The Right for Privacy in a World Where Everything is Shared

hackingteam_1-100594937-orig.jpg

 

The latest revelations about “Hacking Team” (an Italian offensive-cyber company), its products (snooping SW for every type of digital communication, from email to whatsapp) and it its clientele (mostly dark regimes) seems to shock everyone. Lets’ look at the facts and see how truly shocking this is:

Governments want to have the capacity to spy on their citizens- nothing new here. since the dawn of time the ruler’s no. intelligence priority was to spy not on his enemy from abroad but on his enemies from within (opposition, subversive elements).

Governments can now do this in a scale that was incomprehensible before: they can pretty much collect and store every piece of digital communication they can get there sniffers on.

Governments can analyze and understand the information like never before- The East-German Statsi was notorious for eavesdropping on large segments of the population. They were so obsessed with this that the accumulated so much recorded material that they were never able to listen or dissect it. Fast forward 30 years- machines do it almost instantly today, identifying key phrases, mapping links between seemingly unconnected people and are rapidly gaining in machine intelligence. But….

  • We share everything online- are locations, friends, images and desires
  • We wear mobile tracking devices with us most times
  • We are now loving the idea of having a wearable tracking devices, which we will never take off and will transmit not only our location but our vital signs
  • We disregard any common sense when it comes to online safety (using same password for all our social media accounts for example).

So why are we surprised? We are simply making it easier for any nation state (be it our own or an adversary) to collect information about us. What’s the solution? We’ll, if you don’t want anyone to access a piece of information (sensitive correspondence, nude selfies) please refrain from posting it anywhere online. Otherwise- consider everything you’ve ever posted as “free for all” (regardless of privacy settings). If you still consider sharing after all this- don’t act surprised…  


Yotam Gutman is Director Product Marketing at Cytegichttp://owntrepreneurship.com/
 

« NATO missile system hacked remotely by ‘foreign source’
The Focus on Terror has Distorted the Debate on Encryption »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Cyber Security Experts Association of Nigeria (CSEAN)

Cyber Security Experts Association of Nigeria (CSEAN)

Cyber Security Experts Association of Nigeria (CSEAN) is a not for profit group of professionals in the field of Information Security in Nigeria and Diaspora.

MBL Technologies

MBL Technologies

MBL Technologies specializes in information assurance, enterprise security, privacy, and program/project management.

CyberDegrees.org

CyberDegrees.org

CyberDegrees.org aims to provide top-notch information for students seeking Cyber Security education and career guidance.

Hacken

Hacken

Hacken provide a range of cybersecurity services including security assessments, blockchain security audits, and secure software development.

NanoVMs

NanoVMs

NanoVMs is the industry's only unikernel platform available today. NanoVMs runs your applications as secure, isolated virtual machines faster than bare metal installs.

Centraleyes

Centraleyes

Centraleyes (formerly CyGov) is a cutting-edge integrated cyber risk management platform that gives organizations unparalleled understanding of their cyber risk and compliance.

Clear Thinking Solutions

Clear Thinking Solutions

Clear Thinking is an IT Solutions company specialising in secure & compliant technical services.

Precursor Security

Precursor Security

Precursor Security are information security specialist, delivering all aspects of Security testing, Cyber Risk Management, and Continuous Security Testing.

link22

link22

link22 offers a high level of expertise within IT security and system solutions. We help public and private actors with highly secure IT-solutions.

Quartz Network

Quartz Network

Quartz Network is a curated community for change-makers, up-and-comers, and professionals who are ready to grow, adapt, and thrive.

Quantum eMotion (QeM)

Quantum eMotion (QeM)

Quantum eMotion is a Montreal-based advanced developer leading the way towards a new generation of quantum-safe encryption for the quantum computing age.

Zenzero

Zenzero

Zenzero simplifies technology adoption and supports our customers through managed and outsourced IT support.

Fernao Group

Fernao Group

Fernao offer you all solutions from a single source - from cyber security, business resilience and digital infrastructure to cloud technologies and pentesting.

Point Wild

Point Wild

Point Wild is a holding company that acquires, integrates and manages a diverse portfolio of best-in-class cybersecurity brands for consumers and enterprises.

UBDS Digital

UBDS Digital

UBDS Digital is your Digital Lifecycle Partner for Secure Cloud Transformation.

Teal

Teal

Teal provides exceptional managed IT solutions for small- to medium-sized organizations that value real partnerships and elevated security.