‘I have nothing to hide’ doesn’t mean you are anonymous

nothing to hideIn my post from last week, I addressed some of the concerns in the growing conflict between security and privacy. One of the issues that I didn’t talk about, as several readers reminded me, is the difference between privacy and anonymity. This is often summarized by saying, “I don’t care if someone tracks me, I have nothing to hide.” Well, consider the following scenarios.

Scene 1. You are hiking on a remote trail. As you are enjoying the view, someone is taking pictures with their smartphone and pointing their camera in your direction. flash hiding scarfSo essentially your image is being taken without your consent. At first, you think this is fine: after all, you are anonymous, just some random hiker. But when the photographer posts your image on their social feed, your face is recognized thanks to the site’s software. And now, not only are you identified, but your location is also specified. So you have been tagged without your consent. One way around this is to wear specialized clothing that defeats flash photographs, as shown here.

Scene 2. You maintain a very active Pinterest account and post numerous pictures when you are at various events, or when you travel to distant cities. One consequence of this is that anyone who spent time looking at your account could see where you have been and what you have done.

Scene 3. Beginning in 2007, employees of the UK-based News Corp. regularly hack into celebrities’ voicemail accounts. They are sued and eventually pay various fines. Eventually, things come to boil in 2011 and others are charged, and one staffer is actually jailed. Testimony reveals that thousands of phones were involved and dozens of staffers had access to the collected information.

Scene 4. In the neighborhood where I live in St. Louis, the community monitors nearly 100 cameras that continuously capture video imagery to aid in solving crimes. Several dozen people have been arrested as a result of investigations using these images, which are available to law enforcement personnel. While they don’t have facial recognition software yet, it is only a matter of time. But what if anyone could access the video feeds online and monitor what is going on?

Scene 5. Your online activities are being tracked. One of the stories that I wrote about tracking online fraud recently was how security researchers were able to use machine learning to predict when an endpoint device could be considered compromised. They found a series of common characteristics that were easy to discover, without any sophisticated software. These included freshly made cookies (fraudsters clear their cookies often while regular users almost never do), erased browser histories, 32-bit Windows running on 64-bit CPUs and using few browser plug-ins. While any of these factors taken alone might be from a legit user, combined together they almost always indicated a machine used by an attacker.

Still think you have nothing to hide? Maybe so, but it is a bit creepy to know that your digital footprints are so obvious, and show up in so many places.

Some vendors, such as email encryption software Mailpile, have gone to great lengths to document how they address their users’ privacy. Given their market focus, it isn’t surprising. But still the level of detail in that document is impressive. “People should be able to communicate privately,” as they state in their document. That means no eavesdropping on email content, supporting authentic messages and privacy when it comes to the message metadata and storage too. What I liked about the Mailpile manifesto was their non-goals: “Mailpile is not attempting to enable anonymous communication. Most people consider e-mail from anonymous strangers to be spam, and we have no particular interest in making it easier to send spam.”

So as you can see, there is a difference between being anonymous online and maintaining your privacy. Like anything else, it is a balance and everyone has their own trade-offs as to what is acceptable, what isn’t, and what is just creepy. And expect new technologies to upset this balance and make these choices more difficult in the future.

2 thoughts on “‘I have nothing to hide’ doesn’t mean you are anonymous

  1. This bothers me certainly, but in all honesty at the same time I feel passive, since I am not the only one whose privacy is being violated. If a celebrity or some public figure it’s more concerning, but as an average person whose data is being collected with millions of other average people the efforts of trying to avoid these privacy violations seem too great, perhaps at a later time we will begin to see more consequences. Right now I care, but not enough to make drastic or costly changes in my life to be more protected.

  2. Actually, your scene 4 is worse than you think. Many businesses and governments do not restrict their cameras so someone *else* could be using those cameras to track you. Heck, even the feds didn’t encrypt drone images so people could watch what was happening on those drones (not now).

    If you are on (or off) line, it is pretty difficult to be truly anonymous.

    Identity and privacy go hand in hand, but they are different. You can use encrypted channels and have a secure communication link, but how do you know the person on the other end is who they say they should be? And….unfortunately, the more checks and balances you add, the more inconvenient things become.

    I tell people that standard e mail is neither a secure, assured, or even timely system. It is designed to be simple and reliable. But…. it is secure as a postcard, you really have no real mechanism of knowing someone actually got and read what you sent, and there is no guarantee when the message will get there, if it does at all.

    Things really get sticky when you expect people to keep communications private and secure for a long time. HIPAA laws would have you keep personal health information confidential for the life of the patient and utilize chain of custody type thinking for that long. Unfortunately, we really don’t know how to do that well and it can be counterproductive to be “too secure” when it comes to delivering medical care in the real world.

Leave a Reply to Tony Stirk Cancel reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.