Skip to main content

People of the world beware: An assault on our privacy is coming, of unimaginable proportions.

Yes, that's kind of hyperbolic, but it's really the only way to get the point across.  Your personal data and information is quickly becoming digital - and almost everything digital is accessible online.  Here are a few small examples of the things that you probably don't think about being accessed by someone you haven't authorized, and how it could impact your life:
There is no denying that we are heading toward a completely on-line existence.  Progress has spoken - social networking has propelled much more than photos of you and your friends to be put online.  Devices like exercise bracelets, music sharing websites that advertise what you listened to, refrigerators that track what you've eaten, cars that log your speed and driving habits, and SO MUCH MORE.   And the convenience of the cloud means that all this data is likely to be housed not in your hands - but those of someone else (like Facebook or Google).

The big question is this:

What stands in the way of someone you don't know getting access to these things?

In today's world, 9-times-out-of-10, even in the best case scenario, it's a single password.  Yes, a single password is all it takes for someone who wanted to completely ruin your life.  Even if you are conscientious and maintain a separate password for each website (which most people don't), most systems utilize your e-mail address to reset your password, making the point of vulnerability for almost of your data a single password - the one on your e-mail account.

Ask yourself another question:  What is my attitude toward passwords? How about my family's? And my friends'?  I'm willing to guess that the answer for at least one of these contingents is something along the lines of this:
"Passwords are a pain in the neck, I invest the minimum amount of effort I can get away with."
Unfortunately, it gets worse.

As your data footprint gets wider, the chances that someone will make a human error that exposes your data rises.  That means your data could be compromised even if you are diligent about security.

So if we look at all this in perspective over time, we have the following factors:

  • More sensitive data being created, 
  • More of that sensitive data being put on online, 
  • With basically the same type of security we have had to protect our data since the invention of e-mail - at best, a single password, and
  • At worst, diminishing security, as any of the increasing number of online services housing our data are vulnerable to compromise.
  • As people are becoming increasingly aware, government agencies like the NSA are becoming more powerful (by necessity?), and can requisition your data from those services whenever they want
And still worse.

Up until now, you probably have a friend or two who have had their computer "pwned", or their e-mail account hacked.  Most likely they had to reformat their computer, change their e-mail and other passwords, maybe send an apology to their friends for spam they received from their account, and in the more extreme cases, change their credit card numbers and notify their banks.  

But this is NOTHING, in terms of the amount or severity, compared to what we will see in 5-10 years from now, as more of our data is made digital.  The stakes will be far higher.  If a hacker gains access to your Facebook account today, that counts for some amount of value - perhaps they can advertise something or blackmail you into paying some amount of money.  But if they can gain access to your banking info, your living habits, the vehicles you own, all of your financials, and other things we can't even imagine, hacking becomes more lucrative.  Instead of script-kiddies and people who write in broken English sitting in front of a home computer, we are talking about highly paid, technically adept, convincing actors, whose job it is to gain access to your data.  These people could even be blurring the lines between malicious or illegal activity, working for government contracts for organizations like the NSA.  They will stop at almost nothing, and they will move on to someone else before you even know anything happened to you.  Eventually, privacy is going to become one of the most valued (and valuable) things on the internet, and in the world.

The point of this article isn't to generate paranoia.  It's a wake-up call about where we're heading, and how our (collective) attitudes are going to need to change, if this is all going to be sustainable.  Sadly, we are most assuredly going to have to weather a few major storms before there is a widespread change in the way we all approach security.

So as crazy new gadgets that find new and novel ways to computerize your life emerge, think carefully about what you choose to adopt.  Consider the gains against the risks to your privacy.  If you do decide to adopt something, think about what you can do to prevent your data from falling into the wrong hands, and take the opportunity to do it.  


Popular posts from this blog

Reaper, Linux, and the Behringer X-Air - Complete Studio Solution, Part 1

Introduction and Rationale This is part one of a major effort to document my experiences with recreating my home studio, entirely using Linux.  Without getting into too many of the specifics, a few months ago I decided that I was unhappy with Windows' shenanigans - to the point that I was ready to make a serious attempt to leave it behind.  For most in this situation, the obvious choice is to switch to Mac OS.  With its proven track record, support, and options for multimedia production, it is naturally the first alternative to consider if your goal is to simply use something other than Windows. For me the choice was not so simple. I despise Mac OS and, in general, the goals and philosophies put forth by Apple in an effort to ostensibly provide users with an "easy" working environment.  It does not help that I have also failed to find any aspect of the Mac OS UI intuitive, but I realize that this is a subjective matter. With my IT background and user-control* favori

Timbaland rips off a Demoscene artist

I knew this day would come. The new Timbaland/Nelly Furtado song "Do It" uses a song made in 2000 by Finnish demoscene artist "Tempest" (Janne Suni). It's a 4 channel .mod (the ripoff is from a playback using the C64 SID soundchip). The song was hosted on's servers (the main repository for all everyones demos and tracked music, etc.). As you might expect, no permission or royalties were paid to Tempest. Just to clarify, we're not talking about some kind of coincidence here. There is no question that this track was used to create the song "Do It". In an interview, Timbaland tries to downplay it, saying things like "he sampled it from a video game". (This track was not written for a video game- it was actually written for the 2000 demoscene music competition, in which it won 1st place). Regardless, he basically claims he has no legal obligations because it's just like all the other pop artists that sample other m

The Hellscape that is Google’s Web in 2023

Alternate title: "were we better off in 2015 2007?" Time now for another anti-capitalist, “get off my lawn” posting for all the folks out there who won’t see it anyway, because they don’t read real blogs for the reasons specified in this very article. The web has existed for 30 years now. One would think our ability to access information on it would keep getting better. However, I watch as web search is instead devolving every year, to the point where people are giving up and hoping for the next thing.  While this sounds dire, this kind of behavioral change has historical precedent. Remember running your own mail or web server, or better yet, having a phone that you might actually answer calls to, even if you don’t recognize the caller’s number?  Yes, those ideas are gone too. It's all thanks to the uncontrolled thirst for advertising. Let’s walk through the experience of someone doing a simple Google search for “how to control poison ivy”.  The desired outcome would be