Friday, January 24, 2020

You wouldn't download a car

Intellectual Property Office of Singapore.
You wouldn't download a car, however, your car might download you. Or at least a version of you; your data profile. Tesla cars are recording your data every time you drive, The data collected includes milage, speed, every location and time at which the car gets charged, and more.. [1]  Such data can be used to create a profile of where you work/study, where you eat most often, etc.



My own Google data settings
Combine this with Google's data profile and all of a sudden anyone who has access to your data can derive your favorite restaurants and perhaps your favorite foods from said restaurants, your favorite youtube personalities, your political affiliation, whether you had diarrhea last night, etc. Using the link above you can turn off most of Google's data collection with a couple clicks. 


Many people are concerned about the collection and use of their data. While not a new problem, people have been concerned about their data for a long time now. However, the topic of privacy has grown exponentially recently.  To the point where the flagship feature of HP's new laptop series is this "webcam kill switch" which is said to cut the power to the webcam. Making it impossible for your laptop to collect any visual data while it's switched off. 

Google seems to be upfront about which data they're collecting from you and how you can turn off the collection of said data, HP is showing off the killswitch and subsequent stop of visual collection. While I do think these are good steps in the right direction, this kind of data has been collected, bought and sold, and used to sell things to you from advertisers on sites such as YouTube. It just goes to show how Moor said that as tech advances and creates new ethical dilemmas, the solutions are often applied quite a while after the problem has arisen.










[1] https://www.lamag.com/citythinkblog/tesla-recording-data-privacy/

5 comments:

  1. Your blog post is very easy to follow along with and does a good job of explaining the different ways that information about us is gathered without us knowing. One thing that I think you could revise in your post is where you introduce James Moor, as right now he is brought up in the last sentence. Introducing him earlier would provide more insight for the reader and allow the reader to understand the connection you are trying to make with Moor. I also think expanding on your discussion of Moor is necessary in order for the reader to understand which of his ideas you are evidencing.

    ReplyDelete
  2. Hi Isaiahges, I think you did a good job discussing several examples of each company's approach to data privacy - I didn't know about the webcam kill switch until your post! I also really like the multimedia embedded in this, from videos, pictures to links connected to outside readings. However, some things you can definitely improve on is to reference James Moor earlier on and expand on how he inspired this topic. As we're supposed to write in the perspective for someone outside this class, maybe reference the readings that your ideas came from as well.

    ReplyDelete
  3. This comment has been removed by the author.

    ReplyDelete
  4. Hi Isaiahges, I enjoyed reading your blog as it has a grabbing headline. The examples that you mentioned in your post also explains your main point well. One of the things that I would recommend in improving is that try to mention the reading source earlier in the post and expand beyond with your relevant point. Overall, a great post!

    ReplyDelete
  5. The instances about breaches of privacy are interesting in this post but you include too much in little space. The title is about a car but the body jumps right into computers as if you just found a video online and wanted to talk about it. I would recommend staying more on the subject of Tesla and explain
    1. Why are they collecting this data
    2. Is this data being sold to third parties?
    3. What kind of preventative measurements has Tesla taken against hacking?

    ReplyDelete

Note: Only a member of this blog may post a comment.