Risk
9/29/2011
02:25 PM
Connect Directly
LinkedIn
Twitter
Google+
RSS
E-Mail
50%
50%

Amazon Silk Browser Prompts Privacy Worries

The fast Web surfing Amazon promises on its Kindle Fire tablet involves a record of what you visit on the Net.

Amazon's most significant announcement on Wednesday was not the introduction of its Kindle Fire tablet. Rather, it was the Web browser that will ship with the Kindle Fire, Amazon Silk.

Amazon Silk is based on WebKit, the open source browser engine that forms the foundation of the Apple Safari and Google Chrome browsers. But Silk's technical ancestry isn't as important as its split personality: Silk can operate as a traditional browser, in "off-cloud mode," but it also can take advantage of Amazon's cloud computing infrastructure to optimize Web page files so they load more quickly.

In "cloud mode," Silk relies on Amazon Web Services as a proxy service: Amazon becomes the middleman responsible for fulfilling the user's Web page requests. Imagine how useful all that data will be to Amazon as business intelligence.

Chester Wisniewski, senior security advisor at Sophos Canada, says Silk presents an obvious privacy problem. "All of your Web surfing habits will transit Amazon's cloud," he wrote in a blog post. "If you think that Google AdWords and Facebook are watching you, this service is guaranteed to have a record of everything you do on the Web."

[ Take a visual tour of Amazon's forthcoming Kindle Fire. ]

What Amazon is doing isn't unprecedented. The Opera Mini browser relies on remote servers to optimize Web data. BlackBerry browsers may be assigned to a BlackBerry Enterprise Server, which serves as an intermediary between the user and the Internet.

Like an ISP, Amazon will have access to data about the Internet activities of Kindle Fire users. Indeed, Amazon compares Silk's awareness of its users to that of an ISP.

"[L]ike most Internet service providers and similar services that enable you to access the Web, the content of webpages you visit using Amazon Silk passes through our servers and may be cached to improve performance on subsequent page loads," the company states in its Silk Terms & Conditions.

Amazon notes that it temporarily logs Web URLs and identifiers like IP and MAC addresses to help with technical issues. "We generally do not keep this information for longer than 30 days," the company states, which means there may be circumstances when data is retained for longer periods.

But unlike an ISP, Amazon will also be presenting SSL certificates on behalf of users, and will thus have even more intimate knowledge of what users are doing online.

As Wisniewski observes, a U.S. court order would make it easy to monitor the online activities of a Kindle Fire user, at least in "cloud mode." Other governments are also likely to see Amazon as a one-stop data shop for Kindle Fire users, to judge by RIM's experience in India and the United Arab Emirates.

Unified communications isn't like other online apps. Get the infrastructure right or risk some major hang-ups. Read all about it in the new all-digital InformationWeek supplement. Download it now. (Free with registration.)

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
jcox617
50%
50%
jcox617,
User Rank: Apprentice
10/1/2011 | 4:42:53 PM
re: Amazon Silk Browser Prompts Privacy Worries
Test
darkmatter
50%
50%
darkmatter,
User Rank: Apprentice
9/30/2011 | 3:17:41 PM
re: Amazon Silk Browser Prompts Privacy Worries
This is the best intelligence device ever developed to gather information on customers coupled with an efficient selling engine behind it. Amazon has developed a Trojan horse (not covered with wooden planks but nice silky fur) capable of identifying your habits, knowing your friends, understanding your quirks, satisfying most of your wishes and desires ... and a point-of-sales nearby you 24/7. What is better than Amazon Fire for a consumerist society? The Greeks gave the wooden horse free of charge to the Trojans. Amazon asks for $199. Too much?
jrapoza
50%
50%
jrapoza,
User Rank: Apprentice
9/29/2011 | 8:56:08 PM
re: Amazon Silk Browser Prompts Privacy Worries
I agree with Brian. I'm almost less concerned with this then I am with how my ISP can track surfing data. I'm pretty sure I know how Amazon will use this data (to improve their own capability to sell stuff). With the ISPs, I'm less sure how they are using data and more concerned about what they are doing with it.

Jim Rapoza is an InformationWeek Contributing Editor
Bprince
50%
50%
Bprince,
User Rank: Ninja
9/29/2011 | 8:22:28 PM
re: Amazon Silk Browser Prompts Privacy Worries
From the perspective of developing intelligence on customers, this sounds fine. But I think they should be clear on how long they retain data and what type of data they retain so people can make a decision about privacy based on all the facts.
Brian Prince, InformationWeek contributor
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-3352
Published: 2014-08-30
Cisco Intelligent Automation for Cloud (aka Cisco Cloud Portal) 2008.3_SP9 and earlier does not properly consider whether a session is a problematic NULL session, which allows remote attackers to obtain sensitive information via crafted packets, related to an "iFrame vulnerability," aka Bug ID CSCuh...

CVE-2014-3908
Published: 2014-08-30
The Amazon.com Kindle application before 4.5.0 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.

CVE-2010-5110
Published: 2014-08-29
DCTStream.cc in Poppler before 0.13.3 allows remote attackers to cause a denial of service (crash) via a crafted PDF file.

CVE-2012-1503
Published: 2014-08-29
Cross-site scripting (XSS) vulnerability in Six Apart (formerly Six Apart KK) Movable Type (MT) Pro 5.13 allows remote attackers to inject arbitrary web script or HTML via the comment section.

CVE-2013-5467
Published: 2014-08-29
Monitoring Agent for UNIX Logs 6.2.0 through FP03, 6.2.1 through FP04, 6.2.2 through FP09, and 6.2.3 through FP04 and Monitoring Server (ms) and Shared Libraries (ax) 6.2.0 through FP03, 6.2.1 through FP04, 6.2.2 through FP08, 6.2.3 through FP01, and 6.3.0 through FP01 in IBM Tivoli Monitoring (ITM)...

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
This episode of Dark Reading Radio looks at infosec security from the big enterprise POV with interviews featuring Ron Plesco, Cyber Investigations, Intelligence & Analytics at KPMG; and Chris Inglis & Chris Bell of Securonix.