The History and Mathematics of Codes and Code Breaking

Tag: personal information

Watch Out Your Personal Information

In the podcast, there is an example of that some companies use a personal picture to predict what the person looks like in the future; this event also happens in China. When I surfing online or using apps for chatting, this kind of advertisement will come up sometimes. Expect about your future appearance, there are also some advertisements about what you are going to look like when you become a soldier. These are really funny and some of my classmates played with it. Before this class, I think this event is just for having fun and never think about giving out your personal information. Although I have not played it before, thinking that these companies may use our pictures to use for other purposes, I’m worried about this. These companies don’t have any income if they just do this activity, so there are possibilities that they sell personal information for money, which may cause a lot of inconvenience and troubles. What’s more, there are other fishing websites and we also need to keep out them. We need to think carefully before we click on the link or the app. To keep our own privacy, we need to pay attention to details and maybe some unfair condition is hidden inside the texts.

Advice for College Students on their online security

First of all, to ensure the security of the computer operating system, install important and urgent patches, the operating system now has the function of automatically updating the patch, the system is often updated to ensure security. If the security of the operating system is not guaranteed, hackers or Trojans can easily obtain various private information of users through system vulnerabilities. For Windows systems, the daily login system, preferably users of the Power User or User group, avoid using the Administrators group, so even if the computer has a Trojan, the damage is controllable.

In terms of security, the iPhone that is not jailbroken is the best in common mobile phones. To use the iPhone, you need to turn on the “fingerprint unlocking” function and the “find my iPhone” function, while ensuring the security of the Apple ID password, using a unique The only secure password. If the phone is lost, log in to the iCloud website for the first time, and enable “Lost Mode” on the device in “Find My iPhone”, so that you can’t use your phone by any method (even if reset the phone), then you can hit it. The phone is reported to the operator for loss of the SIM card. In the event of an emergency, you can remotely erase the information in your phone from the iCloud website.

Try to avoid using software that is suspected of having a privacy risk. Use caution on software developed by small companies. Do not enter personal information in it.

The Current Role of the Internet

In the beginning of chapter 7, Singh makes several predictions about the future roles of the Internet, many of which are true now. It’s definitely true that the Internet has become a significant, if not the most popular medium for exchange, with a massive volume of transactions nowadays taking place solely online. Email has indeed become more popular than conventional mail, and online tax declarations do exist, but for the most part voting still occurs at physical locations. However, Singh’s claim that information is the most valuable commodity is the truest and most significant of his claims. Now, a surprising (and scary) amount of information about nearly every individual can be found online, and it doesn’t even take that much digging to find it. If you really wanted to, you could easily search through Facebook’s repositories of all your information that they collect (and sell!). Digital information has become extremely valuable to advertising companies, because they’re willing to pay a lot of money to determine the best way to sell you stuff.

Going along those lines, the elevation of the importance of cryptography is mainly due to the negative consequences of others getting a hold of your information. The most obvious bad example is when identity thefts use your information for malicious reasons, but other concerns include government surveillance and targeted advertising. It’s pretty clear why you wouldn’t want the government to surveil you, and encryption can help you get around that. It’s less clear why targeted advertising is bad, but the reason they can deliver ads tailored to your interests is because they’ve done extensive research on your browsing history to figure out what you might be interested in, and have probably paid other websites for their data too. While this may not seem terrible, it should be unsettling to everyone that an extensive online profile has been compiled on pretty much everyone who uses the Internet.

How should us certainly “PROTECT” the Students?

In this essay, the author hopes that the threat-assessment teams use of the Students’ internet data or the daily behavior to verify does the student have a tendency to endanger the safety of the campus. Why don’t we start with the basic part of the problem, but stop them when they have turned students into dangerous people?

The bullying on campus, the teacher’s indifference to students, the tremendous pressure on school, etc., these may become BULLETS that break the last line of defense of students’ psychology. In China, we call this “The last straw that crushed the camel”. Why don’t we pay more attention to these students in their daily life, why the teachers can not put more patient on these students, why the classmates cannot stop the bullying on campus? Have you ever thought that if you do this, you might become the next target to be shot?

I don’t agree with the opinion of the author, one is that it didn’t slive the problem from the root. Another is that the students should also be protected. Not only the life of them but also the pieces of information about them.  We actually should do something to protect the students from physical to psychic, they are the future of the country. But look now, what we use to protect the students?

We use guns to protect the president.

We use guns to protect the star.

We use guns to protect the governor.

We usee guns to protect banks.

We use guns to protect factories.

But we use only one sign reads “This is a gunless zone” to protect our children. And When a shooting incident occurs, call the police with guns to help.

That looks ridiculous but this is the fact, this is the truth. If we can’t protect students in real life, not only that but also invade the privacy of students on the Internet, one day students will break out. Who is willing to live under the supervision of others? The Internet is a tool that facilitates our lives, not as a means of investigating our personal information.

Taking a structuralist tactic, legal scholar Alan Westin argues that privacy is “the claim of individuals, groups, or institutions to determine for themselves when, how, and to what extent information about them is communicated to others,” (boyd, 59).

With all of the definitions and specifics of privacy that dana boyd gives in Chapter Two of her book It’s Complicated, I think Alan Westin’s is the most sound. Many argue that privacy is the right to be left alone or the right for someone to keep personal information to themselves, but I think a better definition is that privacy is the ability to control how and how much personal information is made public, which is exactly how Alan Westin defines it. This definition is the best one because when teens post personal information on social media websites, they are not depriving themselves of privacy as some parents think; they are still in control of when, how, and to what extent their personal information is posted on these sites.

The reason many teens dislike when their parents look at their texts without permission or go onto their Facebook accounts is because they have no control over what their parents might see, which is a complete invasion of privacy by the parents. On the other hand, teens should not be bothered by their parents viewing their social media pages from their own social media accounts. Teens should assume that whatever pictures get put on the Internet are there permanently and almost anyone can access them. Teens have the ability to control what they put on public social media sites, so they cannot be annoyed by their parents viewing and commenting on their Facebook picture if they choose to be friends with their parents on Facebook. Teens are in control of what information they post on public social media sites, so they have no one to blame but themselves if they are bothered by how much information their parents can see on their Facebook, Twitter, or Instagram page.

Powered by WordPress & Theme by Anders Norén