{"id":63120,"date":"2015-08-31T12:00:59","date_gmt":"2015-08-31T11:00:59","guid":{"rendered":"https:\/\/www.transcend.org\/tms\/?p=63120"},"modified":"2015-08-30T17:44:27","modified_gmt":"2015-08-30T16:44:27","slug":"when-surveillance-is-a-feature-not-a-bug","status":"publish","type":"post","link":"https:\/\/www.transcend.org\/tms\/2015\/08\/when-surveillance-is-a-feature-not-a-bug\/","title":{"rendered":"When Surveillance Is a Feature, Not a Bug"},"content":{"rendered":"<p><em>Windows 10 heralds a future in which the cloud rules and computers snitch on us by default.<\/em><\/p>\n<p><a href=\"https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2015\/08\/windows-10-spying-surveillance-big-brother-1984.jpg\" ><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-63121\" src=\"https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2015\/08\/windows-10-spying-surveillance-big-brother-1984-1024x639.jpg\" alt=\"windows 10 spying surveillance big brother 1984\" width=\"700\" height=\"437\" srcset=\"https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2015\/08\/windows-10-spying-surveillance-big-brother-1984-1024x639.jpg 1024w, https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2015\/08\/windows-10-spying-surveillance-big-brother-1984-300x187.jpg 300w, https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2015\/08\/windows-10-spying-surveillance-big-brother-1984.jpg 1460w\" sizes=\"auto, (max-width: 700px) 100vw, 700px\" \/><\/a><\/p>\n<p><em>August 26, 2015 &#8211; <\/em>There\u2019s a saying you\u2019ll hear in certain tech circles: There is no cloud, just other people\u2019s computers.<\/p>\n<p>The cloud is, of course, the vast collection of distant databanks we use to back up our vacation photos, search the Web, make online purchases, find the quickest route home and do pretty much everything else. It is owned by unaccountable corporations, is regularly accessed by police and intelligence agencies and creates a convenient gold mine of credit card numbers, nude photos and other private data for malicious hackers to steal.<\/p>\n<p>And increasingly, using it is no longer optional.<\/p>\n<p>With the July release of its Windows 10 operating system, Microsoft has made the border between using your computer and using other peoples\u2019 computers blurrier than ever before. Privacy advocates are warning about <a target=\"_blank\" href=\"http:\/\/arstechnica.com\/information-technology\/2015\/08\/windows-10-doesnt-offer-much-privacy-by-default-heres-how-to-fix-it\/\" >a host of default settings<\/a> that make automatic sharing of data the new normal \u2014 from your voice and typing patterns to unique machine IDs that help advertisers identify, track and target you with personalized ads, even on your device\u2019s lock screen. Basically, all the privacy worries of your smartphone and Web browser are now a regular part of a major desktop operating system.<\/p>\n<p>This isn\u2019t really a surprise. Microsoft\u2019s previous iteration, Windows 8, laid the groundwork for a fully cloud-integrated operating system that phones home an alarming amount of user information and activity. Windows isn\u2019t alone either: By default, users of Mac OSX and Ubuntu Linux unwittingly transmit local search terms to their respective companies as well as to third parties. Unless these settings are changed (learn how <a target=\"_blank\" href=\"https:\/\/fix-macosx.com\/\" >for Mac<\/a> and <a target=\"_blank\" href=\"https:\/\/fixubuntu.com\/\" >for Ubuntu<\/a>), these companies analyze everything users type into the search box to find a file or app on their hard drives, along with unique IDs and location data.<\/p>\n<p>Windows 10 suggests that this trend is here to stay. Take Cortana, the operating system\u2019s personal digital assistant, similar to Apple\u2019s Siri. Cortana uses a feature called Getting to Know You \u2014 enabled by default \u2014 which allows Windows to automatically record, analyze and share your speech and typing patterns, as well as your location, contacts, calendars and more. We\u2019re told this is for our own good because these kinds of apps, Siri and Google Now included, need our personal data in order to be useful. When the data are sent to Microsoft (or Apple or Google, plus any law enforcement agency or third party that the companies\u2019 arcane terms of service agreements allow) they\u2019re used to improve the algorithm that responds to our queries. There\u2019s no way around this; it\u2019s simply how the app was designed to work.<\/p>\n<p>It\u2019s the ultimatum that mainstream technology companies keep offering us: Either we give up our privacy to use the latest apps and features or we opt out and miss out. Accept the defaults or get left in the dust. Conform or die.<\/p>\n<p>Even when people choose the former, in reality, they\u2019re hardly ever consciously choosing anything. Defaults are powerful decisions that software companies make for us, and it\u2019s always easier for users to do nothing \u2014 especially when they\u2019re told it\u2019s for their benefit. Studies have <a target=\"_blank\" href=\"https:\/\/www.uie.com\/brainsparks\/2011\/09\/14\/do-users-change-their-settings\/\" >consistently shown<\/a> that users rarely change their default settings, and companies that design software know it.<\/p>\n<p>Companies rarely make changing these defaults easy. All of Windows 10\u2019s privacy settings are hidden during the setup process unless a difficult-sounding customized installation is chosen. (The recommended setup is called Express.) Similarly, users who want to use their Windows PC without attaching it to a cloud-based Microsoft login need to click through two additional options to use a local account.<\/p>\n<p>Even with Cortana disabled and all options toggled for maximum privacy, <a target=\"_blank\" href=\"http:\/\/arstechnica.co.uk\/information-technology\/2015\/08\/windows-10-doesnt-offer-much-privacy-by-default-heres-how-to-fix-it\/?comments=1&amp;post=29502191\" >closer inspection shows<\/a> that Windows 10 is still reporting some of your keystroke data to Microsoft. Additional behavioral data collection can be disabled only by editing system files \u2014 something no average user would do. Others can\u2019t be disabled unless you\u2019re using an enterprise version of Windows 10. These design choices that intentionally make desirable user behaviors easy and undesirable ones difficult are known as <a target=\"_blank\" href=\"http:\/\/darkpatterns.org\/\" >dark patterns<\/a>.<\/p>\n<p>Telling nontechnical, privacy-concerned people to stop using the cloud is thus not only misguided but also implausible. What consumers deserve (and what developers should be giving them) are cloudless alternatives that deliver the same convenience and features that Microsoft, Apple, Google and other companies offer.<\/p>\n<p>The current options are sadly lacking, but some developers have started building systems that challenge the centralized cloud model. Cloud-free file storage and backup have gotten easier in recent years, thanks to apps such as BitTorrent Sync and SyncThing, which allow users to create a private peer-to-peer network that keeps files in sync among all their devices. Other projects are more ambitious. A software platform called <a target=\"_blank\" href=\"https:\/\/www.ethereum.org\/\" >Ethereum<\/a> hopes to eventually offer applications that run entirely on distributed peer-to-peer technology similar to the digital currency bitcoin, rather than on centralized servers. Key to Ethereum\u2019s plans are so-called smart contracts and decentralized autonomous organizations, entities that act like corporations but are entirely governed by machine logic and immune to human interference.<\/p>\n<p>The basic idea is that smart contracts can mediate and notarize transactions (a business deal, for example) without the need for a human or corporation in the middle. They can also be used to run distributed applications that fill the same roles as the current cloud-based ones. With strong encryption and no corporate middleman, these applications could offer the same functionality as cloud apps such as Cortana and Siri, with fewer privacy concerns.<\/p>\n<p>These ideas are still in their infancy, but we need to consider them seriously now if we want an alternative to personal devices that are dependent on corporate-controlled clouds. New technology shouldn\u2019t offer a choice between giving up our privacy to live like the Jetsons and defending it to live like the Flintstones. For now, the quest to stay current without surrendering our privacy and autonomy remains elusive.<\/p>\n<p>______________________________<\/p>\n<p><em>Joshua Kopstein is a cyberculture journalist and researcher from New York City. His work focuses on Internet law and disorder, surveillance and government secrecy.<\/em><\/p>\n<p><a target=\"_blank\" href=\"http:\/\/america.aljazeera.com\/opinions\/2015\/8\/when-surveillance-is-a-feature-not-a-bug.html\" >Go to Original \u2013 aljazeera.com<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Windows 10 heralds a future in which the cloud rules and computers snitch on us by default. New technology shouldn\u2019t offer a choice between giving up our privacy to live like the Jetsons and defending it to live like the Flintstones.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[60],"tags":[],"class_list":["post-63120","post","type-post","status-publish","format-standard","hentry","category-whistleblowing-surveillance"],"_links":{"self":[{"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/posts\/63120","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/comments?post=63120"}],"version-history":[{"count":0,"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/posts\/63120\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/media?parent=63120"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/categories?post=63120"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/tags?post=63120"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}