Académique Documents
Professionnel Documents
Culture Documents
(and all of your contacts) by either governments, or what is far worse, the beforementioned (who are
among the top 10) richest corporations on the world, by those who own the telecommunications
network, those who produced you phone or computer, the operating system and any additional
software you may have bought. And don't be fooled, changing the corporation you depend on for
digital services doesn't help you, as they make very good business in trading massive collections of
their costumers data between themselves, officially for the benevolent purposes of advertising, but
in reality, although officially in competition between themselves, the elite corporations work
together and exchange and sell the info between themselves in a mutually beneficial way.
This directly influences international politics (we remember the affair where the US government was
illegally spying on the highest ranking political representatives of their own ALLIED countries, for
example the president of France. If we put on top of that the recent Hillary Clinton e-mail leaking
controversy, this means that cyberspace security has become a central topic of global political
debate and legislation, which will make things even a lot worse very soon.
What is emerging because of this is a huge class division inside cyberspace, which the underlying
ideological premise being: if you're relatively poor and can't afford absurdly expensive corporate
hardware and security software, and don't have in-depth technical knowledge, you are instead
forced to freely give out all of your information to the most powerful groups of people in the world
(Google. Facebook, Microsoft, etc. are among the top10 richest global companies) not only all of your
personal information, but even the personal information of everyone you're in contact with, if you
even want to use those companys services, which you are forced to do anyway in order to be able to
normally function in todays (post)modern society at all. And don't be deceived, they store
everything, because the technology is advanced enough that this has today become technically
relatively easy to do for those that have enough funds, since extremely advanced technology is being
produced at very low costs (for the companies at least).
With the advent of Augmented Reality, the currently emerging new trend in technology, things get
even worse. Not only that the manipulation and control are now even more complete and total,
since cyberspace and the spontaneous everyday perception of reality get inextricably merged. Now
manipulation and control becomes even more terrifying, as even the people who walk on the street
might thing they are acting completely free, but dont not even realize the data transmitted to them
and the directions given to them might be manipulated or falsified in real-time by some anonymous
employee of a corporation through the internet.
And all of this collection of data is completely passive, stored, and hidden, unlike in the past, where
corporate and government spying required actual people to collect your information. Every button
press, every finger swipe, every mouse click, every voice sound is and can be saved for long, long
years. Even if youre never doing anything wrong or illegal, what you write in a message today, can
used against you in the future, when some employee decides to open your database folder that has
been piling up over the years, thus making power relations even more absolute.
The only possible proposed solution is said to be encryption, but even that has to be set up
extremely carefully and precisely, and it has to be used on both ends: by the sender of the message,
and its receiver. And if the device used for encrypted communication has been compromised before
encryption is installed on either end, it doesnt help at all. And services and software that provide
genuine security and encryption are either corporate (and thus extremely expensive, available only
to the selected few), or are extremely unpopular for the use in the general public, and can even be
counterproductive: just by using it, if its detected, you can be automatically put unto a blacklist of
suspects, which means that if you use encrypted software you might be put even under active efforts
of surveillance just becaused you installed the software in the first place.