diff options
Diffstat (limited to 'content/entry')
-rw-r--r-- | content/entry/the-privacy-paradox.md | 35 |
1 files changed, 7 insertions, 28 deletions
diff --git a/content/entry/the-privacy-paradox.md b/content/entry/the-privacy-paradox.md index e242b41..b2a052d 100644 --- a/content/entry/the-privacy-paradox.md +++ b/content/entry/the-privacy-paradox.md @@ -2,56 +2,35 @@ title: "The Privacy Paradox" date: 2020-12-28T00:00:00 draft: false -makerefs: false --- -After the Snowden revelations of 2013[1], we learned that the NSA's global internet surveillance program XKeyscore[2] was flagging people that read...Linux Magazine[3]. That's right. The NSA would place you on a special high-priority surveillance list for taking an interest in one of the only operating systems that isn't known to have a backdoor[4]. But it didn't end there. +After the [Snowden revelations of 2013](https://www.wikipedia.org/wiki/Global_surveillance_disclosures_%282013%E2%80%93present%29), we learned that the NSA's global internet surveillance program [XKeyscore](https://www.wikipedia.org/wiki/XKeyscore) was flagging people that read...[Linux Magazine](https://www.linuxjournal.com/content/nsa-linux-journal-extremist-forum-and-its-readers-get-flagged-extra-surveillance). That's right. The NSA would place you on a special high-priority surveillance list for taking an interest in one of the only operating systems that isn't known to have a [backdoor](https://www.wikipedia.org/wiki/Backdoor_%28computing%29). But it didn't end there. -You can see in the XKeyscore rules[5] people that searched for Tor[6] and Tails OS[7] software were being targeted. These are programs written for the express purpose of anonymity and avoiding the watchful eye of Big Brother. +You can see in the [XKeyscore rules](https://daserste.ndr.de/panorama/xkeyscorerules100.txt) people that searched for [Tor](https://www.torproject.org/) and [Tails OS](https://tails.boum.org/) software were being targeted. These are programs written for the express purpose of anonymity and avoiding the watchful eye of Big Brother. There seems to be a common theme here. Big Brother programs automatically targeted people that took steps to avoid surveillance. It's a fair bet to make that people that use privacy tools are still targeted more than those who don't. There's one very good reason to suspect this: Big Brother doesn't need to take a special interest in those that don't avoid mass surveillance because mass surveillance is sufficient to build a full portrait of their lives anyway. It's logical that Big Brother would only need to pay special attention to those avoiding mass surveillance since their privacy is harder to violate. # The Paradox Thus we end up with a paradox: The more you avoid mass surveillance, the more interesting you become to Big Brother. This increases the likelihood that you'll end up on one of their "extra surveillance" lists and that more targeted methods will be used on you. The less you avoid mass surveillance, the less interesting you become to Big Brother. All else being equal, this decreases the likelihood that you'll get special attention. Blending in with the surveilled masses might give you more anonymity and privacy, in practice. In other words, allowing yourself to be mass surveilled might act as a kind of protection against targeted surveillance. -If you pay for everything in cash[8] where cash payments are uncommon, if you use internet services[9] registered outside of the Five Eyes[10], if you use Tor and VPNs for accessing the internet, if you use free as in freedom[11] software and encrypted communication apps, if you avoid social media[12], if you drive a privacy-friendly vehicle[13] when you can afford a newer car, you're going to attract attention to yourself. One of these things on its own isn't a red flag, but combined together, there's really only one thing you can be doing: avoiding mass surveillance. One doesn't avoid mass surveillance in today's world by accident unless you're Amish or living in a poor country. +If you [pay for everything in cash](/2020/11/16/avoiding-consumer-surveillance) where cash payments are uncommon, if you use [internet services](/2020/10/29/using-email) registered outside of [the Five Eyes](https://www.wikipedia.org/wiki/Five_Eyes), if you use Tor and VPNs for accessing the internet, if you use [free as in freedom](/2020/10/20/use-free-software) software and encrypted communication apps, if you [avoid social media](/2020/12/17/atom-and-rss), if you drive a [privacy-friendly vehicle](/2020/12/16/avoiding-automobile-surveillance) when you can afford a newer car, you're going to attract attention to yourself. One of these things on its own isn't a red flag, but combined together, there's really only one thing you can be doing: avoiding mass surveillance. One doesn't avoid mass surveillance in today's world by accident unless you're Amish or living in a poor country. Knowing this, what ought you to do about it? Should you try to blend in or should you avoid mass surveillance and just not care how many watch lists you end up on? # What to Do About It ## Short Answer -Trying to blend in with the surveilled populace is like giving a thief your money so they can't steal it. If you really want to fight mass surveillance, you should take as many steps to avoid mass surveillance as you're willing to take and don't worry about being targeted. If enough people do this, it will raise the bar on privacy[14] so that only the more expensive targeted surveillance tools will work. Then everyone will collectively have more privacy. +Trying to blend in with the surveilled populace is like giving a thief your money so they can't steal it. If you really want to fight mass surveillance, you should take as many steps to avoid mass surveillance as you're willing to take and don't worry about being targeted. If enough people do this, it will [raise the bar on privacy](/2020/11/14/raising-the-bar-on-privacy) so that only the more expensive targeted surveillance tools will work. Then everyone will collectively have more privacy. ## Long Answer -If you or someone you know is doing something illegal and you don't want Big Brother's attention, especially since Big Brother has been known to do nasty things such as assisting with evidence laundering[15], you might think it's a good idea to avoid mass surveillance only when conducting illegal activities to avoid drawing too much attention to yourself. This strategy is ill-advised for at least two reasons: +If you or someone you know is doing something illegal and you don't want Big Brother's attention, especially since Big Brother has been known to do nasty things such as assisting with [evidence laundering](/2020/12/04/shining-light-on-the-dark-side-of-law-enforcement), you might think it's a good idea to avoid mass surveillance only when conducting illegal activities to avoid drawing too much attention to yourself. This strategy is ill-advised for at least two reasons: ### Reason #1 Allowing yourself to be mass surveilled on purpose some of the time is the reason the bar on privacy remains low. If all you care about is not drawing attention to yourself and your illegal activities, then fine. But if you care about wider society, then you should raise the bar on privacy by avoiding mass surveillance at all times, not only when engaging in illegal activities. ### Reason #2 -You contribute to the stereotype that a desire for privacy indicates nefarious activity. It empowers the surveillance state in the current iteration of the crypto wars[16] because Big Brother can say that anonymity networks are mainly used for criminal purposes. If it can be shown for instance that 90% of Tor traffic is used for legal activities then it's (theoretically) much harder for the government to make the case that it should be censored because of drug dealers, money launderers, pedophiles and terrorists. +You contribute to the stereotype that a desire for privacy indicates nefarious activity. It empowers the surveillance state in the current iteration of the [crypto wars](https://www.wikipedia.org/wiki/Crypto_Wars) because Big Brother can say that anonymity networks are mainly used for criminal purposes. If it can be shown for instance that 90% of Tor traffic is used for legal activities then it's (theoretically) much harder for the government to make the case that it should be censored because of drug dealers, money launderers, pedophiles and terrorists. -The only long-term winning strategy for all society is to avoid mass surveillance as much as possible with the hope that others will follow suit. This is true whether you're a law-abiding citizen or a criminal mastermind. To drive this point home, I'll end with a quote by Edward Snowden[17] from his interview with John Oliver on Last Week Tonight: +The only long-term winning strategy for all society is to avoid mass surveillance as much as possible with the hope that others will follow suit. This is true whether you're a law-abiding citizen or a criminal mastermind. To drive this point home, I'll end with a quote by [Edward Snowden](https://www.wikipedia.org/wiki/Edward_Snowden) from his interview with John Oliver on Last Week Tonight: > "You shouldn't change your behavior because a government agency somewhere is doing the wrong thing. If we sacrifice our values because we’re afraid, we don’t care about those values very much." This quote was taken from the context of taking dick pics, but it can be equally applied here: Don't accept mass surveillance as reality just because the government might target you for it. - - -Link(s): -[1: https://www.wikipedia.org/wiki/Global_surveillance_disclosures_(2013%E2%80%93present)](https://www.wikipedia.org/wiki/Global_surveillance_disclosures_(2013%E2%80%93present)) -[2: https://www.wikipedia.org/wiki/XKeyscore](https://www.wikipedia.org/wiki/XKeyscore) -[3: https://www.linuxjournal.com/content/nsa-linux-journal-extremist-forum-and-its-readers-get-flagged-extra-surveillance](https://www.linuxjournal.com/content/nsa-linux-journal-extremist-forum-and-its-readers-get-flagged-extra-surveillance) -[4: https://www.wikipedia.org/wiki/Backdoor_(computing)](https://www.wikipedia.org/wiki/Backdoor_(computing)) -[5: https://daserste.ndr.de/panorama/xkeyscorerules100.txt](https://daserste.ndr.de/panorama/xkeyscorerules100.txt) -[6: https://www.torproject.org/](https://www.torproject.org/) -[7: https://tails.boum.org/](https://tails.boum.org/) -[8: /2020/11/16/avoiding-consumer-surveillance](/2020/11/16/avoiding-consumer-surveillance/) -[9: /2020/10/29/using-email](/2020/10/29/using-email/) -[10: https://www.wikipedia.org/wiki/Five_Eyes](https://www.wikipedia.org/wiki/Five_Eyes) -[11: /2020/10/20/use-free-software](/2020/10/20/use-free-software/) -[12: /2020/12/17/atom-and-rss](/2020/12/17/atom-and-rss/) -[13: /2020/12/16/avoiding-automobile-surveillance](/2020/12/16/avoiding-automobile-surveillance/) -[14: /2020/11/14/raising-the-bar-on-privacy](/2020/11/14/raising-the-bar-on-privacy/) -[15: /2020/12/04/shining-light-on-the-dark-side-of-law-enforcement](/2020/12/04/shining-light-on-the-dark-side-of-law-enforcement/) -[16: https://www.wikipedia.org/wiki/Crypto_Wars](https://www.wikipedia.org/wiki/Crypto_Wars) -[17: https://www.wikipedia.org/wiki/Edward_Snowden](https://www.wikipedia.org/wiki/Edward_Snowden) |