Kindle Fire browser bounces through EC2

Powered by SC Magazine
 

URLs, IP and MAC addresses logged.

Amazon's Silk browser, used on the new Kindle Fire tablet, has raised concerns because it directs encrypted traffic through its EC2 cloud service and logs user data.

The opt-out feature directs SSL traffic through Amazon's web servers to speed up encrypted connections and page rendering which would otherwise be run on the device.

Amazon said in an FAQ that it did not collect personal user information but did temporarily store Kindle IP and MAC addresses, and an aggregate of websites that users visited for up to 30 days.

"Amazon's Silk optimises and accelerates the delivery of web content by using Amazon's cloud computing services.To do this, the content of web pages you visit using Amazon's Silk maybe cached to improve performance and certain web address information will be collected to help troubleshoot and diagnose Amazon Silk technical issues."

The company said security provided by websites "would still exist". It did not say if a certificate was created for the Kindle Fire.

Xamax Consultancy director Roger Clarke said the information on the Silk service from Amazon was confusing.

"It is confusing and perhaps should have been explained by technicians," Clarke said.

"But roughly speaking, it is a big concern in the broader vacuuming of data by the few big tech companies.:

He said the ability to offset processing requirements to the cloud was a clever use of technology.

"However we are concerned that privacy must be accommodated."

Clarke said Amazon's opt-out function was "nonsense" and should be made opt-in.

Copyright © SC Magazine, Australia


Kindle Fire browser bounces through EC2
 
 
 
Top Stories
Microsoft confirms Australian Azure launch
Available from next week.
 
NBN Co names first 140 FTTN sites
National trial extended.
 
Cloud, big data propel bank CISOs into the boardroom
And this time, they are welcome.
 
 
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
In which area is your IT shop hiring the most staff?




   |   View results
IT security and risk
  25%
 
Sourcing and strategy
  12%
 
IT infrastructure (servers, storage, networking)
  22%
 
End user computing (desktops, mobiles, apps)
  14%
 
Software development
  27%
TOTAL VOTES: 259

Vote
Would your InfoSec team be prepared to share threat data with the Australian Government?

   |   View results
Yes
  62%
 
No
  38%
TOTAL VOTES: 82

Vote