The Fantasy of Opting Out

In today’s digital world, most of the things that we need are just one click away with our computers and cellphones. As a user, you are constantly monitored. But that is also up to the user. If you want to be monitored less then you should perhaps not enjoy all those services. Is it perhaps too much to blame the government and companies? No, because the costs (social, financial, etc.) to go without those services are getting higher. Not everyone can afford not to do things on principle.

And because it is not really possible to opt out, are there things you can do?

Those who know about us have power over us. Obfuscation may be our best digital weapon.”

This book Obfuscation by Finn Brunton and Helen Nissenbaum is an interesting read covering approach on how to avoid having your personal data manipulated by our current pervasive digital surveillance society. Obfuscation means “to make difficult to perceive or understand”.

As explained in the book Obfuscation is a privacy control which information accessed by third-party is garbled or hidden and generally harder to understand, which meant to interfere with surveillance and data collection projects. In the programming world, code obfuscation means making code harder to understand or read, generally for privacy or security purposes.

With the ever-growing data-mining and surveillance business, simply opting out is getting more and more difficult to achieve these days. In the book, the author offers some ways to practice obfuscation and minimize the effects of a surveillance society and data gathering using the following tools available in the market today.

  • The secure browser Tor, which (among other anti-surveillance technologies) muddles our Internet activity with that of other Tor users, concealing our trail in that of many others.
  • The browser plugins TrackMeNot and AdNauseam, which explore obfuscation techniques by issuing many fake search requests and loading and clicking every ad, respectively.
  • The browser extension Go Rando, which randomly chooses your emotional “reactions” on Facebook, interfering with their emotional profiling and analysis.
  • Playful experiments like Adam Harvey’s “HyperFace” project, finding patterns on textiles that fool facial recognition systems – not by hiding your face, but by creating the illusion of many faces.

The security and privacy expert, Bruce Schneier also commented – “I am generally skeptical about obfuscation tools. I think of this basically as a signal-to-noise problem, and that adding random noise doesn’t do much to obfuscate the signal. But against broad systems of financially motivated corporate surveillance, it might be enough“.

As convincing as it may sound, we agree with Bruce that Obfuscation might not be enough. We hope that the arguments and the approach represented in the book will not give a false sense of security or privacy to the people, although it may help a little bit in our fight for privacy.

Source: www.thereader.mitpress.mit.edu

WordPress Downgrade Plugin

By Rutger | August 14, 2020

If for some reason you run into an issue when you upgraded WordPress, you can simply restore the backup that you made (you made one, right?) If the issue is with WordPress core, and for example your theme does not (yet) support the new WordPress version, then it’s good to know there’s a downgrade plugin…

WordPress 5.5 “Eckstine”

By Rutger | August 11, 2020

[Upgrade issues? Check the downgrade plugin post] Here it is! WordPress 5.5 “Eckstine” is finally released. The 39th version of WordPress is named after the jazz musician Billy Eckstine. You can download the latest version of WordPress or update in your dashboard. With the new WordPress 5.5 “Eckstine”, your site gets new power as it is…

Two Factor Authentication (2FA) for Control Panel

By Rutger | August 11, 2020

The control panel already limits unauthorized login attempts to prevent anyone from accessing your sensitive information. You can also add an extra layer of protection by enabling two-factor authentication. Two-factor authentication also known as two-factor verification or 2FA is an additional step in the login process that requires users to present a piece of information that…

Google Resumes Its Attempt to Hides Full Addresses on Chrome 85

By Rutger | July 1, 2020

Over the years Google has tried to hide full URLs in Chrome’s address bar, despite the public backlash that came after every attempt, Google is pressing on with new plans to hide all parts of web addresses except the domain name. To test this, you have to download and install the Canary channel from the…

How to protect yourself from your ISP snooping on the websites you visit

By Rutger | June 21, 2020

TLDR; To prevent your ISP snooping on the websites you visit, you must not only change your browser settings, you most likely also need to change your DNS settings. Your Internet Service Provider (ISP) connects you to the internet, every request sent can be logged and tells your ISP which websites you visited, down to the hostnames…

Thai Database Leaks 8.3 Billion Internet Records

By Rutger | June 5, 2020

Thailand’s largest telecommunications company’s Advanced Info Service (AIS) urgently brought down one of its databases following a leak of more than 8 billion real-time internet records on millions of Thai internet users. The data breach was discovered by security researcher Justine Paine, who found an exposed ElasticSearch database online containing DNS queries and Netflow data…

What is the new Brave Browser about?

By Rutger | May 20, 2020

The internet took a deep dive into Brave Private Browser, to figure out why it has become increasingly popular to users. Here’s what you need to know to decide whether Brave’s for you.   What makes Brave browser special amongst other browsers is its speed and the privacy protection it provides to users, both a…

Keep your email safe from hackers and trackers using Firefox Private Relay

By Rutger | May 13, 2020

Firefox Private Relay is a new add-on service by Firefox maker Mozilla; the service is designed to reduce unwanted emails and spam by generating unique aliases acting as a proxy email service to hide the user’s email address from advertisers and spam operators when signing up for a web form. The service entered testing last month…

Zoom’s 5.0 Update Improves Encryption, Adds Meeting Security Features

By Rutger | May 7, 2020

As the COVID-19 virus spread across the globe, the business landscape was forced to make a number of swift changes. Almost overnight, the video conferencing app Zoom becomes the go-to option to hold lessons, business meetings, and sensitive discussions. The surge in popularity, the firm was also bombarded for issues related to its privacy and…

How to Change PHP Version of Your Websites

By Rutger | May 5, 2020

Update: PHP 7.4 is available (August 2020) While it is a best practice to always use the latest version of PHP, compatibility is also an important factor to consider before upgrading. Starting May 2020 it is now possible to choose which PHP version your account uses via the Control Panel.   Note: this is done per account (username),…