SMARTPHONES AND BIG DATA – THE END OF PRIVACY

SMARTPHONES AND BIG DATA – THE END OF PRIVACY

FADI ABU ZUHRI

INTRODUCTION

Technology is rapidly advancing. The technology that was there ten years ago is not the technology that is there today and it will not be there in ten years to come, as new technologies would have been adopted (Briggs & Thomas, 2015). Smartphone manufacturers have adopted various biometric security measures such as voice recognition, fingerprints, facial recognition and IRIS scanners to protect its users. In the not too distant future, biometric scanners and other new security measures would be commonplace. This article shows how such technological advancements can be creepy, as the safety of users’ information would no longer be guaranteed.

WHAT YOUR SMARTPHONE MIGHT BE REVEALING ABOUT YOU

A smartphone can say so much about a person’s personality including the person’s likes and dislikes, the person’s location, which services are being used and how much time spent on various apps, even the mood can be predicted. The smartphone could in fact trigger services to send the individual targeted advertisements (Tene & Polonetsky, 2013).

A study conducted by the University of Lancaster indicated that the operating system of a smartphone, whether Android or OS can depict the personality of an individual. Apparently, people who used Android phones were found to be more honest and humble than those who used iPhones. Further research indicated that Android phone users were found to be kinder, more open and less extroverted that OS users. They concluded by stating that the smartphone is the most basic level of personalization, which can tell a lot about a user (Shaw, Ellis, Kendrick, Ziegler, & Wiseman, 2016).

The applications that the users download could also tell about their personality traits, where that person is downloading from and the services that the individual is using which allow advertising companies to send targeted ads to that individual. A future with Radio Frequency Identification (RFID) implants offer a wide range of challenges and opportunities with identifying pepole (Rotter, Daskala, & Compano, 2008). It has become more and more apparent that the smartphone is the mini digital version of a user and that is why many users do not like other people using their smartphones. This calls for the use of security measures such as biometric scanners to protect the users.

THE PROS AND CONS OF BIOMETRIC SCANNERS

Over the years, smartphone manufacturers have managed to upgrade these devices with embedded biometric scanners (Mayer-Schönberger & Cukier, 2014). Smartphone manufacturers companies have started adding biometric scanners to protect the users. The biometric scanners are beneficial in that they can identify criminals, understand an individual’s online behavior, and predict the political or religious affiliations of that person (Hubbard, 2008). For instance, when a criminal tries to withdraw funds from a person’s online banking through a smartphone, biometric scanners may be able to detect that there is a change of fingerprints and use mechanisms to protect the user such as locking down of the smartphone to prevent withdrawal of the funds. A biometric scanner could proactively scans for viruses to protect the user of the smartphone (Gilbert, 2009).

However, this has proven to be more creepy than beneficial since the personal information of the users can be compromised if someone can hack the biometric scanner. The biometric scanner stores personal information such as the fingerprints of an individual, individual likes and dislikes, app preferences, physical location, etc. (Lieberoth & Hansen, 2011). The biometric scanner could predict a person’s political or religious affiliations. For example, if political elections registers voters using biometric registration, this information can be linked to the person (Greenberger & Padesky, 2015). It is, therefore, evident that future smartphone with more biometric scanners are creepier as they are in a position to store personal information, identify criminals, understand the online behavior of an individual, and depict his or her political or religious affiliations.

HOW BIG DATA IS MARKING THE END OF PRIVACY

It is being suggested that smartphones will, in future, carry out blood tests, medical scans, and even offer diagnosis by linking with advanced medical profiles and databases. Biosensors would be linked to smartphones, monitor the patient’s vital signs and treatment (Topol, 2016).

Powerful alogorithms that run the in backend and link to your smartphone could help the government fight terrorism or online retailers predict buying patterns. For example, Amazon, through its Kindle application, knows which section of the book is most engaging and which one is not. This information can be used to target the user with other interesting sections or prompt the reader to buy another book. Big data and real-time constant surveillance through our smartphones mark the start of new digital revolutions that can change the way we think and interact in a new world. Big data could even predict our future behavior and possibly implicate us for something we did not even do (Mayer-Schönberger & Cukier, 2014).

CONCLUSION

While the benefits of smartphones and in-built security are much touted, one needs to consider the power they are increasingly being vested with as technology advances. With the emergence of new technologies, smartphone manufacturers can enhance more security measures for the users while at the same time store more personal information (Ferguson, 2015). The personal information that is likely to be kept by a biometric scanner includes an individual’s fingerprints, personality traits, likes and dislikes, political and religious affiliations, geo-location, preferred apps and so forth (Fadiman, 2012).

REFERENCES

  1. Briggs, P., & Thomas, L. (2015). An inclusive, value sensitive design perspective on future identity technologies. ACM Transactions on Computer-Human Interaction (TOCHI) , 22 (5).
  2. Fadiman, A. (2012). The spirit catches you, and you fall: A Hmong child, her American doctors, and the collision of two cultures. Macmillan.
  3. Ferguson, A. G. (2015). Big Data and Predictive Reasonable Suspicion (Vol. 163). University of Pennsylvania Law Review.
  4. Gilbert, D. (2009). Stumbling on happiness. USA: Vintage Books.
  5. Greenberger, D., & Padesky, C. A. (2015). Mind over Mood: Change how you feel by changing the way you think. USA: Guilford Publications.
  6. Hubbard, T. E. (2008). Automatic license plate recognition: an exciting new law enforcement tool with potentially scary consequences. Syracuse Journal of Science & Techlogy Law , 18 (3).
  7. Lieberoth, A., & Hansen, F. A. (2011). Can autobiographical memories create better learning? The case of a scary game. Proceedings of ECGBL. The 5th European Conference on Games Based Learning, (pp. 350-357). Athens, Greece.
  8. Mayer-Schönberger, V., & Cukier, K. (2014). Big data: A revolution that will transform how we live, work, and think. Houghton Mifflin Harcourt.
  9. Rotter, P., Daskala, B., & Compano, R. (2008). RFID implants: Opportunities and challenges for identifying people. IEEE Technology and Society Magazine , 27 (2).
  10. Shaw, H., Ellis, D. A., Kendrick, L.-R., Ziegler, F., & Wiseman, R. (2016). Predicting Smartphone Operating System from Personality and Individual Differences. Cyberpsychology, Behavior, and Social Networking , 19 (12), 727-732.
  11. Tene, O., & Polonetsky, J. (2013). A theory of creepy: technology, privacy, and shifting social norms. Yale Journal of Law and Technology , 16 (1).
  12. Topol, E. (2016). The patient will see you now: the future of medicine is in your hands. Basic Books.

DARKER SIDE OF CRYPTOCURRENCY AND THE ROLE OF DARTH VADER

DARKER SIDE OF CRYPTOCURRENCY AND THE ROLE OF DARTH VADER

FADI ABU ZUHRI

INTRODUCTION

Cryptocurrency is the latest innovation in currency that has been introduced in the world today. It involves the use of digital assets to work as a medium of exchange by the use of cryptography. In 2009, Bitcoin became the first company to decentralize cryptocurrency and ever since, many companies have mushroomed to provide the same services (Gao, Clark, & Lindqvist, 2016).

The introduction of this particular medium of exchange was aimed at reducing the production of currency and makes the whole idea of digital assets come to play. The various reasons that have made this particular medium of exchange grow in popularity is the fact that this particular exchange has the ability to reduce the amount of currency that is circulating in various financial institutions that are present today. Also, the assets that have been transformed to the form of Cryptocurrency are less culpable to be followed up as far as legal matters are concerned.

To take an example, Bitcoins have suddenly become a major topic of financial innovation all over the world. There are various benefits of Bitcoin. For instance, Bitcoin has no transaction costs. It is transparent and very open (VPRO, 2015). The development of this technology also comes up with some hitches despite the fact that more and more people are using it as the most preferred medium of exchange. It is estimated that more than 10 million people hold Bitcoin wallets (Burniske & White, 2017). For these reasons, we take a look at the darker side of Crytocurrency.

BLOCKCHAINS EXPLAINED

A blockchain consists of blocks, each holding some data, linked with other blocks. A block of data, in Bitcoin for example, is limited to one megabyte and there is no limit on the number of transactions that can fit in a block (BitcoinWiki, 2016). A blockchain is open, distributed and ensures that the transactions are immutable and can be verified. This is achieved by unique hashing algorithm, like SHA-256. A hashing algorithm provides a unique sequence of bits to authenticate the integrity of the data. Any change in the data leads to a different hash. The hash of one block gets embedded in the next block and so on (Sims, 2017). While this ensured integrity it did not prevent anyone from replicating the blockchain. This is solved by the use of cryptographic nonce (Rogaway, 2004). A nonce is an arbitrary number added within the block to generate a specific type of hash. This, for example in 2017, is a sequence of seventeen zeros at the beginning of the hash. Recreating this hash sequence is infeasible due to the massive computing power required.

MISUNDERSTANDING CRYTOCURRENCY

A lack of public awareness is a cause of misunderstanding Cryptocurrency. People haven’t had enough time to educate themselves about how these systems works (Baur, Bühler, Bick, & Bonorden, 2015). Cryptocurrency is a very young technology when it comes to dealing with currency. People embraced this new idea but not everyone has evaluated the pros and cons of owning and transacting in Cryptocurrencies. This makes them vulnerable to being conned and even losing their fortune.

RISK AND VOLATILITY

Bitcoin and other Cryptocurrencies are still growing and undergoing various developments. Blockchains use private key (secret key) to access digital currency wallets, trade and transact. Thus, protecting your private key is of utmost importance, as it is irreplaceable if lost or stolen, just like cash. It is estimated that the value of lost Bitcoins is US$ 950 million (Berke, 2017). If Darth Vader lost his private key, his money is forever lost in Internet’s virtual space.

Popularity of Cryptocurrency is also increasing as evidenced by the fact that daily Bitcoin transactional volume is over $200 million (Burniske & White, 2017). There is a great risk that this high demand of this Bitcoins may fail to be satisfied raising skepticism from the client on whether the company can meet the demand of the customers. Also, there is a big risk when it comes to the idea of volatility involving the change in prices of the Bitcoin (Kostakis & Giotitsas, 2014). Currently, the Bitcoin prices change every day due to the events related to the production and trade of Cryptocurrencies. There is a risk because at this infancy stage of Bitcoins, there might be loopholes that have not been discovered and it would be important to discover them and cover them as soon as possible to avoid future catastrophe in the transactions.

Your computing power could be used without your knowledge by Cybercriminals for Cryptocurrency mining operations. Such an attack was reported recently when unpatched Windows 2003 Webservers were infected with modified mining software (Monero). The loss was estimated at more than US$ 63,000 in digital currency (Seals, 2017).

PRONE TO MALWARE ATTACK

Cryptocurrency works on a technology of storing assets on a publicly accessible digital platform that could attract cyber-criminals. They could be a constant attempt to try to come up with malware with an attempt of stealing this money (Kostakis & Giotitsas, 2014). Hackers from all corners of the world always try to come up with ways to break the cipher on which these particular Cryptocurrencies have been encrypted. Bitfinex is the largest US dollar-based Bitcoin exchange in the world. It suffers from the effects of a DDoS attack on its systems. Apart from the attacks against the Cryptocurrency exchanges, DDoS has also attacked the Russian exchange BTC-e. Bitcoin inherits decentralization, which is of advantage but also one of its biggest risks and challenges (Muncaster, 2017).

Also, there is a risk of malware in the form or viruses and even Trojans. The fact that all the transactions involving Cryptocurrencies are conducted via the Internet puts this particular type of exchange at the risk of being attacked by malware on the Internet that might decipher or corrupt information that is present about the Bitcoin. The most probable attack by malware is through ransomware where criminals will intercept the information and demand money in exchange.

DECRIMINALISING CRYTOCURRENCY

It is well known within the law enforcement circles that civilian-type vehicles are a preferred choice to blend in with the crowd and go unnoticed. Vehicles such as Toyota Corolla sedans, Ford F-150 pickups, or Chevrolet Malibu sedans are popular choices by both drug dealers and narcotics officers in the United States (Clinton, 2014). Does that mean an unmarked Toyota Corolla should be suspected an accomplice to a crime?

Anyone who has seen the movie “Jaws” will remember how deadly sharks can be. But in reality, you are more likely to be killed by a deer than by sharks, bears and alligators combined. Statistics show that for every one shark related death on average in the United States, 120 deaths are due to deers, 58 due to flying insects and 28 due to dogs. This is in stark contrast to 0.18 deaths per year by a wolf, or on average one person every 5 years (Lopez, 2016). These examples are just a reminder to how people are quick to dismiss Cryptocurrency because the ransomware perpetrators demanded money in Bitcoins. It almost seems as if the media is bent upon projecting Cryptocurrency as the iconic evil currency, similar to Darth Vader of Star Wars fame.

It is argued that for currency to be a suitable medium of exchange, it should be easily dispersed and easily spent. This is not the case for Cryptocurrencies since it is not easily liquidated and thus it cannot be spent as easily as cash. This limitation makes it hard for the Cryptocurrencies to be popular among those engaged in “dark business” (Rogojanu & Badea, 2014). As much as it is touted that Crytocurrencies work outside the traditional modes of banking, evading detection, law enforcement agencies might have access to tools to keep track of the transactions that take place with Cryptocurrency. These arguments suggest that it is a common misconception that Cryptocurrency is a trading ground for illegal business such as Money Laundering and Drug Trafficking.

CONCLUSION

Cryptocurrency is a revolutionary concept that is sure to disrupt the market. It has come with many advantages over the current medium of exchange. These advantages have led to a lot of people to adopt this technology sometimes without having the full knowledge of how this particular business is conducted (Al Kawasmi, Arnautovic, & Svetinovic, 2015).

This particular technology could be the next big thing as a medium of exchange, but there must be a lot of policy formulation that must follow up to ensure that there is minimal fraud. Also, this technology being at an infancy stage there should be a lot of development that should take place to ensure that this whole system functions well and without any doubt from the clients.

While fiat currencies are backed by the government, Cryptocurrencies are generated on a computer system with no governmental guarantees. While some find comfort in government backing, it also means that the government can print an unlimited amount of fiat currency. Fiat currency, in some cases, is not backed up any physical asset like gold. On one had the value of fiat currencies are subject to regulations, market and political forces; on the other hand, Crytocurrencies are influenced by supply and demand.

Owning a Toyota Corolla is not illegal even though it s popular vehicle for criminals who wish to go unnoticed. Popular culture criminalizes the wolf and the shark for killing one and five people every 5 years. The lovely deer is not criminalized even after it is responsible for 120 deaths a year.

Cryptocurrencies are not without its challenges. While there are voices asking for stronger government regulation, does it not defeat the whole premise of decentralization that Cryptocurrency stands for? Despite the name Cryptocurrency, is it not just another asset class that presents a convenient form of value exchange? Why regulate it anymore than you would any taxable good of value?

Is there a solution to recovering your encrypted assets locked by a private key? Can you be given ownership of your Cryptocurreny wallet if it was lost or stolen? Losing ownership of one’s private key is seen as the ultimate risk with no signs of a viable solution.

REFERENCES

1.Al Kawasmi, E., Arnautovic, E., & Svetinovic, D. (2015). BitcoinBased Decentralized Carbon Emissions Trading Infrastructure Model. Systems Engineering , 18 (2), 115-130.

2.Baur, A. W., Bühler, J., Bick, M., & Bonorden, C. S. (2015). Cryptocurrencies as a disruption? empirical findings on user adoption and future potential of bitcoin and co. In Conference on e-Business, e-Services and e-Society (pp. 63-80). Springer International Publishing.

3.Berke, A. (2017, March 7). How Safe Are Blockchains? It Depends. Retrieved 2017, from https://hbr.org/2017/03/how-safe-are-blockchains-it-depends

4.BitcoinWiki. (2016, April 11). Block size limit controversy. Retrieved 2017, from https://en.bitcoin.it/wiki/Block_size_limit_controversy

5.Burniske, C., & White, A. (2017, January). Bitcoin: Ringing the bell for a new asset class. Retrieved 2017, from Ark Invest: http://research.ark-invest.com/bitcoin-asset-class

6.Clinton, P. (2014, March). Driving a Drug Dealer’s Car. Retrieved 2017, from http://www.government-fleet.com/channel/procurement/article/story/2014/03/driving-a-drug-dealer-s-car.aspx

7.Gao, X., Clark, G. D., & Lindqvist, J. (2016). Of Two Minds, Multiple Addresses, and One Ledger: Characterizing Opinions, Knowledge, and Perceptions of Bitcoin Across Users and Non-Users. Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems, (pp. 1656-1668). Santa Clara, California.

8.Kostakis, V., & Giotitsas, C. (2014). The (A) political economy of Bitcoin. Communication, Capitalism & Critique. Open Access Journal for a Global Sustainable Information Society , 12 (2), 431-440.

9.Lopez, G. (2016, September 24). You are way more likely to be killed by deer than by sharks, bears, and gators combined. Retrieved 2017, from https://www.vox.com/2016/9/24/13032272/killer-animals-deer-sharks-bears

10.Muncaster, P. (2017, June 15). World’s Largest Bitcoin Exchange Bitfinex Crippled by DDoS. Retrieved 2017, from https://www.infosecurity-magazine.com/news/worlds-largest-bitcoin-exchange/

11.Rogaway, P. (2004). Nonce-Based Symmetric Encryption. In B. Roy, & W. Meier (Eds.), Fast Software Encryption. FSE 2004. Lecture Notes in Computer Science (Vol. 3017, pp. 348-358). Berlin, Heidelber: Springer.

12.Rogojanu, A., & Badea, L. (2014). The issue of competing currencies. Case study–Bitcoin. Theoretical and Applied Economics , 21 (1), 103-114.

13.Seals, T. (2017, September 29). Monero-Mining Campaign Takes the Easy Road to Cash Gains. Retrieved 2017, from https://www.infosecurity-magazine.com/news/moneromining-campaign-takes-cash/

14.Sims, G. (2017, September 29). What is a blockchain. Retrieved 2017, from https://www.youtube.com/watch?v=KN-FQR7A6Iw&feature=youtu.be

15.VPRO. (2015, November 1). The Bitcoin Gospel. Retrieved 2017, from https://topdocumentaryfilms.com/bitcoin-gospel/

Dr. Berg’s New Body Type Guide: Get Healthy Lose Weight & Feel Great

Dr. Berg’s New Body Type Guide: Get Healthy Lose Weight & Feel Great Hardcover – October 24, 2017

The New Body Type Guide by Eric Berg, DC, is a major upgraded and improved version of his best selling book, The 7 Principles of Fat Burning. In his recent years, many new discoveries and observations prompted Dr. Berg to come out with a new version to bust through any slow metabolism. Dr. Berg will teach you how to take your results to a whole new level and get your body into super health state. Also added is several additional chapters on acupressure techniques to rid stress, pleasure food recipes that are healthy and how to stick to your plan no matter what comes up. But the major change is in what you are going to be eating. Forget about cravings, blood sugar imbalances and the numerous continued problems people have when they struggle to lose weight. This is your personal guild to customize your results based on your body type – let the adventure begin!
(Eric Berg, DC)
Translate »