Mail: Strong Objections to MessageTag

By | November 24, 2011

Robyn Winter comments on my recent column about MessageTag:

I noticed, from checking on MSGTAG’s website that you recently did an article on MSGTAG’s email tracking service.

I recently received several email in which the sender utilised MSGTAG’s email tracking service. I was completely unaware that there was even any type of “read receipt” tracking until I had printed out the email and noticed the MSGTAG’s icon. This was because the icon and accompanying message was below the sender’s signature details.

Apart from the fact that our company has a policy NOT to allow read receipts, personally, I strongly object to MSGTAG’S email tracking service, as I have absolute right to control what does or does not leave my mailbox and computer.

The sender has no real right to know when and if I read his email, where will this go next…tracking how often the email is open, tracking to whom I on forward the email…the possibilities are endless and tantamount to spying and invasion of privacy.

MSGTAG also collects the recipients email address, email ID, IP address and email headers without the recipients authorisation or knowledge. This is in direct contravention to the privacy act and the rules governing the collection of personally identifiable information. We also feel that MSGTAG’s email tracking service is not only an invasion of our privacy but is also an infringement of the “Information Access” and “Computer Equipment Access” laws as their service provides “back-flow” traffic, without the recipient’s knowledge or consent, directly from their computer software and hardware.

Because of this activity, which for all intents and purposes (although stated to the contrary on the MSGTAG web site), the email tracking is a form of common spyware and we have therefore banned the use of MSGTAG services through our firewall and proxy services.

We will be taking every opportunity to make users aware of the infringement this product inherently has on privacy. We have contacted MSGTAG regarding their software and have not received any response to date, which to our mind, reflects on their business practices and ethic, as does their product.

Robyn Winter

I’ve passed this email along to MSGTAG for a response. Personally, while I can see some folk might have issues with this kind of tracking, I have been using it myself for some time and have very little negative feedback. Furthermore, after long discussions with them, I am willing to believe that:
– the folks at MSGTAG are not using the information they gather for traditional spyware purposes
– they have put safeguards in place to prevent it being used for spam purposes and
– it amounts to no more than a registered post service facility.

I’m ready to be convinced otherwise. Anyone else have any strong views? Write me.

News: Pier to Pier, or WiFi on the Beach

By | November 24, 2011

Brighton Beach is the world’s first free WiFi beach, reports The Guardian.

A Web site called Trepia has begun to explore possibilities, and can find out who else is using WiFi in your vicinity, and thus can exchange personal profiles similar to an Internet dating site. Alex Studd, who works for Moving Edge, created Brighton’s “Pier to Pier” network. (Thanks to the OnlineJournalism.com Newsletter, the daily news Weblog of the USC Annenberg Online Journalism Review for this link)

News: The RIAA Are After You

By | November 24, 2011

If you’re in the U.S., and have ever used Grokster, KaZaa or another file sharing program to download mp3 files, expect a call. The RIAA are out to get you, and they don’t care whether you’re a granny. According to Associated Press, one 50 year-old grandfather in California was shocked to learn this week that the RIAA had subpoenaed his ISP to provide his name and address for downloading songs from the internet. But the man was not the downloader – it was a member of his family.

The RIAA has served subpoenas to Internet service providers, which will ultimately end in lawsuits. TechTV has published a number of the P2P user names filed with the US District Court in Washington, DC, mainly Kazaa users. In the end this list could be massive, raising the possibility of a backlash and a half.

My tupennies’ worth? I think the RIAA should have been more circumspect. My understanding is that the vast majority of mp3 files out there are from a small number of uploaders, and if they can be closed down, the file-sharing world will be less appealing. Get rid of them and you may have little more than an informal ‘tasting net’ where folk can check out music without having to pay for it first (a little like the old cassette days). Or am I being hopelessly romantic?

News: Come To Australia, Skim Central

By | November 24, 2011

Looks like Australia is becoming a haven for credit card fraud, or at least a part of the business. An article on News Interactive says that losses by Australian banks to credit card skimming have risen by more than 400 per cent in the past year, according to The Australian Crime Commission (ACC). Organised groups have used portable card skimmers to obtain credit card data at gas stations, restaurants and in taxis, before selling this data to gangs in Malaysia, Indonesia, Hong Kong and Thailand, where it was transferred to plastic cards bearing the logos of Australian banks, before making fraudulent purchases.

Credit-card skimming involves the unauthorised copying of electronic data from a legitimate card. It is often done by dishonest shop assistants. Stolen data can then be encoded onto a counterfeit card, with the original card holder none the wiser until details of unauthorised spending start appearing on his or her statement. Current laws still allow the importation of skimmers, embossing machines and credit card blanks, but the ACC is calling for closer co-operation with police.“From some of the material [the ACC] has gathered so far, it would seem that since 2001, the problem of card skimming and card fraud has migrated to Australia”, ePaynews.com quoted cybercrime co-ordinator Scott McLeod as saying.