OPINION: Freedom and privacy, R.I.P.

"A lack of lifestream privacy makes it possible, at the least, for businesses to manipulate you"

Freedom and privacy, in any meaningful sense, are dead. I know, I know ... I've written about this topic before but that was in the context of our "factual" privacy, which is about access to what you might think of as "static" data about you. Now we have to recognize the death of our "realtime" or "lifestream" privacy: the freedom to go about our business unobserved and anonymously.

Factual privacy is different from lifestream privacy. The former is about access to facts such as the color of your hair and eyes, your ethnicity, your height and weight, your income, your cholesterol level and so on. Those are all data points that create a snapshot of you.

IN THE NEWS: Commerce Department will push privacy codes of conduct

Almost 10 years ago I wrote a Backspin column titled "The Paperwork of Freedom" in which I discussed my knee surgery and the endless medical forms I had to fill in over and over again.

My point was that, while digitizing medical records may be the way of the future, the sheer messiness of paperwork ensures it's a lot harder for your "factual" privacy to be breached. Unfortunately we now know that all of our factual data, not just the medical stuff, is becoming digital whether we like it or not.

On the other hand, lifestream privacy involves behavioral data such as where you go and when, what you look at, and even how you respond; it's more like a movie of you. Taken to its extreme it also includes who you talk to, telephone and email with, and even what you talk about.

A lack of lifestream privacy makes it possible, at the least, for businesses to manipulate you. For example, consider online shops that track and test your behavior.

These stores "watch" where you linger, note what you look at, monitor for indications of interest, and then conclude, for example, from the shirts and pants you've looked at, that you like a particular shade of yellow and that you're looking for casual clothing. As a result, when you visit the shoe department, the shop makes sure you see the yellow tennis shoes first.

How does that make you feel? In that scenario you would have factual privacy (at least, until you enter your credit card at checkout), so you would be effectively anonymous, but all the same you would have been measured and manipulated, possibly over multiple visits.

While you might look at this as a good thing (your desires and interests are being addressed far more efficiently), you also need to recognize that the shop will use the intelligence it's gained about your preferences to manipulate you, at the very least to "up-sell" you related products such as, for example, socks in colors they determine might appeal to you.

Similar tracking techniques are now in use in the real world, and the connection of your factual data to your lifestream data on- and offline is what many businesses are trying to do ... until they get caught..

Thomas Jefferson has often been quoted as saying, "The price of freedom is eternal vigilance." Alas, you can be as vigilant as you please and still have to stand by and watch your freedom being chipped away, a piece at a time, until there's nothing left. Which, it could be argued, is where we already are. Freedom and privacy, rest in pieces.

Gibbs mourns our loss in Ventura, Calif. Your condolences to backspin@gibbs.com.

Read more about wide area network in Network World's Wide Area Network section.

Join the CSO newsletter!

Error: Please check your email address.

Tags Tracking / antitrackingUtilitiessecuritysoftwareprivacy

More about GoogleIONLAN

Show Comments

Featured Whitepapers

Editor's Recommendations

Solution Centres

Stories by Mark Gibbs

Latest Videos

  • 150x50

    CSO Webinar: Will your data protection strategy be enough when disaster strikes?

    Speakers: - Paul O’Connor, Engagement leader - Performance Audit Group, Victorian Auditor-General’s Office (VAGO) - Nigel Phair, Managing Director, Centre for Internet Safety - Joshua Stenhouse, Technical Evangelist, Zerto - Anthony Caruana, CSO MC & Moderator

    Play Video

  • 150x50

    CSO Webinar: The Human Factor - Your people are your biggest security weakness

    ​Speakers: David Lacey, Researcher and former CISO Royal Mail David Turner - Global Risk Management Expert Mark Guntrip - Group Manager, Email Protection, Proofpoint

    Play Video

  • 150x50

    CSO Webinar: Current ransomware defences are failing – but machine learning can drive a more proactive solution

    Speakers • Ty Miller, Director, Threat Intelligence • Mark Gregory, Leader, Network Engineering Research Group, RMIT • Jeff Lanza, Retired FBI Agent (USA) • Andy Solterbeck, VP Asia Pacific, Cylance • David Braue, CSO MC/Moderator What to expect: ​Hear from industry experts on the local and global ransomware threat landscape. Explore a new approach to dealing with ransomware using machine-learning techniques and by thinking about the problem in a fundamentally different way. Apply techniques for gathering insight into ransomware behaviour and find out what elements must go into a truly effective ransomware defence. Get a first-hand look at how ransomware actually works in practice, and how machine-learning techniques can pick up on its activities long before your employees do.

    Play Video

  • 150x50

    CSO Webinar: Get real about metadata to avoid a false sense of security

    Speakers: • Anthony Caruana – CSO MC and moderator • Ian Farquhar, Worldwide Virtual Security Team Lead, Gigamon • John Lindsay, Former CTO, iiNet • Skeeve Stevens, Futurist, Future Sumo • David Vaile - Vice chair of APF, Co-Convenor of the Cyberspace Law And Policy Community, UNSW Law Faculty This webinar covers: - A 101 on metadata - what it is and how to use it - Insight into a typical attack, what happens and what we would find when looking into the metadata - How to collect metadata, use this to detect attacks and get greater insight into how you can use this to protect your organisation - Learn how much raw data and metadata to retain and how long for - Get a reality check on how you're using your metadata and if this is enough to secure your organisation

    Play Video

  • 150x50

    CSO Webinar: How banking trojans work and how you can stop them

    CSO Webinar: How banking trojans work and how you can stop them Featuring: • John Baird, Director of Global Technology Production, Deutsche Bank • Samantha Macleod, GM Cyber Security, ME Bank • Sherrod DeGrippo, Director of Emerging Threats, Proofpoint (USA)

    Play Video

More videos

Blog Posts

Market Place