We have been taught till now that Privacy refers to information shared with visiting sites, how that information is used, who that information is shared with, or if that information is used to track users.
How did the term paradox joined the team privacy?
Since the arrival of early social networking sites in the early 2000s, online social networking platforms have expanded exponentially, with the biggest names in social media in the mid-2010s being Facebook, Instagram, Twitter and SnapChat. The massive influx of personal information that has become available online and stored in the cloud has put user privacy at the forefront of discussion of the databases ability to safely store such personal information.
One of the greatest paradoxes regarding our tech use is how we profess to care about controlling our private information online, yet appear so willing to give it away. Although 92% of internet users are worried about their online privacy and 64% feel it should be a human right, only 31% understand how companies share their information. Reasoning to that, Kupanzone has made their privacy policies really simple.
PRIVACY IS DEAD!
The goal of The Privacy Paradox it to be digitally woke, cognizant of the underlying trade-offs and capable of making informed decisions.
WNYC’s Note to self podcast,explains the effect of privacy paradox. Its week long project Privacy Paradox Project and Manoush Zomorodi, the host and managing editor of the Note to self explains all about it.
Tech companies make money off of our online behavior . We are referred to as the information civilization. Most of our data collected by multiple websites are analysed and made into predictions and then sold to us again as a way of telling us that they companies are smarter where in turn its not true.
For example, they know that cookies are a thing, but not everyone knows about digital fingerprinting. Even if you opt out of cookies, you can be followed around the web because of all these data points that are put together to figure out who you are. They don’t realize that there is now technology that can parse not what you post online, but what punctuation you use — what sort of word choices you use. It can literally read between the lines of what you post. So I think we would feel better, and it would also be more perfect if we knew more what was being done with our data and were given a choice to opt out or even to take it back.
Private Boundaries of Privacy Paradox
The private versus public boundaries of social media spaces are unclear. On the Internet, the illusion of privacy creates boundary problems. New users and those engaged feel this illusion most strongly. For example, in a television interview about Facebook to some students, they showed concerned about revealing personal information online. When the reporter asked to see their Facebook page, the page contained their home address, phone numbers, and pictures of them. Without being aware of the dangers of online social sites, they all had revealed too much personal information.
Solution to privacy paradox includes:
- Social solutions
- Technical solutions
- Legal solutions
Think for a moment about the door — one of the most basic privacy-enhancing technologies, though perhaps not the type of technology that most readily comes to mind in modern privacy discussion. A world with doors is significantly more protective of privacy than a world without doors. But the privacy that doors offer is not absolute — and the presence of doors will tend to make surveillance more surreptitious. Watching someone in a world without doors is tricky to do without detection. Close a door, however, and someone can watch you through the keyhole, slip something unpleasant between the door and the threshold, or listen furtively behind the door.
Behind closed doors, moreover, you feel comfortable doing certain things you would never imagine doing before you closed the door. In other words, the door gives you some degree of privacy that you did not have before, but it also masks attempts to undermine the privacy it offers. And there’s the catch: just as the door does not simply protect privacy, technologies we assume will erode privacy have complicated multi-directional effects too. By ignoring or diminishing these privacy effects, we mask the very complicated impacts of new technologies on individual privacy in the aggregate.
Privacy gain and loss are quite difficult to measure. For one thing, we have no agreed-upon units of privacy. For another, privacy gains and losses almost always correlate with other gains and losses. When your password gets compromised, you lose both privacy and security. Are those two losses so hopelessly entangled that they are really the same thing? Or should one try to disaggregate them and describe both a security loss and separate privacy loss?
Similarly, when one gains in privacy, one gains in other areas as well. Privacy gains particularly tend to correlate with gains in convenience — one of the reasons people tend to dismiss the privacy benefits of new technologies as merely gains in convenience.But it is far too simplistic to reduce all the benefits of new technologies to convenience, efficiency, and economic rationality. At least some of them have to do with an interplay between the different forms of privacy we describe above — that is, privacy from individuals in our immediate environment, as opposed to privacy from people and organizations farther removed from our daily routines.
- Sticking to Basic
- Change your privacy settings on your browser and in social media. Here’s how on Chrome, Firefox, Twitter and Facebook.
- Create strong, unique passwords.
- Turn on two-factor authorization for your key accounts (like email). It’s a simple additional layer of protection against hacking.
2. Strong Password
Okay, you have strong passwords. Then here are your next steps.
- Start using a password manager for all your super-strong passwords.
- Try browsing with Duck Duck Go, a search engine that never stores your search data.
- Take the Tor browser for a test drive.
- Learn how to guard against phishing and malware (who knew about the inline images?).
- Install the https Everywhere plugin for your browser, to minimize what data gets sent without encryption.
- Take a break from any voice activated technology you have.
3. Go Further
You’ve done the basics and then some. You have the stamina and want to take it to the next level.
- Remove your information from data brokers. It’s not easy, but there are paid services and DIY guides.
- Consider a YubiKey (or two, don’t want to lose it!).
- Pay with cash for a day.
- Try out facial recognition camouflage.
- Start the switch to open source software.
Our privacy debate too often ignores that fact when it treats privacy as a generic good that is either increasing or decreasing. It works that simply. There’s no correct answer to the question of whether this will lead to less privacy or more.Most new technologies often both enhance and diminish privacy depending on how it is used, who is using it, and what sorts of privacy that person values. Individual concern with privacy often will not involve privacy in the abstract, but rather vis à vis specific audiences — that is to say that the question of privacy from whom matters. At least some modern technologies that we commonly think of as privacy-eroding may in fact enhance privacy from the people in our immediate surroundings.
References: Thanks to Wync, Bigthink and NPR.