Who stored documents in the Cloud, who the images there collects on the web with more or less close friends, who synced his contacts with all the companies, platforms and devices, who’s three, four, five devices at home, in the office, in your backpack, in your pocket at the same time the Browser and the Facebook and the mail program is open and never closes, maybe even a Dating App, Amazon or Ebay for shopping, Google’s text processing for shopping lists, Service plan and To-Do lists, and Google Maps to find your way around – and for good reasons: It is very convenient, it is very convenient, simply seductive; you will feel informed, to feel close and informed, you imagine yourself “in the flow”.
Who deals with his most personal and even intimate data, so I am, so I shoppe, feel, and so reading, love, I live, and the need to be aware of is that all can come out this personal information and content that we put in our Apps and digital applications, also: be Interpreted, and also stole all of our data can be traded – some of this is perfectly legal, much of it still not clearly regulated and some are clearly prohibited. Intelligence services and data economy with political trolls, and criminal Nerds, but one thing in common: you would like it to be, to act on our data to interpret in order to understand ourselves and to illuminate, to cheat us or others, or to extort.
real Public, as in the current Theft-Leak, may be a consequence of: Who captures the data once, finds, or buys, can you publish – whether they were gained in the name of safety, convenience, economic growth, whether it stolen, criminally or just as a result of breakdowns, Sloppy in the wide world are falling, it does not really matter. The authors, the data-raw material suppliers, to be cheated with the help of its own personal data in foreign hands, to blackmail, to understand,, are threatened or even attacked.
we have data to make producers transparent and predictable, which is also the legal business model of the data groups. And the competent state Secretary Dorothee Bär (CSU), has not only excited a few days ago, to pose a threat to their success and earnings due to strict privacy. Secret services – in the name of safety from crime and terrorism, by nature, not the biggest Fans of encryption, secrecy and anonymity. Security also means: Every citizen must be able to be sure that he can self-determine what needs to remain private.
daily mirror Background of digitalization & KI
try it Now for free!
like So embarrassing, controversial, or so banal now publish data on the Individual to be: Minister of justice Katarina Barley called their collected publication of a “serious attack on the right to privacy, and thus a fundamental pillar of our democracy” and warns that “The authors of want of confidence in our democracy and its institutions and damage.” This can be achieved by you, if now all of the Internet, users expect, so the total population of the state and of him, “more security”, and demand.
Video 04.01.2019, 15:11 Uhr01:15 Min.Massive data theft hits politicians and celebrities
No question about it: The environment, the laws of privacy and abuse needs to formulate the policy finally. The economies with data must be effectively regulated, taxed, and rewarded; the users can make the data available. Crime in the network must recognize the authorities is finally, and punish and technically, professionally and personally to be well-equipped.
but Above all, by politicians in the General population (including, as you can see now), a comprehensive cultural understanding of the digital world for data awareness, data economy, data protection, in that order. This is also a political task for the whole society. Nothing of what is now (to happen again), is really surprising: the data to be acted, read, interpreted, and also stolen, and abused. Shocking, but the Surprise about it is the lack of knowledge about the possibilities of the Digital.
The daily mirror cooperates with the survey Institute Civey. When you register, you are contributing to better results. More information here.
Politically, is that the selection of the data collection and publication in the teasingly-perfidious advent calendar-Style is Affected (and Not Affected) is apparently motivated to be politically and party is a disgusting attempt at Intimidation, a brazen demonstration of power against politicians, artists and journalists, personally are against their democratic freedoms and guarantees.
Because someone wants to show: Look what we know – look what we can. The targeted, sorted and annotated dissemination of private data, pictures, and addresses could also follow solid actions, is implied and can be or allows is stimulated. At least the fright, the embarrassment, the threat will remain, but Who could read it straight, on the door or the phone ringing, the most Private visit and trombones? Every burglary victim knows the feeling.
From the political and security authorities, it is now: The published data are not so critical, the state “safety nets” are intact. Of course, there are worse things than having the phone switch (or to simply remain continue to be accessible), pain more than a certificate of vaccination. It has become clear, but again: data from a variety of sources, and combine through obsessive hard work, or through the use of high performance computers and their Algorithms.
The data-the raw material we can supply all, you as a user of the Digital. It is hardly possible to do that if you want to communicate, and needs – convenient, fast, “in the flow”. The protection of our data, we need to all organize and take heed to: Criminal, counter to the permissive state and economic access, but also in front of our own digital naivety. For the Benefit and creation of data responsibility: Who signs the letter box, all the doors and Windows open, the family Council and whispers of love meticulously documented and, finally, the protocols slips along with credit cards and private photos, desire, identity card copies, and a doctor found in the handcart through the streets – can’t slide to safety, screaming all the responsibility on the police and politics.
More about
follow from the data Theft, A safety-belt for the Internet
Antje Sirleschtov
And, Yes: Even a phonebook entry that needs to be considered. #nacktimnetz makes every self, in every Minute we are on a digital journey – or not. Our freedoms, our comforts, and Looseness, have attention, security, and growth earned.