April 19, 2017 By Douglas Bonderud 2 min read

Digital privacy is a hot topic. Contentious net neutrality discussions have been happening for years, and the American government recently empowered companies to buy consumer search histories from internet service providers (ISPs).

Add in the increasing number of device searches carried out by border security personnel — often requiring travelers to give up their passwords voluntarily — and it’s clear that users need a new strategy to keep their data safe. Computerworld suggested one solution is tossing the truth to embrace the value of little digital lies.

Is Digital Privacy Inherent or Optional?

Do citizens have an automatic right to digital privacy? Should it be an inherent part of the contract with any ISP, or are companies only obligated to offer such protections if consumers are willing to pay? Forbes noted the recent decision by Congress empowered ISPs to collect and sell browsing data made this a critical consideration for consumers.

For example, proponents of less powerful privacy legislation argued that ISPs and social giants such as Facebook — which already collects and sells consumer data — are not fundamentally different and should both be given the same opportunity to make a profit. Privacy-as-a-right supporters, meanwhile, make a double case: Shouldn’t consumers have the right to opt out of the collection and distribution of personal data, and see who’s using it if they opt in? Furthermore, if they do allow such collection, shouldn’t they get a portion of the revenue?

Privacy is also making corporate waves. More than 200 American companies are now covered by the EU/U.S. Privacy Shield legislation, which sets data collection and notification requirements while protecting companies from undue harm.

Ultimately, digital privacy is now moving into a new realm of debate: Are these concepts more accurately described as unassailable rights or legislated privileges?

The Art of Lying Well

While government mandates tilt the privacy issue to one side or the other, consumers can’t wait for the hammer to fall before protecting their data. Traditional privacy methods that rely on concealment — such as creating strong passwords, using VPNs and encrypting data — may no longer be enough. If passwords are up for grabs, ISPs are selling data and tech companies build in easy access backdoors, obfuscation is sound and fury that amounts to nothing.

Computerworld noted that one solution is polluting web browser and social site history with fake searches and queries designed to lower the value of private data. The source considered the theory of Steven Smith from MIT, who promoted a concept that polluted web traffic with arbitrary searches and site visits.

An example of this method is the browser plugin Noiszy, which produces “misleading digital footprints around the internet” by visiting random websites. Given the current privacy climate, expect a sharp rise in the number and sophistication of these tools over the next few months.

Telling the truth is always a good idea — until innocuous search data or social posts become potential threats and valuable commodities. To stay safe online, consumers may need to master the art of digital disinformation.

More from

Unpacking the NIST cybersecurity framework 2.0

4 min read - The NIST cybersecurity framework (CSF) helps organizations improve risk management using common language that focuses on business drivers to enhance cybersecurity.NIST CSF 1.0 was released in February 2014, and version 1.1 in April 2018. In February 2024, NIST released its newest CSF iteration: 2.0. The journey to CSF 2.0 began with a request for information (RFI) in February 2022. Over the next two years, NIST engaged the cybersecurity community through analysis, workshops, comments and draft revision to refine existing standards…

What should Security Operations teams take away from the IBM X-Force 2024 Threat Intelligence Index?

3 min read - The IBM X-Force 2024 Threat Intelligence Index has been released. The headlines are in and among them are the fact that a global identity crisis is emerging. X-Force noted a 71% increase year-to-year in attacks using valid credentials.In this blog post, I’ll explore three cybersecurity recommendations from the Threat Intelligence Index, and define a checklist your Security Operations Center (SOC) should consider as you help your organization manage identity risk.The report identified six action items:Remove identity silosReduce the risk of…

Obtaining security clearance: Hurdles and requirements

3 min read - As security moves closer to the top of the operational priority list for private and public organizations, needing to obtain a security clearance for jobs is more commonplace. Security clearance is a prerequisite for a wide range of roles, especially those related to national security and defense.Obtaining that clearance, however, is far from simple. The process often involves scrutinizing one’s background, financial history and even personal character. Let’s briefly explore some of the hurdles, expectations and requirements of obtaining a…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today