Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Risk

1/29/2008
12:00 AM
Commentary
Commentary
Commentary
50%
50%

Should Your IP Address Be Private?

The European Union has just ruled that Spain's Telefonica SA doesn't have to hand over the identities of file sharers on its networks . At least, not simply because the allegedly aggrieved party asks for such information.  

The European Union has just ruled that Spain's Telefonica SA doesn't have to hand over the identities of file sharers on its networks . At least, not simply because the allegedly aggrieved party asks for such information.

 

The case involves Promusicae, a group representing film and music producers, who had asked for the names and addresses of KaZaA users on Spanish telecom Telefonica SA's network who it believed were sharing copyrighted works. Telefonica SA essentially responded by saying "Nuh-uh. We only have to do that if it's a criminal prosecution or a matter of national security ." Promusicae said "We'll see you in court."

The Spanish courts passed it up the chain to the EU's highest court, which has sided with Telefonica SA.

Central to this whole mess is the question of how private one's IP address should be. Well, let's clarify: not how private one's IP address should be, but how private the link between one's IP address and one's personally identifying details should be. Most of us go around with our IP addresses hanging out for all to see. Few people bother to use an anonymizing proxy for simple web browsing or file sharing.

So how sacred should we make this identifying link? My instinct is that it should be very private, right up to the point where you commit a crime. Yet even this maxim represents a simplification of the issue. Who gets to determine when you've committed a crime? Surely not third parties who have a profit motive, or some even less noble motive to stop you from doing what you're doing. I'm not being anti-capitalist here—I believe in the right to profit from intellectual property. But the question of whether or not someone has committed a crime, and therefore forfeited the right to privacy, can not, and must not, be left in the hands of those responsible to no one but their own shareholders.

Even in the hands of governmental powers, this power is abused. But at least there is some semblance of responsibility to the general public when public officials must make these determinations. You can argue, of course, that this responsibility is not taken seriously, but that's not a reason to hand over the power to private parties.

Comment  | 
Print  | 
More Insights
Comments
Threaded  |  Newest First  |  Oldest First
COVID-19: Latest Security News & Commentary
Dark Reading Staff 10/27/2020
Chinese Attackers' Favorite Flaws Prove Global Threats, Research Shows
Kelly Sheridan, Staff Editor, Dark Reading,  10/27/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Special Report: Computing's New Normal
This special report examines how IT security organizations have adapted to the "new normal" of computing and what the long-term effects will be. Read it and get a unique set of perspectives on issues ranging from new threats & vulnerabilities as a result of remote working to how enterprise security strategy will be affected long term.
Flash Poll
How IT Security Organizations are Attacking the Cybersecurity Problem
How IT Security Organizations are Attacking the Cybersecurity Problem
The COVID-19 pandemic turned the world -- and enterprise computing -- on end. Here's a look at how cybersecurity teams are retrenching their defense strategies, rebuilding their teams, and selecting new technologies to stop the oncoming rise of online attacks.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-27986
PUBLISHED: 2020-10-28
** DISPUTED ** SonarQube 8.4.2.36762 allows remote attackers to discover cleartext SMTP, SVN, and GitLab credentials via the api/settings/values URI. NOTE: reportedly, the vendor's position is "it is the administrator's responsibility to configure it."
CVE-2020-27981
PUBLISHED: 2020-10-28
An XSS vulnerability in the auto-complete function of the description field (for new or edited transactions) in Firefly III before 5.4.5 allows the user to execute JavaScript via suggested transaction titles. NOTE: this is exploitable only in a non-default configuration where Content Security Policy...
CVE-2020-24707
PUBLISHED: 2020-10-28
Gophish before 0.11.0 allows the creation of CSV sheets that contain malicious content.
CVE-2020-24708
PUBLISHED: 2020-10-28
Cross Site Scripting (XSS) vulnerability in Gophish before 0.11.0 via the Host field on the send profile form.
CVE-2020-24709
PUBLISHED: 2020-10-28
Cross Site Scripting (XSS) vulnerability in Gophish through 0.10.1 via a crafted landing page or email template.