Feeds

'Don't break the internet': How an idiot's slogan stole your privacy...

... and how to get it back

High performance access to file storage

Special Report "I am the head of IT and I have it on good authority that if you type 'Google' into Google, you can break the Internet. So please, no one try it, even for a joke. It's not a laughing matter. You can break the Internet" - Jen, The IT Crowd

For 15 years internet companies have been waging a war against any kind of laws that establish properties and permissions for digital things. Every attempt to do so has been bitterly fought. It's the one constant in Silicon Valley's battles against the copyright industries. The fight has crippled the traditional, historical partnership between technology and creators that benefited everyone. But it has also had an awful unintended consequence: it has weakened our ability to establish the clear property rights we need to protect our privacy.

When, in February, the EU tentatively suggested rules based on the principle that people own their own data, and this property right includes exclusivity ("the right to be forgotten") – guess who was firing all guns against it? Facebook and Google... At Davos, Google chairman Eric Schmidt said the EU proposal would "break the internet".

Just this week the UK government caused a huge privacy storm when it floated the idea of making internet companies keep a record of all personal communications on the the internet. While it argued that it wanted to store "traffic" data, not the contents of communications, little would be exempt: emails, blog comments, Tweets and Facebook Likes.

And more alarmingly, this trove of information would be casually available to busybodies. In 2010 alone, public authorities submitted 552,000 requests for communications data under RIPA. We've already seen how local councils, for example, initiate surveillance operations using the Act.

RIPA is intended to prevent "serious crimes", requiring necessity and proportionality. But councils have used it to tackle "serious crimes" such as smoking, and putting recycling in the wrong bag. Some even boast about it. The new store of electronic communications would add to the data available to them. It's a huge intrusion by the state into business that isn't its own.

At the same time, Facebook and Google operate their own global data collection systems, hoarding huge amounts of personal data. And this is merely the start. The regression models that Facebook and Google use to predict consumer behaviour for advertisers are exactly what law enforcement agencies dream can be put to use to predict crime or 'deviant' behaviour. In a 2012 rewrite of Philip K Dick's Minority Report, the "Pre Crime Division" will not require mutants floating in tanks - just software.

Privacy is not a luxury, or an optional extra - a world without privacy raises all kinds of ethical issues, and everyday judgements made about us.

How to stop the snoops

So how can we halt this slide to Panopticon, where everything we do online is dipped into?

Well, no matter what law you pass, it won't work unless there's ownership attached to data, and you, as the individual, are the ultimate owner. From the basis of ownership, we can then agree what kind of rights are associated with the data – eg, the right to exclude people from it, the right to sell it or exchange it – and then build a permission-based world on top of that. None of this is possible without the fundamental recognition that it's the individual – you or me – who ultimately owns it, and ultimately decides what's then done with it, and by whom. Without properties and permissions on digital "things", there will be no digital privacy.

I'll illustrate this with a short story that you probably haven't heard before - about this great phrase.

Breaking The Internet: an example

Dominic Young doesn't describe himself as a techie, but he runs Linux at home (out of choice) and was one of the earliest users and evangelists for it in the UK (which puts him in the 'fairly techie' class in most people's books). He doesn't like not being able to do things but believes, as most people do, that if you offer an attractive product or service most people will hand over their money. I met him in 1995 when we were moderating a CompuServe forum - if you can remember that.

Young poses an interesting question. How could a network that was designed to be so robust it could withstand a nuclear attack actually be so fragile it "breaks" if one so much as breathes upon it? There are known points of failure, such as DNS (poisoning, causing temporary glitches in name to address translations, are not unknown). And there are edge cases where a node is overloaded and taken out. But overall, it's a remarkably resilient beast - and a very difficult thing to "break". The phrase "breaking the internet" is quite close to Young's heart, since he was in the thick of a "breaking the internet" story.

High performance access to file storage

More from The Register

next story
Audio fans, prepare yourself for the Second Coming ... of Blu-ray
High Fidelity Pure Audio – is this what your ears have been waiting for?
Dropbox defends fantastically badly timed Condoleezza Rice appointment
'Nothing is going to change with Dr. Rice's appointment,' file sharer promises
MtGox chief Karpelès refuses to come to US for g-men's grilling
Bitcoin baron says he needs another lawyer for FinCEN chat
Did a date calculation bug just cost hard-up Co-op Bank £110m?
And just when Brit banking org needs £400m to stay afloat
Zucker punched: Google gobbles Facebook-wooed Titan Aerospace
Up, up and away in my beautiful balloon flying broadband-bot
Apple DOMINATES the Valley, rakes in more profit than Google, HP, Intel, Cisco COMBINED
Cook & Co. also pay more taxes than those four worthies PLUS eBay and Oracle
It may be ILLEGAL to run Heartbleed health checks – IT lawyer
Do the right thing, earn up to 10 years in clink
France bans managers from contacting workers outside business hours
«Email? Mais non ... il est plus tard que six heures du soir!»
prev story

Whitepapers

Securing web applications made simple and scalable
In this whitepaper learn how automated security testing can provide a simple and scalable way to protect your web applications.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
HP ArcSight ESM solution helps Finansbank
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.