The Internet Has Your Data (Whether You Like It Or Not)

Cloud Cleanup Anyone?

Following on where we left off from my last two articles now we shift focus to what this data collection means to you and me and some impending regulations that presumably give us control but do they really? And if we can’t rely on regulations alone, then what can we do about it to protect ourselves?

Let’s start with the regulation GDPR that is making the rounds or all the right reasons – which for the uninitiated is ‘General Data Protection Regulation‘, a sweeping regulation that originated in the EU and impacts not just EU enterprises but every enterprise that has customers or partners in the EU – that affords controls to end customers – enterprises and individuals. Let’s focus on one such with a catchy title ‘The Right to be Forgotten’ (could serve as a good tag line for an estranged lover’s song lyrics as well) which is really the right to ask your provider to erase every digital footprint that you left behind and. On the face of it, this looks very compelling – imagine I can call Vodafone and say, ‘forget me’ and all my digital exhaust is obliterated. But is that really the case? Lets’ dig in. If every provider needs to uniquely identify each of their customers’ digital trail on a continuous basis, imagine the cost that it’s going to entail. And is it even feasible? Let me explain my skepticism. The average number of IP devices in an average US home was about 25 (laptops, smartphones, smart TVs, NEST sensors, IoE devices …) last year that is likely to double this year. And the amount of data that each of these devices is generating is also skyrocketing. So how realistic is it that providers are going to be able to keep up with this data tsunami and fingerprint these in real-time in the event that I hit the ‘Erase All’ button and they need to bring the Kleenex out?

(Source: oecdinsights)

I hope I have your attention now. So, what we are left with – as enterprises and consumers – then? As enterprises – the answer comes down to protecting your own data. And the ‘easiest’ way to do it is by encrypting everything AND keeping the crypto keys with you. The cloud providers’ response of – we can’t provide you with customized solutions or good analytics – with encrypted data is no longer valid. Good technology like ‘homomorphic encryption’ allows for data analytics even on encrypted data. So encrypt everything, and keep the keys with you. As consumers, it is more challenging. I do want Netflix to offer me a 3 month ‘All you can eat Bollywood movies’ based on my viewing patterns. But I do not want Roomba (yes, the vacuum) to snoop and collect data on me without my explicit permission. So, we fickle consumers, want the cake and eat it too! And for the right reasons. So, anonymizing everything with things like the Tor browser or obfuscating IP addresses is not for the faint of heart. And with the pervasiveness of connected pacemakers, insulin monitoring tools, connected refrigerators – all of which collect and send data to the cloud – there is no pragmatic way of obfuscating or anonymizing anything anymore. So, it really boils down to the contract between providers and consumers that needs to change. Regulation clearly helps but we – as consumers – need to become more educated individually, help our friends and family get educated and demand answers from provider’s aka grassroots activism. If you want to join in on the conversation – there is a brand-new podcast series called ‘The Moral Compass’ that I will be hosting and looking for folks who feel strongly about this subject to join me in the conversation (drop me a line). This is not easy, but pursuing anything worthwhile rarely is.

By Ashwin Krishan

Gary Taylor

5 Reasons Why Virtual Desktop Infrastructure Will Go Mainstream Post 2020

Virtual Desktop Infrastructure Growth Virtual Desktop Infrastructure (VDI) technology enables remote users to access their desktop from anywhere using an internet connection. This technology has been around for a couple of decades but never received ...
Automate Order Fallout Resolution Using Self-healing Framework

Automate Order Fallout Resolution Using Self-healing Framework

Automate Order Fallout Resolution Using Self-healing Framework to Accelerate Resolution Time by 98% Most Digital Service Providers (DSPs) face a common challenge of meeting due dates for their customer orders. The instability and delay in ...
Non-Fungible Tokens

Non-Fungible Tokens (NFTs) As Digital Artwork

NFTs As Digital Artwork NFT stands for Non-Fungible Token. Anything fungible is replaceable with something that is of an equal value. A basic example would be money. A $10 note is fungible as it can ...
Martin Mendelsohn

Of Rogues, Fear and Chicanery: The Colonial Pipeline Dilemma and CISO/CSO Priorities

The Colonial Pipeline Dilemma The Colonial Pipeline is one of a number of essential energy and infrastructure assets that have been recently targeted by the global ransomware group DarkSide, and other aspiring non-state actors, with ...
Data Web Accessibility

Data Centres Of The Future

Data Centres Of The Future As humans require more and more computing power and more and more cloud storage, we’re going to need more and more data centres. So what do the data centres of ...