Foodstuffs/New World are using RFID technology on trolleys to track customer movement around the store.
Yes they are RFID receivers designed to pick up the signals from the front of most of our trolleys (although they are not currently active due to an issue with the some of the receivers). The project is being done by Foodstuffs so that they can better understand customer movements around the store. This will enable them to design better supermarkets in the future.
>Hi > >I noticed Symbol(?) units installed on the ceiling in the store. I’m just curious as to what they are for. Are they using RFID technology? > >Kind regards > > >Matt Taylor
I posted a while ago about a security issue with TelstraClear’s webmail. Mainly that someone could access an email account through the referring URL gathered through visitor analytics tools available for most websites.
This made me think about the personal information that I have in my email account.
The library here in Christchurch includes users’ addresses in the header of all emails that they send out automatically (reminders about due books, holds, etc). I gather libraries around the country do this.
This always struck me as strange, because there’s no need to include this information.
An address isn’t the most private information in the world, but if someone broke into my email account, it’s something I wouldn’t like them to have.
So I asked the library about it. Here’s their response:
“Thank you for your recent query as to why postal address details are included in Christchurch City Libraries customer email notifications.
SirsiDynix, the integrated library system provider used by Christchurch City Libraries, have responded that identical address information is shown on both notification options [email and snail mail] because the reports draw on the same User Address information. Their opinion is that modifying the script to suit emailed notices would harm the report’s ability to print the needed addresses for mailed notices.
Unfortunately in-house report customisation is not currently a viable option because of time and financial constraints but we would certainly re-evaluate should there be further customer demand. We are not aware of any likely changes to the SirsiDynix system in the near future.”
When you visit this website, like most others, analytics software on this end records some information about you, including what website brought you here.
Following a link from an email isn’t usually a problem. However, when your provider is Clear/TelstraClear’s and you’re using webmail it is. Or was.
The Clear referring URL lets someone access a customer’s emails by simply clicking on the link (until, I assume, the session is logged out, timed out or the customer’s password is changed).
This applies to virtually any site visited through TelstraClear’s webmail.
What’s in your emails?
This becomes a very big problem when you think about what someone keeps around in their emails. Google wants to encourage its users to archive everything. Perhaps this post contains a very convincing argument as to why you shouldn’t archive everything, and instead make liberal use of the delete button (or move the emails to your computer).
Here’s some examples of information routinely sent to and stored in email accounts that would be very useful to someone with bad intentions:
Unencrypted payslips, with IRD and bank account numbers
Shipping notifications, with addresses, phone numbers and courier tracking codes
Work emails that have made it into a personal email account
Information on utilities and addresses supplied from power company e-bills
Broadband or other service activation email, containing usernames and passwords to webmail and/or internet access
A power company told me that the information contained in their e-bills isn’t all that private. They said that their customers like the convenience of not having to log in to access their bill and that they consider all feedback on their services.
TelsraClear said that the issue has been fixed, that “this was the first time the issue has been raised” and that they “take security very seriously”.
Understandably TelstraClear were “not too keen” on this post going ahead as “it might encourage attempts to hack the webmail application” which “might still cause service problems for legitimate users if such an attack was to take place”.
However, maybe a real life example will hit home with people, even if they’re not with TelstraClear.