Privacy Through Obscurity

S. Davidson
{"title":"Privacy Through Obscurity","authors":"S. Davidson","doi":"10.1109/MDAT.2013.2283595","DOIUrl":null,"url":null,"abstract":"h I RECENTLY READ an editorial in an electronics magazine about license plate readers, devices used by police and government to scan license plates on cars, look them up in a database, and report if the car is stolen or if the owner of the car is wanted by the law. Information about the location of cars whose licenses are read is kept a long time, a potential privacy problem. Even plates of cars not involved in nefarious activities are scanned. Because license plates are displayed in public, it is perfectly legal to record them. This is not the only way in which we are being recorded. In the old days, if the police wanted to find out what happened at a particular location, they had to find witnesses. Today, police can also consult footage from the large number of surveillance cameras in the area. In England, these are owned by the government, but in the United States, there seem to be just as many owned by businesses, not to mention the prevalence of cell phone cameras. In Russia, many cars use dashboard-mounted cameras, and so the recent meteorite event was captured. Even meteorite privacy is not safe. Anyone having the slightest involvement in computer security knows that ‘‘security through obscurity’’ is one of the worst policies to follow. This policy tries to keep security holes secret, and hopes that no one finds out. This might have worked when access to computers was controlled by a small set of professionals, but today even the slightest flaw will be broadcast around the world as fast as a video of a cute kitten. Those of us well out of college grew up in a time of what we can call ‘‘privacy through obscurity.’’ Perhaps people could read your license plate, but unless your car was very suspicious and you were unlucky, it was unlikely that anyone would record it or even notice it. Unless you were famous, no one but friends would take your picture. Politicians and Hollywood stars learned to live with constant exposure and loss of privacy, but at least they were well compensated. One unexpected side effect of work by engineers and computer scientists is that we are all Hollywood stars. But we don’t make the big bucks. Technology has made it possible for our public presence to be recorded and stored. Today, at least a person has to watch the videos to see if you are in themVwork is being done on automating this also. Our privacy through obscurity is no more. Gordon Bell has a project of recording his entire life. Today, we are all Gordon Bell. I’ve often wondered when he’d have time to look at this. However, I can imagine software that could look through streams of video and other information and go right to the moments you want to reliveVor the moments some observer wants to look at more closely. We tell our kids to be careful of their on-line presences, because someone might be watching. Perhaps they are well ahead of us. Someone will always be watching, in real life as well as on-line, and our kids are just getting ready for a world of little or no privacy. h","PeriodicalId":50392,"journal":{"name":"IEEE Design & Test of Computers","volume":null,"pages":null},"PeriodicalIF":0.0000,"publicationDate":"2013-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1109/MDAT.2013.2283595","citationCount":"2","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"IEEE Design & Test of Computers","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/MDAT.2013.2283595","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 2

Abstract

h I RECENTLY READ an editorial in an electronics magazine about license plate readers, devices used by police and government to scan license plates on cars, look them up in a database, and report if the car is stolen or if the owner of the car is wanted by the law. Information about the location of cars whose licenses are read is kept a long time, a potential privacy problem. Even plates of cars not involved in nefarious activities are scanned. Because license plates are displayed in public, it is perfectly legal to record them. This is not the only way in which we are being recorded. In the old days, if the police wanted to find out what happened at a particular location, they had to find witnesses. Today, police can also consult footage from the large number of surveillance cameras in the area. In England, these are owned by the government, but in the United States, there seem to be just as many owned by businesses, not to mention the prevalence of cell phone cameras. In Russia, many cars use dashboard-mounted cameras, and so the recent meteorite event was captured. Even meteorite privacy is not safe. Anyone having the slightest involvement in computer security knows that ‘‘security through obscurity’’ is one of the worst policies to follow. This policy tries to keep security holes secret, and hopes that no one finds out. This might have worked when access to computers was controlled by a small set of professionals, but today even the slightest flaw will be broadcast around the world as fast as a video of a cute kitten. Those of us well out of college grew up in a time of what we can call ‘‘privacy through obscurity.’’ Perhaps people could read your license plate, but unless your car was very suspicious and you were unlucky, it was unlikely that anyone would record it or even notice it. Unless you were famous, no one but friends would take your picture. Politicians and Hollywood stars learned to live with constant exposure and loss of privacy, but at least they were well compensated. One unexpected side effect of work by engineers and computer scientists is that we are all Hollywood stars. But we don’t make the big bucks. Technology has made it possible for our public presence to be recorded and stored. Today, at least a person has to watch the videos to see if you are in themVwork is being done on automating this also. Our privacy through obscurity is no more. Gordon Bell has a project of recording his entire life. Today, we are all Gordon Bell. I’ve often wondered when he’d have time to look at this. However, I can imagine software that could look through streams of video and other information and go right to the moments you want to reliveVor the moments some observer wants to look at more closely. We tell our kids to be careful of their on-line presences, because someone might be watching. Perhaps they are well ahead of us. Someone will always be watching, in real life as well as on-line, and our kids are just getting ready for a world of little or no privacy. h
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
通过模糊实现隐私
h我最近在一本电子杂志上读到一篇关于车牌阅读器的社论。车牌阅读器是警察和政府用来扫描汽车牌照、在数据库中查找车牌并报告汽车是否被盗或车主是否被通缉的设备。牌照被读取的车辆的位置信息会被长时间保存,这是一个潜在的隐私问题。即使是没有参与不法活动的车牌也会被扫描。因为车牌是在公共场合展示的,所以记录它们是完全合法的。这并不是我们被记录的唯一方式。在过去,如果警察想知道在某个特定地点发生了什么,他们必须找到目击者。今天,警方还可以查阅该地区大量监控摄像头的录像。在英国,这些都归政府所有,但在美国,似乎也有很多归企业所有,更不用说手机摄像头的普及了。在俄罗斯,许多汽车使用安装在仪表盘上的摄像头,因此最近的陨石事件被捕捉到了。即使是陨石的隐私也不安全。任何稍微接触过计算机安全的人都知道,“通过模糊实现安全”是最糟糕的策略之一。这一政策试图将安全漏洞保密,并希望没有人发现。当电脑被一小群专业人士控制时,这可能还管用,但今天,即使是最轻微的缺陷也会像一只可爱小猫的视频一样迅速传遍全世界。我们这些刚从大学毕业的人成长在一个我们可以称之为“通过默默无闻获得隐私”的时代。“也许人们可以读到你的车牌,但除非你的车非常可疑,而且你运气不好,否则不太可能有人会记录下来,甚至注意到它。”除非你很有名,否则除了朋友没人会给你拍照。政客和好莱坞明星学会了忍受不断的曝光和隐私的丧失,但至少他们得到了很好的补偿。工程师和计算机科学家工作的一个意想不到的副作用是,我们都是好莱坞明星。但我们赚不到大钱。科技使我们的公共存在被记录和存储成为可能。今天,至少需要一个人来观看视频,看看你是否在其中。我们也在自动化这项工作。我们通过默默无闻获得的隐私不复存在。戈登·贝尔有一个记录他一生的计划。今天,我们都是戈登·贝尔。我常常在想,他什么时候会有时间来看看这个。然而,我可以想象这样一种软件,它可以通过视频流和其他信息,直接找到你想要重现的时刻,或者某个观察者想要更仔细地观察的时刻。我们告诉我们的孩子要小心他们在网上的表现,因为有人可能会监视他们。也许他们走在我们前面。无论是在现实生活中还是在网上,总有人在监视着我们,而我们的孩子们正准备迎接一个几乎没有隐私的世界。h
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
IEEE Design & Test of Computers
IEEE Design & Test of Computers 工程技术-工程:电子与电气
自引率
0.00%
发文量
1
审稿时长
>12 weeks
期刊最新文献
Message From the Steering Committee Conference reports Conference Reports Conference Reports Editorial Calendar
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1