Beijing time on September 14, according to foreign media reports, in people’s subconscious minds, people would expect some private information to be completely leaked, causing people’s social circle to collapse, and publishing people’s inner world secrets and shame on Facebook, Once the private information is exposed on platforms such as Google, there may be a lot of noise, and the social circle will not be peaceful.When all the private data-every text message, email, voice memo is leaked out, who among us can avoid such troubles, maybe some people will not be affected, but most people will be leaked Get into trouble with personal privacy. What happens when people are trapped in a completely transparent world?
Fred Farnberg, Professor of Statistics, Professor of Marketing and Head of Department at the University of Michigan in the United States, studied how people make choices in uncertain environments.
“All those people who appear not to participate in X activities but secretly engage in the activities will be disclosed. This may not be a bad thing.”
This involves two completely different levels, interpersonal relationships (how to affect personal relationships) and social relationships (how attitudes and behaviors change), as well as short-term and long-term effects. When personal information is completely leaked, the short-term impact is predictable: dismissal of the company, divorce, loss of face, arrest for exposing corruption, abuse of power, and worse, it will involve hackers or “black hands” accusations. Of course, there are a large number of hypocrisy incidents. All those people who do not participate in X activities on the surface but secretly engage in the activities will be disclosed. This may not be a bad thing.
But the so-called privacy paradox—people going from fear to anger, from anxiety to “knowing everything” in a few days or weeks—will definitely work, but for almost everyone, life will return to The new normal. Some people originally thought that leaking some deep secrets would cause a sensation, but it turned out to make people yawn again and again, or make someone say humorously: “Scare me!” After someone’s privacy is leaked, others will keep it. Skeptical, or just hope to return to your “inner world”.
The long-term impact of personal privacy leaks is difficult to calibrate. When something happens to everyone, a “we all work together” mentality will appear. When two-factor authentication fails, Mars password leaks, and other business When the secret is exposed, the social group will call for a common need for greater security. Biometric recognition technology is likely to become a difficult problem that conspiracy theorists, local military organizations, and the Civil Liberties Union (ACLU) cannot solve, providing a certain degree of security. Through such incidents, we can find that there are some things that need to be hidden and shameful in our lives. The leakage of personal privacy may not be harmless and without victims. Exposing someone as homosexual or smoking marijuana will ruin his life and even cause him to suffer in prison. For example, a neighbor’s child accidentally discovered a hidden cannabis production base while playing a military parade. This was due to personal bravery and unconscious information disclosure. Therefore, it is reasonable to believe that a “destructive level” information leak will cause short-term Avalanche panic, but it will also bring some long-term positive changes.
Tessa West is an associate professor of psychology at New York University. His research focuses on understanding the attributes and dynamics of social cognition.
“Although these personal privacy is found to be difficult and the cost is high, most people are not worried about their network secrets being leaked. We believe that the use of unexpected password systems and secure monitoring systems can ensure personal privacy. Information security will not be discovered by others. Of course, this view is stupid. Network data is often hacked and leaked.”
Almost everyone has an online secret. Maybe you are tracking your ex-girlfriend online, or you develop an out-of-control shopping habit, or you have a fetish and your life partner doesn’t know it at all, and the relevant evidence is only Stored in a pornographic folder. It would be very embarrassing to leak these personal privacy, will there be more serious problems? If this private information is very sensitive, if it is leaked, it may lead to litigation, divorce, or fire from the boss? Although it is found that these personal privacy is difficult and the cost is high, most people are not worried about their network secrets being leaked. We believe that the use of unexpected password systems and secure monitoring systems can ensure personal privacy information Safe and will not be discovered by others. Of course, this view is stupid, and network data is often hacked and leaked by hackers.
If one day, when we wake up and discover that a quick search can unlock anyone’s private data, what will happen? Do we immediately search for historical information about the closest people in our lives? Maybe we won’t do this. Usually the first thing we do is to find out whether our information is completely leaked, because human beings are self-centered living entities. In this case, we will think that everyone around us is thinking: “Wow, I can’t wait to search for Tessa West to see what secrets she has!” Social scientists call this the “spotlight effect.” This is a belief that others may pay more attention to us. We are all very We are worried about the consequences of leaking our secrets, so that we will pay attention to ourselves and our search history before paying attention to other people’s search information.
The next thing we might do is to read headline party articles about celebrities and their dirty secrets. It will be more interesting to obtain private information about celebrities. Everyone likes to “gloriously”, especially when a person who seems to have everything fails. When, you will have this wonderful feeling. Dirty secrets about famous people will be the perfect antidote to our shame and anxiety about ourselves.
Will we eventually search for historical information about the people closest to us? Maybe, but not without a lot of psychological preparation. When it comes to our lover or caring person, we will be grateful, they have helped us through difficult times. But if your lover is rude or indifferent at the party, you will usually explain to your friend: “She is just tired” as an excuse. Maybe you pay attention to your lover’s life trajectory, maybe you find that she (he) flirts with new employees at work. From the bottom of your heart, you may comfort yourself to think that your lover is only out of friendship, but it turns out that it is actually a good thing to observe your lover through “rose glasses” (within reason). Some of us How many people are willing to face their worldview being completely shattered? Not many. For most of us, investigating personal privacy issues requires drinking a few glasses of wine and getting some strong social support.
The most interesting question in this thinking experiment is, what happened in society? Has society become free from moral and ethical constraints and become more accepting of deviant behavior? Probably not. Although many behaviors are very common, they are still not recognized (for example, lying, one in every five social interactions). At least for the time being, blame and moral criticism still dominate. Perhaps this will provide us with a good opportunity to be more honest with each other and tell us that the things we do and the things we hide are not that strange. In fact, as long as people do a quick search, they will find that at least half of the people living near you have the same pornographic content settings on your computer.
Giovanni Vigna, major in computer science at the University of California, Santa Barbara, focuses on vulnerability analysis, network security, malware analysis, and mobile platform security. Wigner’s partner is the Shellphish group, which is a hacker group, and he serves as the head of the group.
“Will the loopholes appear again? If the answer is yes, then we will need brand new protocols, mechanisms, technologies and strategies to ensure security and privacy.”
When personal information is leaked, there may be three stages, the first stage: everyone becomes crazy! At this stage, some factors are very important, such as: how is the leaked information distributed? If this is a large file, finding the key information in it will be a daunting task. If the leaked information is an information index, you can search and query, and the relevant information service can immediately implement a “denial of service”. Try to find out the source of the information leak and find out how your ex-girlfriend (boyfriend) describes your relationship with you. There will definitely be a lot of awkward conversations during this period, and even cause people to commit suicide.
The second stage: When everything stops, because all financial secrets (for example: your bank account password) are leaked, people’s financial accounts will be paralyzed. Similarly, other password systems will be shut down immediately to prevent people from malicious intent. Abuse (e.g. voting sites, etc.).
The third stage: In the “dawn period” after the personal information leaked, almost everyone was concerned about rebuilding their identity information, financial information, account passwords, etc. At this stage, he knew that he had two types of information: invalid information (For example: a Gmail mailbox password, such information can be modified, but the previous password is invalid) and valid information (for example: you send a text message to your mistress, and your wife is taking care of your baby).
The way to reset the previous type of information depends on the nature of the information leak: will the vulnerability reappear? If the answer is yes, then we will need brand new protocols, mechanisms, technologies and strategies to ensure security and privacy, but we currently don’t know how to do better. This will take time. At the same time, the society we know The rules may disappear.
If another intrusive information leak is unlikely to occur, the system will slowly restart, but as critical, fatal, and accidental information is disclosed, new ways of destroying our personal privacy will appear.
Michael Slepien, associate professor at Columbia Business School, is engaged in leadership and ethics research. He is mainly engaged in the research and analysis of psychological secrets and confidential activities.
“When personal privacy is leaked, you may be safe for a while, because everyone you know is busy screening their private data before considering seeing your information.”
Our research has found that, on average, each person has at least 13 secrets at the same time. These secrets involve our interpersonal relationships, financial status, embarrassing events, desires, and cheating. They are all very common. There is at least one secret. So, what happens if everyone’s private data is leaked at the same time? What if your medical privacy issues for every website visit, every online shopping, and every Internet search are suddenly revealed?
Suddenly, we might agree that 13 secrets seem to be grossly underestimated. Among the massive amounts of data that we believe to involve privacy, there is a lot of data that we tend to keep confidential. What will our friends, family, spouses, colleagues and bosses think? Is it possible for everyone who leaked their privacy to be fired, divorced, or abandoned by friends? I don’t think so. You may be safe for a while because everyone you know is busy sifting through their private data before considering seeing your information. When we start to pay attention to other people’s data (others are also paying attention to our data), there will be many surprises, but if such a major event happens to everyone, no one will be spared. I think when personal privacy is generally suffered Invasion will unite people instead of causing interpersonal relationships to become worse.
Although people feel lonely when keeping their secrets, few people can really do it. This is one of the problems we didn’t realize when we kept secrets. When people keep secrets, they may close the door to potential help, guidance and support from others. Sharing secrets with others is a way to gain the trust and help of others. Large-scale data leaks will eventually reveal many of what we have shared and shared. secret.
Alt Markman is a professor of psychology, organizational human dimension and marketing at the University of Texas at Austin, and the author of books such as “Thinking Smart” and “Let Your Brain Work”.
“In a world where all information is readily available, the largest and most financially capable organizations will be able to develop new ideas at the fastest speed, so the rich will become richer.”
Secrets are the so-called “information asymmetry”, which actually means that one person knows anything that another person does not know. When someone deliberately hides information to create information asymmetry, secrets are produced. The ability to keep secrets lies in the interpersonal relationship. It is essential in communication. Not everyone always wants to know or need to know what you think about everything. I may not like the shirt you wear, but in a particular social gathering, the shirt you wear will not affect the communication between us. We Controlling the information you disclose to others often contributes to social interaction. Of course, a surprise party requires a certain degree of secrecy.
In addition, some secrets are friendly and well-intentioned. If I am trying to build a new business, I will not disclose all the details of my ideas until I have the opportunity to develop and create a company and potentially make money from it. In a world where all information is readily available, the largest and most financially powerful organizations will have the ability to develop new ideas at the fastest speed, so the rich will become richer. Only by allowing people to keep trade secrets can we allow new ideas. Players enter the market and make innovations in the market.
Of course, any tool that has a positive impact will also have a negative impact. People do use information asymmetry to harm others. I think it is better for us to live in a world with information asymmetry than without information asymmetry. (Ye Qingcheng)