We Live In A Transient Internet

One of the original purposes of the early Internet, beyond endless information, chat rooms and porn, was its offer of anonymity and privacy. Today, the role of Internet is as a remote tool designed for the kind of conversation you might have in a public house or cafe, which could be both highly personal and private and you hope nobody is listening in. 

Posting, sharing, then your thoughts and messages disappearing, was part of the fundamental appea for millions of users. Not any more.

The Internet, cloud computing and the evolution of social networks has led to a significant transition. We have now moved from carrying paper images around, to having digital ones on our smartphone and the smartphone has taken over from the camera. 

As time went on and more of ourselves were placed online, the need to erase our digital paper trail grew at the same rate as our inability to do so. The modern Internet's capacity for privacy has dissolved with the arrival of mainstream social media and the  appeal it has for creating a personal shop window. 

The evolution of social media has been fueled by the human impulse to communicate is a story about using technology to establish personal connections at massive scale. By the time Snapchat launched in the autumn of 2012, the itch for a return to the ephemeral disappearing Internet was prevalent. Eight years later, Snapchat is really a messaging service on steroids, with all the benefits of a real conversation, visual stimulus, speed, and the contents being left to human memory. 

What Snapchat unlocked was a desperate desire for users to not have their digital actions follow them around, fulfilling the wish that your posts need not  live on in your timeline forever. 

Through fulfilling this need, Snapchat and others like it unlocked a new era of disappearing content, in stark contrast to   most mainstream platforms, where content in your timeline is almost impossible to expunge - as anybody who has ever tried to close their Facebook account can tell you.

Fulfillment of this need  lies behind the latest initiative from Twitter  with their new “fleets”  - posts that, like Instagram Stories, disappear after 24 hours. Fleets are so named because they are fleeting - the work of a moment.  They sit at the top of your mobile screen and can display pictures or screenshots of tweets users feel deserve a second showing and then they are gone. 

Twitter is a platform that is frequently accused of a powerful source of misinformation and abuse, largely because because the evidence is so easily accessible. Journalists and fact checkers can easily report on Twitter’s many trends because they are so readily available. Twitter data is searchable and can  be quickly aggregated. It can derive thousands of results from a single word search.

Twitter is also the biggest megaphone for some of the world’s most powerful people including Donald Trump who, without editorial mediation, can tweet whatever he wants, even with some warnings about his message content inserted by Twitter .But with Fleets, Twitter has created a new opportunity for for its more questionable users to do their work far less publicly.

The implications of un-traceability for dangerous people, dangerous ideas and those who hold power are now crystallised on the platform where they are given an unchecked voice.

Social media is great for making friends and exploring interests, it is also great for radicalising lonely young people and spreading misinformation that can cost lives. The problem may not be struggling to find disappearing content from popular accounts, but that the millions of small accounts whose tweets are traceable will be able to post the same content while making it impossible to track the mass effect. 

Fleets may just become another ill-conieived andely-used feature. and may eventually be undone simply because in the end nobody uses them. The important question is who benefits the most out of our posted content automatically disappearing. Is it the normal people who don’t want to be plagued by every online action, particularly those who’ve had access to social media their entire lives? Or, will it be those malicious users who are already twisting the Internet into their own version of reality, who have made misinformation and abuse normal. 

Some of the dangerous ideals popularised in the last decade began in online spaces free of personal accountability. The hope to be free of our digital footprint and to be afforded true privacy is a valid wish. However, the capacity for co-option when everything online becomes impermanent will never not exist.

This complexity will only be untangled if we start honestly answering the question: Who wins most on the ephemeral Internet? Do the benefits outweigh the costs?  These are serious questions for the next generation to deal with as the Internet’s effects on fake news and the financial problems for the established publishing companies, who are losing the commercial ability to produce real truth in news. 

New Statesman:        Forbes:          AE Daily:      Maryville University

You Might Also Read: 

Coming Soon: Regulation Of Social Media

Facebook Fights Fake News - Poorly:

 

« In The Age of Risk, Cyber Security Is The Leading Concern
The Cause Of Amazon’s Cloud Outage »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Cloudera

Cloudera

Cloudera provide the world’s fastest, easiest, and most secure data platform built on Hadoop.

Assured Data Protection

Assured Data Protection

Assured Data Protection specialises in data protection and disaster recovery services for large SME and enterprise organisations.

AVeS Cyber Security

AVeS Cyber Security

AVeS combines expert knowledge and services with leading technology products to provide comprehensive Information Security and Advanced IT Infrastructure solutions.

VerSprite

VerSprite

VerSprite is a specialist information security consulting firm. We provide organizations with detection across all their attack surfaces and deliver critical insight into all possible attack methods.

Philippine National Police Anti-Cybercrime Group (PNP-ACG)

Philippine National Police Anti-Cybercrime Group (PNP-ACG)

The mission of the PNP Anti-Cybercrime Group is to implement and enforce pertinent laws on cybercrime and other cyber related crimes and pursue an effective anti-cybercrime campaign.

ShiftLeft

ShiftLeft

ShiftLeft is a continuous application security platform, purpose-built for the modern software development life cycle.

Octane OC

Octane OC

OCTANe is building the SoCal of tomorrow. We drive innovation and growth by connecting people, resources and capital. Our Incubator focus is FinTech, Data Analytics and Cybersecurity.

Aujus Cybersecurity

Aujus Cybersecurity

Aujas is a pure-play cyber security services company with deep expertise in Identity and Access Management, Managed Security and Security Testing services.

CyberWhite

CyberWhite

CyberWhite is a disruptive provider of cyber security and risk mitigation solutions.

Network Intelligence

Network Intelligence

Network Intelligence are a global cybersecurity provider offering services across 6 broad spectrums - Assessment, BCMS, GRC, Professional Services, MSSP & Training.

Tier One Technology Partners

Tier One Technology Partners

Tier One Technology Partners is an IT managed services provider that focuses on cybersecurity, cloud services, IT consulting, and infrastructure.

UnderDefense

UnderDefense

UnderDefense provides cyber resiliency consulting and technology-enabled services to anticipate, manage and defend against cyber threats.

Trapp Technology

Trapp Technology

Trapp Technology combines the very best cloud, Internet, IT managed services, and IT consulting to provide a true all-in-one IT solution for small to mid-sized businesses.

Cyera

Cyera

Cyera is the data security company that gives businesses context and control over their most valuable asset: data.

SecureAck

SecureAck

From our A-Op SaaS automation platform to Managed Automation-as-a-Service (MAaaS), SecureAck offer powerful security automation the way that best suits your organisation's needs.

WIIT Group

WIIT Group

WIIT Group are focused on a single goal: securing our clients’ critical processes and enabling them for digital transformation.