Quotulatiousness

April 18, 2013

Neologism of the week: “Glassholes”

Filed under: Liberty, Media, Technology — Tags: , , , , — Nicholas @ 11:06

Jason Perlow explains why Google Glass (or similar devices from other vendors) are inevitably going to be part of the future, and why many already refer to the users of such devices as “Glassholes”:

It could certainly be argued that whenever a new consumer technology enters society, those who are quick to adopt it are typically ridiculed by the have-nots. Eventually, many of these technologies become commonplace and are more accepted by the mainstream, particularly when they become more affordable.

This has pretty much always been the case, starting with the radio pager, then the cellular phone, text capable handsets, and then, of course, Bluetooth headsets, the smartphone and the tablet.

People who first used these things were once seen very much as elitist and not part of the mainstream, and they were considered disruptive.

To some extent, even with their popularity, they are still considered disruptive when used in various social contexts.

[. . .]

With Glass, because the device is being worn and there’s no indication of when it is being used, one has to assume that the wearer is recording everyone all of the time.

I can’t speak for anyone else, but I have serious issues with the notion that I could be recorded by everyone at any time.

Look, I am aware that law enforcement and government agencies have us under surveillance, and it’s not uncommon for people to be photographed and videoed hundreds of times per day, particularly if you live in a major city.

The growth of public surveillance has all kinds of civil liberties concerns, but it’s a done deal … you probably can’t avoid being recorded many times per day unless you stay at home with the blinds down (and turn off your cell phone, and avoid the internet, and …). The social and cultural issues around private surveillance will provide some fascinating legal wrangles in the very near future: where does my right to record (“lifelog”) all of my activities conflict with your right not to be so recorded? Will the concept of privacy be one of the first things jettisoned over the side?

Governments and law enforcement agencies will want maximum opportunity to use their surveillance tools — both for specific investigations and for general purpose Big Brothering — and if that means abandoning any pretense of protecting your privacy against invasion by non-government agencies, they’ll take it. They’re already 9/10ths of the way there as it is.

There are things you only say and do with close friends in confidence, others which may be revealed in private business meetings, et cetera. We all know and have seen what happens when supposedly “private” or unauthorized recordings are made behind closed doors and then leaked to the general public, either intentionally or accidentally.

It can cost someone their career. It can destroy one’s personal reputation. It will most certainly cause one strife with one’s friends and family. And as we have most recently seen, it can also cost you a Presidential Election.

He also discusses the possibility of social and technical controls to provide anti-lifelogging zones, which I strongly suspect will be simultaneously introduced almost immediately when Google Glass or similar technology is released to the public, and almost certainly more of a hassle for non-users of the technology for little or no actual benefit. It will be the usual politician’s syllogism: “Something must be done. This is something. Therefore we must do it.” As for the technical side, there is almost nothing more tempting to a certain kind of hacker than the technical equivalent of a “Do not touch” sign.

Obviously, for this type of anti-lifelogging tech to work, there has to be an agreed upon API or programmatic trigger signals that cannot easily be defeated by hackers.

But if it cannot be made to work, or if the effectiveness of the tech cannot be guaranteed, then I forsee situations where people will be forced to remove and surrender their devices in order to prevent the possibility of recording, as well as a change in our culture to be much more careful about what one says, even in very intimate situations.

And that is an Orwellian chilling effect that I think could be very harmful to the development of our society as a whole.

This chilling effect was evident in decades past in East Germany while the country was in fear of the ever-watching eyes and ears of the Stasi, which had perhaps the largest informant and surveillance network of any nation per capita in the Eastern Bloc during the Cold War, the USSR included.

March 26, 2013

“It’s as if Doctorow … figured out how to be a novelist and a blogger in the same book”

Filed under: Books, Liberty, Media — Tags: , , , — Nicholas @ 09:15

At Reason, Tom Jackson reviews Cory Doctorow’s Homeland, the sequel to 2007’s Little Brother:

By day, Yallow works within the system, taking a job as a webmaster for an independent candidate for the California senate. By night, he’s a part of a guerrilla WikiLeaks-style operation, trying to deal with goons who are out to get him and hackers trying to control his computer and his information. Life gets even more complicated when he starts participating in large outdoor demonstrations that attract the attention of the police. The story should resonate with any reader who worries about online privacy and the government’s ability to use the Net as a tool for political repression.

Although Yallow and his buddies are fictional, Homeland is studded with educational bits. One early chapter, for example, includes a recipe for cold-brew coffee. A librarian delivers a lecture on copyright reform. While at Burning Man, Doctorow meets four heroes of the Internet — Mitch Kapor, John Gilmore, Wil Wheaton, and John Perry Barlow — and the reader is duly educated on how they relate to the founding of the Electronic Frontier Foundation and the creation of Lotus. The infodump continues after the novel ends, with an afterword by Jacob Appelbaum of WikiLeaks and another by the late Aaron Swartz. (Swartz, facing a federal trial and possible prison on felony charges for downloading academic documents, committed suicide on January 11. His exhortations here not to give in to despair and a feeling of powerlessness make for sad reading, but he also explains how political movements to preserve the Internet from censorship have a chance to succeed.) There is also a bibliographic essay on the topics the book covers. It’s as if Doctorow, well-known both as a science fiction writer and as a contributor to Boing Boing, figured out how to be a novelist and a blogger in the same book.

The encounter with Kapor and company isn’t the only way the novel intersects with reality. Yallow logs on to his laptop using the Paranoid Linux operating system, created to maximize the user’s privacy. Paranoid Linux was fictional when Doctorow invented it in Little Brother, but it inspired the creation of a real, albeit short-lived, Paranoid Linux distro. And if you Google “Paranoid Linux,” you’ll learn about current Linux distributions that emphasize security, such as Tails and LPS. As Doctorow notes in his afterword, Googling terms in the book that might be unfamiliar to the reader — “hackerspace,” “drone,” “Tor Project,” “lawful intercept” — provides many of the novel’s educational experiences.

March 2, 2013

“The most important Google Glass experience is not the user experience – it’s the experience of everyone else”

Filed under: Liberty, Media, Technology — Tags: , — Nicholas @ 11:08

Charles Stross linked to this article saying that it’s the second order effects that are going to be more important over time:

The key experiential question of Google Glass isn’t what it’s like to wear them, it’s what it’s like to be around someone else who’s wearing them. I’ll give an easy example. Your one-on-one conversation with someone wearing Google Glass is likely to be annoying, because you’ll suspect that you don’t have their undivided attention. And you can’t comfortably ask them to take the glasses off (especially when, inevitably, the device is integrated into prescription lenses). Finally – here’s where the problems really start – you don’t know if they’re taking a video of you.

Now pretend you don’t know a single person who wears Google Glass… and take a walk outside. Anywhere you go in public – any store, any sidewalk, any bus or subway – you’re liable to be recorded: audio and video. Fifty people on the bus might be Glassless, but if a single person wearing Glass gets on, you – and all 49 other passengers – could be recorded. Not just for a temporary throwaway video buffer, like a security camera, but recorded, stored permanently, and shared to the world.

[. . .]

Remember when people were kind of creeped out by that car Google drove around to take pictures of your house? Most people got over it, because they got a nice StreetView feature in Google Maps as a result.

Google Glass is like one camera car for each of the thousands, possibly millions, of people who will wear the device – every single day, everywhere they go – on sidewalks, into restaurants, up elevators, around your office, into your home. From now on, starting today, anywhere you go within range of a Google Glass device, everything you do could be recorded and uploaded to Google’s cloud, and stored there for the rest of your life. You won’t know if you’re being recorded or not; and even if you do, you’ll have no way to stop it.

And that, my friends, is the experience that Google Glass creates. That is the experience we should be thinking about. The most important Google Glass experience is not the user experience – it’s the experience of everyone else. The experience of being a citizen, in public, is about to change.

February 19, 2013

US Supreme Court okays search warrants issued by dogs

Filed under: Law, Liberty, USA — Tags: , , , , , , — Nicholas @ 15:14

A glum day for civil liberties:

Today the U.S. Supreme Court unanimously ruled that “a court can presume” an alert by a drug-sniffing dog provides probable cause for a search “if a bona fide organization has certified a dog after testing his reliability in a controlled setting” or “if the dog has recently and successfully completed a training program that evaluated his proficiency in locating drugs.” The justices overturned a 2011 decision in which the Florida Supreme Court said police must do more than assert that a dog has been properly trained. They deemed that court’s evidentiary requirements too “rigid” for the “totality of the circumstances” test used to determine when a search is constitutional. In particular, the Court said it was not appropriate to demand evidence of a dog’s performance in the field, as opposed to its performance on tests by police. While the Court’s decision in Florida v. Harris leaves open the possibility that defense attorneys can contest the adequacy of a dog’s training or testing and present evidence that the animal is prone to false alerts, this ruling will encourage judges to accept self-interested proclamations about a canine’s capabilities, reinforcing the use of dogs to transform hunches into probable cause.

Writing for the Court, Justice Elena Kagan accepts several myths that allow drug dogs to function as “search warrants on leashes” even though their error rates are far higher than commonly believed

February 16, 2013

“The mainstream news has become the Boy who Cried Internet”

Filed under: Media, Technology — Tags: , , , , , , — Nicholas @ 11:29

In Maclean’s, Jesse Brown explains why the mainstream media still doesn’t seem to “get” the internet or social media channels like Twitter, Google+, and Facebook:

While I was delivering some talking-head sound-bites on this item for a certain newscast, the reporter asked me why the Twitter hack was such a huge deal. I was stumped – it wasn’t. So she asked me why it was getting so much attention. I knew the answer, but held my tongue.

Here’s what I was thinking: it gets so much attention because print and TV news love to bash technology, especially social media, and can’t resist a scary story about how the people who use it should be very, very afraid. The truth is, despite years of fear-mongering stories about Facebook identity theft, Gmail phishing attacks and massive Twitter hacks, public interest and concern about these things remains very low. That’s because these things haven’t happened to the vast majority of us, or to anyone we know. For the small number of people this has happened to, the impact is typically minimal. The mainstream news has become the Boy who Cried Internet.

This is not to say privacy isn’t a valid concern when it comes to free Internet services. There’s much to worry about, but little of it has to do with Russian digital mobsters, Chinese military hackers or spammy Nigerian princes. The real data privacy danger – with social media, and beyond – comes from government.

February 11, 2013

Police dogs as “probable cause on a leash”

Filed under: Law, Liberty, USA — Tags: , , , , , — Nicholas @ 11:19

Jacob Sullum on how credulous courts have granted police dogs the power to circumvent Americans’ right to be free from intrusive search and seizure by police officers on fishing expeditions:

The deputy and another officer who arrived during the stop nevertheless went through Burns’ truck for half an hour or so, reaching up into the boat, perusing his cargo, looking under the seats and the hood, examining the gas tank and the undercarriage. They found no trace of drugs, although they did come across the loaded pistol that Burns mentioned to them once it was clear they planned to search the truck.

“They were cool with the gun,” Burns says. “If it had been California, God knows what would have happened.” He was so relieved that he barely minded the delay and inconvenience, which stretched a brief traffic stop into more than an hour. “I’m not a lawyer, and I’m not a super-libertarian,” Burns says. “Once I realized that the pistol was not going to be an issue, man, they could have spent all day going over that car and under that car. My only concern was that one of the guys might have slipped something in to cover up for the fact that they didn’t find anything.”

That’s one way of looking at it. But even if you are neither a lawyer nor a super-libertarian, you might wonder 1) how often this sort of thing happens, 2) how it came to be that police can get permission from a dog to rifle an innocent man’s belongings, and 3) whether that state of affairs is consistent with the Fourth Amendment’s guarantee against “unreasonable searches and seizures.” The answers, in brief, are 1) fruitless searches based on dog alerts happen a lot more often than commonly believed, 2) dogs acquired this authority with the blessing of credulous courts mesmerized by their superhuman olfactory talents, and 3) this dog license is hard to square with the Fourth Amendment, unless it is reasonable to trust every officer’s unsubstantiated claim about how an animal of undetermined reliability reacted to a person, a suitcase, a car, or a house.

All of these issues come together in two cases the U.S. Supreme Court heard a few weeks after Bob Burns was pulled over. Florida v. Harris raises the question of how a judge knows that a dog’s alert is reliable enough to justify a search. Florida v. Jardines asks whether police need a warrant to use a drug-sniffing dog at the doorstep of a home. These cases, which will be decided by this summer, give the Supreme Court an opportunity to reconsider its heretofore unshaken faith in dogs, or at least limit the damage caused by the amazing canine ability to transform hunches into probable cause.

January 29, 2013

Last things

Filed under: Humour, Technology — Tags: , — Nicholas @ 00:02

By way of Gerard Vandeleun’s Ka-Ching! blog on Tumblr:

Internet-age Medic Alert Bracelet

December 19, 2012

Exiting gracefully from Instagram

Filed under: Business, Media — Tags: , , , , , — Nicholas @ 00:02

Lots of folks are furious about Instagram’s recently announced changes to their terms of service. If you’re an Instagram user and don’t want to sign up for the changed TOS, here’s Roberto Baldwin‘s recent Wired How-To on rescuing your Instagram photos and closing your account:

First you’ll want to download all of your photos. Instaport will download your entire Instagram photo library in just a few minutes. Currently the service only offers a zip file download of your photos, although direct export to Flickr and Facebook are in the works.

Once the photos are downloaded, you can upload them to another photo service. Some of the Gadget Lab staff is fond of the new Flickr app and service.

After you’ve removed your photos from Instagram, you can quickly delete your account and pretend you’ve never even heard of Lo-Fi filter.

But once you delete your account, that’s it. Instagram cannot reactivate deactivated accounts and you will not be able to sign up for Instagram later with the same account name.

H/T to Nick Packwood for the link.

Update: Charles Cooper at CNET News:

From the outset, let’s note a couple of points that ought to be abundantly clear to anyone watching the unfolding controversy about the upcoming changes to Instagram’s terms of use.

A) Instagram — and thus by definition, Facebook, the site’s corporate parent — is entirely within its rights to change the terms of use governing how photos uploaded by people using the service get used.

B) Facebook’s management is comprised of incredibly smart folks.

Given that A and B are true, the powers that be who are running the company must either be amazingly tone deaf or crazy as loons.

It’s obviously not the latter, so we’re left with the conclusion that the people at the top, so impressed by the sound of their own voices, have lost touch with the people who helped turn them into gazillionaires — in other words, the users.

December 9, 2012

Verizon attempts to patent creepy targeted ad delivery technology

Filed under: Business, Media, Technology — Tags: , , — Nicholas @ 11:02

Verizon wants your TV to carefully observe you so it can deliver ads tailored for whatever activity you might be doing:

The U.S. Patent Office has delivered a “non-final” rejection of a Verizon patent application for a controversial technology that would have served targeted ads to TV viewers based on what they might be doing or saying in front of their sets.

[. . .]

The patent in question has been the subject of intense media scrutiny since FierceCable uncovered it last week. Verizon’s somewhat laboriously titled the patent application “Methods and Systems for Presenting an Advertisement Associated with an Ambient Action of a Use.”

The application says the technology would be capable of triggering different advertisements depending on whether a viewer or viewers might be eating, playing, cuddling, laughing, singing, fighting or gesturing in front of their sets. Specifically, the patent covers technology that can serve ads “…targeted to the user based on what the user is doing, who the user is, the user’s surroundings, and/or any other suitable information associated with the user.”

Privacy? You don’t need that, because we need to sell you shit.

December 6, 2012

NZ court allows Kim Dotcom to sue for illegal spying

Filed under: Business, Law, Liberty, USA — Tags: , , , , — Nicholas @ 10:01

This could get interesting quickly:

Details of the top secret international spy agency ring known as Echelon will have to be produced after a new judgment in the Kim Dotcom case.

The internet tycoon was also cleared to pursue a case for damages against the police and the Government Communications Security Bureau in a judgment which has opened the Government’s handling of the criminal copyright case for its harshest criticism yet.

[. . .]

Chief high court judge Helen Winkelmann said the GCSB would have to “confirm all entities” to which it gave information sourced through its illegal interception of Dotcom’s communications.

She said her order included “members of Echelon/Five Eyes, including any United States authority”. The Echelon network is an international intelligence network to which New Zealand and the United States are members, along with Australia, Canada and the United Kingdom.

The judgment also recorded Dotcom’s suspicions he had been spied on at least six weeks before the GCSB admitted to doing so, and sought details as to whether others had been swept up in the illegal operation.

Update: Moved the video below the fold to stop it auto-playing any time someone visited the blog main page.

(more…)

December 4, 2012

ITU approves Deep Packet Inspection requirement to enable government snooping of internet traffic

Filed under: Bureaucracy, Liberty, Media, Technology — Tags: , , , — Nicholas @ 10:59

The UN’s International Telecommunications Union continues its in-camera campaign to wrest control of the internet from all other organizations with a new policy designed to please intrusive and authoritarian governments worldwide:

The telecommunications standards arm of the U.N. has quietly endorsed the standardization of technologies that could give governments and companies the ability to sift through all of an Internet user’s traffic – including emails, banking transactions, and voice calls – without adequate privacy safeguards. The move suggests that some governments hope for a world where even encrypted communications may not be safe from prying eyes.

At the core of this development is the adoption of a proposed international standard that outlines requirements for a technology known as “Deep Packet Inspection” (DPI). As we’ve noted several times before, depending on how it is used, DPI has the potential to be extremely privacy-invasive, to defy user expectations, and to facilitate wiretapping.

[. . .]

The ITU-T DPI standard holds very little in reserve when it comes to privacy invasion. For example, the document optionally requires DPI systems to support inspection of encrypted traffic “in case of a local availability of the used encryption key(s).” It’s not entirely clear under what circumstances ISPs might have access to such keys, but in any event the very notion of decrypting the users’ traffic (quite possibly against their will) is antithetical to most norms, policies, and laws concerning privacy of communications. In discussing IPSec, an end-to-end encryption technology that obscures all traffic content, the document notes that “aspects related to application identification are for further study” – as if some future work may be dedicated to somehow breaking or circumventing IPSec.

Several global standards bodies, including the IETF and W3C, have launched initiatives to incorporate privacy considerations into their work. In fact, the IETF has long had a policy of not considering technical requirements for wiretapping in its work, taking the seemingly opposite approach to the ITU-T DPI document, as Germany pointed out in voicing its opposition to the ITU-T standard earlier this year. The ITU-T standard barely acknowledges that DPI has privacy implications, let alone does it provide a thorough analysis of how the potential privacy threats associated with the technology might be mitigated.

These aspects of the ITU-T Recommendation are troubling in light of calls from Russia and a number of Middle Eastern countries to make ITU-T Recommendations mandatory for Internet technology companies and network operators to build into their products. Mandatory standards are a bad idea even when they are well designed. Forcing the world’s technology companies to adopt standards developed in a body that fails to conduct rigorous privacy analysis could have dire global consequences for online trust and users’ rights.

December 3, 2012

We’re from the ITU and we’re here to “fix” your internet

Filed under: Bureaucracy, Liberty, Media, Technology — Tags: , , , , , — Nicholas @ 10:32

At Techdirt, Nick Masnick recounts some of the wonderful things the International Telecommunications Union would like to “help” regarding that pesky “internet” thing:

We’ve been talking about the ITU’s upcoming World Conference on International Telecommunications (WCIT) for a while now, and it’s no longer “upcoming.” Earlier today, the week and a half session kicked off in Dubai with plenty of expected controversy. The US, the EU and now Australia have all come out strongly against the ITU’s efforts to undermine the existing internet setup to favor authoritarian countries or state-controlled (or formerly state-controlled) telcos who want money for internet things they had nothing to do with. The BBC article above has a pretty good rundown of some of the scarier proposals being pitched behind closed doors at WCIT. Having the US, EU and Australia against these things is good, but the ITU works on a one-vote-per-country system, and plenty of other countries see this as a way to exert more control over the internet, in part to divert funds from elsewhere into their own coffers.

Hamadoun Toure, secretary-general of the ITU, keeps trying to claim that this is all about increasing internet access, but that’s difficult to square with reality:

    “The brutal truth is that the internet remains largely [the] rich world’s privilege, ” said Dr Hamadoun Toure, secretary-general of the UN’s International Telecommunications Union, ahead of the meeting.

    “ITU wants to change that.”

Of course, internet access has already been spreading to the far corners of the planet without any “help” from the ITU. Over two billion people are already online, representing about a third of the planet. And, yes, spreading that access further is a good goal, but the ITU is not the player to do it. The reason that the internet has been so successful and has already spread as far as it has, as fast as it has, is that it hasn’t been controlled by a bureaucratic government body in which only other governments could vote. Instead, it was built as an open interoperable system that anyone could help build out. It was built in a bottom up manner, mainly by engineers, not bureaucrats. Changing that now makes very little sense.

Canada is also on the record as being against the expansion of the ITU’s role.

Canada will look to prevent governments from taking more power over the Internet when governments sit down for 12 days of negotiations on the future of the Internet next week, but the government didn’t say Thursday where it stands on a contentious proposal that could see users pay more for online content.

Canada’s position going into the World Conference on International Telecommunications (WCIT) mirrors a number of Western allies in opposing having governments control how the Internet functions, leaving it to the current mix of public and private sector actors, according to documents released to Postmedia News under access to information laws. That stance is in contrast to proposals from some of the 193 members of the International Telecommunications Union, such as Russia, that want greater control over the Internet — more so than they already have in some cases — including more powers to track user identities online.

The meeting in Dubai will determine whether the ITU, an arm of the United Nations, will receive broad regulatory powers to set rules of road in cyberspace. The potential to centralize control over the Internet into the hands of governments has some users and hacktivists concerned that freedoms online would be crushed should a new binding international treaty change the status quo for how telecommunications companies interact across borders.

November 9, 2012

Solving the “tax haven problem” … with military intervention

Filed under: Economics, Europe, Government — Tags: , , , , , , , , — Nicholas @ 12:30

Radley Balko suggested that this is insanity. I agree, but as Dan Mitchell explains, it’s being bruited about by people who should know far, far better:

A former bureaucrat from the European Bank for Reconstruction and Development actually called for the forcible annexation of low-tax jurisdictions, writing in the Financial Times that, “Jersey, Guernsey and the Isle of Man should simply be absorbed lock, stock and barrel into the UK…Andorra, Monaco and Liechtenstein should be given the choice of ending bank secrecy or facing annexation.”

He wasn’t quite so belligerent about Switzerland, perhaps because all able-bodied male citizens have fully automatic assault weapons in their homes. But he did urge financial protectionism against the land of chocolate, yodeling, and watches.

What a bizarre attitude. It’s apparently okay for certain countries to persecute – or even kill – ethnic minorities, religious minorities, political dissidents, homosexuals, and other segments of their populations. Very rarely do people like Mr. Buiter call for annexation or sanctions against such loathsome regimes.

But if a nation has low taxes and a strong human rights policy on financial privacy, then cry havoc and let slip the dogs of war.

October 24, 2012

UN report says the internet is too vulnerable to terrorist use

Filed under: Liberty, Technology — Tags: , , , , — Nicholas @ 14:21

Mike Masnick views with alarm a new UN report that deserves to be viewed with alarm:

Ah, the UN. As highlighted by Declan McCullagh, a new report from the United Nations Counter-Terrorism Implementation Task Force, clocking in at an unwieldy 158 pages (pdf) warns that this old internet of ours is just too damn open, and that means terrorists can use it. Thus, it has to stop the openness. The report really is just about that bad: if terrorists might misuse it, it’s bad and must be stopped. The costs of locking up all this openness are brushed aside, if they’re even considered at all. Among the problems? How about open WiFi?

    ISPs may require users to provide identifying information prior to accessing Internet content and services. The collection and preservation of identifying information associated with Internet data, and the disclosure of such information, subject to the appropriate safeguards, could significantly assist investigative and prosecutorial proceedings. In particular, requiring registration for the use of Wi-Fi networks or cybercafes could provide an important data source for criminal investigations. While some countries, such as Egypt, have implemented legislation requiring ISPs to identify users before allowing them Internet access, similar measures may be undertaken by ISPs on a voluntary basis.

It seems like it should be a general rule that, if you’re supporting something that includes better surveillance tools by saying, “Hey, Egypt — the same country that recently had the people rise up to force out a dictator, who tried to shut down the internet — does it!” perhaps you don’t have a very good argument.

The report is basically one big “OMG! But… but… terrorists! Kill it!”

October 14, 2012

“I would hate to live in a world where every dumb ass thing I did from 13 to 30 would be captured forever for those who Googled my name”

Filed under: Liberty, Media, Technology — Tags: , , , , , — Nicholas @ 10:27

James Joyner on the phenomenon of internet privacy — and the growing reality that it’s pretty much an illusion.

In the first instance, a bad person is likely to have his real life — including his ability to make a living — upended by the conscious act of a reporter. In the second, two young people who did nothing more than join a school club had their biggest secret exposed by a well-meaning person who made the mistake of trusting Facebook, a data mining company that makes billions by getting people to give them their personal information.

[. . .]

I’ve been active online now since the mid-1990s and have, by virtue of this blog, been a very minor online public figure for almost a decade. For a variety of reasons, including the fact that my professional career is one that encourages writing and publishing, I’ve done virtually all of my online activity under my real life name. As such, I’ve long been aware that my family, friends, co-workers, bosses, and prospective employers might read everything that I put out there. That’s the safest way to operate online, in that it avoids the sort of disruptive surprises that Brutsch, Duncan, and McCormick received. But it also means, inevitably, that there’s a subtle filter that makes me more cautious than I might otherwise be. That’s likely both good and bad in my own case.

But I continue to worry about what it means for a younger generation, for whom Facebook and other social networks are part and parcel of their everyday existence from their teenage years forward. By the time the Internet was a public phenomenon, I was a grown man with a PhD. I would hate to live in a world where every dumb ass thing I did from 13 to 30 would be captured forever for those who Googled my name.

I have generally used my real name — or at least not tried to actively conceal my real identity — in most of my online activities. Some of this has been because there wasn’t a pressing reason to remain anonymous, but as in the writer’s case, it was a strong suspicion from the start that it would be difficult to maintain that degree of privacy over the long term (information wanting to be free, and all that).

« Newer PostsOlder Posts »

Powered by WordPress