Get In Touch
Wuse 2, Abuja,

Ph: +234.706.699.8070
Work Inquiries
hi@johnadebayo.com
Ph: +234.706.699.8070
Back

Online Privacy: is the trade-off worth it? Are we selling our souls to the devil?

Over the years, technology has revolutionized our world and daily lives. Technology has created amazing tools and resources, putting useful information at our fingertips.

What does Privacy mean?

Privacy can be defined as an individual, group, or institutions’ claim to determine for themselves when, how and to what extent information about them is publicly made available or communicated to others.

According to Wikipedia: Privacy is the ability of an individual or group to seclude themselves, or information about themselves, and thereby express themselves selectively. The boundaries and content of what is considered private differ among cultures and individuals, but share common themes.

In the world today where technology is our savior on daily basis, privacy has become nearly impossible and there’s only one way to it; get the hell out of it. I mean, get out of tech or the world itself, that is the freaking only way to it.

But, there’s still left a little control though, which can be achieved only if you’re deep in the shit!!!Every services on internet is being paid for one way or another. I am not baffled with the fact that free services are being paid for with the collection of its users’ sometimes-sensitive information. Everything tagged free isn’t free; for there’s no free meal even in Freetown:

What information is at risk:

Location Information: Your device GPS can be used to keep track of your movements.

Cameras: That your lovely smart TV or webcam can be used to keep you on the watch.

Credit Card: Your credit card information can be sniffed if care is not taken.

Sources at which information are being captured from:

Sources where personal/sensitive information can be captured from include but not limited to gadgets and apps you really can’t do without, both the ones that are connected to the internet and those that are not has the ability to mine your data locally.

These could be your:

  • Smart Phones
  • Smart TV
  • Smart Sound System
  • Tablets
  • Computers
  • Paid and Free Software/Applications installed on your gadgets or Online Services which includes: Emails, Social Media, Online Gaming, Online Forum etc.

How Privacy is being compromised on the Internet:

Phishing: An Internet hacking activity used to steal secure user data, including username, password, bank account number, security PIN or credit card number.

Pharming: An Internet hacking activity used to redirect a legitimate website visitor to a different IP address.

Spyware: An offline application that obtains data without a user’s consent. When the device is online, previously acquired data is sent to the spyware source.

Malware: An application used to illegally damage online and offline computer users through Trojans, viruses and spyware.

Free Online Services, Software and/or Applications

Internet privacy violation risks may be minimized, as follows:

  • Always use preventative software applications, such as anti-virus, anti-malware, anti-spam and firewalls.
  • Remove all unused software/applications
  • Avoid shopping on unreliable websites
  • Avoid exposing personal data on websites with lower security levels
  • Clear the browser’s cache and browsing history on a consistent basis Always use very strong passwords consisting of letters, numerals and special characters.
  • Watch and Read Carefully before you say YES: A lot of internet users have no or limited time to read through every goddamn information being displayed on their devices or application interface once there’s a YES or NO button to agree or disagree, many just go straight ahead by clicking YES just to quickly eliminate the information displayed to enable them proceed to the next thing.
  • When you sign up in a new online services, check settings. And you can do this frequently so as to keep up with the updates made in the app or the services that could put your privacy at risk.

There’s another left,

All these above listed sources are capable of collecting your personal data both online and offline, synchronize with server when they have access to internet and if yours is always connected to the internet, well done, you just make things easier; all they have to do is synchronize at interval to update your information previously collected and/or uploaded on the source server.

How money is being made off your information gathered with or without your knowledge:

Information collected through this your lovely devices and/or software and apps you’re so engrossed with or can’t do without, not excluding the ones you’ve never even open nor use for one day but are presence on your gadgets are being auction or will it be better if I say sold to companies or used by governments and law enforcement to keep tabs, gather evidence or for advertisements purposes.

Conclusion:

We use technology so frequently as a society because it allows us to do things faster and with much less effort. Is the trade-off worth it, or are we selling our souls to the devil?.

As it turns out, some feel technology is far too convenient to give up despite its flaws, while others would trash their devices if they found out it was spying on them. Of course, many were of mixed opinion and considered these issues on a case-by-case basis. While the spectrum of sentiment on the issue is quite varied, the discussion of technology and privacy is one of paramount importance today.

More articles from John Ojebodewww.johnojebode.com/blog/

John Adebayo
John Adebayo
https://www.johnadebayo.com

Leave a Reply

Your email address will not be published. Required fields are marked *

We use cookies to give you the best experience. Cookie Policy