Firstly, I’m not against privacy or anything, just ignorant. I do try to stay pretty private despite that.

I wanted to know what type of info (Corporations? Governments? Websites??) Typically get from you and how they use it and how that affects me.

  • abbenm@lemmy.ml
    link
    fedilink
    arrow-up
    0
    ·
    14 days ago

    SSRN is a kind of vast warehouse of academic papers, and one of the most excited and well-read ones is called “I’ve got nothing to hide and other misunderstandings of privacy.”

    The essence of the idea is that privacy is about more than just hiding bad things. It’s about how imbalances and access to information can be used to manipulate you. Seemingly innocuous bits of information can be combined to reveal important things. And there are often subtle and invisible harms that are systematic in nature, enabling surveillance state institutions to use them to exercise greater amounts of control and anti-democratic ways, and it can create chilling effects on behavior and free speech.

    https://papers.ssrn.com/sol3/papers.cfm?abstract_id=998565

    • fool@programming.dev
      link
      fedilink
      arrow-up
      0
      ·
      13 days ago

      Everyone should read academic papers regardless of scholarship. But at the same time, I don’t pretend not to be lazy, so let me summarize (no gee-pee-tee was used in this process):

      comment 1/2

      Section I. Introduction

      skip :3

      Section II. The “Nothing to Hide” argument

      We expand the “nothing to hide” argument to a more compelling, defensible thesis.

      “The NSA surveillance, data mining, or other government information- gathering programs will result in the disclosure of particular pieces of information to a few government officials, or perhaps only to government computers. This very limited disclosure of the particular information involved is not likely to be threatening to the privacy of law-abiding citizens. Only those who are engaged in illegal activities have a reason to hide this information. Although there may be some cases in which the information might be sensitive or embarrassing to law-abiding citizens, the limited disclosure lessens the threat to privacy. Moreover, the security interest in detecting, investigating, and preventing terrorist attacks is very high and outweighs whatever minimal or moderate privacy interests law-abiding citizens may have in these particular pieces of information.” (p. 753, or pdf page 9)

      Section III. Conceptualizing Privacy

      A. A Pluralistic Conception of Privacy (aka “what’s the definition”)

      Privacy definitions suck.

      • “privacy’s content covers intimate information, access, and decisions”? But your Social Security and religion are private but not intimate (p. 755, or pdf page 11).
      • ye olde Harvard Law Review “right to be let alone”? But shoving someone and not leaving them alone isn’t a privacy violation (p. 755, or pdf page 11)
      • The 1984 Orwellian thingy of social control by surveillance? But the boring data like the history of your beverage use and marital status isn’t very controlly (p. 756, or pdf page 12)

      Since it isn’t only about inhibition or chilling (scaring people into not doing stuff) and more about a helpless powerless relationship with the important-life-decision institutions, Kafka’s The Trial is more accurate: a bureaucracy “with inscrutable purposes… uses people’s information to make important decisions about them, yet denies people the ability to participate in how their information is used” (p. 756-757, or pdf page 12-13).

      To make privacy distinct and its issues more concrete – it is kinda a blobby subject (p. 759 or pdf page 15) – we define it as a blurry family relationship of kinda similar stuff (i.e. if it’s similar to the below, it’s in the privacy umbrella):

      • Information Collection
        • Surveillance
        • Interrogation
        • Main problem: “an activity by a person, business, or government entity creates harm by disrupting valuable activities of others” whether physical, emotional, chilling socially beneficial behavior like free speech, or power imbalances like executive branch power.
      • Information Processing
        • Aggregation
        • Identification
        • Insecurity: Information might be abused. You can think of ways ;)
        • Secondary Use
        • Exclusion: People have no access nor say in how their data is used
      • Information Dissemination
        • Breach of Confidentiality
        • Disclosure
        • Exposure
        • Increased Accessibility
        • Blackmail
        • Appropriation
        • Distortion
        • Main problem: How info can transfer or be threatened to transfer
      • Invasion
        • Intrusion
        • Decisional Interference
        • Main problem: Your decisions are regulated

      (p. 758-759, or pdf page 14-15)

      ((aside by me: Sheesh lol))