Computers, Privacy & the Constitution

View   r4  >  r3  ...
MalcolmEvansFirstPaper 4 - 24 Mar 2017 - Main.MalcolmEvans
Line: 1 to 1
 
META TOPICPARENT name="FirstPaper"

It is strongly recommended that you include your outline in the body of your essay by using the outline as section titles. The headings below are there to remind you how section and subsection titles are formatted.

Line: 7 to 7
 -- By MalcolmEvans - 22 Mar 2017
Changed:
<
<
If you already take your technological privacy seriously, this paper isn’t for you. However, if when reading about thinks such as the Snowden leaks, NSA spying, wiretapping (whether real or not), you’re initially alarmed, but then eventually tell yourself something along the lines of “it’s definitely an invasion of privacy, but I’m not doing anything wrong, so I have no reason to worry,” then I’m writing this paper directly for you. I used to be you. When people suggested I let go of things like my iPhone and Gmail for the sake of enhanced security I scoffed at the thought of my hindered productivity from the byproduct of using “inferior” products that were far less convenient Yet, slowly but surely I came to realize that even if I wasn’t doing anything wrong, I needed to take steps to protect my privacy; I’m nowhere close to leading the charge, but I’m getting nearer, and here’s my case to you to join me.
>
>
If you already take your technological privacy seriously, this paper isn’t for you. However, if when reading about things such as the Snowden leaks, NSA spying, wiretapping (whether real or not), you’re initially alarmed, but then eventually tell yourself something along the lines of “it’s definitely an invasion of privacy, but I’m not doing anything wrong, so I have no reason to worry,” then I’m writing this paper directly for you. I used to be you. When people suggested I let go of things like my iPhone and Gmail for the sake of enhanced security and privacy I scoffed at the thought of having my productivity hindered due to using "inferior," far less convenient products. Yet, slowly but surely I came to realize that even if I wasn’t doing anything wrong, I needed to take steps to protect my privacy; I’m nowhere close to leading the charge, but I’m taking steps, and the following is the first part of my case for you to join me.
 

The Technical

Changed:
<
<
The first hump to more privacy is getting over the fear of technology. Unfortunately, because the majority of Americans are deeply ingrained with the mindset of consumers, we learn to interact with products, and not how they are created. Overtime, this unawareness of how what we use operates solidifies into a seemingly unclimbable wall of information.; so unscalable that we lose hope of ever seeing the side of enlightenment. But this shouldn’t be the case for several reasons.
>
>
The first hump to more privacy is getting over the fear of technology. Unfortunately, because the majority of Americans are deeply ingrained with the mindset of consumers, we learn to interact with products, without knowing how they are created. Over time, this unawareness solidifies into a seemingly unclimbable wall; so unscalable that we lose hope of ever seeing the side of enlightenment and simply acquiesce to our ignorance. But this shouldn’t be the case for several reasons.
 

The Ease

Changed:
<
<
Increasing your privacy is easier than you think. (1) Part of you may have an aversion for doing so because of the assumption that increasing privacy requires being a computer wizard or completely overhauling their entire life, neither of which is true. In fact, there are many step-by-step tutorials that will walk you through things such as sending encrypted emails that which will protect the email’s content from being read by other entities than the intended recipients, and proxying your web traffic (2) which makes it difficult for others around you (like in coffee shops) to view your web traffic, and can allow you to mix your traffic with others, which in turn will make it harder to isolate your specific activity.

Notes

1 : When I say easier, I mean from a technological standpoint. It is not easy, for most, to give up technologies that make it “convenient” for them to perform certain functions, or to untangle themselves from technologies that have become deeply ingrained in their lives and way of being.

2 : This tutorial is designed specifically for those with Columbia email addresses, however, the concepts contained therein are generally applicable.


>
>
Increasing your privacy is easier than you think. (3) Part of you may have an aversion to doing so because of the assumption that increasing privacy requires being a computer wizard or completely overhauling their entire life, neither of which is true. In fact, there are many step-by-step tutorials that will walk you through things such as sending encrypted emails which will protect your email’s content from being read by entities other than the intended recipients, and proxying your web traffic (4) which makes it difficult for others around you (like in coffee shops) to view your web traffic, and can allow you to mix your traffic with others, which in turn will make it harder to isolate your specific activity.
 
Changed:
<
<
The reality is that almost all things you can do to increase your privacy are simply an exist somewhere in a tutorial format that assumes little to no prior technical knowledge/skills. I intentionally used the word “searchable” instead of “Googlable” because Google is not your friend when it comes to privacy because their business model is heavily centered on collecting information about your activities, including your browsing activities, and using this as a foundation for their advertising revenue model.
>
>
The reality is that almost all things you can do to increase your privacy exist somewhere as a tutorial that assumes little to no prior technical knowledge/skills. I intentionally used the word “searchable” instead of “Googlable” because Google is not your friend when it comes to privacy because their business model is heavily centered on collecting information about your activities, including your browsing activities, and using such information as a foundation for their revenue model.
 

The Community

Changed:
<
<
Before I started taking steps to reclaim my privacy, I wrongly assumed that in doing so I would become part of the select few who actually cared about privacy, and therefor would be alone in my efforts. I couldn’t have been more wrong. In fact, I was pleased to learn that a robust, extremely dedicated community focused on preserving privacy already existed. For instance the Tor Project exists to help people browse anonymously online, and works in part, because it is maintained by an extensive network of volunteers who are dedicated to furthering the protection of privacy. Another example is GnuPG which facilitates the encryption of communication.
>
>
Before I started taking steps to reclaim my privacy, I wrongly assumed that doing so I would make me part of the select few who actually cared about privacy, and that I would therefore be alone in my efforts. I couldn’t have been more wrong. In fact, I was pleased to learn that a robust, extremely dedicated community focused on preserving privacy already existed. For instance, the Tor Project exists to help people browse anonymously online, and works in part, because it is maintained by an extensive network of volunteers who are dedicated to furthering the protection of privacy. Another example is GnuPG which facilitates the encryption of communication.
 
Changed:
<
<
Perhaps most importantly, in addition to established organizations that are dedicated to helpin you reclaim your privacy, is the psycho-sociological tendencies of those within the “privacy community.” Specifically, the community is largely comprised of people who volunteer their time genuinely because they believe in the cause, and to that end, are open and willing to answer the questions you have, no matter how rudimentary they might be. This page provide a great example. In short, the standard tutorial provided to install a certain type of operating system didn’t specify how to deal with some of the quirks of dealing with Macs; so this person created a complimentary page to explain how to deal with the quirks, just to help people down the road. This is typical of the privacy community and should help, to an extent, lessen any fears you have that you might be alone on an island as you try to figure out this “tech stuff.”
>
>
Perhaps most importantly, in addition to established organizations that are dedicated to helping you reclaim your privacy, is the psycho-sociological tendencies of those within the “privacy community.” Specifically, the community is largely comprised of people who volunteer their time genuinely because they believe in the cause, and to that end, are open and willing to answer the questions you have, no matter how rudimentary they might be. This page provide a great example. In short, the standard tutorial provided to install a certain type of operating system didn’t specify how to deal with some of the quirks of dealing with Macs; so this person created a complementary page to explain how to deal with the quirks, just to help people down the road. This is typical of the privacy community and should help, to an extent, lessen any fears you have that you might be alone on an island as you try to figure out this “tech stuff.”
 

The Amount of Change / Work

Changed:
<
<
I briefly referenced this earlier but it’s important so it bares mentioning twice. Increasing your privacy does not require changing how you do everything. In fact, there are likely a few relatively painless steps (5) you can take to dramatically improve your privacy. For instance, learning how to proxy your web traffic, and shifting away from products such as Google or Yahoo can increase your privacy and security. In general, the popularity of these products make them greater targets for hackers and listeners who want your information. As I phrased to someone recently, a hacker or listener finds it easier to do their job when everyone is in the same room, as opposed to when people are scattered in different rooms and buildings. Using alternatives to popular products that have a mandate to further your security and privacy, specifically alternatives for emailing and web browsing, can greatly improve your privacy given the amount of time we as people spend on these two mediums.

Notes

5 : I use painless loosely here, to encourage you that the technological rigor behind the steps is relatively pain-free, but again, the psychology of changing how you’re used to doing something, may indeed be very painful.


>
>
I briefly referenced this earlier but it’s important so it bares mentioning twice. Increasing your privacy does not require changing how you do everything. In fact, there are likely a few relatively painless steps (6) you can take to dramatically improve your privacy. For instance, learning how to proxy your web traffic, and shifting away from products such as Google or Yahoo can increase your privacy and security. In general, the popularity of these products make them greater targets for hackers and listeners who want your information. As I phrased to someone recently, a hacker or listener finds it easier to do their job when everyone is in the same room, as opposed to when people are scattered in different rooms and buildings. Using alternatives to popular products that have a mandate to further your security and privacy is a first step, Specifically, you should find alternatives for emailing and web browsing, and doing so can greatly improve your privacy given the amount of time we as people spend on these two mediums.
 

Parting Words and Part 2(7)

Notes

7 : In part two of this series (forthcoming) I’m going to explore some of the practical reasons why learning to increase your privacy matters, as well as some of the theoretical lessons we’ve learned from history regarding why unfettered, ongoing invasions of privacy can lead to the deterioration of a society. Stay tuned!



Revision 4r4 - 24 Mar 2017 - 20:03:24 - MalcolmEvans
Revision 3r3 - 23 Mar 2017 - 05:12:48 - MalcolmEvans
This site is powered by the TWiki collaboration platform.
All material on this collaboration platform is the property of the contributing authors.
All material marked as authored by Eben Moglen is available under the license terms CC-BY-SA version 4.
Syndicate this site RSSATOM