However, this contrast between security and privacy might not be necessary. And if we want some level of privacy, we must recognize that we must sacrifice some security in order to get it. He writes:įten the debate is characterized as “security versus privacy.” This simplistic view requires us to make some kind of fundamental trade-off between the two: in order to become secure, we must sacrifice our privacy and subject ourselves to surveillance. Access to data, like cell phone logs, can reduce privacy but support security. One of Schneier’s points is about security and privacy, which pertain to data. For anyone curious about what data that companies and the government keep and monitor, it is a fascinating read. A lot of information can be gleaned from data, from your location to your relationships.īruce Schneier writes about surveillance via data in Data and Goliath: The Hidden Battles to Collect Your Data and Control Your World. For example, cell phone data reside on servers of private companies. We don’t always know whose eyes are on our data. The answer to this question is not always straightforward. Where are your data stored, and who has control of your data?
0 Comments
Leave a Reply. |