Cryptography

The History and Mathematics of Codes and Code Breaking

Tag: privacy Page 2 of 19

Worry About Amazon

In Episode 062 of Leading Lines, Derek Bruff’s guest Chris Gillard begins talking about changing his twitter handle to something insulting Amazon as a joke. In explaining his motivation behind this, he said  “I’m very troubled to say the least by the surveillance network amazon is building.” While almost just a comment in passing, I found this to be an extremely interesting comment. This is because of the role amazon is begging to play in our society. For a long time, I have claimed that the things amazon is beginning to do are not only troublesome in terms of our security, but also in terms of our economy and our survival.

What Amazon started out doing was fine. Providing an online marketplace to compete with in-store shopping and with online shopping on companies’ sites was a good idea. However, the success of that idea has allowed Amazon to expand into much more than that. As Amazon out competes retail and closes stores, and as it grows dominance as the only mainstream online marketplace, its power becomes too intense. This is shown in the fact that it has been proven that Amazon’s actions directly impact inflation, which no one company should be able to do, and that municipal governments competed and begged for Amazon’s headquarters. This business such a powerful presence, and it is expanding. Amazon is planning to start it own banking system. This would make the Amazon experience completely contained: people could hold their money in Amazon and use it to purchase what they need in Amazon. The problem is that this involves giving away so much financial and personal data. And not to the government; to a private company. If the government can abuse data, a private company can do worse, and a private company that it seems can’t be held accountable because society is starting to depend on it can do much, much worse.

The Price We (Force Others to) Pay

In the episode of Leading Lines, one point that Professor Gilliard brought up was that of how privacy infringements in the United States can have consequences that transcend national borders. The example provided: the oppression of Uyghurs in China.

At one point in the episode, Professor Gilliard mentions how FaceApp, an app available to American consumers through the app store that enabled users to leverage AI to perform mobile edits to photos of their faces, stored information on the user base’s facial data and transmitted it to foreign servers in China. While for us, this kind of privacy infringement doesn’t necessarily have any immediate consequences, there is a group that is currently paying a steep price for our negligence: the Uyghurs of China. Gilliard mentions how the data collected by FaceApp was actually leveraged by the Chinese government to train their facial recognition algorithms and ultimately augment their ability to locate and extradite Uyghurs to “reeducation camps”. For the west, such a grim reality is a drastic departure from what we consider as the true threat of increasing government infringement on personal privacy; most discussions of privacy infringements in the west eventually turn into hyperbolic debates about the inevitable slide into a 1984-esque police state, the common theme being that these debates primarily focus on conjecture of how the future may or may not turn out given the actions taken in the status quo. For China, however, these repercussions are unfolding today, and complacency with the privacy of our data in the west is leading to unparalleled and unheard of misery and suffering to the order of millions of people.

Consequently, China must serve as a wakeup call for what a government given too much power over privacy can and will accomplish. No longer should the debate surrounding government infringement of privacy revolve around what-ifs and conjecture. Rather, they should cite China as an inevitable terminus for a government given too much power and too much information.

Picture Privacy

At around the 16th minute in the podcast, Professor Bruff brings up the FaceApp. The FaceApp was a smartphone application in which users uploaded photos and the app modified them in creative ways. It was later discovered that FaceApp was taking the data of the faces and potentially storing it in some servers. With an application created abroad, naturally it drew criticism from the U.S. as a potential spying problem. This is an example of a larger problem, the misleading nature of privacy on the internet. A similar example is the Cambridge Analytica scandal in which innocent looking personality tests were used to collect data on Facebook users. The problem is that the majority of these apps are very unclear as to their privacy terms of service, and oftentimes are misleading by creating an innocent looking application while not being entirely transparent with their users about what they will do with the data that the users are supplying. Professor Gilliard then goes on to mention how he tries to avoid putting up pictures of himself on the internet. This is a completely foreign concept to anyone using social media. Be it Instagram or Snapchat, social media revolves around photographs. This has spread to internet culture, where accounts for various services oftentimes have an untrustworthy connotation if they do not have a profile picture.

Privacy Rights

When discussing the argument that “I have nothing to hide so surveillance isn’t really an issue for me,” Chris Gilliard brought up an interesting point, stating plainly: that’s simply not how rights work.

I never really comprehended the fuss over privacy. Why is it a big deal for a big corporation or government to look at what we’re doing. If you have nothing to hide, who cares and why should it matter? Gilliard really helped broaden my perspective on the topic. I now understand the faultiness of that logic. For example, with the First Amendment, the United States’ Bill of Rights grants citizens freedom of speech, press, assembly, religion, and petition. Using the same argument people often use against privacy and applying it to something like speech, it becomes rather ridiculous. “I have nothing bad to say about the government, so I don’t have a problem with my speech and writing being restricted.”

Rights are the fundamental rules are humans are owed in life, and according to our societal values, privacy is one of these rights.

Watch Out Your Personal Information

In the podcast, there is an example of that some companies use a personal picture to predict what the person looks like in the future; this event also happens in China. When I surfing online or using apps for chatting, this kind of advertisement will come up sometimes. Expect about your future appearance, there are also some advertisements about what you are going to look like when you become a soldier. These are really funny and some of my classmates played with it. Before this class, I think this event is just for having fun and never think about giving out your personal information. Although I have not played it before, thinking that these companies may use our pictures to use for other purposes, I’m worried about this. These companies don’t have any income if they just do this activity, so there are possibilities that they sell personal information for money, which may cause a lot of inconvenience and troubles. What’s more, there are other fishing websites and we also need to keep out them. We need to think carefully before we click on the link or the app. To keep our own privacy, we need to pay attention to details and maybe some unfair condition is hidden inside the texts.

First Questions

In class the other day, I asked you to brainstorm questions that you might need answered as you prepare your final argumentative essays. Below is a curated list of those questions. I’ll ask you in this week’s bookmark assignment (see next post) to find a source that helps answer one or more of these questions.

  • How effective has mass surveillance been in preventing terror attacks since 9/11?
  • What actual harm has come to US citizens as a result of mass surveillance?
  • How specifically has the pursuit of privacy impeded security efforts?
  • What are the mechanisms behind surveillance? How precisely are people surveilled in the US?
  • What is the balance of threats to national security that come from inside the US versus outside?
  • What specific legal frameworks are relevant to a discussion of mass surveillance?
    • What safeguards are in place to protect people from unwarranted surveillance?
    • What about other regulations or policies that govern privacy? Like regulations that might govern Facebook?
  • What reasons for surveillance does a government have other than terrorism prevention?
  • What have experts predicted for the future of surveillance?
  • What alternatives to mass surveillance have been proposed, and by whom?
  • What does polling say about public perception of surveillance and privacy?
  • What does this debate look like other countries? Say, China or the EU?
  • What do experts say about the risks of government “back doors” in software?

Controlling our Narratives

This post is in response to Brianna’s blog post, “Redefining Privacy.”

To start, I find a lot of Brianna’s points to be extremely accurate and thoughtful. For example, many teens do use social media to “socialize with friends; to gather information on peers we know little about; to attract potential roommates and significant others.” Our purpose for posting online has never been to expose personal details about our lives, and I don’t believe our social media use exposes us more than we’d like to be exposed. And this purpose does not undermine a design for privacy – Brianna is right – it is absolutely about control. I, for example, pick and choose exactly what I post online, choosing what I want to let others see. I control the narrative that people can see, through my different social media networks.

However, it’s also important to discern between different intents on different social media platforms. For example, Facebook is a platform widely used by adults and people that we may have formal connections with. I see the most filtered posts on Facebook – the average college student may be posting wholesome pictures from their dinner out with friends, or sharing an update on a volunteer org that they joined. The next level down would be Instagram, where we are “followed” by most all of our peers, but also some select adults. These pictures and captions may be less formal: glamor shots, funny photos, aesthetically appealing food pics, etc. And the final level would be snapchat, where teens post “stories” at parties, of their friends doing stupid things, of little life-updates such as “I just got a D on that chem test HAHA” that may be viewed as weird or out-of-place on another social media site.

We choose to control our appearances through different social media sites, attempting to maintain a careful and well thought-out list of who can “friend” us on Facebook, “follow” us on Instagram, or see our “story” on Snapchat. For someone like me, who uses all these platforms, it’s easy to slip into the mindset that I’ve got it all planned out. That I know exactly who can see what. However, this is naive and unrealistic. At some point, we must expect to make a mistake, or unintentionally blur these narratives that we design to be so different. And it’s always interesting to see the consequences.

 

What Privacy Means for the Modern World

Public discourse around privacy often centers on hiding or opting
out of public environments, whereas scholars and engineers often
focus more on controlling the flow of information. These can both be
helpful ways of thinking about privacy, but as philosopher Helen Nissenbaum astutely notes, privacy is always rooted in context  (Boyd 60).

In this quote from It’s Complicated, Danah Boyd points out an import disconnect in the definitions of privacy: that of the public layman and that of the scholars and engineers tasked with determining the minutiae of the definition itself. Identifying this disconnect is critical in the discussion of privacy as it precludes meaningful discourse on how to implement privacy measures that satisfy all involved parties. While a more philosophical view is presented by the philosopher Helen Nissenbaum, the triviality of the statement, once again, fails to advance any kind of useful discourse on what privacy truly is; saying “privacy is always rooted in context” is a general statement that does nothing to establish a set of axioms from which we derive a general sense of what privacy is.

So then, what is privacy? Or rather, what are some common features of this ethereal concept we refer to as “privacy”? For this, we can return to Boyd’s distinction between two different views: that of the public and that of scholars and engineers. For the public, privacy is the ability to hide certain personal details from the public eye or scrutiny. Sounds simple enough, but this definition falls apart with regards to private third parties. Suppose, for example, that a teenager doesn’t want their parents to snoop about their private social media feeds, accounts that are understood to be privately available to a select group of people chosen by the teen themselves. Parents, in this situation, act as a private third party and, under the aforementioned definition of privacy, should be allowed to have access to these accounts. However, ask any teen whether or not they would grant access to their social media to their parents and you’ll be met with a zealous “No”.

So then, if this definition fails to address certain, we must turn to the scholarly definition, the one wherein the actor has control over the flow of their personal information. This definition, however, also has its faults, faults which have grown more apparent with the advancement of the digital age. We’ll examine these faults in the context of a teen’s media feed once more. Consider then, the case where a teen posts information to a select number of carefully curated followers: close friends and acquaintances, among others. Following, suppose one of those friends wishes to share the post with their friends, and so on and so forth. Here, we see that the scholarly definition of privacy fall apart at the outset, as as soon as the teen posts the information, they relinquished all control over the flow of that information.

As such, we see that both definitions of privacy fail in an increasingly connected world, but they do provide us with a general sense of what privacy means in practicality: privacy can be loosely defined the ultimate freedom to choose who exactly can view one’s personal details. While such perfect privacy may never be achievable, defining privacy as such can ultimately lead to constructive discourse on how to approach such an ideal, despite the increasingly abundant pitfalls created by a digitizing world.

Redefining Privacy

With the popularization of social media, the 21st century has redefined the ways that people interact and share with one another. Today’s teenagers are notorious for posting everything online, from embarrassing pictures to political opinions. Parents consistently accuse teens of “oversharing” and often believe they are entitled to monitoring their kid’s online activities. They impose that their children have no regard for privacy because they share every bit of their lives online. Teenagers, however, argue differently. In her book, It’s Complicated, Danah Boyd offers various teenagers perspectives on privacy in a public setting:

 In a mediated world, assumptions and norms about the visibility and spread of expressions must be questioned. Many of the most popular genres of social media are designed to encourage participants to spread information. On a site like Facebook, it is far easier to share with all friends than to manipulate the privacy settings to limit the visibility of a particular piece of content to a narrower audience. As a result, many participants make a different calculation than the one they would make in an unmediated situation. Rather than asking themselves if the information to be shared is significant enough to be broadly publicized, they question whether it is intimate enough to require special protection. In other words, when participating in net- worked publics, many participants embrace a widespread public-by- default, private-through-effort mentality.” (Boyd 62)

Parents mistake posting on social media with a disregard for privacy. Traditionally, the notion of privacy pertains to keeping personal information out of the public eye. As our culture has shifted to interacting on online public domains, however, this conventional understanding is no longer relevant. We [including myself in the teenage population] share things online to socialize with friends; to gather information on peers we know little about; to attract potential roommates and significant others. Interactions that traditionally occurred in person, where there is little chance of documentation, now take place on the internet where they are more accessible for viewing. But simply because the domain of communication has changed does not nullify the desire for privacy. With regards to monitoring the flow of information that people want to be available online, perhaps a better word than “privacy” is “control”. It is not that we don’t want people to know information about us or what is going on in our lives; rather, we want to retain power over our narrative that exists online. Posting content and commenting on what other people share typically creates a link to your personal profile. Every move we make online is a conscious decision. By selectively participating on social media sites, I believe we have control over our digital personalities that are accessible for viewing.

Having Something to Hide in the Social Media Age

“she has started creating a ‘light version’ of her life that she’ll regularly share on Facebook just so that her friends don’t pester her about what’s actually happening. Much to her frustration, she finds that sharing at least a little bit affords her more privacy than sharing nothing at all.” (Boyd 74).

In this social-media fueled age, it seems that the typical “cynic[al]” doctrine of privacy—”that only people who have something to hide need [it]” still rings true to a certain extent. I find that it is often the norm for people of my generation, which is relatively more internet conscious and well-lectured on the dangers of social media than our early 2000s counterparts, to practice certain measures of privacy from outsiders—like keeping Instagram or Facebook pages on the “private” setting so that only those who you allow can see your posts. However, I also find that it is often privacy from those we know in real life that is much harder to obtain in our online personas. In this quote a teenage girl finds that she must somewhat regularly post on Facebook to keep her friends from pestering her about why she isn’t updating people on her life online. This story is not an outlier, and it would definitely be a true statement that the norm is regular social media use, and not the other way around. If someone goes from posting regularly on any of their social media sites, to silence, it would definitely raise alarm from those in their online following and lead to invasive questioning in real life.

Therefore, these days, the idea that wanting privacy is indictive of  having something to hide, may have given way to the idea that choosing not to share (and share frequently) online is indicative of having something to hide.

Page 2 of 19

Powered by WordPress & Theme by Anders Norén