Risk
9/29/2011
02:25 PM
Connect Directly
Google+
LinkedIn
Twitter
RSS
E-Mail
50%
50%

Amazon Silk Browser Prompts Privacy Worries

The fast Web surfing Amazon promises on its Kindle Fire tablet involves a record of what you visit on the Net.

Amazon's most significant announcement on Wednesday was not the introduction of its Kindle Fire tablet. Rather, it was the Web browser that will ship with the Kindle Fire, Amazon Silk.

Amazon Silk is based on WebKit, the open source browser engine that forms the foundation of the Apple Safari and Google Chrome browsers. But Silk's technical ancestry isn't as important as its split personality: Silk can operate as a traditional browser, in "off-cloud mode," but it also can take advantage of Amazon's cloud computing infrastructure to optimize Web page files so they load more quickly.

In "cloud mode," Silk relies on Amazon Web Services as a proxy service: Amazon becomes the middleman responsible for fulfilling the user's Web page requests. Imagine how useful all that data will be to Amazon as business intelligence.

Chester Wisniewski, senior security advisor at Sophos Canada, says Silk presents an obvious privacy problem. "All of your Web surfing habits will transit Amazon's cloud," he wrote in a blog post. "If you think that Google AdWords and Facebook are watching you, this service is guaranteed to have a record of everything you do on the Web."

[ Take a visual tour of Amazon's forthcoming Kindle Fire. ]

What Amazon is doing isn't unprecedented. The Opera Mini browser relies on remote servers to optimize Web data. BlackBerry browsers may be assigned to a BlackBerry Enterprise Server, which serves as an intermediary between the user and the Internet.

Like an ISP, Amazon will have access to data about the Internet activities of Kindle Fire users. Indeed, Amazon compares Silk's awareness of its users to that of an ISP.

"[L]ike most Internet service providers and similar services that enable you to access the Web, the content of webpages you visit using Amazon Silk passes through our servers and may be cached to improve performance on subsequent page loads," the company states in its Silk Terms & Conditions.

Amazon notes that it temporarily logs Web URLs and identifiers like IP and MAC addresses to help with technical issues. "We generally do not keep this information for longer than 30 days," the company states, which means there may be circumstances when data is retained for longer periods.

But unlike an ISP, Amazon will also be presenting SSL certificates on behalf of users, and will thus have even more intimate knowledge of what users are doing online.

As Wisniewski observes, a U.S. court order would make it easy to monitor the online activities of a Kindle Fire user, at least in "cloud mode." Other governments are also likely to see Amazon as a one-stop data shop for Kindle Fire users, to judge by RIM's experience in India and the United Arab Emirates.

Unified communications isn't like other online apps. Get the infrastructure right or risk some major hang-ups. Read all about it in the new all-digital InformationWeek supplement. Download it now. (Free with registration.)

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
jcox617
50%
50%
jcox617,
User Rank: Apprentice
10/1/2011 | 4:42:53 PM
re: Amazon Silk Browser Prompts Privacy Worries
Test
darkmatter
50%
50%
darkmatter,
User Rank: Apprentice
9/30/2011 | 3:17:41 PM
re: Amazon Silk Browser Prompts Privacy Worries
This is the best intelligence device ever developed to gather information on customers coupled with an efficient selling engine behind it. Amazon has developed a Trojan horse (not covered with wooden planks but nice silky fur) capable of identifying your habits, knowing your friends, understanding your quirks, satisfying most of your wishes and desires ... and a point-of-sales nearby you 24/7. What is better than Amazon Fire for a consumerist society? The Greeks gave the wooden horse free of charge to the Trojans. Amazon asks for $199. Too much?
jrapoza
50%
50%
jrapoza,
User Rank: Apprentice
9/29/2011 | 8:56:08 PM
re: Amazon Silk Browser Prompts Privacy Worries
I agree with Brian. I'm almost less concerned with this then I am with how my ISP can track surfing data. I'm pretty sure I know how Amazon will use this data (to improve their own capability to sell stuff). With the ISPs, I'm less sure how they are using data and more concerned about what they are doing with it.

Jim Rapoza is an InformationWeek Contributing Editor
Bprince
50%
50%
Bprince,
User Rank: Ninja
9/29/2011 | 8:22:28 PM
re: Amazon Silk Browser Prompts Privacy Worries
From the perspective of developing intelligence on customers, this sounds fine. But I think they should be clear on how long they retain data and what type of data they retain so people can make a decision about privacy based on all the facts.
Brian Prince, InformationWeek contributor
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2013-7421
Published: 2015-03-02
The Crypto API in the Linux kernel before 3.18.5 allows local users to load arbitrary kernel modules via a bind system call for an AF_ALG socket with a module name in the salg_name field, a different vulnerability than CVE-2014-9644.

CVE-2014-8160
Published: 2015-03-02
net/netfilter/nf_conntrack_proto_generic.c in the Linux kernel before 3.18 generates incorrect conntrack entries during handling of certain iptables rule sets for the SCTP, DCCP, GRE, and UDP-Lite protocols, which allows remote attackers to bypass intended access restrictions via packets with disall...

CVE-2014-9644
Published: 2015-03-02
The Crypto API in the Linux kernel before 3.18.5 allows local users to load arbitrary kernel modules via a bind system call for an AF_ALG socket with a parenthesized module template expression in the salg_name field, as demonstrated by the vfat(aes) expression, a different vulnerability than CVE-201...

CVE-2015-0239
Published: 2015-03-02
The em_sysenter function in arch/x86/kvm/emulate.c in the Linux kernel before 3.18.5, when the guest OS lacks SYSENTER MSR initialization, allows guest OS users to gain guest OS privileges or cause a denial of service (guest OS crash) by triggering use of a 16-bit code segment for emulation of a SYS...

CVE-2014-8921
Published: 2015-03-01
The IBM Notes Traveler Companion application 1.0 and 1.1 before 201411010515 for Window Phone, as distributed in IBM Notes Traveler 9.0.1, does not properly restrict the number of executions of the automatic configuration option, which makes it easier for remote attackers to capture credentials by c...

Dark Reading Radio
Archived Dark Reading Radio
How can security professionals better engage with their peers, both in person and online? In this Dark Reading Radio show, we will talk to leaders at some of the security industry’s professional organizations about how security pros can get more involved – with their colleagues in the same industry, with their peers in other industries, and with the IT security community as a whole.