Security Market Segment LS
Friday, 13 March 2020 12:51

Privacy violations are a terrible thing, but so is the panic they sow

By James Herrin
James Herrin, VPN Reviews James Herrin, VPN Reviews

GUEST CONTRIBUTION by James Herrin VPN Reviews: In a world where pretty much every corporation, starting from Amazon and Google and to your local grocery store wants to know everything about you, it is inevitable that people become more mindful of their privacy and sore about its violations.

Undoubtedly, the length to which many companies go in pursuit of their customers’ private data should be treated very seriously. Not only the companies themselves often use this data in dangerous and irresponsible ways, but also they subject it to the threat of hacking. The bigger and the more detailed database a business has on its clients, the juicier the morsel is for data thieves.

All in all, the rising trend of people taking their privacy with a great deal of caution is a good thing.

But like all good things, it does require a certain amount of moderation not to become a mockery of itself – and it appears that too many privacy enthusiasts lack this moderation.

For some of them, anything short of a military-grade setup for their personal computer is weak and untrustworthy. Everything is either black or white to them, with no shades whatsoever. These are the people who are willing to spend not hours but days and weeks on end reading VPN reviews and testing various services to create the perfect, Platonic combination of a virtual private network and Tor to make sure the state or the corporations don’t know what they are looking up on the internet
(at glorious dial-up speeds, no less).

And you know what, this is completely fine. If somebody wants to make data privacy their hobby or even a part-time job for no other benefit than the peace of mind, it’s actually a great thing.

Alas, there are certain issues with this kind of attitude towards personal privacy that, ultimately, make the entire cause weaker.

First of all, there is the problem of gatekeeping, be it voluntary or not. Like in any community, there are some extremely vocal members who dominate any discussion as well as control the general narrative. Though most often not out of any ill intent, these users make the whole community look a tad unwelcoming to a newbie wandering in.

While it is true that asking easily google-able questions on forums is generally frowned upon, what we see too often in privacy communities all around the Web is downright hostility to those who just start their journey towards improving their confidentiality. Heavens forbid someone asks how to make Google Chrome less creepy – no, the only answer here is clearly to delete the thing entirely and never mention it again.

Such an attitude is sure to scare some people (and more than a few) off, to say the least.

Secondly, such fanaticism in protecting one’s privacy sometimes exhibited by the members of various internet forums also harms the cause in a different way. The flaming insistence on taking the most drastic measures available, combined with the lack of sensible explanations for the reason to do so makes the community look like a bunch of conspiracy theorists to an outside observer.

And when something looks funny (or pathetic), it’s very easy to dismiss – even if it, in fact, is important.

Our fight for privacy should be a concentrated global effort if we want to actually achieve anything.

Therefore, spreading the message that our data privacy is at risk is supremely important and to do that effectively we must be more open accepting of novices.

After all, riding the train of self-righteousness and exclusivity never worked well in the public eye.

About: James Herrin - Cybersecurity research who studies the ways of reducing cyber risks and improving Internet safety.

WEBINAR event: IT Alerting Best Practices 27 MAY 2PM AEST

LogicMonitor, the cloud-based IT infrastructure monitoring and intelligence platform, is hosting an online event at 2PM on May 27th aimed at educating IT administrators, managers and leaders about IT and network alerts.

This free webinar will share best practices for setting network alerts, negating alert fatigue, optimising an alerting strategy and proactive monitoring.

The event will start at 2pm AEST. Topics will include:

- Setting alert routing and thresholds

- Avoiding alert and email overload

- Learning from missed alerts

- Managing downtime effectively

The webinar will run for approximately one hour. Recordings will be made available to anyone who registers but cannot make the live event.



Security requirements such as confidentiality, integrity and authentication have become mandatory in most industries.

Data encryption methods previously used only by military and intelligence services have become common practice in all data transfer networks across all platforms, in all industries where information is sensitive and vital (financial and government institutions, critical infrastructure, data centres, and service providers).

Get the full details on Layer-1 encryption solutions straight from PacketLight’s optical networks experts.

This white paper titled, “When 1% of the Light Equals 100% of the Information” is a must read for anyone within the fiber optics, cybersecurity or related industry sectors.

To access click Download here.




Recent Comments