Every day when you wake up, you
take your phone to check whether someone had called you or sent you a text
message. Of course, you can’t leave your bed without switching on your mobile
data to see what is going on in the social media. But have you ever thought of
how much footprints you leave on the internet?
Whether we know or we don’t, we
generate millions of terabytes of data each day. Giant tech companies such as
Google and Facebook produce addictive free apps such as Instagram, Twitter, and
WhatsApp among many others. Someone once said, if you don’t pay for it, you are
the one being used. These giant tech companies didn’t tell you one thing: they
collect data in your apps. Everywhere you visit, every picture you click,
everything you type is stored and analyzed to be used somewhere sometime.
Fifty years ago, data meant
nothing to anybody, just like the way owning land meant nothing to Africans
three hundred years ago; the land was anybody’s and no body’s. Now, everything
has changed. Possessing data means more than just having someone else’s
details. It means having access to his life, his mind, his security.
“When someone knows your
movements online, his reparation can go beyond just having access to your
data,” says Joshua Mabina, a freelance software engineer.
But how valuable is your personal
information to some stranger living thousands of miles away from you?
Our online behavior very much
defines our actual lives. The videos we watch, the song we listen or skip, the
product we search or purchase, the film we watch, etc. Our browsers (Chrome,
Mozila Firefox, Opera, etc.) use cookies which are stored in browsers every
time you visit a website. The web owners then store your ‘movements’ on their
website for the purpose of improving their website services next time you visit
again.
All this information is used by
tech companies to better their products and services. Advertising companies use
this data to suggest products that they think you might be interested to buy. Politicians
use this data to estimate how many votes they may get. Police use this data to
track and catch the lawbreakers. Good thing, isn’t it?
The 2008 Obama campaigns, for
instance, designed a tool in which people would predict how likely they would
cast a ballot, and whether or not they supported him. The campaign team was so
confident that one of the campaign consultants was quoted
saying that they were confident about who was going to vote for Obama before
they decided.
This is not a new concept,
politicians have always used data to predict the election results, like in the
campaign rallies, public opinions, and media influence. What is shocking, however,
is the rate at which the giant tech companies have invested in collecting data
they have used to influence the election result. The 2016 Cambridge Analytica
saga is a good example of this scenario. This is where the UK-based data
analytics firm was involved in the theory that it had played an important role
in the US election. The company, it was revealed, contained data of more than
220 million Americans culled from Facebook and other data purchased from data
mining companies.
The problem arises when the use
of data accumulated over a period of time, which, of course, is private and
sensitive, is essential in affecting political influence and undermining the
democratic process. Personal traits can be used to predict the action of an
individual.
There is also a security concern
when it comes to accumulating mass data. Databases can get hacked, leaked,
stolen or shared, as it happened in the US 2016 election where political
candidates shared the database of their supporters.
Some of us still believe that
online is a secure place to store our personal and sensitive data, simply
because cloud drives are encrypted and no-one can break into ‘online safe box.’
But the cloud storage companies use encryption keys to secure the data, which
of course, can get hacked like any other data storage system.
What should we do now? Should we
stop using social media? Should we stop uploading our data to cloud drives?
Should we stop using emails because they aren’t safe? Of course not. Here is a
piece of advice.
First, create complex passwords.
These will prevent hackers to easily get into your system. Strong password
includes words in both capital and small letters, numbers and characters. For
example, pGd486-HWY can be
considered a strong password. Additionally, use different password for each
account, like password for Facebook account should be different from your
Twitter account. This is to prevent the possibility of all accounts to be breached
once a hacker gets access to one of your account. This includes your digital
bank password too.
We all like free Wi-Fi, don’t we?
On the public areas, free Wi-Fi’s are tempting to use. But the reality is, they
are insecure. It is very easy for hackers to access your device information or
your data when you are using public Wi-Fi. The best advice here is to use the
Virtual Private Network (VPN). This is a software that helps to create secure
connection on the internet. However, most VPNs do not come for free. But better
safe than sorry.
How many times have we clicked on
links or downloaded attachments on the emails without even considering what
they are? Be advised: you are put to a vulnerable place by the links you click.
Most of the hackers today use phony free offers to lure you to click and reveal
your personal information. Don’t download every attachment sent in your email.
Just download from the sender you trust. In addition, make sure you scan before
downloading.
I ask some of the technology
consumers if they are aware of their sensitive data online. Most of them agree
that they pay very little attention to who has their data online or who use
them. However, Stephen, a Mikocheni resident in Dar es Salaam, says that he
always read terms and conditions before he agrees to them. “If they are too
long, I skip!”
Some even go further to suggest
not providing accurate data when it comes to their safety. “You never know who
wants your data for. Just give wrong information; name, age, e-mail, gender,
etc. just to be on the safe side,” says David Rweyemamu, a recent graduate at
the University of Dar es Salaam.
Just as any good thing has its
other side, technology has its other side too. When it comes to data, it
directly involves our personal lives. Being careful is not an option anymore.
“If you become a target, your life might be in danger, especially when they
profile you,” says Mr. Mabina. Profiling is when someone compiles your online
data. “What you are doing online will always help someone who is after you. You
have to agree to give your personal data only to someone you trust.” And that
is how we should go.