The Loss of Online Anonymity
Anonymity is important to avoid providing an Achilles’ heel that can be wounded. The internet, however, preys on our vulnerability by placing us at the whim of government agency scrutiny, and much darker, predatory forces. At its least dangerous position, the internet subjects us to targeted advertising.
Whenever we like a post or article it is carefully monitored, along with our internet searches and so on, and information connected with our online actions is stored. Google, for one, has a database of who you email, who you chat to, etc. Facebook, in fact, is well known for having the most finely tuned advertising targeting system and has the largest advertisements network because of the extent of information it can gather about an individual based on his or her activity and profile.
Through Snowden we know that various internet firms such as Facebook, Google, Yahoo, etc were being used by the US National Security Agency (NSA) for mass surveillance. There is a regular undermining of technology with the disallowing of encryption. This means the government can tap into your communication without your knowledge or permission.
BeeGee says, ‘How do you defend yourself then? How do I remain the master of my universe, determining who I talk to and what I talk? We cannot keep secrets because the powers that be can gain access to them. A good example is Udta Punjab and the CBFC (Central Board of Film Certification). Where is the freedom with people not being allowed to talk about it online? So how do you share information online securely with freedom?’ There are ways of tracking down people even if they use multiple or fake accounts. Besides, Facebook has a strict policy on maintaining an authentic account.
BeeGee recommends the use of open source systems and software, calling proprietary software untrustworthy. The most precarious operating system is Windows, while Linux operating system is supposed to be one of the best and is open source. Mac OS is somewhere in between the two but more reliable than Microsoft Windows. It is far more difficult to write malware for Linux or Mac as compared to Microsoft Windows, which has an extremely weak OS. The weakness may be inherent or deliberate. There is also the fact that Windows is more widely used and is therefore more prone to hacker attacks. ‘It is important to invest in better tools and software,’ says BeeGee, a computer science engineer who was in town (at 6 Assagao) to share his knowledge in the least technical manner possible.
Preventing cookies from tracking your activity does help to some extent. Furthermore Google Chrome allows you to go incognito and you can use more than one profile (one for work while staying off Facebook, etc, and one for personal activity). However the loophole that exists here is that agencies can link your online activity if the user visits more than one website on a particular profile.
BeeGee warns that Whatsapp’s purported encryption of messages and calls may be nothing more than a PR exercise. The True Caller app keeps phone numbers it has tracked in its own database, and clicking on links of some of the apps on Facebook, especially the ones that have quizzes that give an estimate of your personality, etc, gives the apps access to your information unless you manually turn off permission. Malware may be attached to some of these apps and websites too.
BeeGee says, ‘There are so many companies that are just content farms and the goal is to convert human beings into ad units. It is sociology and psychology which are being used to generate algorithms to target specific people.’ The only real protection is awareness; educating oneself and sharing the knowledge as much as possible.
(Originally published in June 2016)
Comments
Post a Comment