Book: "Privacy in the Era of Big Data"
Privacy in the Era of Big Data
Looking around the world, most people expose their personal identity information to thieves, and business Groups are grappling with cyber espionage and patent thieves; banks are facing an increasing number of cyberattacks; social media networks and internet platforms are constantly under attack by malware and viruses.
Information security has long been a content that cannot be ignored.
For ordinary people, it seems relatively far away, because the leaked information will not cause obvious financial losses, nor will it cause physical harm. At most, it will be snooped by the other party. , it just doesn’t feel good.
Just like today’s smart advertising, one second you entered the search engine, and the next second an advertisement for the items you may need is pushed on another website. Your every move is being analyzed. Your portrait is constantly being labeled. You know that this is the technology of advertisers and big companies, but you can't refuse the free services they provide.
While you are watching television, at least one television provider attempts to observe you through the camera on the television or controller. Even power companies can record and analyze activity in your home.
Before this, cameras were known to be the most easily monitored electronic devices, but in today's era of the Internet of Everything, everything may be monitored, and there is even no way to defend against it.
For example, biometric technology.
Why would someone want to invade your privacy? Simply because the better he knows you, the more he can influence your decisions. We have described privacy as the protector of choice and even freedom. The more choices you have, the more you can live your life the way you want. Restricting freedom forces you to make choices that others want you to make.
Merchants use big data to accurately place advertisements and display products. However, not only this, their actions also include design and guidance. Even if the quality of some products is not good, they will be dissatisfied in some way. You purchase.
If it is used for negative behaviors such as deception and rogue clauses, it will be even more difficult to prevent.
On most home computers, you can find all the latest family photos, or any of the computer owner's paintings and music. You'll find the videos the person likes to watch, the songs he likes to play, and the radio he finds worth listening to. blog. You probably already know a lot about the person living in your home, but understanding their computer activity can provide a deeper understanding of their psychology.
To a certain extent, your mobile phone and computer contain all your information.
Especially stored photos, videos, recordings, documents, text, etc.
For ordinary people, the biggest threat is not that a large company in the cloud collects your data indiscriminately, but that people around you accurately monitor you to cause physical harm and psychological harm. Purpose.
If a picture is worth a thousand words, then adding sound to the picture is even better. Almost all modern personal computers have a microphone. When they're activated, these microphones can be used to listen to conversations, hear you singing in the shower, or gain insight into the mood of the person operating this computer. A hacker who takes over your computer can turn on the microphone to discern how many people are in the room and hear discussions taking place around the computer. Most computer cameras light up when activated, but most computer microphones have no visual or other display indication that it is listening or recording. Therefore, microphones are the most secretive way to spy on computer users.
Because it is so secretive, our attention is always focused on the camera.
Although it cannot collect richer video information, it can already do many unexpected things in terms of sound alone.
A biometric reader is not a complex machine. To build a biometric identifier, you only need a data input device that can continuously read images, videos, sounds and smells or a pattern recognizer.
The most common ones are fingerprint identification, followed by DNA identification.
Advanced ones include retinal scanning and voiceprint recognition.
For centuries, dogs have also been used to track scents and identify criminal suspects.
Surveillance techniques may start with programming your phone, laptop or tablet and using simple apps that can record photos, videos or audio for snooping. This monitoring is completely silent and difficult to detect. A spy might also buy something that looks like a toy airplane or helicopter and launch it to fly above your roof, recording hours of video and audio like a drone. Easily obtain everyday items such as stuffed animals and wall outlets. USB flash drives, clocks, calculators, pens and glasses can now be equipped with chips that can record images, text, photos and videos.
Everything around you may be a surveillance device in disguise, not just cell phones and computers.
You can also read the following articles:
How to quickly attract 5,000 fans in a month through a robot