|
|
04-09-2010, 05:36 PM
|
#21
|
Full time employment: Posting here.
Join Date: Sep 2009
Posts: 739
|
Thanks for the great replies, and agreeing with Freebird, lots of knowledge passed on from IT folks and users of TT.
A hacker has to be out there right now working on this because it was the first thing I thought of when I saw how they were doing it. Even if a hacker were just monitoring my inputs from hacking me, it's enough to make me wonder.
Probably 99.99966% safe. But I'm usually the loser getting the 0.00034% kick in the groin.
Appreciate the opinions.
|
|
|
|
Join the #1 Early Retirement and Financial Independence Forum Today - It's Totally Free!
Are you planning to be financially independent as early as possible so you can live life on your own terms? Discuss successful investing strategies, asset allocation models, tax strategies and other related topics in our online forum community. Our members range from young folks just starting their journey to financial independence, military retirees and even multimillionaires. No matter where you fit in you'll find that Early-Retirement.org is a great community to join. Best of all it's totally FREE!
You are currently viewing our boards as a guest so you have limited access to our community. Please take the time to register and you will gain a lot of great new features including; the ability to participate in discussions, network with our members, see fewer ads, upload photographs, create a retirement blog, send private messages and so much, much more!
|
04-09-2010, 05:40 PM
|
#22
|
Thinks s/he gets paid by the post
Join Date: Feb 2007
Posts: 2,612
|
Unless one is only willing to submit their tax forms in paper format, you are using someone's database to submit your taxes. The only exception is actually filing while on the IRS web site.
That is, even when you prepare on your computer and do e-file, there is a vendor who is actually doing the submitting for you. I'm pretty sure the IRS doesn't allow just anyone to dump 'data' in their repository and that there are both technical and security details that need to be met before they gain access.
About the vendor mining your personal information:. I imagine that it's prohibited.
Rita
__________________
Only got A dimple, would have preferred 2!
|
|
|
04-09-2010, 05:58 PM
|
#23
|
Thinks s/he gets paid by the post
Join Date: Apr 2006
Posts: 1,684
|
Took a look at the Tax Act privacy policy: TaxACT Privacy Policy Statement
...
All information you enter while using TaxACT is used strictly by 2nd Story Software, Inc. to provide the services requested by our customers. We maintain physical, electronic, and procedural safeguards that comply with applicable law and federal standards. All data is stored on 2nd Story Software servers and is backed up to prevent the loss of data. Electronically filed returns, which are further encrypted, are sent directly from 2nd Story Software to the IRS via a secure connection. ...
I imagine these tax software companies have to go through a qualification process and audit as defined by the IRS before they are allowed to submit returns.
|
|
|
04-10-2010, 05:55 AM
|
#24
|
Give me a museum and I'll fill it. (Picasso) Give me a forum ...
Join Date: Feb 2006
Location: Washington, DC
Posts: 11,328
|
I have been using TT and TaxAct to track filings this year in anticipation of using them next year or the following year when our tax situation will be simpler than it is today. I enter everything by hand but have been curious about the ability to download information. I just assumed you had to enable your financial servicing organization to release the info with some sort of restricted access. The software isn't using full access usernames and passwords are they? As to the security of encrypted systems, they are as secure as the users. Encrypted DBs will prevent a hacker who somehow access a copy of the data from opening it. But private keys, tokens, etc can be compromised if users don't protect them or, as was pointed out above, if users are malicious.
__________________
Idleness is fatal only to the mediocre -- Albert Camus
|
|
|
04-10-2010, 06:27 AM
|
#25
|
Moderator
Join Date: Dec 2007
Location: Eastern WV Panhandle
Posts: 25,340
|
Quote:
Originally Posted by freebird5825
Yes.
I always get the downloadable version for this very reason. dh2b is a telecomm guy and very savvy about computer security. His feeling about voluntarily supplying a full set of highly personal info online is a big
Who am I to argue with someone who w*rks in the business ?
|
Agreed. I did computer forensics for a long time and part of that job entailed breaking passwords and encryption. It is difficult, but not impossible, to break any encryption now known and it will get easier with faster processors and distributed attacks. It boils down to factoring large prime numbers, giving each computer a "piece of the pie" to munch on, similar to the concept behind the SETI screensaver project. And it depends on how many resources you want to throw at it.
In the words of one of the early guys doing that work in the late '80's "The only way to make a computer absolutely secure is turn it off."
An interesting read is The Code Book by Simon Singh, about the history of cryptography.
__________________
When I was a kid I wanted to be older. This is not what I expected.
|
|
|
|
|
Currently Active Users Viewing This Thread: 1 (0 members and 1 guests)
|
|
Thread Tools |
|
Display Modes |
Linear Mode
|
Posting Rules
|
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts
HTML code is Off
|
|
|
|
» Recent Threads
|
|
|
|
|
|
|
|
|
|
|
|
|
» Quick Links
|
|
|