2020-04-07-on-not-caring-about-your-privacy.html (3703B) - raw
1 <!-- title: On not caring about your privacy --> 2 <!-- slug: on-not-caring-about-your-privacy --> 3 <!-- categories: Miscellany, Privacy --> 4 <!-- date: 2020-04-07T16:17:00Z --> 5 6 <p> 7 When talking about violations of our privacy, I've found that most people don't care because it is 8 a thing that happens "far away" (<em>who in that huge enterprise cares about me, my browsing 9 habits, etc.?</em>). I can see where those people are coming from, it looks as if you are 10 anonymous because there are just so many people whose data is collected.</p> 11 <!-- /p --> 12 13 <p> 14 Let's bring it closer: if you are connected to your work WiFi, your employer can—and probably 15 does—monitor your traffic. This sounds a lot "closer", but maybe not enough. What if a co-worker 16 showed you a screenshot with all the connections that the devices connected to the WiFi were 17 doing? That happened to me, I could see my phone in there, with the URL I was visiting a couple of 18 minutes ago. I could also see other co-workers' phones ("Someone's iPhone", "Someone's Samsung 19 Galaxy") also followed by URLs. Those URLs were harmless, so that particular screenshot wasn't 20 particularly dangerous. However, my superiors knew everything I was doing on the work's WiFi<sup 21 id="fnref1"><a href="#fn1">1</a></sup>. Not that I had anything to hide, but I also had no 22 intention to give up my privacy, so I started using Tor when connected to the WiFi. They would 23 probably never know I was using Tor (just that I was accessing a certain IP address), but even if 24 they did, I didn't really care, there's nothing wrong with using it.</p> 25 <!-- /p --> 26 27 <p> 28 It seems as people are fine with having their privacy violated when it's from someone "far away", 29 but they are not okay when someone "closer" does it. Another example of this is email. Most people 30 wouldn't give away their email password to anybody, but they are okay with the fact that their 31 email provider is reading all their emails. The same happens with most internet services.</p> 32 <!-- /p --> 33 34 <p> 35 One can have the feeling that they are anonymous because they are one in a million, but the 36 reality is we are not. Thanks to technology and data analysis, we are able to process all that 37 data and profile people based on it. It happens on such a great scale that <a 38 href="https://en.wikipedia.org/wiki/Real-time_bidding">real-time bidding</a> is a thing. When you 39 visit a webpage, there is a real-time bid between advertisers to publish their ad in the 40 designated spaces, and companies bid more or less depending on the profile they have made of you. 41 In less than a second companies retrieve your profile and bid for you, every time you surf the 42 Internet!</p> 43 <!-- /p --> 44 45 <p> 46 You are one of many, but you are definitely not anonymous because of it. Targeted ads might not 47 sound too terrible. However, today companies are bidding for your attention, can you ensure 48 tomorrow they won't use that information for other purposes? Today you may trust a big company, 49 but the information they have will last for very long, can you trust the future leadership not to 50 use it for other purposes?</p> 51 <!-- /p --> 52 53 <p> 54 Just like you don't go around giving everyone access to your browsing history or emails, you 55 shouldn't do the same with companies. You might have nothing to hide, but why would you give such 56 private information away?</p> 57 <!-- /p --> 58 59 <!-- footnotes --> 60 <hr /> 61 62 <ol> 63 <li id="fn1"> 64 Not everything. When connected through HTTPS, traffic monitoring can only see the domain you are 65 visiting, not the actual URL. <a href="#fnref1" title="Jump back to footnote 1 in the 66 text">↩</a></li> 67 <!-- /li --> 68 </ol>