How Fixable Is The Unsafe Internet
How Fixable Is The Unsafe Internet?
The larger the information on the Internet becomes, the more users and the larger the security issues and violations. If only we could rebuild the Internet's infrastructure to make data travel more safely and securely, we would have a safer internet. IT and cybersecurity experts frequently lament.
Efforts are being made to address privacy and data theft concerns. However, despite the occasional proposals to replace the Internet with a new and improved super highway over the years, current projects are comparable to patching potholes and repaving lanes on physical transit roadways.
According to a recent study conducted by Consumer Reports' Digital Lab, 96% of Americans agree that more should be done to protect consumer privacy. However, do not anticipate the emergence of a completely new alternative Internet in the coming year.
Rather than hardware, you will see a greater emphasis on software offerings focused on privacy and security. These "patchwork solutions" include new alternative search engines, browsers, email, chat, productivity, payment, and advertising technologies.
The @ Company is one Company that is leading the charge to fix the Internet. Barbara Tallent, the Company's CEO, aims to create a more secure and human-centric Internet by granting you true ownership and control over your data.
To that end, the Company launched an app last October based on its new privacy protocol. This new standard aims to alter how online merchants and businesses handle and manage the personal information of billions of Internet users.
The objective is to reclaim control of your user information from third parties and return it to you. According to Tallent, every piece of personal information collected, stored, and organized online is used to sell, track, and even profile everyone on the planet — including you.
"There is undoubtedly a trend toward privacy, but I would argue that people want to trust that the data they provide is being used for the intended purposes, is not being tracked, and that they have the right to be forgotten and to engage anonymously once they have provided data," according to Tallent.
Fixing What's Broken
Tallent noted that while discussing the negative consequences of affecting the Internet, he noted that a number of workaround solutions are already available. She anticipates that additional items will be added shortly.
For instance, you can now purchase de-Googled phones. In 2021, the e.foundation will launch the first of these phones. OSOM Products is expected to release additional de-Googled phones this year. These phones will not monitor your activity for their benefit.
Another patching solution for messaging apps is on the way. By offering end-to-end encryption, Signal and Telegram paved the way for private messaging in 2020. By 2021, the next generation of messaging apps will allow you to delete your messages from another person's phone completely. Soon, your messages will always be yours alone.
This year will also see improvements to file sharing; by 2021, true peer-to-peer file sharing will be available. Completely encrypted files can be transmitted without being permanently stored on a cloud server.
Additionally, a look into location sharing. This year, you'll be able to share your location privately with family and friends, as well as opt into sharing data with other entities when prompted.
Additionally, we will see control over contact data. In 2021, Tallent stated, contact apps will allow you to control who has access to your information.
Social Media
In 2020, we began to see the rise of private social media platforms based on Mastodon. Then, as conservatives faced growing censorship on YouTube and Facebook, they turned to sites such as Parler.
This trend will continue in 2021, as social media platforms enable more nuanced categorization of individuals beyond "followers" and "friends." These "groups" can be used across multiple apps, significantly increasing their interest, utility, and fun.
"At the moment, your data is dispersed throughout the Internet. Fortunately, new businesses are emerging that assist you in reclaiming your data "Continuing, she stated.
For example, Mine announced last year that it could determine which companies have your data, how vulnerable it may be, and how to remove it from those companies' servers. As these services expand in 2021, many businesses will see their mass data stores devalued and forced to adopt new business models.
"When true privacy and the ability to reclaim data are achieved, new and exciting applications will emerge in this space. Consider a voting app that enables you to conduct private and anonymous polls among your friends,"'She stated.
Workarounds Exist
Tallent noted three fundamental types of solutions for protecting data transmitted over the Internet that have been in place for decades.
First, use layer security (TLS) or virtual private networks to encrypt data in flight (VPN). Two, encrypt data contained within an application's walls. Three, develop application-level access control models and associated processes.
More recently, open protocols such as the Signal protocol have enabled end-to-end encryption for use cases such as instant messaging to be provided by the same cryptography and software, Tallent noted.
"The Signal protocol is used by Signal, Skype, and WhatsApp. However, you cannot send an instant message from Signal to Skype or WhatsApp. Furthermore, end-to-end encryption is insufficient,"'She stated.
Privacy a Slippery Slope
Whether for personal or business use, the way messaging and other apps handle privacy can be fluid. Consider the public outcry and migration of WhatsApp users to the privacy-focused chat app Signal earlier this year.
WhatsApp claims to be end-to-end encrypted, and the majority of its activity is. However, Facebook can track when you use the app and who you chat with was enough to erode customer trust for millions of people, according to Tallent.
"Returning the keys to the data owners and decoupling the data and application layers are game changers. However, providing a platform and SDK that enables frontend developers to create new experiences without having to worry about the infrastructure and complexity of cryptographic exchanges is what has the entire [security] community excited "she noted.
Opinions Vary
There is no need for a replacement for the Internet. The technology industry needs to focus its resources on improving its cybersecurity policies, thereby lowering the risk of attacks. Observing Stephen Light, owner of Nolah, an e-commerce retailer of mattresses and bedding supplies.
"The current level of security on the Internet is sufficient to restrict users who do not know how to circumvent cybersecurity. However, the situation is different for experienced hackers [who] can gain access to a system if they are patient and circumspect in order to avoid detection "he explained.
Repairing the Internet is a lofty goal. It's also similar to changing tires while driving a car, as Purandar Das, CEO and co-founder of Sotero, an encryption-based security company, suggested.
"What is more critical is that businesses develop a more robust strategy for security and privacy in relation to consumers. It is critical to place security and privacy on an equal footing with technical capability and revenue streams "he explained.
Something needs to change in the way we approach Internet security. Many people are unaware of their personal and sensitive information's vulnerability to hackers and other cybercriminals, according to Daivat Dholakia, director of operations at Force by Mojio, a GPS fleet tracking service for small businesses.
"While companies such as Facebook emphasize the importance of individual control over security settings, the true responsibility rests with the massive technology companies that handle our data on a daily basis. They must be more forthcoming about who receives and sells your information, and they must strengthen their cybersecurity divisions "he explained.
Dholakia believes that a massive upgrade to Internet security is a foregone conclusion. However, this will be a multi-year endeavour complicated because the companies that purchase and use data have a vested interest in privacy settings remaining disabled or inaccessible.
"At the end of the day, I believe the Internet will not disappear, but I believe that in ten years, we will be using a significantly different kind of Internet," he predicted.
IT Courses and Certification
Information Security and Cyber Law Course and Certificate
Information Technology Fundamentals Course and Certificate
Internet of Things (IoT) Course and Certificate
Internet Technologies Course and Certificate
Internet Marketing Course and Certificate
Social Media Course and Certificate