Developer Ben Simo is not alone in describing serious security problems in the healthcare.gov web site (a site which nobody is defending at this point). But he has described specifics of privacy problems in clear detail.
Simo shows how healthcare.gov sends personal information to 3rd party analytics and advertising companies. In the traces below of the HTTP traffic he shows his username and password reset code first being sent to "rum-collector.pingdom.net". The domain is owned by Pingdom, an uptime performance monitoring company based in Sweden.
The second trace section shows the same data being sent to Doubleclick.
HealthCare.gov uses a variety of Web measurement software tools. We use them to collect the information listed in the “Types of information collected” section above. The tools collect information automatically and continuously. No personally identifiable information is collected by these tools.
[Bold in original text on healthcare.gov.]
The FTC has fined Facebook and others for similar practices.
On another one of his sites, Simo describes more problems he's found:
- Cookie handling errors, including generating more cookies than it is capable of accepting.
- "The site processed an application I did not submit - and that I explicitly told it to not process."
- Stack traces returned to the browser that reveal information about the internal system components
- Password reset codes returned to the browser