January 28, the world commemorates Data Privacy Day, as a sign of the importance of maintaining data privacy. Three days later, the sixth President of Indonesia, Susilo Bambang Yudhoyono (SBY) held a press conference to discuss his trampled privacy rights. Both of them have no connection, but both remind us that privacy is important to fight for.

It also reminds us of today’s irony: when an increasingly sophisticated era seems to be directly proportional to increasingly narrow privacy spaces.

Even more irony is that smart devices often act as our own whistleblowers: Google Maps records your footsteps, the PillDrill health app can record your health condition, the Fitbit app even records how much we are determined to be healthy, Siri or Alexa more intimate — they record all of our traits like and not.

That is, Leler puts smart devices open opportunities for losing important information that is personal. The only way to prevent this is just to take good care of your cellular, or not to store valuable information there at all.

Personal information can be very dangerous if it is used by irresponsible people. For example, as happened in Cut Tari, Luna Maya, and Ariel ‘Noah’. They have to bear the negative impact when the intimate video spread in 2010, because the cellphone Ariel where the recording resides, is missing.

Moreover, the information also becomes more valuable. Based on the New York Times report, 500 million Yahoo accounts that were burglarized last September were worth 200-300 thousand US dollars, even more. With personal data, someone can just hijack a bank account, or plan a robbery in your luxury home. Or simpler, as Ariel’s video announcer did: humiliate you.

Then, what we then reject the sophistication of technology?

Basically, not everyone feels something important from their daily conversation, like Pak SBY. Not everyone also feels that his cellphone keeps a lot of secrets. For example, one of the Gojek drivers I have been in. “Yes, if there is nothing to hide, what is there to be afraid of?” He said when we discussed GPS, which led to today’s cellular sophistication.

But he is also not willing if the thief of his cell phone, also drained his bank account only because he managed to find important password records that he recorded on the same cell. The dilemma finally made him believe that maintaining privacy was important.

One of the most sophisticated people in the world, Mark Zuckerberg the owner of Facebook even plastered the camera and put a silencer on his laptop. This is a form of protection from piracy efforts. The method used by Zuckerberg was also practiced by Edward Snowden, after he learned that the United States Government secretly had access to hijack its own people through their smart devices. As shown in the biofilm titled Snowden.

How to Ward off Information Hijacking at Home
By Brian X. Chen, author of The New York Times Technology, Zuckerberg’s way is summarized in the article “Here Is How to Fend Off a Hijacking Home Devices”. In the article, Chen also summarizes a number of other ways to counter information piracy that can occur at home; considering that homes in this era are also increasingly sophisticated because it is fitted with wi-fi, internet-connected TV sets, smart refrigerators, smart lights, or even virtual household assistants like Alexa from Amazon or Jarvis in Mark Zuckerberg’s house.

The first important point is research before buying. According to Chen, finding out the specifications of the electronic devices to be purchased is a must. Especially wi-fi devices, television sets, or security devices. He also illustrates that big brands – who really think about security when creating their devices – should be considered an option.

Secondly, strengthening Wi-Fi security is another alternative. One way to use two different Wi-Fi connections. Separating wi-fi that is used for lights and your smart fridge as well as other devices with wi-fi that is used for computers, tablets, and cellular is highly recommended. The hijacker will have difficulty stealing information if there are two different wifi used.

The next trick is to install a password that you are hard to guess. The human habit of creating passwords based on proximity, aka proximity to his personality, has not changed. So, it’s good to make a password that you yourself never thought would be your password. If you can make it hard to remember, it’s different for all devices.

Chen’s fourth suggestion is to keep updating your device regularly. The equipment companies that you buy also always upgrade at any time. It could be that security is also a point that is always being developed. So updating it regularly is a good way.

Finally, Chen cites Zuckerberg’s way of installing ‘mute’ on smart devices. As he wrote, a number of technological devices helped to create a ‘mute’ device or the exit button to prevent hijackers from listening to your conversation via computer or cellular at home. For example, loudspeakers produced by Amazon Echo and Google Home. With this, the security of your home may be more secure than information piracy.

The options above may be an alternative to continue to enjoy the sophistication of technology while being introspective about personal privacy.

Telephone tapping (or wire tapping) is a third party monitoring of telephone and Internet conversations, often in a confidential manner. Telephone conversations can be recorded or monitored unofficially, either by a third party without the knowledge of the person being tapped, or recorded by one of the parties making phone calls. Phone tapping is tightly controlled and is generally prohibited for privacy reasons, but it can also be legalized for certain reasons, according to the laws in force in the country concerned.

Telephone tapping began after the invention of telephone conversation recording devices in the 1890s. Law enforcement agencies have begun to tap telephone lines. Initially, long-distance voice communication was carried out exclusively by “circuit-exchange” systems; telephone conversation exchanges will connect wires to form a continuous circuit and disconnect the wire when the call ends. Other telephone services, such as call forwarding and answering messages, are handled by human operators. In 1965, Bell Labs developed the first computerized telephone communication system, which replaced standard tapping techniques.

LEAVE A REPLY

Please enter your comment!
Please enter your name here