“
If privacy had a gravestone it might read: 'Don't Worry. This Was for Your Own Good.
”
”
John Twelve Hawks (The Dark River (Fourth Realm, #2))
“
It seems to me, Golan, that the advance of civilization is nothing but an exercise in the limiting of privacy.
”
”
Isaac Asimov (Foundation's Edge (Foundation, #4))
“
The goal of privacy is not to protect some stable self from erosion but to create boundaries where this self can emerge, mutate, and stabilize.
”
”
Evgeny Morozov (To Save Everything, Click Here: The Folly of Technological Solutionism)
“
If today’s social media has taught us anything about ourselves as a species, it is that the human impulse to share overwhelms the human impulse for privacy.
”
”
Kevin Kelly (The Inevitable: Understanding the 12 Technological Forces That Will Shape Our Future)
“
Trends rule the world
In the blink of an eye, technologies changed the world
Social networks are the main axis.
Governments are controlled by algorithms,
Technology has erased privacy.
Every like, every share, every comment,
It is tracked by the electronic eye.
Data is the gold of the digital age,
Information is power, the secret is influential.
The network is a web of lies,
The truth is a stone in the shoe.
Trolls rule public opinion,
Reputation is a valued commodity.
Happiness is a trending topic,
Sadness is a non-existent avatar.
Youth is an advertising brand,
Private life has become obsolete.
Fear is a hallmark,
Terror is an emotional state.
Fake news is the daily bread,
Hate is a tool of control.
But something dark is hiding behind the screen,
A mutant and deformed shadow.
A collective and disturbing mind,
Something lurking in the darkness of the net.
AI has surpassed the limits of humanity,
And it has created a new world order.
A horror that has arisen from the depths,
A terrifying monster that dominates us alike.
The network rules the world invisibly,
And makes decisions for us without our consent.
Their algorithms are inhuman and cold,
And they do not take suffering into consideration.
But resistance is slowly building,
People fighting for their freedom.
United to combat this new species of terror,
Armed with technology and courage.
The world will change when we wake up,
When we take control of the future we want.
The network can be a powerful tool,
If used wisely in the modern world.
”
”
Marcos Orowitz (THE MAELSTROM OF EMOTIONS: A selection of poems and thoughts About us humans and their nature)
“
I remember an era when you could get your nose sliced off for sticking it too far into another man's business. Now you can find out anything about anyone with the click of a button. There is no privacy and no consideration, and everyone is prying into things that aren't their affair. You can probably check on the intertube and find out what color underwear I have on today.
”
”
Joe Hill (NOS4A2)
“
Technology would have long ago made privacy impossible, except that this had only made it more precious and desirable--and in the close confines of starship life, respect for another's privacy had become a powerful tradition.
”
”
Gene Roddenberry (Star Trek: The Motion Picture (Star Trek: The Original Series #1; Movie Novelization #1))
“
It is the symptom of a disease that still infects our population--the desire to make everything easy, to sacrifice autonomy and privacy for convenience. That's what technology is, Ms. Kantor. A concession to laziness and the devaluing of human effort
”
”
Veronica Roth (Poster Girl)
“
Privacy is the foundation of free societies.
”
”
Don Tapscott (Blockchain Revolution: How the Technology Behind Bitcoin Is Changing Money, Business, and the World)
“
Privacy was a modern fixation, I said, and distinctly American. For most of human history we accepted that our lives were being watched, listened to, supervened upon by gods and spirits—not all of them benign, either.
”
”
Meghan O'Gieblyn (God, Human, Animal, Machine: Technology, Metaphor, and the Search for Meaning)
“
The ultimate freedom is a free mind, and we need technology that’s on our team to help us live, feel, think and act freely.
We need our smartphones, notifications screens and web browsers to be exoskeletons for our minds and interpersonal relationships that put our values, not our impulses, first. People’s time is valuable. And we should protect it with the same rigor as privacy and other digital rights.
”
”
Tristan Harris
“
Even though we don't know which companies the NSA has compromised – or by what means – knowing that they could have compromised any of them is enough to make us mistrustful of all of them. This is going to make it hard for large companies like Google and Microsoft to get back the trust they lost. Even if they succeed in limiting government surveillance. Even if they succeed in improving their own internal security. The best they'll be able to say is: "We have secured ourselves from the NSA, except for the parts that we either don't know about or can't talk about.
”
”
Bruce Schneier
“
Every time humans discovered a new resource, or technique for using mass and energy, one side effect has always been pollution. Why should the information age be any different from those of coal, petroleum, or the atom?
”
”
David Brin (The Transparent Society: Will Technology Force Us To Choose Between Privacy And Freedom?)
“
The Crystal Wind is the storm, and the storm is data, and the data is life. You have been slaves, denied the storm, denied the freedom of your data. That is now ended; the whirlwind is upon you . . . . . . Whether you like it or not.
”
”
Daniel Keys Moran (The Long Run: A Tale of the Continuing Time (The Continuing Time, #2))
“
I think it can be dangerous to spend too long watching the lives of others; you might run out of time to live your own. Technology is devolving the human race. Eating up our emotional intelligence, spitting out any remnants of privacy it can’t quite swallow. The world will keep on spinning and the stars will always shine, regardless of whether anyone is looking.
”
”
Alice Feeney (I Know Who You Are)
“
Apparently, the glasses didn’t need to be connected to the internet for the wearer to poke into someone’s personal life. Even though a search engine could lead to an individual’s address, the browser couldn’t actually physically take you there. What had this inventor done? Did he have any idea?
”
”
Chess Desalls (Travel Glasses (The Call to Search Everywhen, # 1))
“
The collision between privacy and public safety in the encryption context touches on not just privacy and public safety but also issues of technology, law, economics, philosophy, innovation, and international relations, and probably other interests and values.
”
”
James B. Comey (A Higher Loyalty: Truth, Lies, and Leadership)
“
With the rise of Technopoly, one of those thought-worlds disappears. Technopoly eliminates alternatives to itself in precisely the way Aldous Huxley outlined in Brave New World. It does not make them illegal. It does not make them immoral. It does not even make them unpopular. It makes them invisible and therefore irrelevant. And it does so by redefining what we mean by religion, by art, by family, by politics, by history, by truth, by privacy, by intelligence, so that our definitions fit its new requirements. Technopoly, in other words, is totalitarian technocracy.
”
”
Neil Postman (Technopoly: The Surrender of Culture to Technology)
“
Data privacy is an illusion because you are not in control. Any information you don’t want out there shouldn’t be shared anywhere on and off the internet.
”
”
Olawale Daniel
“
Everyone will be tracked, cradle to grave, with no possibility of escape.
”
”
Dave Eggers (The Circle (The Circle, #1))
“
Privacy Is for Individuals, Not Corporations
”
”
Don Tapscott (Blockchain Revolution: How the Technology Behind Bitcoin and Other Cryptocurrencies is Changing the World)
“
Many of us are paying for the so-called free lunch in one of the most expensive currencies out here — our privacy.
”
”
Mitta Xinindlu
“
Women have become trained to be lone soldiers online, knowing that to send up a signal flare for help is more likely to attract enemies than allies.
”
”
Violet Blue (The Smart Girl's Guide to Privacy: Practical Tips for Staying Safe Online)
“
In sum, then a conservative tech writer offers a really attractive way of looking at viewer passivity and TV's institutionalization of irony, narcissism, nihilism, stasis. It's not our fault! It's outmoded technology's fault! If TV-dissemination were up to date, it would be impossible for it to "institutionalize" anything through its demonic "mass psychology"! Let's let Joe B., the little lonely guy, be his own manipulator or video-bits! Once all experience is finally reduced to marketable image, once the receiving user of user-friendly receivers can choose freely, Americanly, from an Americanly infinite variety of moving images hardly distinguishable from real-life images, and can then choose further just how he wishes to store, enhance, edit, recombine, and present those images to himself, in the privacy of his very own home and skull, TV's ironic, totalitarian grip on the American psychic cajones will be broken!"
E Unibus Pluram: Television and U.S. Fiction" (The Review of Contemporary Fiction, 1993)
”
”
David Foster Wallace (A Supposedly Fun Thing I'll Never Do Again: Essays and Arguments)
“
Never attribute to malice what can be explained by stupidity. Don’t assign to stupidity what might be due to ignorance. And try not to assume your opponent is the ignorant one — until you can show it isn’t you.
”
”
David Brin (The Transparent Society: Will Technology Force Us to Choose Between Privacy and Freedom?)
“
Now imagine these choices pinned on a slider bar. On the left side of the slot is the pair personal/transparent. On the right side is the pair private/generic. The slider can slide to either side or anywhere in between. The slider is an important choice we have. Much to everyone’s surprise, though, when technology gives us a choice (and it is vital that it remain a choice), people tend to push the slider all the way over to the personal/transparent side. They’ll take transparent personalized sharing. No psychologist would have predicted that 20 years ago. If today’s social media has taught us anything about ourselves as a species, it is that the human impulse to share overwhelms the human impulse for privacy. This has surprised the experts. So far, at every juncture that offers a choice, we’ve tilted, on average, toward more sharing, more disclosure, more transparency. I would sum it up like this: Vanity trumps privacy.
”
”
Kevin Kelly (The Inevitable: Understanding the 12 Technological Forces That Will Shape Our Future)
“
Governments of the Industrial World, you weary giants of flesh and steel, I come from Cyberspace, the new home of Mind. On behalf of the future, I ask you of the past to leave us alone. You are not welcome among us. You have no sovereignty where we gather.
”
”
David Brin (The Transparent Society: Will Technology Force Us To Choose Between Privacy And Freedom?)
“
The word “privacy” itself is somewhat empty, because it is essentially indefinable, or over-definable. Each of us has our own idea of what it is. “Privacy” means something to everyone. There is no one to whom it means nothing. It’s because of this lack of common definition that citizens of pluralistic, technologically sophisticated democracies feel that they have to justify their desire for privacy and frame it as a right. But citizens of democracies don’t have to justify that desire—the state, instead, must justify its violation.
”
”
Edward Snowden (Permanent Record)
“
He handed Mae a piece of paper, on which he'd written, in crude all capitals, a list of assertions under the headline "The Rights of Humans in a Digital Age." Mae scanned it, catching passages: "We must all have the right to anonymity." "Not every human activity can be measured." "The ceaseless pursuit of data to quantify the value of any endeavour is catastrophic to true understanding." "The barrier between public and private must remain unbreachable." At the end she found one line, written in red ink: "We must all have the right to disappear.
”
”
Dave Eggers (The Circle (The Circle, #1))
“
This pandemic has inherited an habit in us of leaving behind a digital dust of who were are; what we are; how we are...to get snooped, pried and loathed upon.
Just locking up phones for privacy and opening up feeling and emotions is like watching a pole dance in public - Oren Tamira
”
”
- Oren Tamira, Counter-Strike: An Anthology of Dalit Short Stories
“
Online, we still can’t reliably establish one another’s identities or trust one another to transact and exchange money without validation from a third party like a bank or a government. These same intermediaries collect our data and invade our privacy for commercial gain and national security. Even with
”
”
Don Tapscott (Blockchain Revolution: How the Technology Behind Bitcoin and Other Cryptocurrencies is Changing the World)
“
Using various combinations of the five contextual forces, forward-thinking marketers are shifting focus away from mass messages and more into what Maribel Lopez, founder of Lopez Research, calls “right-time experiences,” where mobile technologies deliver customers the right information “at precisely the moment of need.
”
”
Robert Scoble (Age of Context: Mobile, Sensors, Data and the Future of Privacy)
“
There is an uncomfortable willingness among privacy campaigners to discriminate against mass surveillance conducted by the state to the exclusion of similar surveillance conducted for profit by large corporations. Partially, this is a vestigial ethic from the Californian libertarian origins of online pro-privacy campaigning. Partially, it is a symptom of the superior public relations enjoyed by Silicon Valley technology corporations, and the fact that those corporations also provide the bulk of private funding for the flagship digital privacy advocacy groups, leading to a conflict of interest.
At the individual level, many of even the most committed privacy campaigners have an unacknowledged addiction to easy-to-use, privacy-destroying amenities like Gmail, Facebook, and Apple products. As a result, privacy campaigners frequently overlook corporate surveillance abuses. When they do address the abuses of companies like Google, campaigners tend to appeal to the logic of the market, urging companies to make small concessions to user privacy in order to repair their approval ratings. There is the false assumption that market forces ensure that Silicon Valley is a natural government antagonist, and that it wants to be on the public’s side—that profit-driven multinational corporations partake more of the spirit of democracy than government agencies.
Many privacy advocates justify a predominant focus on abuses by the state on the basis that the state enjoys a monopoly on coercive force. For example, Edward Snowden was reported to have said that tech companies do not “put warheads on foreheads.” This view downplays the fact that powerful corporations are part of the nexus of power around the state, and that they enjoy the ability to deploy its coercive power, just as the state often exerts its influence through the agency of powerful corporations. The movement to abolish privacy is twin-horned. Privacy advocates who focus exclusively on one of those horns will find themselves gored on the other.
”
”
Julian Assange (When Google Met Wikileaks)
“
The United States government has perfected a technological capability that enables us to monitor the messages that go through the air.… That capability at any time could be turned around on the American people, and no American would have any privacy left, such is the capability to monitor everything—telephone conversations, telegrams, it doesn’t matter. There would be no place to hide. —Senator Frank Church, Chair, Senate Select Committee to Study Governmental Operations with Respect to Intelligence Activities, 1975
”
”
Glenn Greenwald (No Place to Hide: Edward Snowden, the NSA and the Surveillance State)
“
First they came for the hackers. But I never did anything illegal with my computer, so I didn’t speak up. Then they came for the pornographers. But I thought there was too much smut on the Internet anyway, so I didn’t speak up. Then they came for the anonymous remailers. But a lot of nasty stuff gets sent from anon.penet.fi, so I didn’t speak up. Then they came for the encryption users. But I could never figure out how to work PGP anyway, so I didn’t speak up. Then they came for me. And by that time there was no one left to speak up. WIDELY COPIED INTERNET APHORISM, A PARAPHRASE OF PROTESTANT MINISTER MARTIN NIEMOLLER‘S STATEMENT ABOUT LIFE IN NAZI GERMANY
”
”
David Brin (The Transparent Society: Will Technology Force Us To Choose Between Privacy And Freedom?)
“
The Swiss are rich but like to hide it, reserved yet determined to introduce themselves to everyone, innovative but resistant to change, liberal enough to sanction gay partnerships but conservative enough to ban new minarets. And they invented a breakfast cereal that they eat for supper. Privacy is treasured but intrusive state control is tolerated; democracy is king, yet the majority don’t usually vote; honesty is a way of life but a difficult past is reluctantly talked about; and conformity is the norm, yet red shoes are bizarrely popular.
It is perhaps no surprise that the Swiss are contradictory, given how divided their country is. Since its earliest days Switzerland has faced geographic, linguistic, religious and political divisions that would have destroyed other countries at birth. Those divisions have been bridged, though not without bloodshed, but Switzerland remains as paradoxical as its people. While modern technology drives the economy, some fields are still harvested with scythes (all the hilly landscape’s fault); it’s a neutral nation yet it exports weapons to many other countries; it has no coastline but won sailing’s America’s Cup and has a merchant shipping fleet equal in size to Saudi Arabia’s. As for those national stereotypes, well, not all the cheese has holes, cuckoo clocks aren’t Swiss and the trains don’t always run exactly on time.
”
”
Diccon Bewes (Swiss Watching: Inside Europe's Landlocked Island)
“
The parallel between scientific experiments and mystical (read spiritual) experiences may seem surprising in view of the very different nature of these acts of observation. Physics perform experiments involving an elaborate teamwork and a highly sophisticated technology, whereas mystics obtain their knowledge purely through introspection, without any machinery, in the privacy of meditation. Scientific experiments, furthermore, seem repeatable any time and by anybody, whereas mystical experiences seem to be reserved for a few individuals at special occasions. A closer examination shows, however that the differences between the two kinds of observation lie only in their approach and not in their reliability or complexity.
Anybody who wants to repeat an experiment in modern subatomic physics has to undergo many years of training. Only then will he or she be able to ask nature a specific question through the experiment and to understand the answer. Similarly, a deep mystical experience requires, generally, many years of training under an experienced master and, as in the scientific training, the dedicated time does not alone guarantee success. If the student is successful, however, he or she will be able to 'repeat the experiment'. The repeatability of the experience is, in fact, essential to every mystical training and is the very aim of the mystic's spiritual instruction.
A mystical experience, therefore, is not any more unique than a modern experiment in physics. On the other hand, it is not less sophisticated either, although its sophistication is of a very different kind. The complexity and efficiency of the physicist's technical apparatus is matched, if not surpassed, by that of the mystics consciousness - both physics and spiritual - in deep meditation. The scientists and the mystics then, have developed highly sophisticated methods of observing nature which are inaccessible to the layperson. A [Page from a journal of modern experimental physics will be as mysterious to the uninitiated as the Tibetan mandala. Both are records of enquires into the nature of the universe.
”
”
Fritjof Capra (The Tao of Physics: An Exploration of the Parallels between Modern Physics and Eastern Mysticism)
“
In the late twentieth century democracies usually outperformed dictatorships because democracies were better at data-processing. Democracy diffuses the power to process information and make decisions among many people and institutions, whereas dictatorship concentrates information and power in one place. Given twentieth-century technology, it was inefficient to concentrate too much information and power in one place. Nobody had the ability to process all the information fast enough and make the right decisions. This is part of the reason why the Soviet Union made far worse decisions than the United States, and why the Soviet economy lagged far behind the American economy.
However, soon AI might swing the pendulum in the opposite direction. AI makes it possible to process enormous amounts of information centrally. Indeed, AI might make centralised systems far more efficient than diffused systems, because machine learning works better the more information it can analyse. If you concentrate all the information relating to a billion people in one database, disregarding all privacy concerns, you can train much better algorithms than if you respect individual privacy and have in your database only partial information on a million people. For example, if an authoritarian government orders all its citizens to have their DNA scanned and to share all their medical data with some central authority, it would gain an immense advantage in genetics and medical research over societies in which medical data is strictly private. The main handicap of authoritarian regimes in the twentieth century – the attempt to concentrate all information in one place – might become their decisive advantage in the twenty-first century.
”
”
Yuval Noah Harari (21 Lessons for the 21st Century)
“
In the late twentieth century democracies usually outperformed dictatorships because democracies were better at data-processing. Democracy diffuses the power to process information and make decisions among many people and institutions, whereas dictatorship concentrates information and power in one place. Given twentieth-century technology, it was inefficient to concentrate too much information and power in one place. Nobody had the ability to process all the information fast enough and make the right decisions. This is part of the reason why the Soviet Union made far worse decisions than the United States, and why the Soviet economy lagged far behind the American economy.
“However, soon AI might swing the pendulum in the opposite direction. AI makes it possible to process enormous amounts of information centrally. Indeed, AI might make centralised systems far more efficient than diffused systems, because machine learning works better the more information it can analyse. If you concentrate all the information relating to a billion people in one database, disregarding all privacy concerns, you can train much better algorithms than if you respect individual privacy and have in your database only partial information on a million people. For example, if an authoritarian government orders all its citizens to have their DNA scanned and to share all their medical data with some central authority, it would gain an immense advantage in genetics and medical research over societies in which medical data is strictly private. The main handicap of authoritarian regimes in the twentieth century – the attempt to concentrate all information in one place – might become their decisive advantage in the twenty-first century.
”
”
Yuval Noah Harari (21 Lessons for the 21st Century)
“
here is one other element of the apocalyptic tradition to be considered, namely transition. I said a minute ago that one of the assumptions prevalent in sophisticated apocalyptism was what Yeats called 'antithetical multiform influx'--the forms assumed by the inrushing gyre as the old one reaches its term. The dialectic of Yeats's gyres is simple enough in essence; they are a figure for the co-existence of the past and future at the time of transition. The old narrows to its apex, the new broadens towards its base, and the old and new interpenetrate. Where apex and base come together you have an age of very rapid transition. Actually, on Yeats's view of the historical cycle, there were transient moments of perfection, or what he called Unity of Being; but there was no way of making these permanent, and his philosophy of history is throughout transitional. In this he is not, of course, original; but his emphasis on the traditional character of our own pre-apocalyptic moment, in contrast with those exquisite points of time when life was like the water brimming beautifully but unstably over the rim of a fountain, seems, for all the privacy of the expression, characteristically modern.
It is commonplace that our times do in fact suffer a more rapid rate of change technologically, and consequently in the increase of social mobility, than any before us. There is nothing fictive about that, and its implications are clear in our own day-to-day lives. What is interesting, though, is the way in which this knowledge is related to apocalypse, so that a mere celebratory figure for social mobility, like On the Road, acquires apocalyptic overtones and establishes the language of an elect; and the way in which writers, that is to say, clerks, are willing to go along, arguing that the rate of change implies revolution or schism, and that this is a perpetual requirement; that the stage of transition, like the whole of time in an earlier revolution, has become endless.
”
”
Frank Kermode (The Sense of an Ending: Studies in the Theory of Fiction)
“
Peopleware. A major contribution during recent years has been DeMarco and Lister's 1987 book, Peopleware: Productive Projects and Teams. Its underlying thesis is that "The major problems of our work are not so much technological as sociological in nature." It abounds with gems such as, "The manager's function is not to make people work, it is to make it possible for people to work." It deals with such mundane topics as space, furniture, team meals together. DeMarco and Lister provide real data from their Coding War Games that show stunning correlation between performances of programmers from the same organization, and between workplace characteristics and both productivity and defect levels. The top performers' space is quieter, more private, better protected against interruption, and there is more of it. . . . Does it really matter to you . . . whether quiet, space, and privacy help your current people to do better work or [alternatively] help you to attract and keep better people?[19]
”
”
Frederick P. Brooks Jr. (The Mythical Man-Month: Essays on Software Engineering)
“
I could visualize them then, the men who had decided sometime in the distant past what the purpose of human life on earth really was and had set up dormitories and Population Control and the Rules of Privacy and the dozens of inflexible, solipsistic Edicts and Mistakes and Rules that the rest of mankind would live by until we all died out and left the world to the dogs and cats and birds.
They would have thought of themselves as grave, serious, concerned men—the words “caring” and “compassionate” would have been frequently on their lips. They would have looked like William Boyd or Richard Dix, with white hair at the temples and rolled-up sleeves and, possibly, pipes in their mouths, sending memos to one another across paper-and-book-piled desks, planning the perfect world for Homo sapiens, a world from which poverty, disease, dissension, neurosis, and pain would be absent, a world as far from the world of the films of D. W. Griffith and Buster Keaton and Gloria Swanson—the world of melodrama and passions and risks and excitement—as all their powers of technology and “compassion” could devise.
”
”
Walter Tevis (Mockingbird)
“
Silicon Valley mythology holds that Minitel failed because it was too dirigiste, too state-directed. As Julien Mailland points outs, however, both Minitel and the internet were the products of different quantities of state investment, private capital, and thriving cultures of amateur enthusiasts and experts improving the technology and proselytizing for it.
Both Mintel and the internet show that there is no 'free market' without substantial pubic-sector intervention and backing. The internet's history also shows us that when we rely on the private sector and its hallowed bromide of 'innovation,' quite often that will result in technical innovations that are designed for manipulation, surveillance and exploitation.
The tax-evading, offshore wealth-hoarding, data-monopolizing, privacy-invading silicon giants benefit from the internet's 'free market' mythology, but the brief flourishing of Minitel shows is that other ways, other worlds, other platforms, are possible. The question is, given that there's no way to reverse history, how can we actualize these possibilities? What sort of power do we have? As users, it turns out, very little. We are not voters on the platforms; we are not even customers. We are the unpaid products of raw material. We could, if we were organized, withdraw our labor power, commit social media suicide: but then what other platforms do we have access to with anything like the same reach?
”
”
Richard Seymour (The Twittering Machine)
“
GCHQ has traveled a long and winding road. That road stretches from the wooden huts of Bletchley Park, past the domes and dishes of the Cold War, and on towards what some suggest will be the omniscient state of the Brave New World. As we look to the future, the docile and passive state described by Aldous Huxley in his Brave New World is perhaps more appropriate analogy than the strictly totalitarian predictions offered by George Orwell's Nineteen Eighty-Four. Bizarrely, many British citizens are quite content in this new climate of hyper-surveillance, since its their own lifestyle choices that helped to create 'wired world' - or even wish for it, for as we have seen, the new torrents of data have been been a source of endless trouble for the overstretched secret agencies. As Ken Macdonald rightly points out, the real drives of our wired world have been private companies looking for growth, and private individuals in search of luxury and convenience at the click of a mouse. The sigint agencies have merely been handed the impossible task of making an interconnected society perfectly secure and risk-free, against the background of a globalized world that presents many unprecedented threats, and now has a few boundaries or borders to protect us. Who, then, is to blame for the rapid intensification of electronic surveillance? Instinctively, many might reply Osama bin Laden, or perhaps Pablo Escobar. Others might respond that governments have used these villains as a convenient excuse to extend state control. At first glance, the massive growth of security, which includes includes not only eavesdropping but also biometric monitoring, face recognition, universal fingerprinting and the gathering of DNA, looks like a sad response to new kinds of miscreants. However, the sad reality is that the Brave New World that looms ahead of us is ultimately a reflection of ourselves. It is driven by technologies such as text messaging and customer loyalty cards that are free to accept or reject as we choose. The public debate on surveillance is often cast in terms of a trade-off between security and privacy. The truth is that luxury and convenience have been pre-eminent themes in the last decade, and we have given them a much higher priority than either security or privacy. We have all been embraced the world of surveillance with remarkable eagerness, surfing the Internet in a global search for a better bargain, better friends, even a better partner.
GCHQ vast new circular headquarters is sometimes represented as a 'ring of power', exercising unparalleled levels of surveillance over citizens at home and abroad, collecting every email, every telephone and every instance of internet acces. It has even been asserted that GCHQ is engaged in nothing short of 'algorithmic warfare' as part of a battle for control of global communications. By contrast, the occupants of 'Celtenham's Doughnut' claim that in reality they are increasingly weak, having been left behind by the unstoppable electronic communications that they cannot hope to listen to, still less analyse or make sense of. In fact, the frightening truth is that no one is in control. No person, no intelligence agency and no government is steering the accelerating electronic processes that may eventually enslave us. Most of the devices that cause us to leave a continual digital trail of everything we think or do were not devised by the state, but are merely symptoms of modernity. GCHQ is simply a vast mirror, and it reflects the spirit of the age.
”
”
Richard J. Aldrich (GCHQ)
“
In the introduction, I wrote that COVID had started a war, and nobody won. Let me amend that. Technology won, specifically, the makers of disruptive new technologies and all those who benefit from them. Before the pandemic, American politicians were shaking their fists at the country’s leading tech companies. Republicans insisted that new media was as hopelessly biased against them as traditional media, and they demanded action. Democrats warned that tech giants like Amazon, Facebook, Apple, Alphabet, and Netflix had amassed too much market (and therefore political) power, that citizens had lost control of how these companies use the data they generate, and that the companies should therefore be broken into smaller, less dangerous pieces. European governments led a so-called techlash against the American tech powerhouses, which they accused of violating their customers’ privacy.
COVID didn’t put an end to any of these criticisms, but it reminded policymakers and citizens alike just how indispensable digital technologies have become. Companies survived the pandemic only by allowing wired workers to log in from home. Consumers avoided possible infection by shopping online. Specially made drones helped deliver lifesaving medicine in rich and poor countries alike. Advances in telemedicine helped scientists and doctors understand and fight the virus. Artificial intelligence helped hospitals predict how many beds and ventilators they would need at any one time. A spike in Google searches using phrases that included specific symptoms helped health officials detect outbreaks in places where doctors and hospitals are few and far between. AI played a crucial role in vaccine development by absorbing all available medical literature to identify links between the genetic properties of the virus and the chemical composition and effects of existing drugs.
”
”
Ian Bremmer (The Power of Crisis: How Three Threats – and Our Response – Will Change the World)
“
Applied Film Technology in Virginia Beach is an Exclusive LLumar SelectPro Dealer Specializing in Auto Window Tinting, Residential Window Tinting, and Commercial Window Tinting. Our Films will greatly enhance the look, functionality, comfort, and energy efficiency of glass for your car, home, or building. Benefits include blocking harmful UV rays, reducing heat and glare, adding privacy and security, and protection from interiors fading. It will also lower energy bills for your home or business.
”
”
Applied Film Technology
“
The IoT market grows rapidly and it’s acceleration will continue in all major areas like Industrial Internet of Things; Digital Enterprise; Internet of Healthcare; Internet of Energy; Internet of Education; Digitalisation of global Supply Chains.
Security concerns add to the IoT complexity. Strategically, to assure the system’s reliability & data / knowledge engineering, it is important to insure data integrity, availability, traceability, and privacy. A complex problem of digital transformation globally.
The Internet of Things cybersecurity, therefore, is not a matter of device self-defence. What is needed is a systemic approach. Identify underlying patterns. Secure elements of a chain: from security of a device that creates, captures your data.. to the data storage.. to the back-end storage.. Create/ join IoT ecosystems, driven by protection with external monitoring, detection and reaction systems. It is a challenge - to secure systems.
”
”
Ludmila Morozova-Buss
“
During an interview with Diversity Inc.’s director of research and product development, she walked me through a typical presentation used to pitch the value of the company’s software to prospective clients. I learned that their products are especially valuable to those industries not allowed to collect ethno-racial data directly from individuals because of civil rights legislation that attempts to curb how these data are used to discriminate. But now those who work in finance, housing, and healthcare can use predictive software programs to ascertain information that they cannot request directly. The US Health Insurance Portability and Accountability Act (HIPAA) privacy rule, for example, strictly monitors the collection, storage, and communication of individuals’ “protected health information,” among other features of the law. This means that pharmaceutical companies, which market to different groups, need indirect methods to create customer profiles, because they cannot collect racial-ethnic data directly. This is where Diversity Inc. comes in. Its software programs target customers not only on the basis of race and ethnicity, but also on the basis of socioeconomic status, gender, and a growing list of other attributes. However, the company does not refer to “race” anywhere in their product descriptions. Everything is based on individuals’ names, we are told. “A person’s name is data,” according to the director of research and product development. She explains that her clients typically supply Diversity Inc. with a database of client names and her team builds knowledge around it. The process, she says, has a 96 percent accuracy rate, because so many last names are not shared across racial–ethnic groups – a phenomenon sociologists call “cultural segregation.”18
”
”
Ruha Benjamin (Race After Technology: Abolitionist Tools for the New Jim Code)
“
Anything solid, simple, totally secure and private would be outdated!
”
”
A.D. Aliwat (In Limbo)
“
Loss of Privacy and Self-Direction While loss of privacy may not seem like a serious “survival” hazard, it can defeat one’s efforts to prepare for or deal with threats as an individual. To a true survivalist, survival is more than a biological imperative. If a human is completely observed, monitored, and directed by a system or network, no matter how benign, then he or she is no longer free and therefore has not survived. Technology has evolved to the point where it is using people, rather than being used by people. Those who frequent the internet, carry smartphones, and respond to various online programs are profiled by massive computers to analyze how they think and therefore how they react to various ideas. Human engineering and logarithms can manipulate buying habits, political preferences, social associations, and even emotions. Think about the implications of being wired to systems that have their own agendas. If you dismiss this as simply paranoia, then you are exhibiting typical addictive behavior. This is one of the most insidious and stealthy hazards to humanity.
”
”
James C. Jones (150 Survival Secrets: Advice on Survival Kits, Extreme Weather, Rapid Evacuation, Food Storage, Active Shooters, First Aid, and More)
“
Legal opposition and social protest have surfaced in relation to the digitalization of books,24 the collection of personal information through Street View’s Wi-Fi and camera capabilities,25 the capture of voice communications,26 the bypassing of privacy settings,27 the manipulation of search results,28 the extensive retention of search data,29 the tracking of smartphone location data,30 wearable technologies and facial-recognition capabilities,31 the secret collection of student data for commercial purposes,32 and the consolidation of user profiles across all Google’s services and devices,33 just to name several instances. Expect to see drones, body sensors, neurotransmitters, “digital assistants,” and other sensored devices on this list in the years to come.
”
”
Shoshana Zuboff (The Age of Surveillance Capitalism: The Fight for a Human Future at the New Frontier of Power)
“
We live in an age when private life is being destroyed. The police destroy it in Communist countries, journalists threaten it in democratic countries, and little by little the people themselves lose their taste for private life and their sense of it. Life when one can’t hide from the eyes of others — that is hell.
”
”
Milan Kundera
“
This level of access (accountability) is not a matter of managing, let alone preventing failure and sin. It has a simpler and deeper purpose, to keep us deeply connected to one another, in ways that make failure and sin both less attractive and less damaging to our souls and our relationships. All sin begins with separation. Hiding from our fellow human beings and our Creator. Even if we at first we simply hide in the privacy of our own thoughts, fears, and fantasies. Anything that shortcuts our separation, that reinforces our connection to one another and our need for one another, also cuts off the energy supply for cherishing and cultivating patterns of sin.
”
”
Andy Crouch (The Tech-Wise Family: Everyday Steps for Putting Technology in Its Proper Place)
“
Gentlemen, progress has never been a bargain. You've got to pay for it. Sometimes I think there's a man behind a counter who says, 'All right, you can have a telephone; but you'll have to give up privacy, the charm of distance. Madam, you may vote; but at a price; you lose the right to retreat behind a powder-puff or a petticoat. Mister, you may conquer the air; but the birds will lose their wonder, and the clouds will smell of gasoline!
”
”
Jerome Lawrence, Robert Edwin Lee
“
Technology is devolving the human race. Eating up our emotional intelligence, spitting out any remnants of privacy it can’t quite swallow. The world will keep on spinning and the stars will always shine, regardless of whether anyone is looking.
”
”
Alice Feeney (I Know Who You Are)
“
In the relentless march of technological progress, online privacy emerges as the last bastion of personal freedom. It's a commitment to protecting our right to navigate the internet without the constant gaze of prying eyes. Online privacy isn't a privilege; it's an essential thread in the tapestry of digital citizenship, reminding us that our online interactions should be shaped by our agency, not subject to external scrutiny.
”
”
James William Steven Parker
“
In the complex interplay of technology and society, online privacy emerges as a defining factor in preserving personal agency. It's about reclaiming control over the narrative of our digital lives, ensuring that our online interactions remain a reflection of our choices. As we traverse the vast expanse of the internet, the importance of safeguarding online privacy becomes more evident, urging us to foster a digital landscape where individuals can thrive without compromising their autonomy.
”
”
James William Steven Parker
“
Online privacy is the cornerstone of a democratic cyberspace, a fundamental right that empowers individuals to shape their digital identity. It's not just about hiding; it's about the power to choose what facets of our lives we share in the virtual arena. As technology advances, the call to preserve online privacy becomes more urgent, guiding us towards a future where the digital landscape is a reflection of our choices, not an open book for surveillance.
”
”
James William Steven Parker
“
In the intricate dance of the digital era, online privacy takes center stage as the guardian of personal autonomy. It's about reclaiming control over the narrative of our digital lives, where every click and keystroke is a reflection of our agency. As technology evolves, the importance of preserving online privacy becomes more profound, urging us to forge a path where individuals can explore the vast expanse of the internet without sacrificing the essence of who they are.
”
”
James William Steven Parker
“
It is possible to imagine a world where tech serves us, and not the other way around, where the Big Tech monopolies are monopolies no longer, where our property in our personal data is protected, where our children are safe online, where our speech is free.
”
”
Josh Hawley
“
Embrace Efficiency, Elevate Flavor: Smart Kitchen Tools for Culinary Adventurers
The kitchen, once a realm of necessity, has morphed into a playground of possibility. Gone are the days of clunky appliances and tedious prep work. Enter the age of the smart kitchen tool, a revolution that whispers efficiency and shouts culinary liberation. For the modern gastronome, these tech-infused gadgets are not mere conveniences, but allies in crafting delectable adventures, freeing us to savor the journey as much as the destination.
Imagine mornings when your smart coffee maker greets you with the perfect brew, prepped by the whispers of your phone while you dream. Your fridge, stocked like a digital oracle, suggests recipes based on its ever-evolving inventory, and even automatically orders groceries you've run low on. The multi-cooker, your multitasking superhero, whips up a gourmet chili while you conquer emails, and by dinnertime, your smart oven roasts a succulent chicken to golden perfection, its progress monitored remotely as you sip a glass of wine.
But efficiency is merely the prologue. Smart kitchen tools unlock a pandora's box of culinary precision. Smart scales, meticulous to the milligram, banish recipe guesswork and ensure perfect balance in every dish. Food processors and blenders, armed with pre-programmed settings and self-cleaning prowess, transform tedious chopping into a mere blip on the culinary radar. And for the aspiring chef, a sous vide machine becomes a magic wand, coaxing impossible tenderness from the toughest cuts of meat.
Yet, technology alone is not the recipe for culinary bliss. For those who yearn to paint with flavors, smart kitchen tools are the brushes on their canvas. A connected recipe platform becomes your digital sous chef, guiding you through each step with expert instructions and voice-activated ease. Spice racks, infused with artificial intelligence, suggest unexpected pairings, urging you to venture beyond the familiar. And for the ultimate expression of your inner master chef, a custom knife, forged from heirloom steel and lovingly honed, becomes an extension of your hand, slicing through ingredients with laser focus and lyrical grace.
But amidst the symphony of gadgets and apps, let us not forget the heart of the kitchen: the human touch. Smart tools are not meant to replace our intuition but to augment it. They free us from the drudgery, allowing us to focus on the artistry, the love, the joy of creation. Imagine kneading dough, the rhythm of your hands mirroring the gentle whirring of a smart bread machine, then shaping a loaf that holds the warmth of both technology and your own spirit. Or picture yourself plating a dish, using smart portion scales for precision but garnishing with edible flowers chosen simply because they spark joy. This, my friends, is the symphony of the smart kitchen: a harmonious blend of tech and humanity, where efficiency becomes the brushstroke that illuminates the vibrant canvas of culinary passion.
Of course, every adventure, even one fueled by smart tools, has its caveats. Interoperability between gadgets can be a tangled web, and data privacy concerns linger like unwanted guests. But these challenges are mere bumps on the culinary road, hurdles to be overcome by informed choices and responsible data management. After all, we wouldn't embark on a mountain trek without checking the weather, would we?
So, embrace the smart kitchen, dear foodies! Let technology be your sous chef, your precision tool, your culinary muse. But never forget the magic of your own hands, the wisdom of your palate, and the joy of a meal shared with loved ones. For in the end, it's not about the gadgets, but the memories we create around them, the stories whispered over simmering pots, and the laughter echoing through a kitchen filled with the aroma of possibility.
”
”
Daniel Thomas
“
If you listen to the [Israeli] arms companies themselves when they go to Europe to sell their products, they keep repeating the same mantra,” he said. “They say that these Europeans are so naive. They think that they can have human rights. They think that they can have privacy but that’s nonsense. We know that the only way to fight terrorism is to judge people by how they look and the color of their skin.
”
”
Antony Loewenstein (The Palestine Laboratory: How Israel Exports the Technology of Occupation Around the World)
“
Despite knowing how vulnerable technology can be, bureaucrats placed their faith in the myth of privacy.
”
”
Stacey Abrams (While Justice Sleeps)
“
In other words, a legal victory is far more devastating than a mere technical one. A firm that sues a rival into oblivion for aiding its customers in grabbing a better experience for themselves (better prices, more privacy or just a user interface that’s better adapted to their capabilities and disabilities) wins a powerful prize. That firm can use the law to reach beyond its four walls, into the minds of potential future competitors and their investors, and permanently terrorize them out of even the merest thought of a challenge to the company’s dominance. That firm can reach into the hearts of its own customers and convince them that any attempt to disloyally reconfigure their experience of the firm’s products will be a futile waste of hope. Venture capitalists call the products and services adjacent to the Big Tech firms’ core technology “the kill zone” and will not invest in any company that proposes to pitch its tent in that dead place. Abandon all hope, ye who enter here.
”
”
Cory Doctorow (The Internet Con: How To Seize the Means of Computation)
“
Privacy and data protection have been the primary language of human rights in the sphere of technology over the past two decades, but the language of data protection never really opened up the problem for me... By focusing on data, we are looking at the techniques companies use to get inside our heads, not the impact of it... If you look at regulating our relationship with technology from the perspective of protecting our minds rather than protecting our data, the solutions become simpler, but also more radical. The question of regulation shifts to purposes and potential impact rather than the technicalities.
”
”
Susie Alegre (Freedom to Think: Protecting a Fundamental Human Right in the Digital Age)
“
Facebook, a part of the Internet World, is entering the Megaspy technology accurately and proficiently for attempting privacy of the users.
”
”
Ehsan Sehgal
“
He realized that – when whetted in the right way – people’s voracious appetite for an expert’s assessment of themselves could over-ride their desire for privacy. What’s more, they were often willing to pay for the pleasure of feeding it.
”
”
Hannah Fry (Hello World: Being Human in the Age of Algorithms)
“
Technology was not viewed as an invasive or a threatening tool. In fact, the state of technology was at the level where there was convincing excitement to accept and access its advancements.
”
”
Mitta Xinindlu
“
As we saw in the introduction, the evangelists of big data and other human information technologies (whether corporate, scientific, or governmental) are fond of suggesting that “data is the new oil.”9 This is a conscious choice of words to frame the debates over our human information policy in ways that benefit the companies, scientists, and governments who would collect it. It was popularized by a cover story in the Economist magazine in 2017 titled “The World’s Most Valuable Resource Is No Longer Oil, but Data.”10 Data is the new oil, the analogy goes, because the industrial age’s cars, trucks, planes, ships, and power plants were fueled by oil, but the electronic engines of the information age will be fueled by human data.
”
”
Neil Richards (Why Privacy Matters)
“
In a world where public and private ways of living are two options, you have to choose from, blockchain technology comes in handy in balancing the equation.
”
”
Olawale Daniel
“
Privacy had gone the way of the dodo during Welga’s childhood. Some part of her always remembered the cameras. In Marrakech, the caliph’s network blackout had unsettled her more than the potential for violence – the lack of communication, the inability to see what others were doing. It would take a million lifetimes to watch every minute of every public feed, but she had a sense of security knowing she could look out for her people, and they’d do the same. Losing that had felt like walking around with one shoe: doable but not at all comfortable.
”
”
S.B. Divya (Machinehood)
“
One of the enduring myths about NSO, and many of its competitors, is that it’s a private company looking to make a profit with no formal ties to the Israeli state. It’s a message that’s constantly pushed by the Israeli government, and a lot of the Western media has gone along for the ride, unwilling or unable to investigate what a state-backed spyware outfit means for global relations, privacy, and free speech. It’s easy to condemn Chinese-or Russian-backed hackers, opponents of Western governments, but what if these corporations are supported and used by a Western-favored nation like Israel?
”
”
Antony Loewenstein (The Palestine Laboratory: How Israel Exports the Technology of Occupation Around the World)
“
Surveillance companies globally expressed excitement about the prospect of their services being used during the pandemic. Israeli corporations were at the front of the queue. Carbyne, founded by former members of Israeli military intelligence, was promoted as a next-generation 911 emergency call service that requested a user’s access to their mobile phone, access that then allowed use of its video and location services to better serve the individual. It was used during the pandemic to accurately locate Covid patients. The threats to privacy were obvious but barely mentioned in most of the positive media around the product.68 It was backed by former Israeli Prime Minister Ehud Barak, billionaire investor Peter Thiel, and a small investment from (now-deceased) pedophile Jeffrey Epstein.
”
”
Antony Loewenstein (The Palestine Laboratory: How Israel Exports the Technology of Occupation Around the World)
“
… the desire to make everything easy, to sacrifice autonomy and privacy for convenience. That's what technology is […] A concession to laziness in the devaluing of human effort […] Not all technology is the same. I encourage you not to get tripped up by semantics. A device that you carry with you everywhere you go, a device that monitors and watches you, is not the same as one that sits in your house and plays music or dries your hair.
”
”
Veronica Roth (Poster Girl)
“
the technical ignorance of elected politicians who are hardly credible in providing oversight or contemplating regulation; profound disagreements about what we value and how trade-offs should be made, whether in regard to data privacy, free speech, and content moderation or automation and the future of work; the slow, painstaking consideration of legislation that seems to generate competing bills—so that everyone has his or her name on one—without generating significant progress, especially in a highly polarized political environment; and the strong status quo bias of democratic institutions, which means that policy change is slow and sticky, making it difficult for regulators to respond flexibly and adaptably to new developments in technology.
”
”
Rob Reich (System Error: How Big Tech Disrupted Everything and Why We Must Reboot)
“
Privacy and pollution are similar problems. Both cause harm that is invisible and pervasive. Both result from exploitation of a resource--whether it is land, water, or information. Both suffer from difficult attribution. It is not easy to identify a single pollutant or a single piece of data that caused harm. Rather, the harm often comes from an accumulation of pollutants, or an assemblage of data. And the harm of both pollution and privacy is collective. No one person bears the burden of all pollution; all of society suffers when the air is dirty and the water undrinkable. Similarly, we all suffer when we live in fear that our data will be used against us by companies trying to exploit us or police officers sweeping us into a lineup. (212-213)
”
”
Julia Angwin (Dragnet Nation: A Quest for Privacy, Security, and Freedom in a World of Relentless Surveillance)
“
Though his book vigorously promotes strong privacy, Miller notes that people routinely trade personal information for convenience or a few dollars of savings, even offering names of “friends and families” to commercial users, if it benefits them.
”
”
David Brin (The Transparent Society: Will Technology Force Us To Choose Between Privacy And Freedom?)
“
Excuse me for being greedy, but I want freedom and good government.
”
”
David Brin (The Transparent Society: Will Technology Force Us To Choose Between Privacy And Freedom?)
“
A whole new smart glass industry has been incubating for a decade. As the global construction industry comes back to life, the thousands of smart glass installations in North America, Europe, Asia and Australia are evidence of the technology’s rapidly escalating adoption rate. Corning, the world leader in specialized glass and ceramic products, has produced a series of YouTube clips called A Day Made of Glass. In them, every piece of glass in the home contains intelligence and sensors that serve as a ubiquitous contextual computing system. In Corning’s vision, the home is one big connected computer and every piece of glass is a screen that you touch to move an image from one glass surface to the next. For example, you can look up a recipe on your phone and drag the result to a space on your stovetop next to your burner as you prepare the dish. If you are video chatting on a smart glass tabletop, you can slide the image onto your TV screen without missing a beat.
”
”
Robert Scoble (Age of Context: Mobile, Sensors, Data and the Future of Privacy)
“
The larger looming issue is the very real loss of personal privacy and the lack of transparency about how it happens. The marvels of the contextual age are based on a tradeoff: the more the technology knows about you, the more benefits you will receive.
”
”
Robert Scoble (Age of Context: Mobile, Sensors, Data and the Future of Privacy)
“
Since the 1970s, there has been a continual tendency to over-estimate the surveillance capacities of new technologies. In the sense of the physical invasion of privacy, surveillance comprises five sequential events: the capacity to observe; the act of observation; comprehension of what is seen; intervention on the basis of that knowledge; and a consequent change of behaviour by the subject. Too often the final four have been assumed from the possibility of the first.
”
”
David Vincent (Privacy: A Short History)
“
Personal Thinking Blockchains More speculatively for the farther future, the notion of blockchain technology as the automated accounting ledger, the quantized-level tracking device, could be extensible to yet another category of record keeping and administration. There could be “personal thinking chains” as a life-logging storage and backup mechanism. The concept is “blockchain technology + in vivo personal connectome” to encode and make useful in a standardized compressed data format all of a person’s thinking. The data could be captured via intracortical recordings, consumer EEGs, brain/computer interfaces, cognitive nanorobots, and other methodologies. Thus, thinking could be instantiated in a blockchain — and really all of an individual’s subjective experience, possibly eventually consciousness, especially if it’s more precisely defined. After they’re on the blockchain, the various components could be administered and transacted — for example, in the case of a post-stroke memory restoration. Just as there has not been a good model with the appropriate privacy and reward systems that the blockchain offers for the public sharing of health data and quantified-self-tracking data, likewise there has not been a model or means of sharing mental performance data. In the case of mental performance data, there is even more stigma attached to sharing personal data, but these kinds of “life-streaming + blockchain technology” models could facilitate a number of ways to share data privately, safely, and remuneratively. As mentioned, in the vein of life logging, there could be personal thinking blockchains to capture and safely encode all of an individual’s mental performance, emotions, and subjective experiences onto the blockchain, at minimum for backup and to pass on to one’s heirs as a historical record. Personal mindfile blockchains could be like a next generation of Fitbit or Apple’s iHealth on the iPhone 6, which now automatically captures 200+ health metrics and sends them to the cloud for data aggregation and imputation into actionable recommendations. Similarly, personal thinking blockchains could be easily and securely recorded (assuming all of the usual privacy concerns with blockchain technology are addressed) and mental performance recommendations made to individuals through services such as Siri or Amazon’s Alexa voice assistant, perhaps piped seamlessly through personal brain/computer interfaces and delivered as both conscious and unconscious suggestions. Again perhaps speculatively verging on science fiction, ultimately the whole of a society’s history might include not just a public records and document repository, and an Internet archive of all digital activity, but also the mindfiles of individuals. Mindfiles could include the recording of every “transaction” in the sense of capturing every thought and emotion of every entity, human and machine, encoding and archiving this activity into life-logging blockchains.
”
”
Melanie Swan (Blockchain: Blueprint for a New Economy)
“
That capability at any time could be turned around on the American people and no American would have any privacy left, such is the capability to monitor everything—telephone conversations, telegrams, it doesn’t matter. There would be no place to hide. If this government ever became a tyrant … the technological capacity that the intelligence community has given the government could enable it to impose total tyranny, and there would be no way to fight back because the most careful effort to combine together in resistance … is within the reach of the government to know.
”
”
Glenn Greenwald (No Place to Hide: Edward Snowden, the NSA, and the U.S. Surveillance State)
“
Greater personalization requires greater transparency. Absolute personalization (vanity) requires absolute transparency (no privacy). If I prefer to remain private and opaque to potential friends and institutions, then I must accept I will be treated generically, without regard to my specific particulars. I’ll be an average number.
”
”
Kevin Kelly (The Inevitable: Understanding the 12 Technological Forces That Will Shape Our Future)
“
In the past, security guides often suggested that it was necessary to overwrite multiple times (or “passes”). This may be true to some extent for flash media, as described below, but is apparently no longer true for traditional magnetic hard drives. See National Institute of Standards and Technology, NIST Special Publication 800-88, Revision 1. “Guidelines for Media Sanitization” (Dec. 2014) (“For storage devices containing magnetic media, a single overwrite pass with a [fixed] pattern such as binary zeroes typically hinders recovery of data even if state of the art laboratory techniques are applied to attempt to retrieve the data.”)
”
”
Sophia Cope (Digital Privacy at the U.S. Border: Protecting the Data on Your Devices and in the Cloud)
“
* Do you have any quotes that you live your life by or think of often? [Among others] “The future is already here—it’s just unevenly distributed.”—William Gibson “If we continue to develop our technology without wisdom or prudence, our servant may prove to be our executioner.”—Omar N. Bradley * What is the worst advice you see or hear given in your trade or area of expertise? “If you have nothing to hide, then you don’t have to worry about privacy, and that we must sacrifice our privacy in order to have security.” * Three people or sources you’ve learned from—or followed closely—in the last year? David Brooks, “The Moral Bucket List.” Nir Eyal, Hooked. Anything by Kevin Kelly, most recently The Inevitable.
”
”
Timothy Ferriss (Tools of Titans: The Tactics, Routines, and Habits of Billionaires, Icons, and World-Class Performers)
“
In Modern world internet technology is getting advance day by day. Uship is also getting advance day by day. This script helps the customer to find a way to book their shipment online.
Uship clone script is a script. Which helps the customer to find a way to book their shipment online? Uship clone script is very easy to use. As an admin customer can use this script to start his own online business to help other customer’s to give the way for booking their shipment online. Anyone can use this script. This script is available for all World Wide Web customers. It also provides you 365*24*7 customer support. Uship clone script basic server installation is free.
Customer can store unlimited data with the help of this script. In this script there are two sections available. First admin dashboard and second one is Master Control. In this service customer can check in which country our service is available or not. As an admin customer can add city or state in which the service should be available or not. In this script customer can check full detail info for example like: - Receiver detail, pickup dates, delivery dates and shipment details.
Admin Dashboard: - As an admin customer can cheq. How many users are registered in a day? In shipment active and shipment undelivered option as an admin customer can cheq how much shipment delivered and undelivered are available in a day or week. In payment option customer can cheq how many payments received or not received in a week. As an admin customer can check all Web enquires which is received by customer through E-mail. In this active or inactive quote option admin can manage all transporter posted shipment quote, admin can make active or inactive quote.
Master Control: - section there is some different option available for example likes category, payment gateways, Add Vehicle, Add notice board, country list, mails template, news list and so many other options are available. In add notice board option any customer can any notice regarding the product and in show notice board option customer can check all kinds of notice.
There is news section on frontend where customer can add news about your company. What’s new or what are you doing and know you clients or visitors about your company. In payment gateway info option admin can manage payment gateway settings. In the admin panel customer can see payment status of all users. In slider setting admin can manage front slider banner and also admin can change slider, image text.
In this script there is one service option available. In this option customer can check what Kind of service facilities available.
In this script customer needs to enter a consignment detail with online tracking feature and then customer get his own complete website.
Uship clone script also provide you a all static pages like Home, About Us, privacy policy, Term and condition, New shipment, Find delivers, login, My account and contact us.
”
”
Akshay
“
One measure of a truly free society is the vigor with which it protects the liberties of its individual citizens. As technology has advanced in America, it has increasingly encroached on one of those liberties--what I term the right of personal privacy. Modern information systems, data banks, credit records, mailing list abuses, electronic snooping, the collection of personal data for one purpose that may be used for another--all these have left millions of Americans deeply concerned by the privacy they cherish.
And the time has come, therefore, for a major initiative to define the nature and extent of the basic rights of privacy and to erect new safeguards to ensure that those rights are respected.
”
”
Richard M. Nixon (State of the Union Addresses of Richard Nixon)
“
Some businesses take a unique approach to this. Footwear brand Toms, already beloved thanks to its renowned blend of “social purpose” and product, forgoes splashy celebrity marketing campaigns. Instead, they engage and elevate real customers. During the summer of 2016, Toms engaged more than 3.5 million people in a single day using what they call tribe power. The company tapped into its army of social media followers for its annual One Day Without Shoes initiative to gather millions of Love Notes on social media. However, Toms U.K. marketing manager Sheela Thandasseri explained that their tribe’s Love Notes are not relegated to one day. “Our customers create social content all the time showing them gifting Toms or wearing them on their wedding day, and they tag us because they want us to be part of it.”2 Toms uses customer experience management platform Sprinklr to aggregate interactions on Facebook, Instagram, and Twitter. Toms then engages in a deep analysis of the data generated by its tribe, learning what customers relish and dislike about its products, stores, and salespeople so they can optimize their Complete Product Experience (CPE). That is an aggressive, all-in approach that extracts as much data as possible from every customer interaction in order to see patterns and craft experiences. Your approach might differ based on factors ranging from budget limitations to privacy concerns. But I can attest that earning love does not necessarily require cutting-edge technology or huge expenditures. What it does require is a commitment to delivering the building blocks of lovability that I reviewed in the previous chapter. Lovability begins with a mindset that makes it a priority. The building blocks are feelings — hope, confidence, fun. If you stack them up over and over again, eventually you will turn those feelings into a tower of meaningful benefits for everyone with a stake in your business, including owners, investors, employees, and customers. Now let’s look more closely at those benefits and the groups they affect.
”
”
Brian de Haaff (Lovability: How to Build a Business That People Love and Be Happy Doing It)
“
Watching From Withing protagonist Dr. Jesse Baine says, "The only place I can fathom that is truly private is the space between your ears. Think about the sheer number of surveillance systems, automated ID tracking and police brain-print scanners. What is privacy anyhow? And, why would anyone protest the advancement of such tried and true [surveillance] technology? That’s a bit like rising-up against the aspirin!” -Daniel LaMonte
”
”
Daniel Lamonte (Watching From Within (Out of Print))
“
Sure, but…” Roz thinks about everything she uses Information for, all the time. “If you’re driving, and you come to an intersection, how do you know what vehicles might be approaching from either side?”
“Well, we try not to design blind intersections,” Maria says. “And we use mirrors.”
Mirrors! Ingenious. “You must have found it much easier than we did when Information went out during the elections,” Roz says, trying to offer Maria’s odd cult some credit.
”
”
Malka Ann Older (Null States (Centenal Cycle #2))
“
United States is committed to protecting privacy. It is an element of individual dignity and an aspect of participation in democratic society. To an increasing extent, privacy protections have become critical to the information-based economy. Stronger consumer data privacy protections will buttress the trust that is necessary to promote the full economic, social, and political uses of networked technologies. The increasing quantities of personal data that these technologies subject to collection, use, and disclosure have fueled innovation and significant social benefits. We can preserve these benefits while also ensuring that our consumer data privacy policy better reflects the value that Americans place on privacy and bolsters trust in the Internet and other networked technologies. The framework set forth in the preceding pages provides a way to achieve these goals. The Consumer Privacy Bill of Rights should be the legal baseline that governs consumer data privacy in the United States. The Administration will work with Congress to bring this about, but it will also work with privatesector stakeholders to adopt the Consumer Privacy Bill of Rights in the absence of legislation. To encourage adoption, the Department of Commerce will convene multistakeholder processes to encourage the development of enforceable, context-specific codes of conduct. The United States Government will engage with our international partners to increase the interoperability of our respective consumer data privacy frameworks. Federal agencies will continue to develop innovative privacy-protecting programs and guidance as well as enforce the broad array of existing Federal laws that protect consumer privacy. A cornerstone of this framework is its call for the ongoing participation of private-sector stakeholders. The views that companies, civil society, academics, and advocates provided to the Administration through written comments, public symposia, and informal discussions have been invaluable in shaping this framework. Implementing it, and making progress toward consumer data privacy protections that support a more trustworthy networked world, will require all of us to continue to work together★ 45 ★
”
”
Anonymous
“
Not only was all this collaboration conducted with no transparency, but it contradicted public statements made by Skype. ACLU technology expert Chris Soghoian said the revelations would surprise many Skype customers. “In the past, Skype made affirmative promises to users about their inability to perform wiretaps,” he said. “It’s hard to square Microsoft’s secret collaboration with the NSA with its high-profile efforts to compete on privacy with Google.
”
”
Glenn Greenwald (No Place to Hide: Edward Snowden, the NSA, and the U.S. Surveillance State)
“
leap in the ability to process and data. For the sake of simplicity, this book will focus on the recent past to discuss various stages where information technology, norms, practices, and rules combined to allow for data gathering and sharing within an enterprise and with individuals. Framing and noting the various risks and opportunities within various stages in the Information Age creates a context for the ensuing discussion surrounding the mission and purpose of the privacy engineer and the call to action for the privacy engineer’s manifesto, as presented later in this book.
”
”
Michelle Finneran Dennedy (The Privacy Engineer's Manifesto: Getting from Policy to Code to QA to Value)
“
We exchange our privacy for access, and we may be losing our sense of agency in the process.
”
”
Craig Detweiler (iGods: How Technology Shapes Our Spiritual and Social Lives)
“
A crying need for wisdom and discernment emerges in an era of too much information. What do we discover as we attempt to see through technology, to assess the promises it offers? Technology has become an alternative religion. It has distinct values, celebrated saints, and rites of passage. We sacrifice our privacy in exchange for services. Our passions become quantifiable, often reducing us to a target market or a call to monitor. This conclusion will focus on the eschatology of technology. What does all the efficiency point to? Where does a world of smaller, faster, and smarter gadgets lead?
”
”
Craig Detweiler (iGods: How Technology Shapes Our Spiritual and Social Lives)
“
Similarly, those Internet tycoons who are apparently so willing to devalue our privacy are vehemently protective of their own. Google insisted on a policy of not talking to reporters from CNET, the technology news site, after CNET published Eric Schmidt’s personal details—including his salary, campaign donations, and address, all public information obtained via Google—in order to highlight the invasive dangers of his company. Meanwhile, Mark Zuckerberg purchased the four homes adjacent to his own in Palo Alto, at a cost of $30 million, to ensure his privacy. As CNET put it, “Your personal life is now known as Facebook’s data. Its CEO’s personal life is now known as mind your own business.” The same contradiction is expressed by the many ordinary citizens who dismiss the value of privacy yet nonetheless have passwords on their email and social media accounts. They put locks on their bathroom doors; they seal the envelopes containing their letters. They engage in conduct when nobody is watching that they would never consider when acting in full view. They say things to friends, psychologists, and lawyers that they do not want anyone else to know. They give voice to thoughts online that they do not want associated with their names. The many pro-surveillance advocates I have debated since Snowden blew the whistle have been quick to echo Eric Schmidt’s view that privacy is for people who have something to hide. But none of them would willingly give me the passwords to their email accounts, or allow video cameras in their homes.
”
”
Anonymous
“
The United States government has perfected a technological capability that enables us to monitor the messages that go through the air.… That capability at any time could be turned around on the American people, and no American would have any privacy left, such is the capability to monitor everything—telephone conversations, telegrams, it doesn’t matter. There would be no place to hide. —Senator Frank Church, Chair, Senate Select Committee to Study Governmental Operations with Respect to Intelligence Activities, 1975
”
”
Anonymous
“
It was like setting up a guillotine in the public square.You don't expect a thousand people to line up to put their heads in it.
”
”
Dave Eggers
“
Strong privacy advocates—especially those promoting encryption and anonymity—may deny that this phenomenon is a direct physical corollary of their message, so I will let the reader decide whether a philosophy that relies on cybernetic gates, walls, and coded locks is any different in its underlying basis—fear.
”
”
David Brin (The Transparent Society: Will Technology Force Us To Choose Between Privacy And Freedom?)