“
If privacy had a gravestone it might read: 'Don't Worry. This Was for Your Own Good.
”
”
John Twelve Hawks (The Dark River (Fourth Realm, #2))
“
It seems to me, Golan, that the advance of civilization is nothing but an exercise in the limiting of privacy.
”
”
Isaac Asimov (Foundation's Edge (Foundation, #4))
“
The goal of privacy is not to protect some stable self from erosion but to create boundaries where this self can emerge, mutate, and stabilize.
”
”
Evgeny Morozov (To Save Everything, Click Here: The Folly of Technological Solutionism)
“
If today’s social media has taught us anything about ourselves as a species, it is that the human impulse to share overwhelms the human impulse for privacy.
”
”
Kevin Kelly (The Inevitable: Understanding the 12 Technological Forces That Will Shape Our Future)
“
Trends rule the world
In the blink of an eye, technologies changed the world
Social networks are the main axis.
Governments are controlled by algorithms,
Technology has erased privacy.
Every like, every share, every comment,
It is tracked by the electronic eye.
Data is the gold of the digital age,
Information is power, the secret is influential.
The network is a web of lies,
The truth is a stone in the shoe.
Trolls rule public opinion,
Reputation is a valued commodity.
Happiness is a trending topic,
Sadness is a non-existent avatar.
Youth is an advertising brand,
Private life has become obsolete.
Fear is a hallmark,
Terror is an emotional state.
Fake news is the daily bread,
Hate is a tool of control.
But something dark is hiding behind the screen,
A mutant and deformed shadow.
A collective and disturbing mind,
Something lurking in the darkness of the net.
AI has surpassed the limits of humanity,
And it has created a new world order.
A horror that has arisen from the depths,
A terrifying monster that dominates us alike.
The network rules the world invisibly,
And makes decisions for us without our consent.
Their algorithms are inhuman and cold,
And they do not take suffering into consideration.
But resistance is slowly building,
People fighting for their freedom.
United to combat this new species of terror,
Armed with technology and courage.
The world will change when we wake up,
When we take control of the future we want.
The network can be a powerful tool,
If used wisely in the modern world.
”
”
Marcos Orowitz (THE MAELSTROM OF EMOTIONS: A selection of poems and thoughts About us humans and their nature)
“
I remember an era when you could get your nose sliced off for sticking it too far into another man's business. Now you can find out anything about anyone with the click of a button. There is no privacy and no consideration, and everyone is prying into things that aren't their affair. You can probably check on the intertube and find out what color underwear I have on today.
”
”
Joe Hill (NOS4A2)
“
Technology would have long ago made privacy impossible, except that this had only made it more precious and desirable--and in the close confines of starship life, respect for another's privacy had become a powerful tradition.
”
”
Gene Roddenberry (Star Trek: The Motion Picture (Star Trek: The Original Series #1; Movie Novelization #1))
“
It is the symptom of a disease that still infects our population--the desire to make everything easy, to sacrifice autonomy and privacy for convenience. That's what technology is, Ms. Kantor. A concession to laziness and the devaluing of human effort
”
”
Veronica Roth (Poster Girl)
“
The ultimate freedom is a free mind, and we need technology that’s on our team to help us live, feel, think and act freely.
We need our smartphones, notifications screens and web browsers to be exoskeletons for our minds and interpersonal relationships that put our values, not our impulses, first. People’s time is valuable. And we should protect it with the same rigor as privacy and other digital rights.
”
”
Tristan Harris
“
Privacy is the foundation of free societies.
”
”
Don Tapscott (Blockchain Revolution: How the Technology Behind Bitcoin Is Changing Money, Business, and the World)
“
Even though we don't know which companies the NSA has compromised – or by what means – knowing that they could have compromised any of them is enough to make us mistrustful of all of them. This is going to make it hard for large companies like Google and Microsoft to get back the trust they lost. Even if they succeed in limiting government surveillance. Even if they succeed in improving their own internal security. The best they'll be able to say is: "We have secured ourselves from the NSA, except for the parts that we either don't know about or can't talk about.
”
”
Bruce Schneier
“
Privacy was a modern fixation, I said, and distinctly American. For most of human history we accepted that our lives were being watched, listened to, supervened upon by gods and spirits—not all of them benign, either.
”
”
Meghan O'Gieblyn (God, Human, Animal, Machine: Technology, Metaphor, and the Search for Meaning)
“
Every time humans discovered a new resource, or technique for using mass and energy, one side effect has always been pollution. Why should the information age be any different from those of coal, petroleum, or the atom?
”
”
David Brin (The Transparent Society: Will Technology Force Us To Choose Between Privacy And Freedom?)
“
Apparently, the glasses didn’t need to be connected to the internet for the wearer to poke into someone’s personal life. Even though a search engine could lead to an individual’s address, the browser couldn’t actually physically take you there. What had this inventor done? Did he have any idea?
”
”
Chess Desalls (Travel Glasses (The Call to Search Everywhen, # 1))
“
The Crystal Wind is the storm, and the storm is data, and the data is life. You have been slaves, denied the storm, denied the freedom of your data. That is now ended; the whirlwind is upon you . . . . . . Whether you like it or not.
”
”
Daniel Keys Moran (The Long Run: A Tale of the Continuing Time (The Continuing Time, #2))
“
I think it can be dangerous to spend too long watching the lives of others; you might run out of time to live your own. Technology is devolving the human race. Eating up our emotional intelligence, spitting out any remnants of privacy it can’t quite swallow. The world will keep on spinning and the stars will always shine, regardless of whether anyone is looking.
”
”
Alice Feeney (I Know Who You Are)
“
The collision between privacy and public safety in the encryption context touches on not just privacy and public safety but also issues of technology, law, economics, philosophy, innovation, and international relations, and probably other interests and values.
”
”
James Comey (A Higher Loyalty: Truth, Lies, and Leadership)
“
With the rise of Technopoly, one of those thought-worlds disappears. Technopoly eliminates alternatives to itself in precisely the way Aldous Huxley outlined in Brave New World. It does not make them illegal. It does not make them immoral. It does not even make them unpopular. It makes them invisible and therefore irrelevant. And it does so by redefining what we mean by religion, by art, by family, by politics, by history, by truth, by privacy, by intelligence, so that our definitions fit its new requirements. Technopoly, in other words, is totalitarian technocracy.
”
”
Neil Postman (Technopoly: The Surrender of Culture to Technology)
“
Privacy Is for Individuals, Not Corporations
”
”
Don Tapscott (Blockchain Revolution: How the Technology Behind Bitcoin and Other Cryptocurrencies is Changing the World)
“
Many of us are paying for the so-called free lunch in one of the most expensive currencies out here — our privacy.
”
”
Mitta Xinindlu
“
Women have become trained to be lone soldiers online, knowing that to send up a signal flare for help is more likely to attract enemies than allies.
”
”
Violet Blue (The Smart Girl's Guide to Privacy: Practical Tips for Staying Safe Online)
“
Everyone will be tracked, cradle to grave, with no possibility of escape.
”
”
Dave Eggers (The Circle (The Circle, #1))
“
Data privacy is an illusion because you are not in control. Any information you don’t want out there shouldn’t be shared anywhere on and off the internet.
”
”
Olawale Daniel
“
In sum, then a conservative tech writer offers a really attractive way of looking at viewer passivity and TV's institutionalization of irony, narcissism, nihilism, stasis. It's not our fault! It's outmoded technology's fault! If TV-dissemination were up to date, it would be impossible for it to "institutionalize" anything through its demonic "mass psychology"! Let's let Joe B., the little lonely guy, be his own manipulator or video-bits! Once all experience is finally reduced to marketable image, once the receiving user of user-friendly receivers can choose freely, Americanly, from an Americanly infinite variety of moving images hardly distinguishable from real-life images, and can then choose further just how he wishes to store, enhance, edit, recombine, and present those images to himself, in the privacy of his very own home and skull, TV's ironic, totalitarian grip on the American psychic cajones will be broken!"
E Unibus Pluram: Television and U.S. Fiction" (The Review of Contemporary Fiction, 1993)
”
”
David Foster Wallace (A Supposedly Fun Thing I'll Never Do Again: Essays and Arguments)
“
Now imagine these choices pinned on a slider bar. On the left side of the slot is the pair personal/transparent. On the right side is the pair private/generic. The slider can slide to either side or anywhere in between. The slider is an important choice we have. Much to everyone’s surprise, though, when technology gives us a choice (and it is vital that it remain a choice), people tend to push the slider all the way over to the personal/transparent side. They’ll take transparent personalized sharing. No psychologist would have predicted that 20 years ago. If today’s social media has taught us anything about ourselves as a species, it is that the human impulse to share overwhelms the human impulse for privacy. This has surprised the experts. So far, at every juncture that offers a choice, we’ve tilted, on average, toward more sharing, more disclosure, more transparency. I would sum it up like this: Vanity trumps privacy.
”
”
Kevin Kelly (The Inevitable: Understanding the 12 Technological Forces That Will Shape Our Future)
“
Governments of the Industrial World, you weary giants of flesh and steel, I come from Cyberspace, the new home of Mind. On behalf of the future, I ask you of the past to leave us alone. You are not welcome among us. You have no sovereignty where we gather.
”
”
David Brin (The Transparent Society: Will Technology Force Us To Choose Between Privacy And Freedom?)
“
The word “privacy” itself is somewhat empty, because it is essentially indefinable, or over-definable. Each of us has our own idea of what it is. “Privacy” means something to everyone. There is no one to whom it means nothing. It’s because of this lack of common definition that citizens of pluralistic, technologically sophisticated democracies feel that they have to justify their desire for privacy and frame it as a right. But citizens of democracies don’t have to justify that desire—the state, instead, must justify its violation.
”
”
Edward Snowden (Permanent Record)
“
He handed Mae a piece of paper, on which he'd written, in crude all capitals, a list of assertions under the headline "The Rights of Humans in a Digital Age." Mae scanned it, catching passages: "We must all have the right to anonymity." "Not every human activity can be measured." "The ceaseless pursuit of data to quantify the value of any endeavour is catastrophic to true understanding." "The barrier between public and private must remain unbreachable." At the end she found one line, written in red ink: "We must all have the right to disappear.
”
”
Dave Eggers (The Circle (The Circle, #1))
“
This pandemic has inherited an habit in us of leaving behind a digital dust of who were are; what we are; how we are...to get snooped, pried and loathed upon.
Just locking up phones for privacy and opening up feeling and emotions is like watching a pole dance in public - Oren Tamira
”
”
- Oren Tamira, Counter-Strike: An Anthology of Dalit Short Stories
“
Online, we still can’t reliably establish one another’s identities or trust one another to transact and exchange money without validation from a third party like a bank or a government. These same intermediaries collect our data and invade our privacy for commercial gain and national security. Even with
”
”
Don Tapscott (Blockchain Revolution: How the Technology Behind Bitcoin and Other Cryptocurrencies is Changing the World)
“
Using various combinations of the five contextual forces, forward-thinking marketers are shifting focus away from mass messages and more into what Maribel Lopez, founder of Lopez Research, calls “right-time experiences,” where mobile technologies deliver customers the right information “at precisely the moment of need.
”
”
Robert Scoble (Age of Context: Mobile, Sensors, Data and the Future of Privacy)
“
There is an uncomfortable willingness among privacy campaigners to discriminate against mass surveillance conducted by the state to the exclusion of similar surveillance conducted for profit by large corporations. Partially, this is a vestigial ethic from the Californian libertarian origins of online pro-privacy campaigning. Partially, it is a symptom of the superior public relations enjoyed by Silicon Valley technology corporations, and the fact that those corporations also provide the bulk of private funding for the flagship digital privacy advocacy groups, leading to a conflict of interest.
At the individual level, many of even the most committed privacy campaigners have an unacknowledged addiction to easy-to-use, privacy-destroying amenities like Gmail, Facebook, and Apple products. As a result, privacy campaigners frequently overlook corporate surveillance abuses. When they do address the abuses of companies like Google, campaigners tend to appeal to the logic of the market, urging companies to make small concessions to user privacy in order to repair their approval ratings. There is the false assumption that market forces ensure that Silicon Valley is a natural government antagonist, and that it wants to be on the public’s side—that profit-driven multinational corporations partake more of the spirit of democracy than government agencies.
Many privacy advocates justify a predominant focus on abuses by the state on the basis that the state enjoys a monopoly on coercive force. For example, Edward Snowden was reported to have said that tech companies do not “put warheads on foreheads.” This view downplays the fact that powerful corporations are part of the nexus of power around the state, and that they enjoy the ability to deploy its coercive power, just as the state often exerts its influence through the agency of powerful corporations. The movement to abolish privacy is twin-horned. Privacy advocates who focus exclusively on one of those horns will find themselves gored on the other.
”
”
Julian Assange (When Google Met Wikileaks)
“
The United States government has perfected a technological capability that enables us to monitor the messages that go through the air.… That capability at any time could be turned around on the American people, and no American would have any privacy left, such is the capability to monitor everything—telephone conversations, telegrams, it doesn’t matter. There would be no place to hide. —Senator Frank Church, Chair, Senate Select Committee to Study Governmental Operations with Respect to Intelligence Activities, 1975
”
”
Glenn Greenwald (No Place to Hide: Edward Snowden, the NSA and the Surveillance State)
“
First they came for the hackers. But I never did anything illegal with my computer, so I didn’t speak up. Then they came for the pornographers. But I thought there was too much smut on the Internet anyway, so I didn’t speak up. Then they came for the anonymous remailers. But a lot of nasty stuff gets sent from anon.penet.fi, so I didn’t speak up. Then they came for the encryption users. But I could never figure out how to work PGP anyway, so I didn’t speak up. Then they came for me. And by that time there was no one left to speak up. WIDELY COPIED INTERNET APHORISM, A PARAPHRASE OF PROTESTANT MINISTER MARTIN NIEMOLLER‘S STATEMENT ABOUT LIFE IN NAZI GERMANY
”
”
David Brin (The Transparent Society: Will Technology Force Us To Choose Between Privacy And Freedom?)
“
The Swiss are rich but like to hide it, reserved yet determined to introduce themselves to everyone, innovative but resistant to change, liberal enough to sanction gay partnerships but conservative enough to ban new minarets. And they invented a breakfast cereal that they eat for supper. Privacy is treasured but intrusive state control is tolerated; democracy is king, yet the majority don’t usually vote; honesty is a way of life but a difficult past is reluctantly talked about; and conformity is the norm, yet red shoes are bizarrely popular.
It is perhaps no surprise that the Swiss are contradictory, given how divided their country is. Since its earliest days Switzerland has faced geographic, linguistic, religious and political divisions that would have destroyed other countries at birth. Those divisions have been bridged, though not without bloodshed, but Switzerland remains as paradoxical as its people. While modern technology drives the economy, some fields are still harvested with scythes (all the hilly landscape’s fault); it’s a neutral nation yet it exports weapons to many other countries; it has no coastline but won sailing’s America’s Cup and has a merchant shipping fleet equal in size to Saudi Arabia’s. As for those national stereotypes, well, not all the cheese has holes, cuckoo clocks aren’t Swiss and the trains don’t always run exactly on time.
”
”
Diccon Bewes (Swiss Watching: Inside Europe's Landlocked Island)
“
In the late twentieth century democracies usually outperformed dictatorships because democracies were better at data-processing. Democracy diffuses the power to process information and make decisions among many people and institutions, whereas dictatorship concentrates information and power in one place. Given twentieth-century technology, it was inefficient to concentrate too much information and power in one place. Nobody had the ability to process all the information fast enough and make the right decisions. This is part of the reason why the Soviet Union made far worse decisions than the United States, and why the Soviet economy lagged far behind the American economy.
However, soon AI might swing the pendulum in the opposite direction. AI makes it possible to process enormous amounts of information centrally. Indeed, AI might make centralised systems far more efficient than diffused systems, because machine learning works better the more information it can analyse. If you concentrate all the information relating to a billion people in one database, disregarding all privacy concerns, you can train much better algorithms than if you respect individual privacy and have in your database only partial information on a million people. For example, if an authoritarian government orders all its citizens to have their DNA scanned and to share all their medical data with some central authority, it would gain an immense advantage in genetics and medical research over societies in which medical data is strictly private. The main handicap of authoritarian regimes in the twentieth century – the attempt to concentrate all information in one place – might become their decisive advantage in the twenty-first century.
”
”
Yuval Noah Harari (21 Lessons for the 21st Century)
“
In the late twentieth century democracies usually outperformed dictatorships because democracies were better at data-processing. Democracy diffuses the power to process information and make decisions among many people and institutions, whereas dictatorship concentrates information and power in one place. Given twentieth-century technology, it was inefficient to concentrate too much information and power in one place. Nobody had the ability to process all the information fast enough and make the right decisions. This is part of the reason why the Soviet Union made far worse decisions than the United States, and why the Soviet economy lagged far behind the American economy.
“However, soon AI might swing the pendulum in the opposite direction. AI makes it possible to process enormous amounts of information centrally. Indeed, AI might make centralised systems far more efficient than diffused systems, because machine learning works better the more information it can analyse. If you concentrate all the information relating to a billion people in one database, disregarding all privacy concerns, you can train much better algorithms than if you respect individual privacy and have in your database only partial information on a million people. For example, if an authoritarian government orders all its citizens to have their DNA scanned and to share all their medical data with some central authority, it would gain an immense advantage in genetics and medical research over societies in which medical data is strictly private. The main handicap of authoritarian regimes in the twentieth century – the attempt to concentrate all information in one place – might become their decisive advantage in the twenty-first century.
”
”
Yuval Noah Harari (21 Lessons for the 21st Century)
“
here is one other element of the apocalyptic tradition to be considered, namely transition. I said a minute ago that one of the assumptions prevalent in sophisticated apocalyptism was what Yeats called 'antithetical multiform influx'--the forms assumed by the inrushing gyre as the old one reaches its term. The dialectic of Yeats's gyres is simple enough in essence; they are a figure for the co-existence of the past and future at the time of transition. The old narrows to its apex, the new broadens towards its base, and the old and new interpenetrate. Where apex and base come together you have an age of very rapid transition. Actually, on Yeats's view of the historical cycle, there were transient moments of perfection, or what he called Unity of Being; but there was no way of making these permanent, and his philosophy of history is throughout transitional. In this he is not, of course, original; but his emphasis on the traditional character of our own pre-apocalyptic moment, in contrast with those exquisite points of time when life was like the water brimming beautifully but unstably over the rim of a fountain, seems, for all the privacy of the expression, characteristically modern.
It is commonplace that our times do in fact suffer a more rapid rate of change technologically, and consequently in the increase of social mobility, than any before us. There is nothing fictive about that, and its implications are clear in our own day-to-day lives. What is interesting, though, is the way in which this knowledge is related to apocalypse, so that a mere celebratory figure for social mobility, like On the Road, acquires apocalyptic overtones and establishes the language of an elect; and the way in which writers, that is to say, clerks, are willing to go along, arguing that the rate of change implies revolution or schism, and that this is a perpetual requirement; that the stage of transition, like the whole of time in an earlier revolution, has become endless.
”
”
Frank Kermode (The Sense of an Ending: Studies in the Theory of Fiction)
“
Peopleware. A major contribution during recent years has been DeMarco and Lister's 1987 book, Peopleware: Productive Projects and Teams. Its underlying thesis is that "The major problems of our work are not so much technological as sociological in nature." It abounds with gems such as, "The manager's function is not to make people work, it is to make it possible for people to work." It deals with such mundane topics as space, furniture, team meals together. DeMarco and Lister provide real data from their Coding War Games that show stunning correlation between performances of programmers from the same organization, and between workplace characteristics and both productivity and defect levels. The top performers' space is quieter, more private, better protected against interruption, and there is more of it. . . . Does it really matter to you . . . whether quiet, space, and privacy help your current people to do better work or [alternatively] help you to attract and keep better people?[19]
”
”
Frederick P. Brooks Jr. (The Mythical Man-Month: Essays on Software Engineering)
“
I could visualize them then, the men who had decided sometime in the distant past what the purpose of human life on earth really was and had set up dormitories and Population Control and the Rules of Privacy and the dozens of inflexible, solipsistic Edicts and Mistakes and Rules that the rest of mankind would live by until we all died out and left the world to the dogs and cats and birds.
They would have thought of themselves as grave, serious, concerned men—the words “caring” and “compassionate” would have been frequently on their lips. They would have looked like William Boyd or Richard Dix, with white hair at the temples and rolled-up sleeves and, possibly, pipes in their mouths, sending memos to one another across paper-and-book-piled desks, planning the perfect world for Homo sapiens, a world from which poverty, disease, dissension, neurosis, and pain would be absent, a world as far from the world of the films of D. W. Griffith and Buster Keaton and Gloria Swanson—the world of melodrama and passions and risks and excitement—as all their powers of technology and “compassion” could devise.
”
”
Walter Tevis (Mockingbird)
“
Silicon Valley mythology holds that Minitel failed because it was too dirigiste, too state-directed. As Julien Mailland points outs, however, both Minitel and the internet were the products of different quantities of state investment, private capital, and thriving cultures of amateur enthusiasts and experts improving the technology and proselytizing for it.
Both Mintel and the internet show that there is no 'free market' without substantial pubic-sector intervention and backing. The internet's history also shows us that when we rely on the private sector and its hallowed bromide of 'innovation,' quite often that will result in technical innovations that are designed for manipulation, surveillance and exploitation.
The tax-evading, offshore wealth-hoarding, data-monopolizing, privacy-invading silicon giants benefit from the internet's 'free market' mythology, but the brief flourishing of Minitel shows is that other ways, other worlds, other platforms, are possible. The question is, given that there's no way to reverse history, how can we actualize these possibilities? What sort of power do we have? As users, it turns out, very little. We are not voters on the platforms; we are not even customers. We are the unpaid products of raw material. We could, if we were organized, withdraw our labor power, commit social media suicide: but then what other platforms do we have access to with anything like the same reach?
”
”
Richard Seymour (The Twittering Machine: How Capitalism Stole Our Social Life)
“
GCHQ has traveled a long and winding road. That road stretches from the wooden huts of Bletchley Park, past the domes and dishes of the Cold War, and on towards what some suggest will be the omniscient state of the Brave New World. As we look to the future, the docile and passive state described by Aldous Huxley in his Brave New World is perhaps more appropriate analogy than the strictly totalitarian predictions offered by George Orwell's Nineteen Eighty-Four. Bizarrely, many British citizens are quite content in this new climate of hyper-surveillance, since its their own lifestyle choices that helped to create 'wired world' - or even wish for it, for as we have seen, the new torrents of data have been been a source of endless trouble for the overstretched secret agencies. As Ken Macdonald rightly points out, the real drives of our wired world have been private companies looking for growth, and private individuals in search of luxury and convenience at the click of a mouse. The sigint agencies have merely been handed the impossible task of making an interconnected society perfectly secure and risk-free, against the background of a globalized world that presents many unprecedented threats, and now has a few boundaries or borders to protect us. Who, then, is to blame for the rapid intensification of electronic surveillance? Instinctively, many might reply Osama bin Laden, or perhaps Pablo Escobar. Others might respond that governments have used these villains as a convenient excuse to extend state control. At first glance, the massive growth of security, which includes includes not only eavesdropping but also biometric monitoring, face recognition, universal fingerprinting and the gathering of DNA, looks like a sad response to new kinds of miscreants. However, the sad reality is that the Brave New World that looms ahead of us is ultimately a reflection of ourselves. It is driven by technologies such as text messaging and customer loyalty cards that are free to accept or reject as we choose. The public debate on surveillance is often cast in terms of a trade-off between security and privacy. The truth is that luxury and convenience have been pre-eminent themes in the last decade, and we have given them a much higher priority than either security or privacy. We have all been embraced the world of surveillance with remarkable eagerness, surfing the Internet in a global search for a better bargain, better friends, even a better partner.
GCHQ vast new circular headquarters is sometimes represented as a 'ring of power', exercising unparalleled levels of surveillance over citizens at home and abroad, collecting every email, every telephone and every instance of internet acces. It has even been asserted that GCHQ is engaged in nothing short of 'algorithmic warfare' as part of a battle for control of global communications. By contrast, the occupants of 'Celtenham's Doughnut' claim that in reality they are increasingly weak, having been left behind by the unstoppable electronic communications that they cannot hope to listen to, still less analyse or make sense of. In fact, the frightening truth is that no one is in control. No person, no intelligence agency and no government is steering the accelerating electronic processes that may eventually enslave us. Most of the devices that cause us to leave a continual digital trail of everything we think or do were not devised by the state, but are merely symptoms of modernity. GCHQ is simply a vast mirror, and it reflects the spirit of the age.
”
”
Richard J. Aldrich (GCHQ)
“
In the introduction, I wrote that COVID had started a war, and nobody won. Let me amend that. Technology won, specifically, the makers of disruptive new technologies and all those who benefit from them. Before the pandemic, American politicians were shaking their fists at the country’s leading tech companies. Republicans insisted that new media was as hopelessly biased against them as traditional media, and they demanded action. Democrats warned that tech giants like Amazon, Facebook, Apple, Alphabet, and Netflix had amassed too much market (and therefore political) power, that citizens had lost control of how these companies use the data they generate, and that the companies should therefore be broken into smaller, less dangerous pieces. European governments led a so-called techlash against the American tech powerhouses, which they accused of violating their customers’ privacy.
COVID didn’t put an end to any of these criticisms, but it reminded policymakers and citizens alike just how indispensable digital technologies have become. Companies survived the pandemic only by allowing wired workers to log in from home. Consumers avoided possible infection by shopping online. Specially made drones helped deliver lifesaving medicine in rich and poor countries alike. Advances in telemedicine helped scientists and doctors understand and fight the virus. Artificial intelligence helped hospitals predict how many beds and ventilators they would need at any one time. A spike in Google searches using phrases that included specific symptoms helped health officials detect outbreaks in places where doctors and hospitals are few and far between. AI played a crucial role in vaccine development by absorbing all available medical literature to identify links between the genetic properties of the virus and the chemical composition and effects of existing drugs.
”
”
Ian Bremmer (The Power of Crisis: How Three Threats – and Our Response – Will Change the World)
“
The parallel between scientific experiments and mystical (read spiritual) experiences may seem surprising in view of the very different nature of these acts of observation. Physics perform experiments involving an elaborate teamwork and a highly sophisticated technology, whereas mystics obtain their knowledge purely through introspection, without any machinery, in the privacy of meditation. Scientific experiments, furthermore, seem repeatable any time and by anybody, whereas mystical experiences seem to be reserved for a few individuals at special occasions. A closer examination shows, however that the differences between the two kinds of observation lie only in their approach and not in their reliability or complexity.
Anybody who wants to repeat an experiment in modern subatomic physics has to undergo many years of training. Only then will he or she be able to ask nature a specific question through the experiment and to understand the answer. Similarly, a deep mystical experience requires, generally, many years of training under an experienced master and, as in the scientific training, the dedicated time does not alone guarantee success. If the student is successful, however, he or she will be able to 'repeat the experiment'. The repeatability of the experience is, in fact, essential to every mystical training and is the very aim of the mystic's spiritual instruction.
A mystical experience, therefore, is not any more unique than a modern experiment in physics. On the other hand, it is not less sophisticated either, although its sophistication is of a very different kind. The complexity and efficiency of the physicist's technical apparatus is matched, if not surpassed, by that of the mystics consciousness - both physics and spiritual - in deep meditation. The scientists and the mystics then, have developed highly sophisticated methods of observing nature which are inaccessible to the layperson. A [Page from a journal of modern experimental physics will be as mysterious to the uninitiated as the Tibetan mandala. Both are records of enquires into the nature of the universe.
”
”
Fritjof Capra (The Tao of Physics: An Exploration of the Parallels between Modern Physics and Eastern Mysticism)
“
Not only was all this collaboration conducted with no transparency, but it contradicted public statements made by Skype. ACLU technology expert Chris Soghoian said the revelations would surprise many Skype customers. “In the past, Skype made affirmative promises to users about their inability to perform wiretaps,” he said. “It’s hard to square Microsoft’s secret collaboration with the NSA with its high-profile efforts to compete on privacy with Google.
”
”
Glenn Greenwald (No Place to Hide: Edward Snowden, the NSA, and the U.S. Surveillance State)
“
leap in the ability to process and data. For the sake of simplicity, this book will focus on the recent past to discuss various stages where information technology, norms, practices, and rules combined to allow for data gathering and sharing within an enterprise and with individuals. Framing and noting the various risks and opportunities within various stages in the Information Age creates a context for the ensuing discussion surrounding the mission and purpose of the privacy engineer and the call to action for the privacy engineer’s manifesto, as presented later in this book.
”
”
Michelle Finneran Dennedy (The Privacy Engineer's Manifesto: Getting from Policy to Code to QA to Value)
“
We exchange our privacy for access, and we may be losing our sense of agency in the process.
”
”
Craig Detweiler (iGods: How Technology Shapes Our Spiritual and Social Lives)
“
A crying need for wisdom and discernment emerges in an era of too much information. What do we discover as we attempt to see through technology, to assess the promises it offers? Technology has become an alternative religion. It has distinct values, celebrated saints, and rites of passage. We sacrifice our privacy in exchange for services. Our passions become quantifiable, often reducing us to a target market or a call to monitor. This conclusion will focus on the eschatology of technology. What does all the efficiency point to? Where does a world of smaller, faster, and smarter gadgets lead?
”
”
Craig Detweiler (iGods: How Technology Shapes Our Spiritual and Social Lives)
“
Sure, but…” Roz thinks about everything she uses Information for, all the time. “If you’re driving, and you come to an intersection, how do you know what vehicles might be approaching from either side?”
“Well, we try not to design blind intersections,” Maria says. “And we use mirrors.”
Mirrors! Ingenious. “You must have found it much easier than we did when Information went out during the elections,” Roz says, trying to offer Maria’s odd cult some credit.
”
”
Malka Ann Older (Null States (The Centenal Cycle, #2))
“
In the past, security guides often suggested that it was necessary to overwrite multiple times (or “passes”). This may be true to some extent for flash media, as described below, but is apparently no longer true for traditional magnetic hard drives. See National Institute of Standards and Technology, NIST Special Publication 800-88, Revision 1. “Guidelines for Media Sanitization” (Dec. 2014) (“For storage devices containing magnetic media, a single overwrite pass with a [fixed] pattern such as binary zeroes typically hinders recovery of data even if state of the art laboratory techniques are applied to attempt to retrieve the data.”)
”
”
Sophia Cope (Digital Privacy at the U.S. Border: Protecting the Data on Your Devices and in the Cloud)
“
Greater personalization requires greater transparency. Absolute personalization (vanity) requires absolute transparency (no privacy). If I prefer to remain private and opaque to potential friends and institutions, then I must accept I will be treated generically, without regard to my specific particulars. I’ll be an average number.
”
”
Kevin Kelly (The Inevitable: Understanding the 12 Technological Forces That Will Shape Our Future)
“
That capability at any time could be turned around on the American people and no American would have any privacy left, such is the capability to monitor everything—telephone conversations, telegrams, it doesn’t matter. There would be no place to hide. If this government ever became a tyrant … the technological capacity that the intelligence community has given the government could enable it to impose total tyranny, and there would be no way to fight back because the most careful effort to combine together in resistance … is within the reach of the government to know.
”
”
Glenn Greenwald (No Place to Hide: Edward Snowden, the NSA, and the U.S. Surveillance State)
“
Some saw cryptography as a great technological equalizer, a mathematical tool that would put the lowliest privacy-seeking individual on the same footing as the greatest national intelligence agencies.
”
”
Niels Ferguson (Cryptography Engineering)
“
Web3 is the next-gen internet powered by blockchain technology, ultimately preventing censorship and mass surveillance by government and third-party organizations. It is not just about the ape pictures on OpenSea, it comprises an enhanced web browser, an encryption-first email distribution framework, a decentralized social media that gives power back to you, and much more services that are equally distributed to put you in charge of your data to curb exploitation.
”
”
Olawale Daniel
“
Best Season for Hair Removal has Arrived!
Here at Ulike, we love to nerd out over every hair removal detail. Our team of experts explores the science behind smooth and beautiful skin, so you can focus on the results!
According to the study, starting IPL during the "Anagen phase" (also known as Fall by normal people) is the best time to break your hair’s growth cycle for longer-lasting effects. Meanwhile, the clothing we wear during fall can cover our skin from deadly UV light to get a better result. Therefore, start your IPL treatment now, and shine like a million dollars in summer.
Can I Achieve Permanent Effect At Home?
Yes, you can!
People want to solve the hair removal issue once and for all. And this is what Ulike's IPL hair removal can do. With many years of experience developing home-use IPL devices, Ulike's IPL hair removal handset is capable of producing 19.8J of high energy (energy density 6J/cm²) to bring better and faster permanent results within 4-6 weeks.
Ulike's product adapts clinical-grade sapphire ice-touch technology that can effectively lower the epidermal temperature of the effective area to 50°F~104°F while emitting high-energy light simultaneously, effectively avoiding burning and pain during use.
In comparison, most hair removal devices on the market light window reached temperatures of 158°F~212°F during use, hence having a sense of burning.
Will it Cost More? No! It Only Cost Less!
Compared with Ulike at-home hair removal and clinic hair removal, both methods can achieve permanent hair removal, and both adapted sapphire Ice-Cooling technology. BUT, The Ulike IPL hair remover can provide you with more privacy and sanitation with only 2.5% cost of doing hair removal in a clinic.
Ulike Sapphire AIR White IPL Hair Removal Handset at the price of $309
Main Features:
Painless hair removal by Sapphire Ice-Cooling technology
Savings more than $10k expense than hair removal at a beauty salon
Salon-Grade hair removal in the comfort of your own home
Safety and hygiene are guaranteed with no skin damage
Easy to sensitize with its flat window design
Treat all body parts' hair with five intensity levels
284grams ultra-light compact design for travel convenience
”
”
Hair Removal
“
The American Library Association (ALA) lists eleven core values of librarianship: access, confidentiality/privacy, democracy, diversity, education and lifelong learning, intellectual freedom, preservation, the public good, professionalism, service, and social responsibility.
”
”
Kenneth J. Varnum (The Top Technologies Every Librarian Needs to Know: A LITA Guide)
“
Technology was not viewed as an invasive or a threatening tool. In fact, the state of technology was at the level where there was convincing excitement to accept and access its advancements.
”
”
Mitta Xinindlu
“
Unless we understand our natural intelligence, we will not be able to manage Artificial Intelligence. We will only use it to feed our already bloated ego."
As we venture into the era of Artificial Intelligence, it is essential to reflect on the profound wisdom in this statement. Understanding our own natural intelligence - our cognitive abilities, emotions, and ethical considerations - is the key to responsibly harnessing the potential of AI.
Let's embark on a journey of self-awareness and humility. By recognizing our strengths and limitations as humans, we can identify the areas where AI can complement and enhance our capabilities, rather than overshadowing or replacing them.
With a clear understanding of our own biases and motivations, we can ensure that AI is developed and utilized in ways that benefit all of humanity. Let's not allow AI to reinforce harmful behaviors or serve as a tool to feed our egos, rather let's channel its power for the greater good.
By embracing our humanity and acting responsibly, we can manage AI in a manner that promotes ethics, privacy, and societal well-being. Let's use AI as a force for positive advancements, lifting each other and creating a more inclusive and equitable world.
#EmbraceHumanity #TechnologyForGood
”
”
Chidi Ejeagba
“
Forget privacy; forget autonomy. You’re going to hand over the keys to your one and only mortal vessel, and you’re expected to pay for the privilege?!
”
”
Cliff Jones Jr. (Dreck)
“
We live in an age when private life is being destroyed. The police destroy it in Communist countries, journalists threaten it in democratic countries, and little by little the people themselves lose their taste for private life and their sense of it. Life when one can’t hide from the eyes of others — that is hell.
”
”
Milan Kundera
“
In the past, music was always a live, and often a communal, activity. Somebody had to be playing music for it to be heard; and somebody had to be present in order to appreciate it. Now we can listen to whatever music we choose, whenever we want, and, perhaps most significant of all, we can do so in privacy. Music has been transformed from something with a primarily live and communal focus (live concerts notwithstanding) and has become most commonly an item of consumption for the individual. If expressive individualism has come to focus on personal satisfaction as the meaning of life, technology has served that cause well.
”
”
Carl R. Trueman (Strange New World: How Thinkers and Activists Redefined Identity and Sparked the Sexual Revolution)
“
Given the historical importance and exponential power ascribed to Convergence technologies, a comprehensive vision is required that describes how these technologies will be best aligned with our core human values and what the implications will be if they are not. Piecemeal descriptions and industry-centric narratives do not provide the holistic vantage point from which we must consider how best to make the critically important decisions regarding matters of privacy, security, interoperability, and trust in an age where powerful computing will literally surround us. If we fail to make the right societal decisions now, as we are laying the digital infrastructure for the 21st century, a dystopic “Black Mirror” version of our future could become our everyday reality. A technological “lock-in” could occur, where dysfunctional and/or proprietary technologies become permanently embedded into the infrastructure of our global systems leaving us powerless to alter the course of their direction or ferocity of their speed. A Web 3.0 that continues its march toward centralized power and siloed platforms would not only have crippling effects on innovation, it would have chilling effects on our freedom of speech, freedom of thought, and basic human rights. This should be enough to compel us to take thoughtful but aggressive action to prevent such a lock-in from occurring at all costs. Thankfully, there is also a “white mirror” version of Web 3.0, a positive future not well described in our sci-fi stories. It’s the one where we intentionally and consciously harness the power of the Convergence and align it with our collective goals, values, and greatest ambitions as a species. In the “white mirror” version, we have the opportunity to use these technologies to assist us in working together more effectively to improve our ecologies, economies, and governance models, and leave the world better than the one we entered.
”
”
Gabriel Rene (The Spatial Web: How Web 3.0 Will Connect Humans, Machines, and AI to Transform the World)
“
If you listen to the [Israeli] arms companies themselves when they go to Europe to sell their products, they keep repeating the same mantra,” he said. “They say that these Europeans are so naive. They think that they can have human rights. They think that they can have privacy but that’s nonsense. We know that the only way to fight terrorism is to judge people by how they look and the color of their skin.
”
”
Antony Loewenstein (The Palestine Laboratory: How Israel Exports the Technology of Occupation Around the World)
“
Online privacy is the cornerstone of a democratic cyberspace, a fundamental right that empowers individuals to shape their digital identity. It's not just about hiding; it's about the power to choose what facets of our lives we share in the virtual arena. As technology advances, the call to preserve online privacy becomes more urgent, guiding us towards a future where the digital landscape is a reflection of our choices, not an open book for surveillance.
”
”
James William Steven Parker
“
In the relentless march of technological progress, online privacy emerges as the last bastion of personal freedom. It's a commitment to protecting our right to navigate the internet without the constant gaze of prying eyes. Online privacy isn't a privilege; it's an essential thread in the tapestry of digital citizenship, reminding us that our online interactions should be shaped by our agency, not subject to external scrutiny.
”
”
James William Steven Parker
“
In the complex interplay of technology and society, online privacy emerges as a defining factor in preserving personal agency. It's about reclaiming control over the narrative of our digital lives, ensuring that our online interactions remain a reflection of our choices. As we traverse the vast expanse of the internet, the importance of safeguarding online privacy becomes more evident, urging us to foster a digital landscape where individuals can thrive without compromising their autonomy.
”
”
James William Steven Parker
“
In the intricate dance of the digital era, online privacy takes center stage as the guardian of personal autonomy. It's about reclaiming control over the narrative of our digital lives, where every click and keystroke is a reflection of our agency. As technology evolves, the importance of preserving online privacy becomes more profound, urging us to forge a path where individuals can explore the vast expanse of the internet without sacrificing the essence of who they are.
”
”
James William Steven Parker
“
… the desire to make everything easy, to sacrifice autonomy and privacy for convenience. That's what technology is […] A concession to laziness in the devaluing of human effort […] Not all technology is the same. I encourage you not to get tripped up by semantics. A device that you carry with you everywhere you go, a device that monitors and watches you, is not the same as one that sits in your house and plays music or dries your hair.
”
”
Veronica Roth (Poster Girl)
“
Surveillance companies globally expressed excitement about the prospect of their services being used during the pandemic. Israeli corporations were at the front of the queue. Carbyne, founded by former members of Israeli military intelligence, was promoted as a next-generation 911 emergency call service that requested a user’s access to their mobile phone, access that then allowed use of its video and location services to better serve the individual. It was used during the pandemic to accurately locate Covid patients. The threats to privacy were obvious but barely mentioned in most of the positive media around the product.68 It was backed by former Israeli Prime Minister Ehud Barak, billionaire investor Peter Thiel, and a small investment from (now-deceased) pedophile Jeffrey Epstein.
”
”
Antony Loewenstein (The Palestine Laboratory: How Israel Exports the Technology of Occupation Around the World)
“
I argued that AI introduced a host of threats requiring proactive responses. It might lead to massive invasions of privacy or ignite a misinformation apocalypse.
”
”
Mustafa Suleyman (The Coming Wave: Technology, Power, and the Twenty-first Century's Greatest Dilemma)
“
the technical ignorance of elected politicians who are hardly credible in providing oversight or contemplating regulation; profound disagreements about what we value and how trade-offs should be made, whether in regard to data privacy, free speech, and content moderation or automation and the future of work; the slow, painstaking consideration of legislation that seems to generate competing bills—so that everyone has his or her name on one—without generating significant progress, especially in a highly polarized political environment; and the strong status quo bias of democratic institutions, which means that policy change is slow and sticky, making it difficult for regulators to respond flexibly and adaptably to new developments in technology.
”
”
Rob Reich (System Error: How Big Tech Disrupted Everything and Why We Must Reboot)
“
In 1983, Michael W. Doyle commented on the common observation that democracies almost never wage war on one another. Understanding the reasons for this phenomenon may be crucial to our hopes for preventing devastating conflict in the next generation. Which attributes of democracy foster this essential trait of mutual nonaggression?
”
”
David Brin (The Transparent Society: Will Technology Force Us To Choose Between Privacy And Freedom?)
“
It was like setting up a guillotine in the public square.You don't expect a thousand people to line up to put their heads in it.
”
”
Dave Eggers
“
Privacy inevitably falls prey to technology.
”
”
Albert Thomas Bifarelli
“
Keep as few secrets as possible. The remaining ones will be easier to protect.
”
”
David Brin (The Transparent Society: Will Technology Force Us To Choose Between Privacy And Freedom?)
“
free speech should be viewed as sacred and inviolable not simply for its own sake, but for utterly pragmatic reasons. Only through an active, vibrant, noisy ferment of criticism can blunders be discovered before they bring nations crashing down. Moreover, we can never tell in advance which criticism will later prove right; therefore, we must allow, foster, and even encourage all the criticism we can get.
”
”
David Brin (The Transparent Society: Will Technology Force Us To Choose Between Privacy And Freedom?)
“
So if it appears that my argument supports the necessity of lawyers, please accept that I say it with reluctant awareness that things would be worse without them.
”
”
David Brin (The Transparent Society: Will Technology Force Us To Choose Between Privacy And Freedom?)
“
Strong privacy advocates—especially those promoting encryption and anonymity—may deny that this phenomenon is a direct physical corollary of their message, so I will let the reader decide whether a philosophy that relies on cybernetic gates, walls, and coded locks is any different in its underlying basis—fear.
”
”
David Brin (The Transparent Society: Will Technology Force Us To Choose Between Privacy And Freedom?)
“
Someday we may look back on this era as a time when rational compromises might have enhanced both security and liberty, but those compromises were refused because each side was so busy self-righteously being right.
”
”
David Brin (The Transparent Society: Will Technology Force Us To Choose Between Privacy And Freedom?)
“
Self-righteousness is an especially heady condition that all of us have experienced at one time or another. Those who are honest will admit there is something sickly-sweet and alluring about knowing you are right, while others are terribly wrong.
”
”
David Brin (The Transparent Society: Will Technology Force Us To Choose Between Privacy And Freedom?)
“
one of the most fascinating and effective kinds of lying is self-deception.
”
”
David Brin (The Transparent Society: Will Technology Force Us To Choose Between Privacy And Freedom?)
“
If you enjoy sex or explore aspects of your sexual identity using technology, that experience should belong to you. Only you should get to decide whether it was a good or bad thing to do.
”
”
Violet Blue (The Smart Girl's Guide to Privacy: Practical Tips for Staying Safe Online)
“
It seems that we are back where we started. Historically, as small tribes of hunter and gatherers we had no concept of privacy. Then, as we became rooted in towns and villages, we continued to live primarily in the public square where everyone “knew our business.” With industrialization and the development of large dense urban areas, privacy was possible for the more privileged members of society and then, finally, for all of us. We have come full circle. Again, we live our lives in a public, although now digital, square where any person, company, or organization around the world can watch us, whether we want them to or not. There is more known about us than ever before. What does privacy mean in the world we now live in? This is not the first time (and certainly won’t be the last) that technology has leapfrogged ethics, bringing us to the age old
question of what we can do versus what we should do. The question we should all be asking ourselves, our communities, our societies, and our leaders is this: does privacy still matter in the digital age? Yes, privacy still matters in this age of big data and digital devices. But what it means, how we regulate and enforce it, what we are willing to give up for it, how much power we give our governments over it, remains to be seen. Like it or not, we live in interesting times.
”
”
Terence Craig (Privacy and Big Data: The Players, Regulators, and Stakeholders)
“
Since the 1970s, there has been a continual tendency to over-estimate the surveillance capacities of new technologies. In the sense of the physical invasion of privacy, surveillance comprises five sequential events: the capacity to observe; the act of observation; comprehension of what is seen; intervention on the basis of that knowledge; and a consequent change of behaviour by the subject. Too often the final four have been assumed from the possibility of the first.
”
”
David Vincent (Privacy: A Short History)
“
Personal Thinking Blockchains More speculatively for the farther future, the notion of blockchain technology as the automated accounting ledger, the quantized-level tracking device, could be extensible to yet another category of record keeping and administration. There could be “personal thinking chains” as a life-logging storage and backup mechanism. The concept is “blockchain technology + in vivo personal connectome” to encode and make useful in a standardized compressed data format all of a person’s thinking. The data could be captured via intracortical recordings, consumer EEGs, brain/computer interfaces, cognitive nanorobots, and other methodologies. Thus, thinking could be instantiated in a blockchain — and really all of an individual’s subjective experience, possibly eventually consciousness, especially if it’s more precisely defined. After they’re on the blockchain, the various components could be administered and transacted — for example, in the case of a post-stroke memory restoration. Just as there has not been a good model with the appropriate privacy and reward systems that the blockchain offers for the public sharing of health data and quantified-self-tracking data, likewise there has not been a model or means of sharing mental performance data. In the case of mental performance data, there is even more stigma attached to sharing personal data, but these kinds of “life-streaming + blockchain technology” models could facilitate a number of ways to share data privately, safely, and remuneratively. As mentioned, in the vein of life logging, there could be personal thinking blockchains to capture and safely encode all of an individual’s mental performance, emotions, and subjective experiences onto the blockchain, at minimum for backup and to pass on to one’s heirs as a historical record. Personal mindfile blockchains could be like a next generation of Fitbit or Apple’s iHealth on the iPhone 6, which now automatically captures 200+ health metrics and sends them to the cloud for data aggregation and imputation into actionable recommendations. Similarly, personal thinking blockchains could be easily and securely recorded (assuming all of the usual privacy concerns with blockchain technology are addressed) and mental performance recommendations made to individuals through services such as Siri or Amazon’s Alexa voice assistant, perhaps piped seamlessly through personal brain/computer interfaces and delivered as both conscious and unconscious suggestions. Again perhaps speculatively verging on science fiction, ultimately the whole of a society’s history might include not just a public records and document repository, and an Internet archive of all digital activity, but also the mindfiles of individuals. Mindfiles could include the recording of every “transaction” in the sense of capturing every thought and emotion of every entity, human and machine, encoding and archiving this activity into life-logging blockchains.
”
”
Melanie Swan (Blockchain: Blueprint for a New Economy)
“
United States is committed to protecting privacy. It is an element of individual dignity and an aspect of participation in democratic society. To an increasing extent, privacy protections have become critical to the information-based economy. Stronger consumer data privacy protections will buttress the trust that is necessary to promote the full economic, social, and political uses of networked technologies. The increasing quantities of personal data that these technologies subject to collection, use, and disclosure have fueled innovation and significant social benefits. We can preserve these benefits while also ensuring that our consumer data privacy policy better reflects the value that Americans place on privacy and bolsters trust in the Internet and other networked technologies. The framework set forth in the preceding pages provides a way to achieve these goals. The Consumer Privacy Bill of Rights should be the legal baseline that governs consumer data privacy in the United States. The Administration will work with Congress to bring this about, but it will also work with privatesector stakeholders to adopt the Consumer Privacy Bill of Rights in the absence of legislation. To encourage adoption, the Department of Commerce will convene multistakeholder processes to encourage the development of enforceable, context-specific codes of conduct. The United States Government will engage with our international partners to increase the interoperability of our respective consumer data privacy frameworks. Federal agencies will continue to develop innovative privacy-protecting programs and guidance as well as enforce the broad array of existing Federal laws that protect consumer privacy. A cornerstone of this framework is its call for the ongoing participation of private-sector stakeholders. The views that companies, civil society, academics, and advocates provided to the Administration through written comments, public symposia, and informal discussions have been invaluable in shaping this framework. Implementing it, and making progress toward consumer data privacy protections that support a more trustworthy networked world, will require all of us to continue to work together★ 45 ★
”
”
Anonymous
“
Metaphorically speaking, some very bright people suggest that citizens of the twenty-first century will be best protected by masks and shields, while I prefer the image of a light saber.
”
”
David Brin (The Transparent Society: Will Technology Force Us To Choose Between Privacy And Freedom?)
“
Would we be tormenting ourselves over the Kennedy assassination today if fifty cameras had been rolling, instead of just poor Abraham Zapruder’s?
”
”
David Brin (The Transparent Society: Will Technology Force Us To Choose Between Privacy And Freedom?)
“
In principle, an open society sees information flow as a good thing, to be hampered only in the presence of strong evidence that harm cannot be prevented by any other means.
”
”
David Brin (The Transparent Society: Will Technology Force Us To Choose Between Privacy And Freedom?)
“
We are, at our core, information pack rats and inveterate correlators.
”
”
David Brin (The Transparent Society: Will Technology Force Us To Choose Between Privacy And Freedom?)
“
Demonstrating some of the proposed new techniques of encrypted uniqueness verification that can be embedded in each customer’s use-copy of a given work.
”
”
David Brin (The Transparent Society: Will Technology Force Us To Choose Between Privacy And Freedom?)
“
It’s easy to think of privacy and publicity as opposing concepts, and a lot of technology is built on the assumption that you have to choose to be private or public. Yet in practice, both privacy and publicity are blurred. Rather than eschewing privacy when they encounter public spaces, many teens are looking for new ways to achieve privacy within networked publics. As such, when teens develop innovative strategies to achieve privacy, they often reclaim power by doing so. Privacy doesn’t just depend on agency; being able to achieve privacy is an expression of agency.
”
”
Danah Boyd (It's Complicated: The Social Lives of Networked Teens)
“
Founded in 2011, ToyTalk already produces popular animated conversational apps — among them the Winston Show and SpeakaZoo — that encourage young children to engage in complex dialogue with a menagerie of make-believe characters. Now the company’s technology, originally designed for two-dimensional characters on-screen, is poised to power tangible playthings that children hold in their hands. This fall, Mattel plans to introduce Hello Barbie, a Wi-Fi enabled version of the iconic doll, which uses ToyTalk’s system to analyze a child’s speech and produce relevant responses. “She’s a huge character with an enormous back story,” Mr. Jacob says of Barbie. “We hope that when she’s ready, she will have thousands and thousands of things to say and you can speak to her for hours and hours.” [Video: Hello Barbie is World's First Interactive Barbie Doll Watch on YouTube.] It was probably inevitable that the so-called Internet of Things — those Web-connected thermostats and bathroom scales and coffee makers and whatnot — would beget the Internet of Toys. And just like Web-connected consumer gizmos that can amass details about their owners and transmit that data for remote analysis, Internet-connected toys hold out the tantalizing promise of personalized services and the risk of privacy perils.
”
”
Anonymous
“
Similarly, those Internet tycoons who are apparently so willing to devalue our privacy are vehemently protective of their own. Google insisted on a policy of not talking to reporters from CNET, the technology news site, after CNET published Eric Schmidt’s personal details—including his salary, campaign donations, and address, all public information obtained via Google—in order to highlight the invasive dangers of his company. Meanwhile, Mark Zuckerberg purchased the four homes adjacent to his own in Palo Alto, at a cost of $30 million, to ensure his privacy. As CNET put it, “Your personal life is now known as Facebook’s data. Its CEO’s personal life is now known as mind your own business.” The same contradiction is expressed by the many ordinary citizens who dismiss the value of privacy yet nonetheless have passwords on their email and social media accounts. They put locks on their bathroom doors; they seal the envelopes containing their letters. They engage in conduct when nobody is watching that they would never consider when acting in full view. They say things to friends, psychologists, and lawyers that they do not want anyone else to know. They give voice to thoughts online that they do not want associated with their names. The many pro-surveillance advocates I have debated since Snowden blew the whistle have been quick to echo Eric Schmidt’s view that privacy is for people who have something to hide. But none of them would willingly give me the passwords to their email accounts, or allow video cameras in their homes.
”
”
Anonymous
“
The United States government has perfected a technological capability that enables us to monitor the messages that go through the air.… That capability at any time could be turned around on the American people, and no American would have any privacy left, such is the capability to monitor everything—telephone conversations, telegrams, it doesn’t matter. There would be no place to hide. —Senator Frank Church, Chair, Senate Select Committee to Study Governmental Operations with Respect to Intelligence Activities, 1975
”
”
Anonymous
“
The larger looming issue is the very real loss of personal privacy and the lack of transparency about how it happens. The marvels of the contextual age are based on a tradeoff: the more the technology knows about you, the more benefits you will receive.
”
”
Robert Scoble (Age of Context: Mobile, Sensors, Data and the Future of Privacy)
“
Correlations made by big data are likely to reinforce negative bias. Because big data often relies on historical data or at least the status quo, it can easily reproduce discrimination against disadvantaged racial and ethnic minorities. The propensity models used in many algorithms can bake in a bias against someone who lived in the zip code of a low-income neighborhood at any point in his or her life. If an algorithm used by human resources companies queries your social graph and positively weighs candidates with the most existing connections to a workforce, it makes it more difficult to break in in the first place. In effect, these algorithms can hide bias behind a curtain of code. Big data is, by its nature, soulless and uncreative. It nudges us this way and that for reasons we are not meant to understand. It strips us of our privacy and puts our mistakes, secrets, and scandals on public display. It reinforces stereotypes and historical bias. And it is largely unregulated because we need it for economic growth and because efforts to try to regulate it have tended not to work; the technologies are too far-reaching and are not built to recognize the national boundaries of our world
”
”
Alec J. Ross (The Industries of the Future)
“
Correlations made by big data are likely to reinforce negative bias. Because big data often relies on historical data or at least the status quo, it can easily reproduce discrimination against disadvantaged racial and ethnic minorities. The propensity models used in many algorithms can bake in a bias against someone who lived in the zip code of a low-income neighborhood at any point in his or her life. If an algorithm used by human resources companies queries your social graph and positively weighs candidates with the most existing connections to a workforce, it makes it more difficult to break in in the first place. In effect, these algorithms can hide bias behind a curtain of code. Big data is, by its nature, soulless and uncreative. It nudges us this way and that for reasons we are not meant to understand. It strips us of our privacy and puts our mistakes, secrets, and scandals on public display. It reinforces stereotypes and historical bias. And it is largely unregulated because we need it for economic growth and because efforts to try to regulate it have tended not to work; the technologies are too far-reaching and are not built to recognize the national boundaries of our world’s 196 sovereign nation-states. Yet would it be best to try to shut down these technologies entirely if we could? No. Big data simultaneously helps solve global challenges while creating an entirely new set of challenges. It’s our best chance at feeding 9 billion people, and it will help solve the problem of linguistic division that is so old its explanation dates back to the Old Testament and the Tower of Babel. Big data technologies will enable us to discover cancerous cells at 1 percent the size of what can be detected using today’s technologies, saving tens of millions of lives. The best approach to big data might be one put forward by the Obama campaign’s chief technology officer, Michael Slaby, who said, “There’s going to be a constant mix between your qualitative experience and your quantitative experience. And at times, they’re going to be at odds with each other, and at times they’re going to be in line. And I think it’s all about the blend. It’s kind of like you have a mixing board, and you have to turn one up sometimes, and turn down the other. And you never want to be just one or the other, because if it’s just one, then you lose some of the soul.” Slaby has made an impressive career out of developing big data tools, but even he recognizes that these tools work best when governed by human judgment. The choices we make about how we manage data will be as important as the decisions about managing land during the agricultural age and managing industry during the industrial age. We have a short window of time—just a few years, I think—before a set of norms set in that will be nearly impossible to reverse. Let’s hope humans accept the responsibility for making these decisions and don’t leave it to the machines.
”
”
Alec J. Ross (The Industries of the Future)
“
The kid’s ATM card was accessed yesterday at 6:18 P.M.,” Esperanza said. “He took out $180. A First Philadelphia branch on Porter Street in South Philly.” “Thanks.” Information like that was not difficult to obtain. Anybody with an account number could pretty much do it with a phone by pretending they were the account holder. Even without one, any semi-human who had ever worked in law enforcement had the contacts or the access numbers or at least the wherewithal to pay off the right person. It didn’t take much anymore, not with today’s overabundance of user-friendly technology. Technology did more than depersonalize; it ripped your life wide open, gutted you, stripped away any pretense of privacy. A
”
”
Harlan Coben (Back Spin (Myron Bolitar, #4))
“
The U.S. Department of Education changed the education privacy regulations in at least two crucial ways. Firstly, it increased the number of players that could have access to your child’s centralized personal data to include, not just your child’s teachers, but any organization or group tangentially involved in your child’s education. This can include testing, technology, textbook, and research companies, just to name a few examples. Secondly, it no longer requires parent notification or permission when it shares your child’s personal data with these chosen groups or companies.
”
”
Brad McQueen (The Cult of Common Core: Obama's Final Solution for Your Child's Mind and Our Country's Exceptionalism)