Feeds

'Don't break the internet': How an idiot's slogan stole your privacy...

... and how to get it back

Next gen security for virtualised datacentres

Special Report "I am the head of IT and I have it on good authority that if you type 'Google' into Google, you can break the Internet. So please, no one try it, even for a joke. It's not a laughing matter. You can break the Internet" - Jen, The IT Crowd

For 15 years internet companies have been waging a war against any kind of laws that establish properties and permissions for digital things. Every attempt to do so has been bitterly fought. It's the one constant in Silicon Valley's battles against the copyright industries. The fight has crippled the traditional, historical partnership between technology and creators that benefited everyone. But it has also had an awful unintended consequence: it has weakened our ability to establish the clear property rights we need to protect our privacy.

When, in February, the EU tentatively suggested rules based on the principle that people own their own data, and this property right includes exclusivity ("the right to be forgotten") – guess who was firing all guns against it? Facebook and Google... At Davos, Google chairman Eric Schmidt said the EU proposal would "break the internet".

Just this week the UK government caused a huge privacy storm when it floated the idea of making internet companies keep a record of all personal communications on the the internet. While it argued that it wanted to store "traffic" data, not the contents of communications, little would be exempt: emails, blog comments, Tweets and Facebook Likes.

And more alarmingly, this trove of information would be casually available to busybodies. In 2010 alone, public authorities submitted 552,000 requests for communications data under RIPA. We've already seen how local councils, for example, initiate surveillance operations using the Act.

RIPA is intended to prevent "serious crimes", requiring necessity and proportionality. But councils have used it to tackle "serious crimes" such as smoking, and putting recycling in the wrong bag. Some even boast about it. The new store of electronic communications would add to the data available to them. It's a huge intrusion by the state into business that isn't its own.

At the same time, Facebook and Google operate their own global data collection systems, hoarding huge amounts of personal data. And this is merely the start. The regression models that Facebook and Google use to predict consumer behaviour for advertisers are exactly what law enforcement agencies dream can be put to use to predict crime or 'deviant' behaviour. In a 2012 rewrite of Philip K Dick's Minority Report, the "Pre Crime Division" will not require mutants floating in tanks - just software.

Privacy is not a luxury, or an optional extra - a world without privacy raises all kinds of ethical issues, and everyday judgements made about us.

How to stop the snoops

So how can we halt this slide to Panopticon, where everything we do online is dipped into?

Well, no matter what law you pass, it won't work unless there's ownership attached to data, and you, as the individual, are the ultimate owner. From the basis of ownership, we can then agree what kind of rights are associated with the data – eg, the right to exclude people from it, the right to sell it or exchange it – and then build a permission-based world on top of that. None of this is possible without the fundamental recognition that it's the individual – you or me – who ultimately owns it, and ultimately decides what's then done with it, and by whom. Without properties and permissions on digital "things", there will be no digital privacy.

I'll illustrate this with a short story that you probably haven't heard before - about this great phrase.

Breaking The Internet: an example

Dominic Young doesn't describe himself as a techie, but he runs Linux at home (out of choice) and was one of the earliest users and evangelists for it in the UK (which puts him in the 'fairly techie' class in most people's books). He doesn't like not being able to do things but believes, as most people do, that if you offer an attractive product or service most people will hand over their money. I met him in 1995 when we were moderating a CompuServe forum - if you can remember that.

Young poses an interesting question. How could a network that was designed to be so robust it could withstand a nuclear attack actually be so fragile it "breaks" if one so much as breathes upon it? There are known points of failure, such as DNS (poisoning, causing temporary glitches in name to address translations, are not unknown). And there are edge cases where a node is overloaded and taken out. But overall, it's a remarkably resilient beast - and a very difficult thing to "break". The phrase "breaking the internet" is quite close to Young's heart, since he was in the thick of a "breaking the internet" story.

The essential guide to IT transformation

More from The Register

next story
6 Obvious Reasons Why Facebook Will Ban This Article (Thank God)
Clampdown on clickbait ... and El Reg is OK with this
No, thank you. I will not code for the Caliphate
Some assignments, even the Bongster decline must
Kaspersky backpedals on 'done nothing wrong, nothing to fear' blather
Founder (and internet passport fan) now says privacy is precious
TROLL SLAYER Google grabs $1.3 MEEELLION in patent counter-suit
Chocolate Factory hits back at firm for suing customers
Mozilla's 'Tiles' ads debut in new Firefox nightlies
You can try turning them off and on again
Facebook to let stalkers unearth buried posts with mobe search
Prepare to HAUNT your pal's back catalogue
Sit tight, fanbois. Apple's '$400' wearable release slips into early 2015
Sources: time to put in plenty of clock-watching for' iWatch
prev story

Whitepapers

5 things you didn’t know about cloud backup
IT departments are embracing cloud backup, but there’s a lot you need to know before choosing a service provider. Learn all the critical things you need to know.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Backing up Big Data
Solving backup challenges and “protect everything from everywhere,” as we move into the era of big data management and the adoption of BYOD.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?