{"id":32116,"date":"2020-01-21T10:02:50","date_gmt":"2020-01-21T15:02:50","guid":{"rendered":"https:\/\/www.kaspersky.com\/blog\/?post_type=emagazine&#038;p=32116"},"modified":"2023-07-06T04:22:57","modified_gmt":"2023-07-06T08:22:57","slug":"history-privacy","status":"publish","type":"emagazine","link":"https:\/\/www.kaspersky.com\/blog\/secure-futures-magazine\/history-privacy\/32116\/","title":{"rendered":"Privacy is dead. Long live privacy!"},"content":{"rendered":"<p>Every year news headlines warn a new technology means privacy is gasping its final breath. But doomsday scenarios predicting privacy\u2019s death are nearly as old as the notion of privacy itself \u2013 which, it turns out, isn\u2019t that old. In this article, I\u2019ll explore western society\u2019s relationship to privacy through the years, and the implications for us all in the digital age.<\/p>\n<h2>Dreaming of privacy from a communal bed<\/h2>\n<p>The idea of privacy began in 19<sup>th<\/sup>-century England, writes Georges Duby in the series, <a href=\"https:\/\/www.hup.harvard.edu\/collection.php?cpk=1094\" target=\"_blank\" rel=\"noopener nofollow\">A history of private life<\/a>. The word \u201cprivacy\u201d came from the French <em>priver \u2013 <\/em>to tame or domesticate. The classical Latin <em>privatum, <\/em>similarly, refers to what happens in the home or within the family circle.<\/p>\n<p>In the Middle Ages, Duby maintains, time alone was a rare commodity. Beds were prohibitively expensive. All but the wealthiest families shared one. And although royalty and aristocrats might have had their own beds, their bedrooms were hardly solitary. Servants and guards always remained at hand.<\/p>\n<p>Sharing sleeping quarters wasn\u2019t unique to western societies. Anthropologists studying the Trobriand Islanders, an ancient hunter-gatherer culture living off the coast of New Guinea, reported families lived and slept in one-room huts. When the parents wanted to be intimate, they told their children to cover their heads with mats.<\/p>\n<h2>Having an ale, and someone else\u2019s mail<\/h2>\n<p><img decoding=\"async\" class=\"aligncenter size-large wp-image-32120\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2020\/01\/21100009\/privacy-history-inline1-mail-1024x525.png\" alt=\"privacy history mail\" width=\"1024\" height=\"525\"><br>\nPrivacy in mail delivery was also once spotty. Even a wax seal didn\u2019t guarantee an envelope would arrive unopened, its contents unread.<\/p>\n<p>In <a href=\"http:\/\/pirp.harvard.edu\/pubs_pdf\/seipp\/seipp-p78-3.pdf\" target=\"_blank\" rel=\"noopener nofollow\">The right to privacy in American history<\/a>, David J Seipp describes how in the 19<sup>th <\/sup>century, letters from England arrived on merchant ships.<br>\n<\/p><blockquote><p>These letters were delivered to taverns, then lay in a mailbag available to all, until claimed by addressees \u2013 or anyone else.<\/p>\n<\/blockquote><br>\nThe British government\u2019s Post Office Act established an official postal service in America in 1710 forbade opening someone else\u2019s mail, becoming the United States\u2019 first privacy law.\n<p>By establishing a postal service, the government aimed to protect individuals\u2019 privacy. But not everyone used it. Some preferred the convenience of merchant ship delivery, despite its risks.<\/p>\n<h2>When telephones came to the party<\/h2>\n<p>Likewise, when <a href=\"https:\/\/www.elon.edu\/e-web\/predictions\/150\/1870.xhtml\" target=\"_blank\" rel=\"noopener nofollow\">the first telephones<\/a> appeared in the US, some predicted this new technology would be personal privacy\u2019s death knell. They had good reason. The earliest phones were in public locales like general stores. People heard everyone else\u2019s calls while they lined up to make and receive their own. Calls went through a central switchboard, where operators made manual connections while overhearing conversations.<\/p>\n<p>When phones became common in the home, many were on \u201cparty lines\u201d \u2013 several households sharing one line. When someone wanted to make a call, they picked up the receiver and checked for a dial tone. If others were using the line, the caller heard their conversation.<\/p>\n<p>Despite concerns about privacy, people kept using the telephone. It let them share information in real-time rather than sending costly telegrams or letters that took days, weeks or months to arrive.<\/p>\n<p>Perhaps people were willing to sacrifice some privacy because they trusted technology could solve the problems it created. In time, private phone lines became increasingly available, and party lines disappeared.<\/p>\n<h2>Hackable yet desirable<\/h2>\n<p>The digital age has presented its own set of privacy challenges. An internet designed to facilitate the free and open exchange of information is also one that lets information be used in ways we don\u2019t always like.<\/p>\n<p><a href=\"https:\/\/www.forbes.com\/sites\/julianvigo\/2019\/08\/13\/surveillance-technology-and-cultural-notions-of-privacy\/#39bc7fc6fe77\" target=\"_blank\" rel=\"noopener nofollow\">Governments conduct \u201cdigital surveillance\u201d of citizens<\/a> using facial recognition technology. Digital personal assistants \u2013 such as Amazon\u2019s Alexa and Apple\u2019s Siri, \u201csmart\u201d television sets, and other <a href=\"https:\/\/me-en.kaspersky.com\/blog\/voice-recognition-threats\/5974\/\" target=\"_blank\" rel=\"noopener\">internet-connected home devices have been hacked<\/a>. Yet sales of internet of things (IoT) devices keep rising. One report predicts the number of <a href=\"https:\/\/techcrunch.com\/2019\/02\/12\/report-voice-assistants-in-use-to-triple-to-8-billion-by-2023\/'\" target=\"_blank\" rel=\"noopener nofollow\">voice assistants in use will more than triple by 2023<\/a>, to eight billion.<\/p>\n<h2>Protecting us from ourselves<\/h2>\n<p>Some might say privacy is already taking a back seat to the convenience the internet affords. At the same time, people and organizations clamor for ever-more-stringent personal data protection.<\/p>\n<p>Governments globally are beginning to impose strict controls over the collection, use, sharing and sale of personal data. Most notable are the European Union\u2019s General Data Protection Regulation (<a href=\"http:\/\/www.kaspersky.com\/GDPR\" target=\"_blank\" rel=\"noopener nofollow\">GDPR<\/a>) and the US State of California\u2019s California Consumer Privacy Act (<a href=\"https:\/\/oag.ca.gov\/privacy\/ccpa\" target=\"_blank\" rel=\"noopener nofollow\">CCPA<\/a>).<br>\n<\/p><blockquote><p>While governments step up privacy protection, people keep posting their personal details online.<\/p>\n<\/blockquote><br>\nMany freely give up private information without knowing how it will be used. Privacy watchdogs and <a href=\"https:\/\/www.amnesty.org\/en\/latest\/news\/2019\/12\/big-tech-privacy-poll-shows-people-worried\/\" target=\"_blank\" rel=\"noopener nofollow\">consumers worldwide are increasingly concerned<\/a> about the potential use of \u201cbig tech\u201d \u2013 including Google, Facebook and Apple \u2013 for political and cultural manipulation.\n<p>The US Federal Trade Commission fined social media site Facebook five billion US dollars for <a href=\"https:\/\/www.kaspersky.com\/blog\/great-hack-review\/27794\/\" target=\"_blank\" rel=\"noopener nofollow\">selling users\u2019 data to political consultancy Cambridge Analytica<\/a>. Recent news reports indicate <a href=\"https:\/\/www.theguardian.com\/uk-news\/2020\/jan\/04\/cambridge-analytica-data-leak-global-election-manipulation\" target=\"_blank\" rel=\"noopener nofollow\">Cambridge Analytica used social media to influence political elections around the world<\/a>.<\/p>\n<h2>Big brother is watching, but do consumers care?<\/h2>\n<p><img decoding=\"async\" class=\"aligncenter size-large wp-image-32121\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2020\/01\/21100129\/privacy-history-inline2-phonelines-1024x525.png\" alt=\"privacy history phonelines\" width=\"1024\" height=\"525\"><br>\nDoes personal privacy matter to consumers today, or doesn\u2019t it? The answer may depend on who we ask.<\/p>\n<p>Millennials supposedly have a devil-may-care attitude about the security of their personal information. In a 2016 US and UK study, seventy percent of <a href=\"https:\/\/www.forbes.com\/sites\/sarahlandrum\/2017\/06\/28\/millennials-trust-and-internet-security\/#53af72f85555'\" target=\"_blank\" rel=\"noopener nofollow\">millennials (aged 19 to 36) said they think their online privacy will probably be compromised and were <em>not <\/em>alarmed<\/a>. But more recently, the Internet Innovation Alliance found <a href=\"https:\/\/www.meritalk.com\/articles\/iia-report-finds-privacy-concerns-across-generations\/\" target=\"_blank\" rel=\"noopener nofollow\">no significant difference between generations on data privacy concerns<\/a>.<\/p>\n<p>In a 2019 Internet Society survey of consumers in Australia, Canada, Japan, France, the UK and the US, <a href=\"https:\/\/www.internetsociety.org\/resources\/doc\/2019\/trust-opportunity-exploring-consumer-attitudes-to-iot\/\" target=\"_blank\" rel=\"noopener nofollow\">75 percent expressed concern about companies sharing their personal data<\/a> without their permission. Even more \u2013 88 percent \u2013 want governments to guarantee their right to data privacy, while 80 percent thought laws and regulations are not enough.<\/p>\n<p>And they\u2019re right.<\/p>\n<h2>Innovations that aim to protect privacy<\/h2>\n<p>History shows us technology and human ingenuity can often solve the problems they create.<\/p>\n<p>When people post their personal information on social media, they\u2019re choosing to do so. The violation occurs when a social media or other site sells or shares that information without its owner\u2019s consent. But an open and freely accessible internet doesn\u2019t have to mean exposing our most sensitive data.<\/p>\n<p>Laws can help protect us, but they can only go so far. And lawmakers are still grappling with how best to impose restrictions on data collection and use without hindering free enterprise.<\/p>\n<p>The light at the end of the privacy tunnel is innovation. In response to increasing concerns over personal data collection and use, technology companies are starting to give internet users alternatives \u2013 to choose privacy, or not.<\/p>\n<p>The <a href=\"https:\/\/duckduckgo.com\/about\" target=\"_blank\" rel=\"noopener nofollow\">DuckDuckGo<\/a> search engine doesn\u2019t save users\u2019 search history, nor share their data. Some adblockers provide a similar service.<\/p>\n<p>The social media site MeWe gives users a <a href=\"https:\/\/mewe.com\/#bill\" target=\"_blank\" rel=\"noopener nofollow\">Privacy Bill of Rights<\/a>, promising data belongs only to the user and the site will never sell or share it.<\/p>\n<p>For businesses, tech startup Duality Technologies invented \u2018homomorphic encryption,\u2019 letting technology companies <a href=\"https:\/\/www.insidesources.com\/this-tech-startup-may-have-figured-out-how-to-solve-the-data-privacy-problem\/\" target=\"_blank\" rel=\"noopener nofollow\">analyze encrypted personal data without unencrypting it<\/a>. Reportedly, <a href=\"https:\/\/www.wired.com\/story\/google-private-join-compute-database-encryption\/\" target=\"_blank\" rel=\"noopener nofollow\">Google now provides a homomorphic encryption tool to its business partners<\/a>.<\/p>\n<p>Emerging technologies also hold promise for improving privacy.<\/p>\n<p>Blockchain, the basis of Bitcoin and other digital currencies, links transactions in a \u201cdistributed ledger,\u201d visible to users and unchangeable. Some <a href=\"https:\/\/www.forbes.com\/sites\/forbestechcouncil\/2019\/07\/19\/the-answer-to-digital-identity-lies-within-blockchain-technology\/#2f2ae489296a\" target=\"_blank\" rel=\"noopener nofollow\">predict Blockchain will be another means of creating encrypted digital identities<\/a>.<\/p>\n<p>Admittedly, some who design technologies and run companies may not have public interests at heart. Laws are needed, therefore, to safeguard privacy. But even <a href=\"https:\/\/www.weforum.org\/agenda\/2019\/01\/who-should-take-charge-of-our-cybersecurity\/\" target=\"_blank\" rel=\"noopener nofollow\">consumers recognize governments can\u2019t do it all<\/a>.<\/p>\n<h2>The dawn of a new privacy era: What businesses should do<\/h2>\n<p>In the fight for data privacy, we need tighter regulation. But if too heavy-handed, legal restrictions could hinder innovation.<\/p>\n<p>The best remedy is a combination of the two: flexible privacy laws plus digital offerings that enable users to protect their data. This \u201cone-two punch\u201d will usher in a new age in which our information, and that of our customers and partners, are as private as its owners want it to be.<\/p>\n<p>To prepare for this new, privacy-centered era, enterprises should take steps <em>now<\/em> to safeguard the data they handle, following <a href=\"http:\/\/www.kaspersky.com\/GDPR\" target=\"_blank\" rel=\"noopener nofollow\">GDPR<\/a> and <a href=\"https:\/\/oag.ca.gov\/privacy\/ccpa\" target=\"_blank\" rel=\"noopener nofollow\">CCPA<\/a> regulations. Do this whether or not these laws apply to your country and organization. You should also ensure that the third parties you work with are doing the same. Taking advantage of technology privacy solutions or inventing your own should be a part of this effort.<\/p>\n<p>Next, the savvy organization will publicize its commitment to data privacy, for example, publishing a \u201cprivacy bill of rights\u201d as others have done.<br>\n<\/p><blockquote><p>Establishing yourself as a leader in the data privacy movement could help raise your company\u2019s profile head-and-shoulders above the competition.<\/p>\n<\/blockquote>\n<p>We can bet on human ingenuity, but businesses need to play their part by prioritizing their customers\u2019 right to privacy and providing easy access services to do so.<\/p>\n<p>Innovation can, and should, usher in a rebirth of privacy, giving individuals and companies unprecedented control over their data. Meanwhile, the digital age will continue to enrich our lives in countless ways.<\/p>\n<p><em>This article reflects the opinions of the author.<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Almost every new technology is said to have finally killed privacy. One thing\u2019s for sure: Regulation alone can\u2019t keep our personal data safe.<\/p>\n","protected":false},"author":2557,"featured_media":32118,"template":"","coauthors":[3654],"class_list":{"0":"post-32116","1":"emagazine","2":"type-emagazine","3":"status-publish","4":"has-post-thumbnail","6":"emagazine-category-data-and-privacy","7":"emagazine-category-opinions","8":"emagazine-category-trends","9":"emagazine-tag-data-security","10":"emagazine-tag-privacy"},"hreflang":[{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/secure-futures-magazine\/history-privacy\/32116\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/secure-futures-magazine\/history-privacy\/21796\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/secure-futures-magazine\/history-privacy\/20183\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/secure-futures-magazine\/history-privacy\/20495\/"},{"hreflang":"pt-br","url":"https:\/\/www.kaspersky.com.br\/blog\/secure-futures-magazine\/history-privacy\/16395\/"}],"acf":[],"_links":{"self":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/emagazine\/32116","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/emagazine"}],"about":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/emagazine"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/2557"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/32118"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=32116"}],"wp:term":[{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/coauthors?post=32116"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}