Digital Footprints: Navigating Privacy and Security in the Information Age

![blockchain]

Made with Canva

Dear Hive Friend and Hive Learner Members,

We are living in an era where most of the activity is in the digital world. Many real-life activities have been shifted to digital life, and this has led to the term "big data." All activities in the digital world create a database, and this data often contains sensitive information. This sensitive data may be used for good or for bad purposes based on the intention of the individual or group of persons who have access to this information. Every tiny activity in the digital world leaves a trail, and there is technology dedicated to analyzing this data.


As I mentioned, the information from the data we generate in the digital world can be used in good or bad ways for any individual or group of people. Let's take a simple example: many social media users often post their day-to-day activities on various platforms. Many times, they use the check-in feature, which shares the physical presence of someone on social media. By doing this, we are sharing our location with all unknown people on social media, and there are many ways that malicious individuals use to track someone.

The government is also tracking data and gathering information to use in many ways. I came across a news story some years back that was very interesting. It was about some people who used to throw big, high-profile parties but did not show the income source on their ITR. One wing of the government was gathering information from social media. Mostly, they were using the pictures uploaded on social media to get the information. They tried to analyze the expenditure for the parties and the number of events in a month. From the information, they got leads and came to know that the highlighted persons were spending lakhs and crores on those parties, and when they checked their ITR details, they were not convinced about the source of income. This was a big achievement for the government in capturing black money. It's not that the government only uses the technology for the good of society; there are many examples where the government used this to suppress voices against them. It is very easy for the government to ban the social media account of any individual or institution in the name of national security. The truth is they used the technology to target people who raised their voice on some issues and the government did not want to highlight those issues for their own gain. A recent incident was seen during the Farmer Protest of 2020-21. Many social media platforms were banned throughout the nation, and many were targeted personally for directly supporting the protest.


Some global companies are very strict when it comes to data security. I remember an incident involving the US government and Apple, where the government asked Apple to retrieve data from one iPhone. The news created a big noise when Apple denied the government's request. They had very good logic behind it: first was their data policy, and second was the technical issue. They declared that if they were to retrieve the data, it would open the back door for others also, which would be a more dangerous situation.


In my opinion, data and digital information are the personal property of any individual, and it's their own wish to make it personal or public. But it's also true that if the data or information is on social media, it will most likely become public as it's available to all. We as individuals also need to take care when we share information on the web domain or social media so that it does not give ill-minded people a chance to use it against us.


Please do share your views in comment section.


Let's Connect
Hive: @guurry123
Twitter: https://twitter.com/guurry123
Discord: guurry123

Posted Using InLeo Alpha



0
0
0.000
10 comments
avatar

This post has been manually curated by @steemflow from Indiaunited community. Join us on our Discord Server.

Do you know that you can earn a passive income by delegating to @indiaunited. We share more than 100 % of the curation rewards with the delegators in the form of IUC tokens. HP delegators and IUC token holders also get upto 20% additional vote weight.

Here are some handy links for delegations: 100HP, 250HP, 500HP, 1000HP.

image.png

100% of the rewards from this comment goes to the curator for their manual curation efforts. Please encourage the curator @steemflow by upvoting this comment and support the community by voting the posts made by @indiaunited..

This post received an extra 1.02% vote for delegating HP / holding IUC tokens.

0
0
0.000
avatar

Thanks for then support
!ALIVE

0
0
0.000
avatar

@indiaunited! You Are Alive so I just staked 0.1 $ALIVE to your account on behalf of @ guurry123. (2/10)

The tip has been paid for by the We Are Alive Tribe through the earnings on @alive.chat, feel free to swing by our daily chat any time you want, plus you can win Hive Power (2x 50 HP) and Alive Power (2x 500 AP) delegations (4 weeks), and Ecency Points (4x 50 EP), in our chat every day.

0
0
0.000
avatar

Hey guurry, thanks for this post and the topic you've chosen!

I mostly agree with your analysis.

One of the hurdles we're facing to use freely the Internet is that the biggest malicious players in that field, apart from the States, are the GAFAM (or "GAMMA") themselves - the very business model of entities like Meta(data, lol), Amazon or Google is based on spying on each and every one of our moves, purchases and decisions.

Apple is one of the worst in that respect: they apparently prevent anybody to access their clients data from outside, but do scan the iPhones pictures galleries, for instance, and know exactly at every moment what we're doing with OUR devices, that we paid in the first place. They're a key piece in today's technological totalitarianism.

I see decentralized social media, like Hive or Nostr, as an infrastructure that allows us to take back our privacy and freedom of speech.

0
0
0.000
avatar

Most of the internet users use the google and youtube as thought those platform are free to use but they are the data source for them and their main moto is to collect that data.
I do not know about the Nostr.. if you can through some light on same. is it similar to the Hive?

0
0
0.000
avatar

It's important to remember that our online activities leave traces that can be used for various purposes. Your example about the use of social media data for government investigations is intriguing and highlights the importance of online privacy. Thanks for sharing these thoughts! 🌟

0
0
0.000
avatar

Many persons do not know about the same and its dangerous some time..
!ALIVE !CTP !HBIT

0
0
0.000
avatar

@michupa! You Are Alive so I just staked 0.1 $ALIVE to your account on behalf of @ guurry123. (1/10)

The tip has been paid for by the We Are Alive Tribe through the earnings on @alive.chat, feel free to swing by our daily chat any time you want, plus you can win Hive Power (2x 50 HP) and Alive Power (2x 500 AP) delegations (4 weeks), and Ecency Points (4x 50 EP), in our chat every day.

0
0
0.000