1

‘A Damning Indictment’: Global Poll Shows 71% Support Regulation of Tech Giants to Protect Data Privacy

In a new poll released by Amnesty International, 71% of respondents expressed fear over how Big Tech is taking and using their personal data. (Photo: Flickr/GostGo/cc)

By Andrea Germanos | Common Dreams

If you’re worried about how big technology companies are storing and using your personal data, you’re far from alone, according to a new poll out Wednesday from Amnesty International.

The survey of 10,000 people in nine countries, conducted by YouGov, revealed that 71% of respondents expressed fear over how Big Tech is taking and using their data. The sentiment was expressed most acutely in Brazil, where 89 percent said they were worried about the use of their personal data by tech companies. India and the United States followed, where the worry was expressed by 71 percent and 70 percent respectively.

Fears of violations of privacy are driving their concerns, said 62 percent of respondents. Fifty-nine percent, meanwhile, said they don’t feel in control over how technology companies share user data with third parties like advertisers.

“The poll results are stark and consistent—a clear majority of people are worried about the power Big Tech has over their lives,” said Amnesty Tech director Tanya O’Carroll.

The findings were released less than two weeks after an Amnesty report said that Facebook and Google have a “surveillance-based business model” that threatens users’ human rights, including the right to privacy, bolstering the rights organization’s call for the era of self-regulation by Big Tech to come to an end.

A strong majority—77%—also said that tech companies creating detailed profiles about users and selling access to those profiles to third-parties including advertisers is a problem.

In the United States, 75% of respondents said that profile selling was a problem, but it was felt even more strongly in France (77%), India (77.8%), South Africa (79.8%), and Brazil (87%).

The overall majority of those who said online profiling was a problem—59%—said that it is an invasion of privacy. And more than half—53%—said profiling could be used to unfairly influence people through ads or political messages. Another concern expressed by 52% was that profiling could be used, without user knowledge, to control the information and media people see.

Seventy-three percent of respondents, which also included people in Denmark, Egypt, Germany, and Norway, said they want their governments to do more to regulate Big Tech. That includes nearly 66% of respondents in the U.S. who want such government action.

Only 16 percent of respondents overall said they did not want their governments to do more to regulate large technology companies.

“People are hankering for governments to do more to regulate these corporate giants,” said O’Carroll.

The poll findings, she continued, offer “a damning indictment of how Big Tech companies harvest and use our personal data. People want to see an end to tech companies trampling over our right to privacy.”

Our work is licensed under a Creative Commons Attribution-Share Alike 3.0 License. Feel free to republish and share it widely.

Read more great articles at Common Dreams.




Snowden Slams Dropbox, Facebook As Threats To Privacy

Source: RT America

Dropbox, Facebook and Google are a few of the biggest threats to individuals’ privacy, Edward Snowden warned at a forum this weekend. Advising consumers to only use encrypted services that promise to not share data with the government or other corporations, the whistleblower gave some quick tips on how to protect personal data and ensure privacy. RT’s Ben Swann recaps the advice.

 




New Technique Could Boost Internet Speeds AND Security

Dario Borghino | Gizmag | July 21 2014

Researchers at Aalborg University, MIT and Caltech have developed a new mathematically-based technique that can boost internet data speeds by up to 10 times, by making the nodes of a network much smarter and more adaptable. The advance also vastly improves the security of data transmissions, and could find its way into 5G mobile networks, satellite communications and the Internet of Things.

The problem with TCP/IP

Data is sent over the internet in “packets,” or small chunks of digital information. The exact format of the packets and the procedure for delivering them to their destination is described by a suite of protocols known as TCP/IP, or the internet protocol suite, designed in the early 70s.

Back when it was conceived, the internet protocol suite was a tremendous leap forward that revolutionized our paradigm for transmitting digital information. Remarkably, 40 years on, it still forms the backbone of the internet. However, despite all its merits, few would say that it is particularly efficient, secure or flexible.

For instance, in order for a TCP data transmission to be successful, the recipient needs to collect the packets in the exact order in which they were sent over. If even a single packet is lost for any reason, the protocol interprets this as a sign that the network is congested – the transmission speed is immediately halved, and from there it attempts to rise again only very slowly. This is ideal in some situations and terribly inefficient in others. The issue is that the protocol doesn’t have the intelligence to know what the right thing to do is.

Also, although the packets could take a theoretically infinite number of paths to travel between point A and point B in a network, it turns out that data in a TCP connection always travels along the same path – which makes it quite easy for an eavesdropper to spy on your communications.

This system is much safer than the current Internet protocols, because an eavesdropper would need to intercept all the packets to decode the information (Image: Franz Fitzek)

This system is much safer than the current Internet protocols, because an eavesdropper would need to intercept all the packets to decode the information (Image: Franz Fitzek)

Network coding – the solution?

An interesting proposal that might offer the solution to these problems is so-called network coding, which aims to make each node in the network much smarter that it currently is. In TCP/IP, the nodes of the network are just simple switches that can only store data packets and then forward them to the next node along their predetermined route; by contrast, in network coding each node can elaborate packets as needed, for instance by re-routing or re-encoding them.

Adding intelligence at the node level may be a truly disruptive change, because it allows for unparalleled flexibility in the way information is handled. For instance, it can take advantage of multipath TCP (implemented in iOS 7) and, on top of it, add an encoding mechanism that further increases security and speed, or even enable data storage right within the nodes of the network.

In a recent study, a team of researchers from Aalborg University (Denmark), MIT and Caltech have built an implementation of just such a protocol, displaying some impressive speed gains. In a demo, a four minute-long mobile video was downloaded five times faster than with the state of the art technology, and was then streamed without interruptions.

“In experiments with our network coding of Internet traffic, equipment manufacturers experienced speeds that are five to 10 times faster than usual. And this technology can be used in satellite communication, mobile communication and regular internet communication from computers,” says Prof. Frank Fitzek, who led the study.

How it works

Whether the contents of a packet are part of a YouTube video, a text or a song, they are nonetheless encoded by a string of zeros and ones, which can also be seen as a number in binary format.

In TCP/IP, the nodes of a network treat data packets individually by simply storing their content and relaying it to the next node. But in the protocol developed by Fitzek and colleagues, the content of the packet is seen as an actual number, and packets are processed in chunks. Each node builds a set of linear equations, using both the numbers extracted from the content of the packets and a set of randomly generated coefficients.

Read the rest of the article