Red Ice News

The Future is the Past

What Happens To Privacy When The Internet Is In Everything?
New to Red Ice? Start Here!

What Happens To Privacy When The Internet Is In Everything?

Source: techcrunch.com
This week Google’s Eric Schmidt was on a panel at the World Economic Forum in Davos, where he suggested that the future Internet will be, in one sense, invisible — because it will be embedded into everything we interact with.

“The Internet will disappear,” he predicted (via The Hollywood Reporter). “There will be so many IP addresses…so many devices, sensors, things that you are wearing, things that you are interacting with that you won’t even sense it. It will be part of your presence all the time.

“Imagine you walk into a room, and the room is dynamic. And with your permission and all of that, you are interacting with the things going on in the room.”

Comment: The guy in this video (Jason Silva) is pretty excited about perpetual WI-Fi, ubiquitous surveillance and "faux animism", which basically is replacement spiritualism for the new breed of atheist arising, putting all trust in the future:


"Future technology will give us everything you ever wanted. The future is going to be paradise." They call it the "techno rapture." Look out!


This is not an especially outlandish forecast, given the trajectory of connected devices. Analyst Gartner calculated there were some 3.8 billion such ‘smart objects’ in use last year, and forecast 4.9 billion this — rising to 25 billion in circulation by 2020. (The global human population was estimated at around seven billion, at the last count.) In other words the sensornet is here, it’s just not densely (or evenly) distributed yet.



Google already owns Nest, a maker of connected devices for the home, such as a smoke alarm and learning thermostat. Google-Nest also owns Dropcam, a Wi-Fi security camera maker. Mountain View is clearly making a bid to be the nexus of the ‘connected home’ — which, along with the ‘connected car’ (of course Google is also building driverless, Internet-tethered cars), is the early locus for the sensornet. See also: wearables (‘connected people’), and the fact smartphones are gaining additional embedded sensors, turning our pervasive pocket computers into increasingly sensory mobile data nodes.

One of Davos’ more outlandish (perhaps) predictions for our increasingly connected future came from a group of Harvard professors who apparently sketched a scenario where mosquito sized-robots buzz around stealing samples of our DNA, as reported by Mail Online. “Privacy as we knew it in the past is no longer feasible,” computer science professor Margo Seltzer is quoted as saying. “How we conventionally think of privacy is dead.”



What Seltzer was actually arguing is that it needs no sneaky, DNA-sealing robo-mosquitos for connected technologies to violate our privacy. The point is, she later told TechCrunch, we are already at a privacy-eroding tipping point — even with current gen digital technologies. Let alone anything so futuristic as robotic mosquitos.

“The high order message is that we don’t need pervasive sensor net technologies for this to be true. We merely have to use technologies that exist today: credit cards, debit card, the web, roads, highway transceivers, email, social networks, etc. We leave an enormous digital trail,” she added.

Seltzer was also not in fact arguing for giving up on privacy — even if the Mail’s article reads that way. But rather for the importance of regulating data and data usage, rather than trying to outlaw particular technologies.

“Technology is neither good nor bad, it is a tool,” she said. “However, hammers are tools too. They are wonderful for pounding in nails. That doesn’t mean that someone can’t pick up a hammer and use it to commit murder. We have laws that say you shouldn’t murder; we don’t specialize the laws to call out hammers. Similarly, the laws surrounding privacy need to be laws about data and usage, not about the technology.”



"With your Permission"

What especially stands out to me from Schmidt’s comments at Davos is his afterthought caveat — that this invisible, reactive, all-pervasive future sensornet will be pulling its invisible strings with your permission.

Perhaps he was paying lip-service to the warning of the FTC’s Chairwoman, Edith Ramirez, at CES earlier this month that building connected objects — the long discussed ‘Internet of Things’ — demands a new responsibility from businesses and startups to bake security and privacy protections into their products right from the get go.

“[The Internet of Things] has the potential to provide enormous benefits for consumers, but it also has significant privacy and security implications,” she warned. “Connected devices that provide increased convenience and improve health services are also collecting, transmitting, storing, and often sharing vast amounts of consumer data, some of it highly personal, thereby creating a number of privacy risks.”

Ramirez said that without businesses adopting security by design; engaging in data minimization rather than logging everything they can; and being transparent about the data they are collecting — and who else they want to share it with — by providing notifications and opt outs to users; then the risks to users’ privacy and security are enormous.

The problem with those well-meaning words from a consumer watchdog organization is that we are already struggling to achieve such rigorous privacy standards on the current Internet — let alone on a distributed sensornet where there’s no single, controllable entry point into our lives. The Internet and the mobile Internet can still be switched off, in extremis, by the user turning off their router and/or powering their phone down (and putting it in the fridge if you’re really paranoid, post-Snowden).

But once a distributed sensornet has achieved a certain penetration tipping point, into the objects with which we humans are surrounded, well then the sheer number of devices involved is going to take away our ability to trivially pull the plug. Unless some kind of regulatory layer is also erected to provide a framework for usage that works in the interests of privacy and consumer control.

Without such consumer-oriented controls embedded into this embedded Internet, the user effectively loses the ability to take themselves offline, given that the most basic level of computing control — the on/off switch — is being subducted beneath the grand, over-arching utility of an all-seeing, always on sensornet. (Battery life constraints, in this context, might be viewed as a privacy safeguard, although low power connectivity technologies, such as Bluetooth Low Energy, work to circumvent that limit.)

In parallel, a well-distributed Internet of Things likely demands greater levels of device automation and autonomy, given the inexorable gains in complexity generated by a dense network of networked objects. And because of the sheer number of connected devices. And more automation again risks reducing user control.

Connected objects will be gathering environmental intelligence, talking to each other and talking to the cloud. Such a complex, interwoven web of real-time communications might well generate unique utility — as Schmidt evidently believes. But it also pulls in increased privacy concerns, given how many more data points are being connected and how all those puzzle pieces might slot together to form an ever more comprehensive, real-time representation of the actions and intentions of the people moving through this web.

Earlier generation digital technologies like email were not engineered with far-sighted privacy protections in mind. Which is why they have been open to abuse — to being co-opted as part of a military industrial surveillance complex, as the Snowden revelations have shown, offering a honeypot of metadata for government intelligence agencies to suck up. Imagine what kind of surveillance opportunities are opened up by an ‘invisible’ Internet — which is both everywhere but also perceptually nowhere, encouraging users to submit to its data-mining embrace without objection. After all how can you resist what you can’t really see or properly control?

Read the rest: techcrunch.com

Comments

We're Hiring

We are looking for a professional video editor, animator and graphics expert that can join us full time to work on our video productions.

Apply

Help Out

Sign up for a membership to support Red Ice. If you want to help advance our efforts further, please:

Donate

Tips

Send us a news tip or a
Guest suggestion

Send Tip

Related News

Internet Control: Obama Blames Internet for ‘Domestic Terrorism’
Internet Control: Obama Blames Internet for ‘Domestic Terrorism’
Internet lines up behind The Declaration of Internet Freedom
Internet lines up behind The Declaration of Internet Freedom

Archives Pick

Red Ice T-Shirts

Red Ice Radio

3Fourteen

Con Inc., J6 Political Prisoners & The Pedophile Problem
Kim Coulter - Con Inc., J6 Political Prisoners & The Pedophile Problem
Why European Culture, Art and Beauty Matter
Gifts - Why European Culture, Art and Beauty Matter

TV

Laughter: The New Weapon Of The Far-Right
Laughter: The New Weapon Of The Far-Right
London’s Fourth Plinth To Get Fat Black “Everywoman” Statue
London’s Fourth Plinth To Get Fat Black “Everywoman” Statue

RSSYoutubeGoogle+iTunesSoundCloudStitcherTuneIn

Design by Henrik Palmgren © Red Ice Privacy Policy