Online Privacy

It is an amazing time to be alive. We carry the world in our hands; the amount of information available at our fingertips is extraordinary. We can share our views with thousands of people with just a click. Staying connected with our loved ones has never been easier. But all this comes at a price, and that price is our privacy.

Scientific advancements in recent years have made it possible for mankind to imagine an arena of potential for the future. Technology and automation have sewn themselves into our lives and made it impossible to survive without it. What drives these advancements is data. Companies collect a huge amount of sensitive information that we may not want to share with anyone, let alone strangers. The rapid development of Artificial Intelligence has made matters worse in the context of data security.

Why stay private?

Some people might say that as a law abiding citizen they have nothing to hide. This is understandable until the extent of data collection is unknown. As we browse the internet on our smartphones or laptops, we are unconsciously sharing details about our interests, behavior, and preferences. Location, time spent on browsing, visited sites, shopping interests, eating habits, medical issues, political views, and so much more. Ignorance leads to sharing more sensitive information like names and social security numbers too.

“Digital Anonymous Profile” – A digital ID that is created with reference to your online behavior. Company’s collect this data in their systems, which can be used and sold to other companies for a profit.

The Risks

There are plenty of loopholes in privacy policies and network processes that full protection is not an option anymore. However, one should be aware of the risks and where they come from, and if possible work on minimizing them. Following are a few ways of how everyday surfing poses a threat to privacy.

Operating System

A Windows 10 device is already tagged with a unique advertising ID for each user. This is done so that “app developers and advertising networks can use to provide more relevant advertising in apps”, quoting the Microsoft website. Data synchronization is enabled by default and lets Microsoft collect any personal data and device information that is entered.  This data can be shared with a third party without consent. Other operating systems like Linux and MacOS are comparatively safer in case of privacy.


Small files saved in the browser designed to hold data specific to a user or a website, cookies act as a tool to enhance the browsing experience. The uses of this tool can be put under scrutiny. A string of text that is stored in your browser, only visible to the site that stored them. Companies use these cookies to show advertisements from other sites, creating a unique identification for a device and bit by bit collecting more data this way.

Web Browser

Browsers are complex software that acts like boats needed to access the internet. Surfing the internet requires browsers to interact with other computers thereby revealing some details to other sites. As a result, a mixture of browser settings and device history create a unique Device Fingerprint.

The Device Fingerprint

Device settings create a unique fingerprint for the purpose of identification. Even if the browser does not save cookies, the digital fingerprint can be used to identify the user. Much like the real world, we leave our fingerprint on each site we visit.

Check your device fingerprint at

Solution? The device can be not entirely unique. As the fingerprint is a combination of browser settings and preferences, one can try to keep them vague and not specific. Also, select a browser that is safer from the privacy aspect, like Tor or Firefox.

The Sensitive Information

Most people fill in forms online placing a remarkable amount of trust in sites whose security standard may not be known. Almost everyone does not read the “Terms and Conditions” before accepting them while creating a new account or signing up on a website. We fill in login credentials, credit card information and other important details then click a button; data leaves the machine, but where does it go? What measure is being taken to ensure its safety?

After the internet became global, new standards were invented for protection against cyber attacks. In 1994, Secure Socket Layer (SSL) protocol came into existence and HTTPS (Hypertext Transfer Protocol, with an SSL) was introduced. Then came Transport Layer Security (TLS), an assured version of Transmission Control Protocol (TCP). All these security protocols have been invented to protect the user’s interest in the case of distrust. But, numerous websites have failed to adopt the SSL which creates the perfect opportunity for hackers to steal details even before the “Submit” button is clicked.

The SSL or TLS always performs a “handshake” that ensures end-point verification, confirming that the data is being received only from the site we think it is, and encryption, which eliminates the possibility of information being tapped and copied.

Storing Passwords

A string of characters as critical as a password cannot be stored in a database as it is. Thus the use of Cryptographic Hash Function, which takes a ‘message’ and turns it into an alphanumeric string of fixed size. The ‘hash value’ obtained is easy to calculate, but difficult to compute back into the message. A small difference in a message will have a totally different hash value.

So, even if the login credentials are compromised, the hash value of passwords cannot be used. Sadly the hackers have found ways to attack this process as well.

Rainbow Table, a database of precomputed cryptographic hash functions and is used to convert them back into passwords. It is designed with compromised databases, around the idea that most people are not so original when it comes to creating a password. To overcome these, another scheme comes into play called ‘salt’.

A ‘Salted Hash’ is when you add a predefined string called ‘salt’ to password and a delimiter (like a colon or a semicolon, it must be consistent) before creating a hash value for it. This makes it considerably difficult for the attacker even after de-hashing the function value unless they can guess the salt value for all passwords.

This is just a small insight into how your data might be manipulated or used. It takes a load of hard work and coding algorithms in protecting and attacking online information.

Effects of Compromised Privacy

We are living in a world where everything is connected and shared. Millenial kids who are growing up with the internet do not understand that their entire life will become a searchable profile. The use of security camera records all activities and can track every interaction. This data may not be public now, but future computers and technology would be able to crack that encryption. There will be more cyber attacks, using data as a weapon. Your digital life can be hacked and used against you, every mistake, every reckless decision can be turned into a liability at any moment.

Computers continue to get more powerful, and it is not hard to imagine a collapse of democracies as the life of leaders become public for political gain. The masses are not ready for this change, and we are starting to get outraged over a small piece of information easily, without checking if it is even true. The future will be a time of miraculous inventions, but it has a dark side to it as well, and the only hope is strong unions and laws that will keep privacy protected.

Share this post on

Start Your Free Trial


Continued support

I would like to thank you for your continued support. I’m so glad everything turned out well. I owe you one.

Vishal Savadiya

Prompt service

George was outstanding; he fixed my issue within a couple of minutes and got me back to work! Thank you for such prompt service!

Lyndsey Chapman

Best tech support

Your tech person resolved this issue to the best of my satisfaction. He is very knowledgeable, helping and nice person. Thank you for this help.

Bipin Bhatt
KB Accounting & Tax Services

Exceptional service

I appreciate the exceptional service that Duke Williams always provided us at JS Morlu. He is patient, knowledgeable and extremely helpful.

John S. Morlu
Global Managing Partner

Quick response

As always, It was a very positive experience having your technician solve the issue we were currently experiencing.

Brad Pollack
Retail Service Options

Kristi PArker

Was assisted with permission setting, easy process. Thank you.

Origin Books

Mary L Zembruski

They have always promptly resolved any issues I have contacted them about.

Wilson Landscaping

Christopher Hutzel

Easy of working and very helpful

Christopher Hutzel
Compactor Service

Mandy Leong

Great customer service

Mandy Leong
Managed Staffing

Taylor Hill

Not a problem since I started years ago. Support is amazing and couldn’t be quicker. Just tonight, I emailed them and within 1 hour David helped me through an issue and resolved it as quick as I could have asked. Glad I found these guys.

Taylor Hill
Hill Tax, Payroll & Bookkeeping

Serina McCoy

Service was very quick to resolve the issue we had with logging in. Michael Olson emailed and called with in a few minutes on realizing we had an issue and had us back up and working quickly.

Serina McCoy
Gilberts Mobile Service

Mark Tevrucht

thank you reason for stars is my opion nothing is perfect

Mark Tevrucht

Nancy Evans

Easy to work with Aaron.

Nancy Evans
Nancy P Evans CPA PC

Tom Cloninger

Excellent service! Very responsive!

Tom Cloninger
RAN Accounting & Consulting

Rich Durso

Anderson solved my issue quickly and efficiently!

Rich Durso

Juli Hale

We’ve been very happy with the service so far. I would highly recommend Sagenext for hosting QuickBooks and other software. Thank you Michael Olson!

Juli Hale
Vico Plastics, Inc.

Nabila Qureshi

Great Customer service and support. Will highly recommend Aaron was very helpful and knowledgeable

Nabila Qureshi
Tax King USA Inc

Yelena V Moshkovsky

Great service with persistence to solve the issue and easy to reach. Anderson was a lot of help with my remote desktop issue.

Yelena V Moshkovsky
Supporting Strategies

IT Director

Sage Next have been great. We moved from 2 other quickbooks hosting providers to SageNext because it is the fastest server we could find which makes working on it much easier for our team. That plus their team is always available and very helpful!

IT Director
American Foods


Very happy with the functionality of the hosted environment and excellent customer service. A human always answers the phone quickly and is always knowledgeable and resolve any issue quickly. Thank you Michael and your support team.


Cristen Rolen

Worst support team who are getting more time ever.

Cristen Rolen
Cristen CPA Firms


Aaron was extremely helpful, and resolved my issue quickly and professionally. Sagenext hosting services has been reliable, and support has always been great.

Zigo Associates

Peg Kelly

Michael Olson was very helpful, professional, knowledgeable and kind. He’s a keeper should have more employees like him. Highly recommend Sagenext.

Peg Kelly
All Star Therapy

Jon Graff

Support has been terrific, every time I’ve had issues I’ve been able to get help quickly which has resolved any issues. Michael Olson recently helped me resolve a backup issue. Thank you Sagenext

Jon Graff
The Reason Foundation


Prompt support when needed!

The College Music Society


Sage is wonderful! Aaron was an incredible help to me!

Elfand & assoc


Thank you so much! I use Quickbooks on their servers and they are very helpful for all my computer needs. Thank you Michael for your great support.


Gwendolyn Terrell

Customer Service was great they was able to fix the issue in a timely matter.

National Tax Center


Free Trial

Sagenext Trial