1. 程式人生 > >Privacy is a four-letter word

Privacy is a four-letter word

You and me? We’re being tracked whether we like it or not.

Use a web browser, apps on your phone — there’s a company (or companies) out there amassing reams of data about every click, tap, photo, song, notification, or icon in your digital life. But don’t get up in arms over the loss of your “privacy”. This word, “privacy”

? — it’s a problem.

In common usage, it’s one of those words that kills useful conversation and prevents many of us from thoughtfully engaging with how the information economy uniquely affects each of us.

At best it obscures; at worst it perpetuates technologically-induced inequity. “Privacy” is a word that puts people on the defensive and confuses them about the choices and rights they have (or should have) as 21st century digital citizens.

We must fix this. We don’t, we jeopardize the acceptance and use of new apps and services, and their potential to uplift humanity. Fer realz.

Privacy ≠ Secrecy≠ Security

At a recent White House summit on cybersecurity and consumer protection, Apple CEO Tim Cook said: “If those of us in positions of responsibility fail to do everything in our power to protect the right of privacy, we risk something far more valuable than money. We risk our way of life.”

But doing everything in our power starts with clarifying the language that shapes the dialogue around these issues.

Let’s start by separating privacy from secrecy,and define security:

  • Privacy is the set of boundaries that we define for ourselves about what we will or won’t reveal to others. We trust software to help us maintain and manage these boundaries online. Every time we choose to share something, we’re deciding where to set a privacy boundary given the audience and how comfortable we feel sharing in that specific context.
  • Secrecy is choosing to keep something to ourselves knowing that there may be consequences if it were to be revealed. Since these consequences may not affect us personally (i.e. if the secret relates to someone else), secrecy can be considered independently from our privacy boundaries.
  • Security is the robustness of the defenses against intrusion that the platforms that store or transmit our information offer. In other words, it’s how good they are at protecting our information from unwanted access, use, or tampering.

We must remember that privacy is about boundary setting and secrecy is about preventing access to information. Security is what ensures that privacy boundaries are enforced, and that secrets stay secret.

In the past, privacy and secrecy have been used interchangeably. To illustrate this, we need only look at the user backlashes against Facebook that ensued whenever they changed their service. Invariably users would complain that the company had violated their privacy, but was that true? Facebook hadn’t changed the secrecy of its users’ data, nor had the security of the site been compromised… Rather, Facebook changed the publicness and publicity of certain profile information, in violation of its users’ expectations. For example, in 2006 Facebook boosted the visibility of relationship status changes by surfacing them in the newsfeed. Previously you had to visit a profile directly to see this. So Facebook hadn’t violated the secrecy of its users’ data, rather it had moved an understood privacy boundary without asking for explicit permission, surprising users, and leaving them feeling exposed. For its part, Facebook was simply building the product that it believed people wanted, and for better or worse, was willing to boldly experiment with the default privacy boundaries it set for user information.

Thus, as digital citizens, every time we see the word privacy, we should consider whether secrecy would be a more appropriate concept, and vice versa. This basic understanding should help us better evaluate decisions concerning our personal information, set privacy boundaries that we’re comfortable with, demand secrecy when necessary, and take the steps necessary to ensure the security of our choices.

相關推薦

Privacy is a four-letter word

You and me? We’re being tracked whether we like it or not.Use a web browser, apps on your phone — there’s a company (or companies) out there amassing reams

await is a reserved word 以及將forEach方法的引數改為async函數出現的問題

engine.registerHandler('breakpoint:*/EvaluateTest.java:*', async (event, arg1, arg2, detail) => { utils.pathEquals(breakp

is-a

所在 調用 pan family 內存 傳遞 既然 通過 end -----------------siwuxie095 is-a 在 C++ 中,is-a (是一個)的概念就相當於 隱形眼鏡也是眼鏡

[uvalive 7263] Today Is a Rainy Day(暴力,BFS,dp)

預處理 ini pen sta 現在 修改 ace printf main 題目鏈接:https://vjudge.net/problem/UVALive-7263 題意:給兩個字符串a,b,只包含1~6的數字,現在允許兩種操作:1、修改某一位數字,2、修改整個串的某個數字

假設寫一段代碼引導PC開機這段代碼是 ? Here is a tiny "OS" :-D

博士 輸出 虛擬 mov download 開機 控制 style blog Hello world -- OS 我找到了華科紹誌遠博士的相關代碼,發現他依據MIT的JOS的boot.S 稍作改動。然

freedom is a kind of responsibility

重寫 小學 三個月 一個 經濟 創新 裏的 它的 整形 張維迎教授在2017年7月1日北大國發院2017屆畢業典禮上的發言《自由是一種責任》 張維迎:自由是一種責任 本文為張維迎教授在2017年7月1日北大國發院2017屆畢業典禮上的發言 同學們好!首先祝賀大

UVALive - 7263 Today Is a Rainy Day(bfs)

二次 變換 net -- bfs math font 字符串 print 原題鏈接 題意 給兩個等長的只含數字1,2,3,4,5,6的字符串s(|s|≤110),有兩種操作: - 把一個位置的數字換成另一個數字,換成的數字也只能是1到6- 把這個字符串中相

Coursera Algorithms week4 基礎標簽表 練習測驗:Check if a binary tree is a BST

eth rmi tree eterm left div mine ont ret 題目原文: Given a binary tree where each ???????? contains a key, determine whether it is a binary

Expected MultipartHttpServletRequest: is a MultipartResolver configured?

XML red commons param 方法 ng- rop dsi ring 解決方法: (1) 第一步:引入commons-fileupload-1.2.jar,具體版本號以具體項目要求為準; 第二步:在spring-mvc.xml中增加如下配置,具體文體大小限制以

Two Sum IV - Input is a BST

empty rip nta 一個 con bool earch arch there Given a Binary Search Tree and a target number, return true if there exist two elements in th

[LeetCode] Two Sum IV - Input is a BST 兩數之和之四 - 輸入是二叉搜索樹

count imp itl .com 否則 href 當前 recursive 兩數之和 Given a Binary Search Tree and a target number, return true if there exist two elements i

what-is-a-closure

arc quest draft overflow targe .com com http www. https://stackoverflow.com/questions/36636/what-is-a-closure http://www.cs.tufts.edu/~n

653. Two Sum IV - Input is a BST

span div targe public || style contains there lean Given a Binary Search Tree and a target number, return true if there exist two element

win10 安裝nodejs,報錯there is a problem in the windows installer package

nload 裝包 ack next org get 就是 技術分享 提示符 1. 在開始面板找到命令提示符,右鍵選擇“以管理員身份運行” 2. 進入到安裝包的文件目錄內 3. 回到命令提示符窗口,運行安裝包名字 之後會跳出安裝提示,點擊運行 之後就一直next,就

ZooKeeper Commands: The Four Letter Words 獲取監控狀態

export ade zookeepe config content 參考手冊 zookeeper spa avg ZooKeeper responds to a small set of commands. Each command is composed of four

新手使用Vector報錯Vector is a raw type. References to ge

str parameter 了解 不能 我不 raw reference ner 新手 照著書上抄代碼有下面一句private Vector vector=null;但是eclipse報錯Vector is a raw type. References to generic

JAVA基礎——is-a 、have-a、和 like-a的區別

就是 不同類 alike 不同 pc機 空調 面向 們的 合成 1、is-a,has-a,like-a是什麽 在面向對象設計的領域裏,有若幹種設計思路,主要有如下三種: is-a、has-a、like-a java中在類、接口、抽象類中有很多體現。 了解java看這裏:什麽

This is a bug I believe, and it took me 2-3 days to figure it out. Please do the following to get it working,

this nco etc figure ood client clas gpo see This is a bug I believe, and it took me 2-3 days to figure it out. Please do the following to

spring-boot 啟動時候 出現異常:The bean 'xxx' could not be injected as a 'xx.xxxx' because it is a JDK dynamic proxy that implements:

ng- for sed AC 存在 cti 解決方法 sid 失敗 The bean ‘xxxService‘ could not be injected as a ‘AaaXxxService‘ because it is a JDK dynamic proxy tha

net.sf.json.JSONException: There is a cycle in the hierarchy!

遞歸 組裝 set mil 對象 數組 tail csdn 都沒有 轉自:https://blog.csdn.net/waysoflife/article/details/24351051 原因分析: 這個異常是由於JSONObject插件內部會無限拆解你傳入的對象,直