Difference between revisions of "Security & Privacy Issues"

From LinuxMCE
Jump to: navigation, search
(Imported document)
 
m
 
(9 intermediate revisions by 5 users not shown)
Line 1: Line 1:
<table width="100%"> <tr><td bgcolor="#FFCFCF">This page was written by Pluto and imported with their permission when LinuxMCE branched off in February, 2007.  In general any information should apply to LinuxMCE.  However, this page should be edited to reflect changes to LinuxMCE and remove old references to Pluto.</td></tr> </table><p>We take your security and privacy very seriously.  All information about your Pluto system is stored in your local Core--not on Pluto's servers--and is accessed using the local "Pluto Admin" web site installed on your Core.  This information never leaves your Core with the only exception being the user ID's, Installation ID's, and Device ID's.  It is important that these ID's be globally unique.  For example, if you decide you want to add Pluto telephony to your system and allow other Pluto user's to call you for free by dialing your user name, your user name must be unique.  Or, if you later go on vacation and decide you want to allow a neighbor with Pluto to add a button on his Orbiter that turns on the lights in your yard, then the lights in your yard must have different ID's from the lights in his.  To ensure that all these ID's are unique, your local "Pluto Admin" site will request a unique ID from the plutohome.com web site when you add a new installation, user, or device. However, no information about the device--other than the ID--is stored on Pluto's server.  Your passwords, configuration settings, and other confidential data are stored locally and there is no 'back door'.  The default installation when you use the Kick-Start CD is to disable all outside access--you can only access the "Pluto Admin" website from within your home. You can use the "Pluto Admin" site to selectively allow some pieces to be accessed from the outside, such as being able to access your local "Pluto Admin" web site from the internet. However, you will always be warned of any possible security risks that you may introduce, and the site will help you setup proper barriers to prevent unauthorized acccess, such as SSL certificates to encrypt your web site, just like online banking systems do. Also, in the future, Pluto will offer secure, encrypted tunnelling services through our secure servers so you can access your local web site securely without having your own SSL certificate, and even if your ISP blocks incoming connections or does not provide you a static IP.</p>
+
We take your security and privacy very seriously.  All information about your LinuxMCE system is stored in your local Core and is accessed using the local [[LinuxMCE Admin Website]] installed on the Core.  This information never leaves your Core (with the exception of the user IDs, Installation IDs, and Device IDs).   
 +
 
 +
It is important that these IDs be globally unique.  For example, if you decide you want to add LinuxMCE telephony to your system and allow other LinuxMCE users to call you by dialing your user name, your user name must be unique.  If you go on vacation and decide you want to allow a neighbor with LinuxMCE to add a scenario on his Orbiter to turn on the lights in your yard, the lights in your yard must have different IDs from the lights in his yard.  To ensure that all these IDs are unique, your local "LinuxMCE Admin" site will request a unique ID from the linuxmce.org web site when you add a new installation, user, or device.  
 +
 
 +
You will notice that you have an installation number reflected on some screens, therefore.
 +
 
 +
However, no information about the device -- other than the ID -- is stored on the LinuxMCE server.  Your passwords, configuration settings, and other confidential data are stored locally and there is no 'back door'.  The default installation disables all outside access -- you can only access the LinuxMCE Admin website from within your home.  
 +
 
 +
You can use the [[LinuxMCE Admin Website]] to selectively [[Outside_Access|allow some devices (such as Web Orbiters) to be accessed from the outside]], however. The LinuxMCE Admin website itself can also be [[Outside_Access|set up to be accessed from the Internet]], as well. You will always be warned of any possible security risks that that may entail, and the site will help you setup proper barriers to prevent unauthorized acccess (such as SSL certificates for encryption).
 +
 
 +
In the future, LinuxMCE will offer secure, encrypted tunneling services through our secure servers. That way, you can access your local Admin website securely without having your own SSL certificate, even if your ISP blocks incoming connections or does not provide you with a static IP.
 +
 
 +
[[Category:Documentation]]

Latest revision as of 22:47, 7 February 2010

We take your security and privacy very seriously. All information about your LinuxMCE system is stored in your local Core and is accessed using the local LinuxMCE Admin Website installed on the Core. This information never leaves your Core (with the exception of the user IDs, Installation IDs, and Device IDs).

It is important that these IDs be globally unique. For example, if you decide you want to add LinuxMCE telephony to your system and allow other LinuxMCE users to call you by dialing your user name, your user name must be unique. If you go on vacation and decide you want to allow a neighbor with LinuxMCE to add a scenario on his Orbiter to turn on the lights in your yard, the lights in your yard must have different IDs from the lights in his yard. To ensure that all these IDs are unique, your local "LinuxMCE Admin" site will request a unique ID from the linuxmce.org web site when you add a new installation, user, or device.

You will notice that you have an installation number reflected on some screens, therefore.

However, no information about the device -- other than the ID -- is stored on the LinuxMCE server. Your passwords, configuration settings, and other confidential data are stored locally and there is no 'back door'. The default installation disables all outside access -- you can only access the LinuxMCE Admin website from within your home.

You can use the LinuxMCE Admin Website to selectively allow some devices (such as Web Orbiters) to be accessed from the outside, however. The LinuxMCE Admin website itself can also be set up to be accessed from the Internet, as well. You will always be warned of any possible security risks that that may entail, and the site will help you setup proper barriers to prevent unauthorized acccess (such as SSL certificates for encryption).

In the future, LinuxMCE will offer secure, encrypted tunneling services through our secure servers. That way, you can access your local Admin website securely without having your own SSL certificate, even if your ISP blocks incoming connections or does not provide you with a static IP.