Risk
9/29/2011
02:25 PM
Connect Directly
LinkedIn
Twitter
Google+
RSS
E-Mail
50%
50%

Amazon Silk Browser Prompts Privacy Worries

The fast Web surfing Amazon promises on its Kindle Fire tablet involves a record of what you visit on the Net.

Amazon's most significant announcement on Wednesday was not the introduction of its Kindle Fire tablet. Rather, it was the Web browser that will ship with the Kindle Fire, Amazon Silk.

Amazon Silk is based on WebKit, the open source browser engine that forms the foundation of the Apple Safari and Google Chrome browsers. But Silk's technical ancestry isn't as important as its split personality: Silk can operate as a traditional browser, in "off-cloud mode," but it also can take advantage of Amazon's cloud computing infrastructure to optimize Web page files so they load more quickly.

In "cloud mode," Silk relies on Amazon Web Services as a proxy service: Amazon becomes the middleman responsible for fulfilling the user's Web page requests. Imagine how useful all that data will be to Amazon as business intelligence.

Chester Wisniewski, senior security advisor at Sophos Canada, says Silk presents an obvious privacy problem. "All of your Web surfing habits will transit Amazon's cloud," he wrote in a blog post. "If you think that Google AdWords and Facebook are watching you, this service is guaranteed to have a record of everything you do on the Web."

[ Take a visual tour of Amazon's forthcoming Kindle Fire. ]

What Amazon is doing isn't unprecedented. The Opera Mini browser relies on remote servers to optimize Web data. BlackBerry browsers may be assigned to a BlackBerry Enterprise Server, which serves as an intermediary between the user and the Internet.

Like an ISP, Amazon will have access to data about the Internet activities of Kindle Fire users. Indeed, Amazon compares Silk's awareness of its users to that of an ISP.

"[L]ike most Internet service providers and similar services that enable you to access the Web, the content of webpages you visit using Amazon Silk passes through our servers and may be cached to improve performance on subsequent page loads," the company states in its Silk Terms & Conditions.

Amazon notes that it temporarily logs Web URLs and identifiers like IP and MAC addresses to help with technical issues. "We generally do not keep this information for longer than 30 days," the company states, which means there may be circumstances when data is retained for longer periods.

But unlike an ISP, Amazon will also be presenting SSL certificates on behalf of users, and will thus have even more intimate knowledge of what users are doing online.

As Wisniewski observes, a U.S. court order would make it easy to monitor the online activities of a Kindle Fire user, at least in "cloud mode." Other governments are also likely to see Amazon as a one-stop data shop for Kindle Fire users, to judge by RIM's experience in India and the United Arab Emirates.

Unified communications isn't like other online apps. Get the infrastructure right or risk some major hang-ups. Read all about it in the new all-digital InformationWeek supplement. Download it now. (Free with registration.)

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
jcox617
50%
50%
jcox617,
User Rank: Apprentice
10/1/2011 | 4:42:53 PM
re: Amazon Silk Browser Prompts Privacy Worries
Test
darkmatter
50%
50%
darkmatter,
User Rank: Apprentice
9/30/2011 | 3:17:41 PM
re: Amazon Silk Browser Prompts Privacy Worries
This is the best intelligence device ever developed to gather information on customers coupled with an efficient selling engine behind it. Amazon has developed a Trojan horse (not covered with wooden planks but nice silky fur) capable of identifying your habits, knowing your friends, understanding your quirks, satisfying most of your wishes and desires ... and a point-of-sales nearby you 24/7. What is better than Amazon Fire for a consumerist society? The Greeks gave the wooden horse free of charge to the Trojans. Amazon asks for $199. Too much?
jrapoza
50%
50%
jrapoza,
User Rank: Apprentice
9/29/2011 | 8:56:08 PM
re: Amazon Silk Browser Prompts Privacy Worries
I agree with Brian. I'm almost less concerned with this then I am with how my ISP can track surfing data. I'm pretty sure I know how Amazon will use this data (to improve their own capability to sell stuff). With the ISPs, I'm less sure how they are using data and more concerned about what they are doing with it.

Jim Rapoza is an InformationWeek Contributing Editor
Bprince
50%
50%
Bprince,
User Rank: Ninja
9/29/2011 | 8:22:28 PM
re: Amazon Silk Browser Prompts Privacy Worries
From the perspective of developing intelligence on customers, this sounds fine. But I think they should be clear on how long they retain data and what type of data they retain so people can make a decision about privacy based on all the facts.
Brian Prince, InformationWeek contributor
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Dark Reading, September 16, 2014
Malicious software is morphing to be more targeted, stealthy, and destructive. Are you prepared to stop it?
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2006-1318
Published: 2014-09-19
Microsoft Office 2003 SP1 and SP2, Office XP SP3, Office 2000 SP3, Office 2004 for Mac, and Office X for Mac do not properly parse record lengths, which allows remote attackers to execute arbitrary code via a malformed control in an Office document, aka "Microsoft Office Control Vulnerability."

CVE-2012-2588
Published: 2014-09-19
Multiple cross-site scripting (XSS) vulnerabilities in MailEnable Enterprise 6.5 allow remote attackers to inject arbitrary web script or HTML via the (1) From, (2) To, or (3) Subject header or (4) body in an SMTP e-mail message.

CVE-2012-6659
Published: 2014-09-19
Cross-site scripting (XSS) vulnerability in the admin interface in Phorum before 5.2.19 allows remote attackers to inject arbitrary web script or HTML via a crafted URL.

CVE-2014-1391
Published: 2014-09-19
QT Media Foundation in Apple OS X before 10.9.5 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted movie file with RLE encoding.

CVE-2014-3614
Published: 2014-09-19
Unspecified vulnerability in PowerDNS Recursor (aka pdns_recursor) 3.6.x before 3.6.1 allows remote attackers to cause a denial of service (crash) via an unknown sequence of malformed packets.

Best of the Web
Dark Reading Radio