You are previewing You: For Sale.
O'Reilly logo
You: For Sale

Book Description

Everything we do online, and increasingly in the real world, is tracked, logged, analyzed, and often packaged and sold on to the highest bidder. Every time you visit a website, use a credit card, drive on the freeway, or go past a CCTV camera, you are logged and tracked. Every day billions of people choose to share their details on social media, which are then sold to advertisers.

The Edward Snowden revelations that governments - including those of the US and UK – have been snooping on their citizens, have rocked the world. But nobody seems to realize that this has already been happening for years, with firms such as Google capturing everything you type into a browser and selling it to the highest bidder. Apps take information about where you go, and your contact book details, harvest them and sell them on – and people just click the EULA without caring. No one is revealing the dirty secret that is the tech firms harvesting customers’ personal data and selling it for vast profits – and people are totally unaware of the dangers.

You: For Sale is for anyone who is concerned about what corporate and government invasion of privacy means now and down the road. The book sets the scene by spelling out exactly what most users of the Internet and smart phones are exposing themselves to via commonly used sites and apps such as facebook and Google, and then tells you what you can do to protect yourself. The book also covers legal and government issues as well as future trends.

With interviews of leading security experts, black market data traders, law enforcement and privacy groups, You: For Sale will help you view your personal data in a new light, and understand both its value, and its danger.



  • Provides a clear picture of how companies and governments harvest and use personal data every time someone logs on
  • Describes exactly what these firms do with the data once they have it – and what you can do to stop it
  • Learn about the dangers of unwittingly releasing private data to tech firms, including interviews with top security experts, black market data traders, law enforcement and privacy groups
  • Understand the legal information and future trends that make this one of the most important issues today

Table of Contents

  1. Cover
  2. Title page
  3. Table of Contents
  4. Copyright
  5. Foreword
  6. About the Author
  7. About the Technical Editor
  8. Acknowledgments
  9. Author’s Note
  10. Chapter 1: Introduction
    1. Abstract
    2. Why All this Fuss About Privacy?
    3. Here’s My Cow, now Where’s My Change?
    4. Hey I Thought this Lunch was Free!
    5. Why should We care About Privacy?
    6. Caution: Hackers at Work
    7. Serious Business
  11. Chapter 2: The Snowden Revelations
    1. Abstract
    2. A Glance at the History Books
    3. You Say Incident, I Say Sham; Let’s Call The Whole Thing Off
    4. Revelations, or Just More of The Same?
    5. PRISM
    6. Plus Ca Change
    7. Snowden Who?
    8. Five Reasons Not to Act
    9. Five Reasons to Act
  12. Chapter 3: Supermarkets and Data Brokers
    1. Abstract
    2. Sign up Here for Privacy Violation
    3. Data Mining all the Way to the Womb
    4. Broken Privacy
    5. Yes but so What!
  13. Chapter 4: Google, Apple, Microsoft and the Concept of Evil
    1. Abstract
    2. Citation, Citation Citation
    3. How Evil is ‘Evil’?
    4. Google Glass
    5. Street View
    6. Android
    7. What Does all this Mean?
    8. Shady Areas and Creepy Lines
    9. Appetite for Information
    10. Yosemite Wham Bam Thank you Sam
  14. Chapter 5: Social Media and the Dangers of Over-Sharing
    1. Abstract
    2. Launching theFacebook and Dropping The ‘The’
    3. Social Media: Both a Blessing and a Curse
    4. Changing the Norm to Suit Yourself
    5. 21<sup xmlns="http://www.w3.org/1999/xhtml" xmlns:epub="http://www.idpf.org/2007/ops">st</sup> Century Ethics Century Ethics
    6. Identity Theft
  15. Chapter 6: Security, Spear Phishing and Social Engineering
    1. Abstract
    2. Plastic Thinking Test
    3. Not a Unique Snowflake After All
    4. Target by Name…
    5. Phishing, With or Without a Spear
    6. RSA Security Discovers It’s Not Very Secure
    7. You Are Screwed
  16. Chapter 7: Privacy and the Law
    1. Abstract
    2. Comparing the US and UK Privacy Laws
    3. The Need for Collaboration
    4. Is the EU “Making a Fool of Itself”?
    5. What are These New Rules Anyway?
    6. In the Wake of Je Suis Charlie…
    7. Across the Pond
    8. Criticism of the Reforms
    9. A Quick Fix
  17. Chapter 8: Privacy and Health
    1. Abstract
    2. Care.Data
    3. Selling your Health Records
    4. Privacy Fears can Kill
    5. Can you have too Much Privacy?
    6. Medical Privacy in the Facebook Age
    7. Does Obamacare about Privacy?
  18. Chapter 9: The Internet of Things and the (not so) Smart Grid
    1. Abstract
    2. And the Point of All This?
    3. Back to the Internet of Things
    4. Data Trawling
    5. The Dangers of Being Smart
    6. Striding Over the Creepy Line
    7. But Why Should I Care? I’m Not Doing Anything Wrong…
  19. Chapter 10: Biometrics and The Future
    1. Abstract
    2. Your Body as Your Password
    3. So What are the Risks?
    4. The Future of Biometrics
    5. Mobile Biometrics
    6. Clandestine Identification of Individuals
    7. Linking Biometric Data
    8. The Solution
    9. Safeguarding Privacy in The Age of Biometrics and Big Data, and Other Impossible Tasks
    10. Conclusions
    11. So We Should All Go Live in a Cave?
  20. Index