How to protect our privacy ?!

How to protect our privacy ?!

 

In a world where digital is pervasive, protecting our privacy is a tall order.

We know that ALL internet platforms based on the Cloud concept, they have the potential to spy on everything and everyone on an ongoing basis, therefore it is necessary to enable a new level of awareness.

Only in this way, individuals will be able to decide how to behave with regard to news and information concerning them and that they can, the name, be shared on the network.

If that were a viable option, probably, many would choose what to share.

But reality puts us in a situation where such a choice, it's impossible.

All mobile computational tools, they continuously spy on everything we generate and use through these devices.

These, being equipped with numerous sensors, they can also communicate a series of unthinkable information… .for example, dove dormiamo tutte le notti!!!

Non ci credete?!?!?… per chi spia, è sufficiente incrociare il dato della geo-localizzazione ( ATTENZIONE: non solo desumibile dal GPS, ma anche dalla triangolazione della rete cellulare….che notoriamente non si può evitare, a meno di non spegnere e STACCARE la batteria!!!) con le ore notturne….et voilà il gioco è fatto!!! 🙂

Ciò che impressiona, è pensare a tutti quei sensori che la tecnologia indossabile è in grado di offrire sul mercato, capaci di comunicare i nostri parametri fisiologici… implicazioni aberranti sulla gestione dei dati riguardanti la salute.

Pensate alla persona che utilizzasse allegramente il suo “luccicante connubio” fra smartphone e braccialetto capace di monitorare battito, pressure and levels of certain target chemical concentration indicators .... how much this information might be worth for life insurance companies?! ( but the hallucinating thing is that Apple is planning just that : article source on wirelessweek )

It might be thought: so I don't use smartphones and wearable technology… but why deprive yourself of a technology that could really increase the quality of our life ( if enjoyed and used well) ?!

However, the danger is not limited to the abuse of those who manage the facility where information spied on through mobile tools "transit" ... the danger is about to enter our homes!!!

And he's doing it with a "Trojan Horse" !!!

Smart TVs, indeed , they are nothing more than smartphones, with large screens!!!

And there are already many reports that accuse the manufacturers of collecting data without permission ( it is. the complaints against LG e against Samsung ).

The details make you shiver: microphones built into the SmartTV always on, remotely activated web cams, facial recognition that catalogs anyone in front of the TV ...

But let's not limit ourselves to seeing how those who are making money without competing fairly on the market, is trying to replicate the model to enter homes and offices ...

The Internet of Things (IOT= internet of things ) it is the new frontier for controlling and optimizing resources and choices.

In itself a technology that could increase everyone's quality of life and enable better choices, in every field.

But the shadow of evil is always present ... even if this opportunity were exploited by the usual "crafty little planet", it would be another way to spy ... and earn resources without really contributing to the creation of added value!!!

Home automation is a market just in its infancy, considering the true diffusion of this technology in the home.

It is unthinkable to leave it in the insatiable jaws of those operators I spy on, they shatter our privacy.

There is already talk of refrigerators and washing machines that in addition to "snooping", they become tools in the hands of hackers ( source article on TechEconomy )

Taking up the Cloud's speech, I personally have yet to know a private entrepreneur who is uploading to a third party's servers, accounting, the list of suppliers and customers, and communication management… while on “certain” topics one could still be in doubt, on the dangers of industrial espionage and unfair competition, the "antennas" are working well!

But to make considerations that define "striking" is euphemistic, they are also those who professionally analyze the offers in the cloud ( source article on Datamanager )

Among the most "sonorous" phrases : … “The transfer of personal data to third parties, condition for joining a cloud contract, opens a chasm of potential critical issues ", and then "the thorny chapter of the performance measurement by the CSP and the possible quantification of compensation" for what concerns the interruption of the service, loss or theft of data ( if and when you notice !!), cases in which it is not established by law, adequate compensation.

in conclusion, we are witnessing a global theater where the “puppeteer” and the puppets, they are behaving like the cat and the fox with poor Pinocchio ( citizens, public institutions and companies )… The cloud story where everything is easier, convenient and transparent… but only for them!!!!

If you still consider this interpretation doubtful, I invite you to read the Guide on the Human Rights of Internet Users, drafted by the Committee of Ministers of the European Council ( source official website of the European Council )

The paragraph Privacy and data protection deserves an in-depth and meditated reading especially in the opening words: “You have the right to private and family life on the Internet which includes the protection of your personal data and respect for the confidentiality of your correspondence and communications. “… Now think about how you are treated on ALL OTT platforms ( Over The Top, like google via android, Apple via iOS, Facebook, Amazon, Microsoft, etc. etc. )

I cannot help but publish the points in this paragraph:

This means:

1. you should be aware that, in using the Internet your personal data is regularly processed. This happens when you use services such as browsers, e-mail, instant messages, voice-over Internet protocols, social networks and search engines and cloud data storage services;

2. public authorities and private companies have an obligation to respect specific rules and procedures when they process your personal data;

3. your personal data should only be processed when laid down by law or when you have consented to it. You should be informed of what personal data are processed and/or transferred to third parties, when, by whom and for what purpose. Generally, you should be able to exercise control over your personal data (check its accuracy, request a correction, a deletion or that personal data is kept for no longer than necessary);

4. you must not be subjected to general surveillance or interception measures. In exceptional circumstances, which are prescribed by law, your privacy with regard to your personal data may be interfered with, such as for a criminal investigation. Accessible, clear and precise information about the relevant law or policy and your rights in this regard should be made available to you;

5. your privacy must also be respected in the workplace. This includes the confidentiality of your private online correspondence and communications. Your employer must inform you of any surveillance and/or monitoring carried out;

6. you can be assisted by data protection authorities, which exist in a vast majority of European countries, to ensure that data protection laws and principles are upheld.

By uploading our data to the servers of a third party, we give back who owns and operates such servers, OWNER of our data ... if he spied on them, would infringe our privacy , but he would not commit the crime of DATA THEFT ( something that happens continuously since this is indirectly communicated in the server management policies ... naturally to protect their correct functioning and "check" that there are no "dangerous" contents ...)

In short, to start making life difficult for these THIEVES OF OUR DIGITAL AND REAL INTIMACY, it is necessary to go back to managing the coding and storage of data ON SITE!

Very simple thing: a PERSONAL PROCESSOR… easy ! 🙂

And if they really wanted our data, that they are ready to PAY and also handsomely, to those .... who would be willing to sell them!

For the record, there is an event that measures the tension in the communication market : Mathias Döpfner, director of the German publishing group Axel Springer called Google "Extortionist" ... ( source Financial Times e Courier Of Communications )

And with that I take my leave, wishing everyone a peaceful Easter

ComputArte Easter postcard 2014 III

ComputArte copyright

Leave a Reply

This site uses cookies to enhance your experience. By continuing to the site you accept their use. More info in our cookies policy.     ACCEPT