=16">Read more &#8594;</a></p>]]></description>
				<content:encoded><![CDATA[<p>Bruce Schneier <a href="http://www.typepad.com/site/blogs/6a00d8345207f669e200e5505db4f48833/post/compose">posts</a> on how he signs guest registers using somebody else&#39;s name:</p>
<div class="blockquote" style="margin-left: 40px;"><em>Since I read that, whenever I see a tourist attraction with a guest<br />
register, I do the same thing. I sign &quot;Robert J. Sawyer, Toronto, ON&quot;<br />
&#8211; because you never know when he&#39;ll need an alibi.</em></div>
<p>This type of thing goes on all the time among friends &#8211; it is juvenile humor at its finest. But it makes me (mildly) uncomfortable to read something like this. I guess I can&#39;t understand how someone who respects privacy so much could violate someone else&#39;s so easily.</p>
<p>I believe the core issues of privacy revolve around loss of control and misperception. This has both.</p>
<p>I find it even more interesting to consider the outcome of exercises like this on a broader scale &#8211; let&#39;s say many people start doing this many times&#8230; assuming there are also many who value authenticity, it only increases the demand for a national ID program.</p>
]]></content:encoded>
			<wfw:commentRss>http://spiresecurity.com/?feed=rss2&#038;p=16</wfw:commentRss>
		<slash:comments>3</slash:comments>
		</item>
		<item>
		<title>The Other Side of Privacy</title>
		<link>http://spiresecurity.com/?p=200</link>
		<comments>http://spiresecurity.com/?p=200#comments</comments>
		<pubDate>Sun, 03 Feb 2008 03:11:33 +0000</pubDate>
		<dc:creator>Pete Lindstrom</dc:creator>
				<category><![CDATA[Highlights]]></category>
		<category><![CDATA[Identity Management]]></category>
		<category><![CDATA[Privacy]]></category>

		<guid isPermaLink="false">http://spiresecurity.com/blog/?p=200</guid>
		<description><![CDATA[
<p class="more-link-p"><a class="more-link" href="http://spiresecurity.com/?p=200">Read more &#8594;</a></p>]]></description>
				<content:encoded><![CDATA[<p>I wish people cared more about privacy. Sometimes, there is stuff you just don&#8217;t want to know. At some point, we&#8217;ll be paying people just to stay quiet about their personal lives.</p>
]]></content:encoded>
			<wfw:commentRss>http://spiresecurity.com/?feed=rss2&#038;p=200</wfw:commentRss>
		<slash:comments>2</slash:comments>
		</item>
		<item>
		<title>What are the worst security metrics?</title>
		<link>http://spiresecurity.com/?p=255</link>
		<comments>http://spiresecurity.com/?p=255#comments</comments>
		<pubDate>Fri, 09 Nov 2007 15:22:18 +0000</pubDate>
		<dc:creator>Pete Lindstrom</dc:creator>
				<category><![CDATA[Identity Management]]></category>
		<category><![CDATA[Metrics]]></category>
		<category><![CDATA[Vulnerability Management]]></category>
		<category><![CDATA[disclosure]]></category>
		<category><![CDATA[Privacy]]></category>

		<guid isPermaLink="false">http://spiresecurity.com/blog/?p=255</guid>
		<description><![CDATA[
<p class="more-link-p"><a class="more-link" href="http://spiresecurity.com/?p=255">Read more &#8594;</a></p>]]></description>
				<content:encoded><![CDATA[<p>Emergent Chaos has a <a href="http://www.emergentchaos.com/archives/2007/11/measuring_the_wrong_stuff.html">useful post</a> that provides an example in education where metrics lead to inappropriate conclusions. He ends with advice: </p>
<blockquote><p><em>There&#8217;s two important takeaways. First, if you&#8217;re reading &quot;scorecards&quot;<br />
from somewhere, make sure you understand the nitty gritty details.<br />
Second, if you&#8217;re designing metrics, consider what perverse incentives<br />
and results you may be getting.</em></p>
</blockquote>
<p>His example is a classic &quot;rate of change&quot; versus &quot;coverage&quot; challenge that highlights the law of diminishing marginal returns. I frequently joke with vendors who suggest that their &quot;year over year revenue increased by 400%&quot; that going from $1 to $4 is not so exciting; having a baseline to work with helps. (This is also somewhat related to the dearth of features by rev 3 or 4 of any product &#8211; the stuff that finally gets integrated has already been accounted for in previous rev marketing <img src='http://spiresecurity.com/blog/wp-includes/images/smilies/icon_wink.gif' alt=';-)' class='wp-smiley' /> .</p>
<p>But there is a broader issue here &#8211; selecting the correct metric to do the job. Since gaming metrics systems are a standard objection to doing metrics, what exactly are the security metrics that people don&#8217;t like? Here are two of mine:</p>
<ol>
<li>From <a href="http://www.privacyrights.org/ar/ChronDataBreaches.htm#CP">privacyrights.org</a>: <strong><span style="font-size: 0.8em;">TOTAL<br />
&nbsp; &nbsp;&nbsp; &nbsp;&nbsp; &nbsp;&nbsp; &nbsp;number of records containing sensitive personal information involved<br />
&nbsp; &nbsp;&nbsp; &nbsp;&nbsp; &nbsp;&nbsp; &nbsp;in security breaches</span></strong>. And <a href="http://spiresecurity.typepad.com/spire_security_viewpoint/2007/03/privacyrightsor.html">given the history</a>, this is about as clear a case of gaming that you&#8217;ll find in security, IMO. And don&#8217;t forget <a href="http://spiresecurity.typepad.com/spire_security_viewpoint/2007/11/thresholds-and-.html">this</a>.</li>
<li>Jeff Jones&#8217; (et.al.) &quot;<a href="http://blogs.csoonline.com/days_of_risk_in_2006_client_os_products">Days of Risk</a>&quot; &#8211; primarily because he is using it as a measure of vendor responsiveness to security issues while the general public sees it as a measure of the vulnerable state of the systems. This latter belief makes the metric, which only counts days between disclosure and patch, horrible.</li>
</ol>
<p>On the enterprise side, I have heard folks say at one time or another that the percent of security spending over total IT spending is a bad measure, as is number of firewall drops. I like both of these if they are put into the right context.</p>
<p>So what is your least favorite security metric?</p>
]]></content:encoded>
			<wfw:commentRss>http://spiresecurity.com/?feed=rss2&#038;p=255</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Privacyrights.org &#8211; now is your chance!</title>
		<link>http://spiresecurity.com/?p=318</link>
		<comments>http://spiresecurity.com/?p=318#comments</comments>
		<pubDate>Thu, 29 Mar 2007 15:46:43 +0000</pubDate>
		<dc:creator>Pete Lindstrom</dc:creator>
				<category><![CDATA[Identity Management]]></category>
		<category><![CDATA[Privacy]]></category>

		<guid isPermaLink="false">http://spiresecurity.com/blog/?p=318</guid>
		<description><![CDATA[
<p class="more-link-p"><a class="more-link" href="http://spiresecurity.com/?p=318">Read more &#8594;</a></p>]]></description>
				<content:encoded><![CDATA[<p>With TJX now <a href="http://searchsecurity.techtarget.com/originalContent/0,289142,sid14_gci1249421,00.html?track=NL-102&amp;ad=581174&amp;asrc=EM_NLN_1205736&amp;uid=527632">admitting to 45 million credit cards</a> being &quot;lost,&quot; now is the chance for <a href="http://www.privacyrights.org/ar/ChronDataBreaches.htm">privacyrights.org</a> to correct their (purposely?) <a href="http://spiresecurity.typepad.com/spire_security_viewpoint/2007/01/is_privacy_righ.html">misleading</a> <a href="http://spiresecurity.typepad.com/spire_security_viewpoint/2007/01/compromise_loss.html">website</a> without taking a hit on its <a href="http://www.google.com/search?sourceid=navclient&amp;ie=UTF-8&amp;rls=SNYF,SNYF:2004-47,SNYF:en&amp;q=privacy+rights+100+million">100 million record</a> tally.</p>
]]></content:encoded>
			<wfw:commentRss>http://spiresecurity.com/?feed=rss2&#038;p=318</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Privacy vs. Anonymity</title>
		<link>http://spiresecurity.com/?p=319</link>
		<comments>http://spiresecurity.com/?p=319#comments</comments>
		<pubDate>Thu, 29 Mar 2007 15:37:29 +0000</pubDate>
		<dc:creator>Pete Lindstrom</dc:creator>
				<category><![CDATA[Identity Management]]></category>
		<category><![CDATA[Privacy]]></category>

		<guid isPermaLink="false">http://spiresecurity.com/blog/?p=319</guid>
		<description><![CDATA[
<p class="more-link-p"><a class="more-link" href="http://spiresecurity.com/?p=319">Read more &#8594;</a></p>]]></description>
				<content:encoded><![CDATA[<p>Can you satisfy privacy interests with anonymity? It seems to me that a breach of privacy requires both an identity and the disclosed attribute or event as inputs. So, if we don&#8217;t know who you are, is it okay to know what you are or what you did (non-pejoratively*)? I think this is a reasonable assumption &#8211; is there a flaw in my position?</p>
<p>* As far as I can tell, this is the real crux of the issue &#8211; there is some entity (potentially including yourself) that is somehow judging or assigning moral value to what you are or what you did.</p>
]]></content:encoded>
			<wfw:commentRss>http://spiresecurity.com/?feed=rss2&#038;p=319</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Huge Security Hole in John Ratcliffe-Lee&#8217;s Browser</title>
		<link>http://spiresecurity.com/?p=326</link>
		<comments>http://spiresecurity.com/?p=326#comments</comments>
		<pubDate>Thu, 22 Mar 2007 02:02:31 +0000</pubDate>
		<dc:creator>Pete Lindstrom</dc:creator>
				<category><![CDATA[Highlights]]></category>
		<category><![CDATA[Identity Management]]></category>
		<category><![CDATA[Privacy]]></category>

		<guid isPermaLink="false">http://spiresecurity.com/blog/?p=326</guid>
		<description><![CDATA[
<p class="more-link-p"><a class="more-link" href="http://spiresecurity.com/?p=326">Read more &#8594;</a></p>]]></description>
				<content:encoded><![CDATA[<p>Sorry about the inflammatory title, but I felt compelled to copy John Ratcliffe-Lee&#8217;s headline in his post &quot;<a href="http://journal.ratcliffe-lee.com/post/190816">Huge Security Hole in Citibank&#8217;s Account Center</a>&quot; which he <a href="http://journal.ratcliffe-lee.com/post/189652">used twice</a>. I will, of course, retract the statement if it turns out I am wrong &#8211; just like I assume John will&#8230; except he doesn&#8217;t appear to be ready to acknowledge his part in this.</p>
<p>Basically, John sounds the alarm about Citibank when he finds a comment he made to Citibank on his <a href="http://www.cocomment.com/">cocomment</a> page. Cocomment, as far as I can tell, uses a browser-based extension to copy POSTs from anything the user POSTs to and sends the copy to the cocomment page. If that is true, then Citibank is not in the communication stream.</p>
<p>A <a href="http://journal.ratcliffe-lee.com/post/226112">few</a> <a href="http://blog.cocomment.com/2007/03/19/cocomment-security-and-privacy/">posts</a> <a href="http://journal.ratcliffe-lee.com/post/226111">later</a>, and as far as I can tell, John still hasn&#8217;t realized his part in all of this:</p>
<blockquote dir="ltr"><p><em>In any case, I don&#8217;t want to lay blame here officially one group or the other, as it appears there&#8217;s some things that Citi&#8217;s site could be doing better, from an outsider&#8217;s perspective, and I&#8217;m guessing there are things that coComment is doing that they might not have originally intended. </em></p>
</blockquote>
<p>He has caught on that there is a cocomment setting that <em>he should have set </em>to block the comment from going to his cocomment page, but still doesn&#8217;t realize that it is HIS fault. And then:</p>
<blockquote dir="ltr"><p><em>we both are very surprised that no word has come down from Citi&#8217;s PR department or agency, based on the fact that this was indexed more than two days ago as far as Technorati and whatnot.</em></p>
</blockquote>
<p>I can&#8217;t tell who actually made this post on John&#8217;s behalf &#8211; if it was John or not&#8230; but this is completely bizarre to be thinking about PR agencies in the face of a security concern.</p>
<p>More than anything, this is a user error &#8211; John Ratcliffe-Lee did not recognize the leakage possibilities in the new toy he was trying out. (Okay, I guess cocomment is slightly responsible for not realizing that its users would be this naive).</p>
<p>As I mentioned, if John can demonstrate how Citibank could have somehow protected against this (without a client-side footprint), then I will happy retract this statement, as I am sure he will once he reads this post (I was so careful to get the spelling right <img src='http://spiresecurity.com/blog/wp-includes/images/smilies/icon_wink.gif' alt=';-)' class='wp-smiley' /> ).</p>
<p><strong>Update: </strong><a href="http://journal.ratcliffe-lee.com/post/266136">He&#8217;s still at it</a>. Here&#8217;s a choice quote:</p>
<blockquote dir="ltr"><p><em>I could speculate about what that means for Citibank, their understanding of the situation, and the people who handle their Internet security &#8211; but I won&#8217;t. </em></p>
</blockquote>
<p dir="ltr"><strong>Update 2: </strong>It appears that coComment by default doesn&#8217;t aggregate SSL comments, so Citibank must not use SSL. That is an interesting but separate question from Citibank&#8217;s ability to explicitly protect against this; the user and his coComment software are in complete control.</p>
]]></content:encoded>
			<wfw:commentRss>http://spiresecurity.com/?feed=rss2&#038;p=326</wfw:commentRss>
		<slash:comments>6</slash:comments>
		</item>
		<item>
		<title>SSNs Re-Re-Re-Revisited</title>
		<link>http://spiresecurity.com/?p=333</link>
		<comments>http://spiresecurity.com/?p=333#comments</comments>
		<pubDate>Fri, 09 Mar 2007 02:51:50 +0000</pubDate>
		<dc:creator>Pete Lindstrom</dc:creator>
				<category><![CDATA[Identity Management]]></category>
		<category><![CDATA[Vulnerability Management]]></category>
		<category><![CDATA[disclosure]]></category>
		<category><![CDATA[Privacy]]></category>

		<guid isPermaLink="false">http://spiresecurity.com/blog/?p=333</guid>
		<description><![CDATA[
<p class="more-link-p"><a class="more-link" href="http://spiresecurity.com/?p=333">Read more &#8594;</a></p>]]></description>
				<content:encoded><![CDATA[<p>Martin McKeay &quot;can&#8217;t see straight&quot; (and I would say he is being myopic) about <a href="http://www.mckeay.net/secure/2007/03/texas_house_of_representatives.html">SSNs in Texas</a>. Here are my points:</p>
<ol>
<li>For as long as we continue to pretend that SSNs are secret and therefore may be used as authenticators, they will be.</li>
<li>There are over 150,000 people (my estimate) with &quot;defendable&quot; access to your SSN right now. They aren&#8217;t secret.</li>
<li>You are more likely by a factor of 10 to be a victim of identity fraud via one of these &quot;authorized&quot; folks.</li>
<li>The real problem is not how easy it is to get your SSN, but how creditors et.al. allow the SSN to be used as an authenticator (See #1).</li>
<li>The SSN is fine as an identifier. No, it is not perfect, but its main benefit is that it is already used in so many places. </li>
</ol>
<p>Martin, you are stuck inside the box. You keep feeling the need for secrecy/privacy even in the face of overwhelming evidence to the contrary. That&#8217;s why you speak of &quot;disclosure&quot; and &quot;choice&quot; and all those things. But &quot;disclosing&quot; the SSN <em>should</em> be no more significant, and quite a bit more useful, than providing your name, address, and phone number to folks.</p>
<p>Of course, something will need to be used officially. That is a function of fraud against the government. People cheat on taxes. People cheat on welfare. People cheat on, well, social security. If they didn&#8217;t, we wouldn&#8217;t need SSNs.</p>
<p>To whatever extent you don&#8217;t want or need credit, then I agree that you shouldn&#8217;t be &quot;forced&quot; to use the SSN. In fact, there are businesses out there that issue &quot;junk&quot; credit which is all you can get if you can&#8217;t prove that your credit history merits better. You have the choice to keep your SSN &quot;private&quot;; they have the option to deny you credit and/or services.</p>
<p>Knee-jerk regulations and laws really suck. They are not a solution to every problem, and they are unnecessary here. Martin, feel free to tell me what organization would accept the SSN as an authenticator if the SSA published every single one of them publicly. Chances are almost nil and if it did happen, there is plenty of recourse in today&#8217;s court systems to stomp on the practice without any new regulation.</p>
<p>Other things I&#8217;ve written on the topic: <a href="http://spiresecurity.typepad.com/spire_security_viewpoint/2006/05/is_the_ssn_a_go.html">SSN as Identifier</a> and <a href="http://spiresecurity.typepad.com/spire_security_viewpoint/2006/04/a_modest_propos.html">A Modest Proposal to Eliminate the SSN Facade</a>.</p>
]]></content:encoded>
			<wfw:commentRss>http://spiresecurity.com/?feed=rss2&#038;p=333</wfw:commentRss>
		<slash:comments>1</slash:comments>
		</item>
		<item>
		<title>Compromise, Loss, Exposure, and Disclosure</title>
		<link>http://spiresecurity.com/?p=347</link>
		<comments>http://spiresecurity.com/?p=347#comments</comments>
		<pubDate>Mon, 22 Jan 2007 04:12:20 +0000</pubDate>
		<dc:creator>Pete Lindstrom</dc:creator>
				<category><![CDATA[Identity Management]]></category>
		<category><![CDATA[Vulnerability Management]]></category>
		<category><![CDATA[disclosure]]></category>
		<category><![CDATA[Privacy]]></category>

		<guid isPermaLink="false">http://spiresecurity.com/blog/?p=347</guid>
		<description><![CDATA[
<p class="more-link-p"><a class="more-link" href="http://spiresecurity.com/?p=347">Read more &#8594;</a></p>]]></description>
				<content:encoded><![CDATA[<p>Does Chris Walsh need a trim for all his hairsplitting? <img src='http://spiresecurity.com/blog/wp-includes/images/smilies/icon_wink.gif' alt=';-)' class='wp-smiley' /> </p>
<p>I have been taken to task by <a href="http://www.emergentchaos.com/archives/2007/01/a_compromising_position.html">Emergent Chaos</a> for my use of the term &quot;lost&quot; instead of &quot;compromised&quot; with respect to Privacy Rights Clearinghouse&#8217;s <a href="http://www.privacyrights.org/ar/ChronDataBreaches.htm">tally for data breaches</a>. </p>
<p>[It is particularly telling when people pull out a dictionary to make a semantic argument and don't note that &quot;compromise&quot; has about a dozen definitions and &quot;lost&quot; has over 30 (depending on how you count).] </p>
<p>First, let me say that I am changing the word in <a href="http://spiresecurity.typepad.com/spire_security_viewpoint/2007/01/is_privacy_righ.html">my previous post</a> to make Chris happy and because I agree that &quot;compromised&quot; is a better word in this case. However, I am surprised that Chris finds his definition of compromise satisfying. Since it makes &quot;compromise&quot;, &quot;expose&quot;, and &quot;make vulnerable&quot; all synonymous. It is clear that he was reaching in that regard. With that definition, I would suggest that ALL credit cards (<a href="http://spiresecurity.typepad.com/spire_security_viewpoint/2005/06/13_billion_visa_1.html">1.3 billion Visa cards in 2004</a>) have been &quot;compromised.&quot; Why doesn&#8217;t the Privacy Rights Clearinghouse list those?</p>
<p>Second, I note that Chris didn&#8217;t bother to actually pull out the definition of &quot;lost&quot; to contrast with compromise. That is because &quot;<a href="http://dictionary.reference.com/browse/lost">lost</a>&quot; has many definitions (according to his reference) that are extremely close to the meaning of &quot;compromised&quot; and are certainly much closer as used colloquially in the security world than &quot;exposed&quot; and &quot;vulnerable&quot; are.</p>
<p>Finally, Privacy Rights Clearinghouse doesn&#8217;t seem to care about the distinction. They make liberal use of the word &quot;breach&quot; which is clearly not in the spirit of Chris&#8217; explanation and imply some comfort with Attrition.org&#8217;s data <em>loss</em> database.</p>
<p>You only need to ferret out this one line to have your answer to my original question:</p>
<blockquote dir="ltr"><p><em>&quot;Sure, there may only have been a confirmed loss of 260K records.&quot;</em></p>
</blockquote>
<p dir="ltr">So, either Privacy Rights Clearinghouse needs to increase their number into the billions or reduce it to 60 million. It is really that simple.</p>
]]></content:encoded>
			<wfw:commentRss>http://spiresecurity.com/?feed=rss2&#038;p=347</wfw:commentRss>
		<slash:comments>1</slash:comments>
		</item>
		<item>
		<title>Is Privacy Rights Clearinghouse Purposely Lying?</title>
		<link>http://spiresecurity.com/?p=349</link>
		<comments>http://spiresecurity.com/?p=349#comments</comments>
		<pubDate>Fri, 19 Jan 2007 04:10:12 +0000</pubDate>
		<dc:creator>Pete Lindstrom</dc:creator>
				<category><![CDATA[Identity Management]]></category>
		<category><![CDATA[Privacy]]></category>

		<guid isPermaLink="false">http://spiresecurity.com/blog/?p=349</guid>
		<description><![CDATA[
<p class="more-link-p"><a class="more-link" href="http://spiresecurity.com/?p=349">Read more &#8594;</a></p>]]></description>
				<content:encoded><![CDATA[<p>So, here&#8217;s the thing. I am starting to see (and hear) this &quot;100 million records <del>lost</del> compromised since February, 2005&quot; figure referenced in a number of places such that it has somehow gained credibility. What I wonder is if the <a href="http://www.privacyrights.org/ar/ChronDataBreaches.htm">Privacy Rights Clearinghouse</a> is blatantly lying by listing the CardSystems&#8217; 40 million records (I am not statistician, but I think that is a full 40% of the total <img src='http://spiresecurity.com/blog/wp-includes/images/smilies/icon_wink.gif' alt=';-)' class='wp-smiley' /> ), or is just shoddy in its tracking (wink, wink, nudge, nudge).</p>
<p>Or, I could be wrong&#8230; but when I read the congressional testimony of the CardSystems&#8217; CEO he clarified that it was actually 263,000 records (a full&#8230;ummm&#8230;.something % of that adjusted 60 million records). The only copy I could come up with quickly was a <a href="http://209.85.165.104/search?q=cache:jRZ9FruE89kJ:financialservices.house.gov/media/pdf/072105jmp.pdf+cardsystems+testimony&amp;hl=en&amp;gl=us&amp;ct=clnk&amp;cd=2">Google cache</a> but I note this because when I read the statement I remembered this adjustment, which is obviously significant and was <a href="http://www.google.com/search?hl=en&amp;lr=&amp;rls=SNYF%2CSNYF%3A2004-47%2CSNYF%3Aen&amp;ie=UTF-8&amp;oe=UTF-8&amp;q=263,000+cardsystems&amp;sa=N&amp;tab=nw">covered at least nominally</a>.</p>
<p>So, what do you think? An &quot;oversight&quot; or deliberate? If I were a privacy advocate, I certainly would want the rather substantial correct number of 60 million to be the one that is used, considering it appears to reflect the real numbers better.</p>
]]></content:encoded>
			<wfw:commentRss>http://spiresecurity.com/?feed=rss2&#038;p=349</wfw:commentRss>
		<slash:comments>4</slash:comments>
		</item>
		<item>
		<title>What If I Release Personal Information?</title>
		<link>http://spiresecurity.com/?p=357</link>
		<comments>http://spiresecurity.com/?p=357#comments</comments>
		<pubDate>Wed, 13 Dec 2006 18:47:20 +0000</pubDate>
		<dc:creator>Pete Lindstrom</dc:creator>
				<category><![CDATA[Highlights]]></category>
		<category><![CDATA[Identity Management]]></category>
		<category><![CDATA[Metrics]]></category>
		<category><![CDATA[Privacy]]></category>
		<category><![CDATA[ROSI]]></category>

		<guid isPermaLink="false">http://spiresecurity.com/blog/?p=357</guid>
		<description><![CDATA[
<p class="more-link-p"><a class="more-link" href="http://spiresecurity.com/?p=357">Read more &#8594;</a></p>]]></description>
				<content:encoded><![CDATA[<p>Rich Mogull has an important post at securosis.com for all folks interested in their privacy: <a href="http://securosis.com/2006/12/12/if-you-release-it-you-cant-control-it/">If You Release It, You Can&#8217;t Control It</a>:</p>
<blockquote dir="ltr"><p><em>&quot;I’m consistently amused by the utter shock and dismay of various individuals and corporations when… gasp.. someone takes something they made public and does something… and you won’t believe this… unexpected and unapproved with it!&quot;</em></p>
</blockquote>
<p dir="ltr">Given that more than 150,000 people (<a href="http://spiresecurity.typepad.com/spire_security_viewpoint/2006/04/a_modest_propos.html">by one estimate</a> <img src='http://spiresecurity.com/blog/wp-includes/images/smilies/icon_wink.gif' alt=';-)' class='wp-smiley' /> ) have access to the typical SSN, that certainly sounds public to me. So don&#8217;t be surprised when you become a victim.</p>
]]></content:encoded>
			<wfw:commentRss>http://spiresecurity.com/?feed=rss2&#038;p=357</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
	</channel>
</rss>
