Sunday, May 21, 2017

Reality Check: Biggest Ransomware Ever Hits Everyone

Ransomware. Malware. Viruses. Stick-ups. Crime. Bad hombres. Evil doers. Burglars. Terrorists. Cyber-attacks. This world has many types of evil, but the worst of it now falls into the technology category. With the latest development of “the biggest ransomware outbreak in history” now carrying through multiple stories throughout the Internet community, the next generation of evil is reaching for what may hurt you the most: computers.

Time for a reality check: computers equal freedom of speech, freedom of expression, and freedom to learn. The world desires and wishes to keep these same principles and philosophies intact for all generations, for all countries, and for all societies.

You see, computers give us unlimited, intimate access to information. And don’t forget, it’s the information age, an age that is driven by the possibilities of fame, possibilities of financial wealth and gain, and promises of endless facts and figures beyond human comprehension.

The Internet has become a world all in itself over the years, and someone (or some group) is trying to stop us from connecting to our pleasure-seeking, self-centered ways.

With more than 150 countries (and counting) being hit with the same type of malware in the same 12-hour time period, you start to realize that our world is more connected, more instantaneous, more intimate, and more on-demand than you would like to admit.

But first, how does the bug work? According to, “ransomware is a type of malware that encrypts a user’s data, then demands payment in exchange for unlocking the data.” This malware attacks in one of three ways: from a bad hyperlink (or clickable link), from a bad email link, or from a phony advertisement. It only takes a matter of minutes for it to convert all your documents and pictures into unusable rubbish. This bug (officially named WannaCry) exploits a vulnerability in Windows, flashes a message on the screen to pay the ransom, and makes your computer virtually a dead-weight machine. The bug’s intent is to put billions and billions of people into panic mode, making them cave in to paying the $300 ransom being asked. It’s all a gimmick to scam you and destroy what seems precious and valuable to you: data. Data will always be a sacred part of an average person’s digital life until the end of time.

Microsoft claims it released an update for this vulnerability back in March, but most users wouldn’t know about this update; that’s because most users don’t spend quality time and effort to perform Windows updates on a regular basis. The other problem is that most users would lack the skill and know-how on how to perform the update themselves. It’s not in their routines to make a checklist and follow it with such accuracy. Hackers have always known of this weakness. Expect more attacks in the future on this kind of level, one that achieves national attention, reveals more weaknesses in software programs, and weakens the “trust-factor” built between mankind and computer.

How to Protect Yourself, Your Computer, and Your Peace of Mind

1.  Perform all Windows updates as soon as possible.

2.  Be suspicious from this point on about strange emails with strange requests. Any request is a fraud and a fake, unless previously known.

3. Keep up-to-date on computer-related news events and public announcements.

4.  Keep your antivirus current and updated.

5. Back up your data more often. Back-ups offer peace of mind to on-going malware threats.

6. Most of all, be on the lookout for anything suspicious on social media websites. Communicate these suspicions to others.

The possibility for cyber-attacks are real, and they do exist. Pure and simple. This isn’t a Hollywood movie script. This is life, a life driven by computers and technology. Cyber-attacks have always been there—much more today than ever before because of faster speeds, better connections, and trustworthy users like yourself. Because of these facts, someone out there, who is rather smart in programming and can figure out logical gaps and loops in coding language, is taking pieces of technology that work in the modern age and putting them into a negative light, a light that spells the end of technology’s control over users.

You may not be feeling the pain of this yet. But give it time. Evil deeds can morph and expand into unforeseen heartaches. This is one of them.

Author's Note: Microsoft's trying their hardest to cure a world-wide problem, the largest and biggest malware outbreak in history. Believe me, this is not a surprise. In fact, it's a given when you connect people with other people; it's a given when you connect different cultures and backgrounds together. Other forces would rather us not have computers or the Internet at all. The only hope we have in this world is to arm ourselves with the best protection known to mankind: thinking. If we think more, we can protect more. If we think more like hackers, we can protect more of our precious digital data. Therefore, thinking is our best tool. No one can alter that. Not even the best technology on Earth. 

Tired of ransomware? Read this: Ordinary Reflections.

Thursday, May 11, 2017

Wireless Technology: Its One and Only Weakness

Wireless technology. Wi-Fi. Powerful. Clean. Flawless. Cheap. For what it’s worth, this is the mothership of all contemporary technology, and quite possibly the most powerful force to test any government’s inclination to openly share information, not only on a small scale, but also on a world-wide scale. Remember, wireless does away with cables and cords, leaving life to be easier and clutter-free.

Simply put, wireless is powerful. There’s no denying the power of wireless technology in things like laptops, cellphones and smartphones, printers, routers, cordless phones, amateur radios, GPS systems, land mobile radios (LMRs), smart TVs, appliances, automobiles, and the list goes on. It allows you to connect things that never connected to each other before; it allows you to do away with cables being buried around your property; it allows you to attach new equipment without any complications; it allows you access to other systems within close range; and it allows your entire family to connect to the Internet at the same time without cables. That’s power; that’s your future; that’s what runs wireless digital devices.

It seems only like yesterday that two-way radios were all the rage and excitement in America. Keep in mind that radio is a game of throw and catch. The concept to making radio waves is rather simplistic: flow electricity through a transmitter (or throw) and allow a receiver to collect (or catch) these oscillating electromagnetic waves through the air—in a straight line—at the speed of light (some 300,000 km per second).

This same concept is used with today’s top wireless equipment. Although the speed is only 25 megabytes per second—that much slower than radio waves—it still proves the point that wireless technology can deliver the Internet to multiple machines up to 200 ft. away.

This comes as no surprise: wireless technology has been long in the making.

Even though the word “Wi-Fi” was officially added to Webster’s Dictionary in 2005, the creation of radio waves in the late 1800s would lead to the world’s first true discovery of wireless technology. It was German physicist Heinrich Hertz (1857–1894) who, in 1888, made the first electromagnetic radio waves in his lab.

Hedy Kiesler Markey, left, and George Antheil are credited with Wi-Fi's creation.

It wasn’t until 1944 that Hedy Kiesler Markey (better known as the actress Hedy Lamarr) and George Antheil, a composer, pianist and author, worked together and patented a spread spectrum frequency hopping code (on a punched paper tape) for radio-controlled torpedoes, encrypting the signal within a range of 88 frequencies (equaling 88 total piano keys). This was a simple way of making wireless communication more reliable and secure by transmitting and receiving on different radio frequencies, thereby eliminating the possibility of getting the signal jammed by the enemy and sending the radio-controlled torpedo to go off its course. Their patent was never used until 1997 with Wi-Fi technology.

The one and only weakness to wireless technology is jamming the signal. With thanks to Hedy Lamarr’s natural instinct and George Antheil’s expertise, their early World War II invention still resonates in the modern world. One example of this ongoing weakness is that of microwave ovens. When you turn on a microwave oven near a wireless router, the Internet goes out. Another example is with specialized “handheld radio jammers”—which are illegal to own in America—because they cause direct interference with not only wireless routers, but that of wireless services to smartphones. By jamming the signal, the oscillating electromagnetic waves don’t reach their intended end. This means users can’t use the Internet. All wireless Internet service stops on these devices. Could this be the weapon of choice in the next World War? A simple radio jammer could do the job, one on an enormous, world-wide scale. It’s simple: knock out wireless technology and turn electronic devices into useless paperweights. This goes along with the other unknown weakness of wireless technology: anything that’s man-made in design can be broken and destroyed. So much for digital perfection.

Author's Note: Yes, it's true that wireless technology has a weakness. The underlying weakness is not a complicated formula based on chemistry and chemical reactions. In layman's terms, it's scrambling one signal over another. The real test of wireless technology will be making it more reliable and secure when transmitting over extended areas. The other test is to make sure that Wi-Fi is not a health hazard to people and pets. Many people don't realize how many Wi-Fi signals are around them at any one time. Healthy? Cancer-related? There's no such study that proves the validity of Wi-Fi's safety as of yet, but soon enough, something will come along to make a case. Give it some time.

Ready to turn off your Wi-Fi? Read this: Ordinary Reflections.

Friday, April 28, 2017

Forced Upgrades: Industry Standards Show True Colors

In this ever-changing, ever-evolving digital world, there’s never been any true type of standard set in place for computer users. Standards are rare in an industry dominated by creativity and the next big innovation. Each day you start your computer with a silent prayer of hope there isn’t any “forced upgrades” to deal with. In reality, any upgrade is painful and tedious and uncomfortable.

Listen to the billions of us who use technology on a daily basis. They would be protesting in the streets if technology hit them with new standards—standards that would ruin the skills and knowledge of a dedicated generation of users.

Let’s face it: users can’t stand change. Change leads to new skills, which many will argue that they don’t need to learn. Why change what works? Everything about a computer works in such a precise manner: mouse clicking, reading email, printing a document, sending an attachment, watching a news video, working on a spreadsheet—this is all routine, all comfort-level skills that took twenty years to learn. Why tip the cart over and dump out all the good stuff? Why change the formula of technology’s success?

Because the industry intends to show its true colors.

First and foremost, technology is a business model. The industry needs standards to make money and survive, and without constant upgrades to technology, the whole thing would flop. Secondly, there are bills to pay, offices to run, employees on the payroll, servers to repair, and software upgrades to stop hackers and thieves. It’s a business. And like any successful business venture, the retooling of its pieces makes for a better-run product.

But what’s so different about 2017 with technology? Is it forced upgrades for good intent? Or does it spell out digital socialism? Whatever way you examine these questions, it all comes down to one thing: standards. You are living in a time where upgrades, whether forced or not, will move forth to become the official standard of using a computer. There’s no way around it. Microsoft does it. Apple does it. Don’t forget Samsung. Don’t pass by Hewlett-Packard. Even websites like Amazon, Google, MSN and Yahoo do it. They are all involved in the same philosophy of regulating and maintaining computer standards. In fact, each of these companies have been releasing new content on all of their products since the beginning of this year—and hardly anyone knows about. Forced upgrades just happen. Upgrades are a natural part of an evolving digital age. Their reasons are simple: it’s because of Russian hacking, identity theft crimes, and also amateur programmers who write malware software to attack institutions.

Since the world is under “digital attack,” the response in the industry is to form support around standardization, a term that hardly has worked in the past. Every few years another round of products emerge that pushes the industry forward, not toward an ethical standard. Look no further than Microsoft’s slow progression: Windows 95, Windows 98, Windows 2000, Windows XP, Windows Vista, Windows 7, Windows 8 and Windows 10. That’s eight generations (and counting) of software development. That’s eight generations of computer learning skills. It’s interesting to note that not every computer user on the planet has worked with and mastered all of these software versions. Millions and millions of users have skipped over one generation to the next. Therefore, standardization seems an almost weak attempt by the industry to structure technology.

The same failure of standardization holds true with Apple. Their laundry list of version names speak volumes about a product that’s developing at a rapid pace: Cheetah/Puma, Jaguar, Panther, Tiger, Leopard, Snow Leopard, Lion, Mountain Lion, Mavericks, Yosemite, El Capitan and Sierra. That’s twelve generations (and counting) of software development. Once again, there’s not many users who can claim they spent time and money purchasing each version.

2017 is the year of set standards, real industry colors, and true digital socialism. You can’t blame people for their personal frustrations, their outbursts of confusion, and their dissatisfaction to constant change. They’ve been taught to either sink or swim in the maddening waters of this digital era.

Author's Note: Here's a part of the industry that no one really talks about: digital socialism. In some odd way, every single year, you can understand how their "standardization practices" are forcing users into a world of limited choices and products. With each "digital attack" that hits the industry, the common response forms around more rules, more standards, and more control. It's getting to a point that users won't be able to help the industry to help itself: they'll have complete control over the Internet, equipment, software, hardware, creativity, and system upgrades. Now doubt, digital socialism is the direction of an industry that keeps offering more promises of perfection and digital bliss.

Want a break from regulations? Read this: Ordinary Reflections.

Sunday, April 16, 2017

Data Input with Mice or Keyboards: Which Do You Prefer?

Data input. If you were to break down the computer into logical steps, this is what you would learn about data: input, processing, and output. These are the same series of steps that you use on smartphones, tablets, laptops, and other computer devices. The whole formula’s fate is dependent upon your data input. It’s the same formula for the past 30 years, and it’ll be the same formula for the next 30 years.

Undoubtedly, the average computer user is at the forefront of data entry. That user is the undisputed tech genius: you. For the rest of your digital life, you’ll be responsible for inputting and deciding what goes into a computer. You see, technology would be rendered useless if it didn’t have someone like yourself feeding it endless information and intellectual knowledge. That information is entered through your keyboard, mouse, voice, and touchscreen inputs. You, the humble tech guru, gets to pick the best method to input this data.

World's First Typewriter in 1867.

The debate of data input has always been between two specific sources: mice and keyboards. These two sources are the traditional ways to get information into a computer, although voice and touchscreen have gained ground in the past few years. Surprisingly, you’ll find many users not wanting to use a mouse for basic data input (as if they are afraid and unskilled to use a mouse), opting instead to enter data by using a standard, century-old keyboard.

Like a good wine, good tastes never change.

And you don’t have to look far to find where good taste arises. You can blame Christopher Latham Sholes, the inventor of the typewriter in 1867, for this ongoing data input debate with technology. He is the reason why the keyboard is still used on a daily basis; he is the reason why laptops have keyboards; he is the reason why smartphones have touchscreen keyboards; and he is the one responsible for pushing new technology that would replace handwriting. It must have been a difficult task for Mr. Sholes to convince people of that generation and time period to say that typewriting could be faster than handwriting—almost the same as saying mouse clicking is faster than keyboarding.

Then another incredible invention came to light in the mid-1960s.

It came in the thought of a small solution and in one incredible dream: the invention of the computer mouse. This pointing device gave users control over the screen, giving them ample ways to manipulate information without using a keyboard. This time, you can blame Douglas C. Engelbart for the headaches you experience with today’s mouse or touchpad. He is the person responsible for the world’s first computer mouse in 1964, with it being made of a wooden shell, a circuit board, and two metal wheels that flowed on a flat surface; he is the person responsible for helping Macintosh ship these out by the millions with the first Apple PC; and he is the person responsible for putting the power of a computer in your hand. Not bad for a simple solution and a dream. That’s not an easy task to achieve in a technological world, but Mr. Engelbart did it way before his time.

Now you have the debate’s core argument: Is it a mouse or a keyboard for data input? Which do you prefer? Which one seems like the ultimate tool to be using in a modern world? Is it old-school keyboards and shortcuts that make you feel like you are playing a piano? Or is it right and left mouse clicks that peak your interest? Whichever method you decide to put your mind around and master in your computer life, most users focus on one or the other. There’s no go-between with technology. According to a number of recent studies, more users are returning to the mouse and keyboard. “People are buying more mice and keyboards today than in years past,” says Rory Dooley, senior vice president of devices at Logitech, one of the world’s largest manufacturers of computer accessories. The number of mouse sales exceeded more than $142 million in the 4th quarter of 2016; keyboard sales reached $125 million in sales during the same period.

History speaks for itself. After all, the keyboard is turning more than a century old—older than your washer and dryer machines, older than television. On the other hand, the mouse was popularized nearly 30 years ago, even before such incredible inventions as the Web, iPhones, and digital voicemail.

With the way things are going, mice and keyboards are here to stay.

Author's Note: This is one of the most challenging aspects of technology: the debate between mice and keyboards. Like the song says, "You can't have one without the other." I mean, this is a perfect relationship made in matrimony. Entering data with your voice or a touchscreen doesn't have that "same-old" feeling, does it? For the next generation of users, many of them won't understand the ecstatic feeling that goes with typing on a keyboard, the fresh smell of ink from a published book, the nostalgic feeling of driving a car without any dummy lights going off, or the damp feeling of getting their hands dirty while planting seeds in the ground. These digital seeds are already planted : mice and keyboards.

Need to slow down from your data input? Read this: Ordinary Reflections.

Wednesday, March 29, 2017

Internet Services: Getting Your Money’s Worth for Broadband

Internet services. You can’t live without your Internet provider. They are the company responsible for providing you that fast, reliable Internet connection on a 24/7 basis; they are the company responsible for giving you the ability to connect to your banks, your email, your social media, and to answer all those endless search queries on Google’s homepage—which add up to more than 40,000 queries per second from around the world.

It’s obvious the basic computer user wants a fast Internet service provider to keep up with their increasing demands. If users were to get this service at a reasonable price, then they would be a customer for life!

This increasing demand leads to a question: Are you really getting your money’s worth for these services?
And, statistically speaking, is your broadband (defined as the Internet’s speed) coming through at its peak performance? These are common questions for users, and many don’t know how to answer them. Many of them don’t have a clue where to start.

Broadband is considered any high-speed connection that’s faster than traditional dial-up service. This means that DSL service through AT&T is now considered broadband—even though its most basic service option is at 6 Megabytes per second (Mbps). Real speed comes from these big-name providers who offer 20—100 Mbps. This list includes the following: Charter, Verizon, Comcast, CenturyLink, Cox, Frontier, Optimum, Time Warner Cable, Suddenlink, Earthlink, Windstream, Cable One, NetZero, Juno, AOL, MSN, Mediacom, Basic ISP and Wow, that’s a big-time list of big-name providers. Imagine if all these service providers were available in cities and towns throughout America. It’s a nice thought, isn’t it? Pricing packages would reach an all-time low, leaving customers 100% satisfied with their Internet services. That stat would be an all-time first in an industry full of poor customer service and overpriced Internet plans.

Q: How do you know what speed you’re getting? Are you really getting the most out of your hard-earned cash? Of the millions of users, many don’t run Internet speed tests on their cable modems and wireless routers, and this leaves them completely in the dark as to determine how fast or how poor their service is running. They could be wasting hundreds of dollars a year over poor Internet connection speeds, poor wireless router connections, and slow Internet speeds that they come to accept over time.

A: Run a speed test. Please visit this recommended website for more information. The results of this speed test include upload and download speeds. A second one you can use is this one by Ookla: Both of these speed tests offer you reliable and accurate results to make decisions.

The following speed test figures are healthy:

The following speed test figures are unhealthy:

Your Internet speed slows down as your equipment ages. Your equipment is on 24/7, surviving a host of electrical power outages and sudden bursts of energy coming through the line. In the end, it is really the mainstay of your home network. If you ignore it long enough, then the only outcome will be poor performance. Change-out rates for equipment happen every five to six years with cable modems and wireless routers. That same statement also applies to other digital equipment like laptops, towers, hand-held gadgets, smartphones, cellphones, and tablets.

Five to six years is not that a long of a period in computer lingo. Consider that the Internet is only 25 years old, and you’ve technically changed out equipment at least three times or more over the course of your life.

Don’t expect this cycle to change. Neither will the Internet!

Author's Note: Getting the most out of your Internet provider is possible. All you need are the right tools to get the job done. Because you never know when your Internet speeds will drop to a "below average" state, leaving you with a lesser, slower service. Getting your money's worth for your broadband is your main objective. People go mad when they don't get first-rate service and quality Internet speed around the clock. That's what people want in this tech age. 

Want your money's worth? Add this book to your collection: Ordinary Reflections.


Tuesday, March 21, 2017

Twitter’s Fame: Can We Really Change Society with 140 Characters?

Instant messaging is no stranger to society. Way before the grassroots of Twitter’s surge, AOL had a feature in its software early on (during the mid-1990s) that allowed you to send messages back and forth between multiple users, with none of the conversation ever being recorded. The phrase “IMing” became an instant hit with young people. You couldn’t send pictures in this format, just plain text, ideas, humor, and good-old elbow-jabbing jokes.

You can even step back further into the time machine and return to a period when BBS (Bulleting Board Services) ruled every college campus. This allowed users to download software and exchange direct messages between each other. It may have had an archaic feeling to it, but during this period, it was fascinating to think your thoughts could go digital to someone else in a matter of seconds. These thoughts were then stored on a server for everyone to read.

Private instant messages soon turned into public forum postings. Twitter’s fame started with its co-founder, Jack Dorsey, sending a message on March 21, 2006, saying, “just setting up my twttr.” Nicknamed a “tweet”—like that of a little bird talking from a tree branch—this new way of communicating offered you 140 characters to post a message (equivalent to 3 sentences). People would read these messages, and either retweet or consider them favorites. Retweeting gave more popularity to the author and gave more credibility that thousands of people liked and supported it—almost similar to starting a revolutionary movement without stepping outside.

So the world began tweeting. And tweeting they did.

After 10 years of this service being available to the public, who could have predicted this kind of output: “every second, on average, around 6,000 tweets are tweeted on Twitter, which corresponds to over 350,000 tweets sent per minute, 500 million tweets per day and around 200 billion tweets per year.” With Twitter having 974 million active accounts in 2017, there’s plenty of voices out there that post breaking news stories, post opinions about controversial topics, post topics about freedom of speech rights, and post various liberal and conservative political views. Even government leaders, congressmen, statesmen, and other political elites love to use Twitter as a personal reservoir of their own slanted opinions and rhetoric. Because there’s an audience, they keep tweeting both day and night.

Twitter offers an intimate, unfiltered conversation with other people. Because of its limitless boundaries, various questions arise due to the impact of the service upon society’s core values and beliefs. Here’s a few:

  • Can proper solutions be offered in 140 characters?
  • Is it possible to influence all of society by merely sending out a simple tweet about your opinion, while offering no specific details on how to back it up?
  • Is it ethical and proper to post your own philosophical ideas to the world as a government official?
  • Why does the news media solemnly trust the messages being posted on Twitter? Why do they fall for the hook-and-bait message?
  • Professionally speaking, does tweeting “off the record” really do any good? Or is it more harmful to everyone?
  • If it weren’t for Twitter, would people really come forth and say these same thoughts in a “live” public forum?
  • Overall, is Twitter discouraging society to hide behind mere tweets rather than stand tall for what they believe in?

As one can see, more questions continue to arise each day because of another tweet. Twitter is gaining more notoriety, more popularity because big-name people are using the service for personal gain, and they are gaining lifelong believers. These people include: celebrities, government officials, leaders, college professors, reporters, and intellectual scholars. It’s the progressive movement of people’s Internet usage that propels Twitter’s success. Since people don’t trust the news media as much, they search for a more common ground with others they can trust. Twitter’s sense of “true innocence” draws millions of people each day to read and believe in every posting.

Twitter’s immediate success could also be their quick exit from the Internet. The real question is: Is Twitter a fad? Maybe so. Email is still more popular in communicating with others than mere tweeting. In reality, all it will take is a misuse or abuse of the service to send followers into an upheaval of distrust. Then, and only then, will people stop reading the posts and stop hanging on every word someone more daring has to say.

Author's Note: Twitter is growing by leaps and bounds. Their rapid success is because of people who long to voice their opinion about on-going topics and political views. People are listening. But who would have thought that posting a message online would mean anything 10 years ago? Who would imagine that society would care at all about "Joe" in a small community posting a thought on the Internet about racial injustice? Email's still more personal, more enduring than a tweet, but time will tell how long these tweets will turn some people into twits.     

Tweeting too much? Order this book: Ordinary Reflections

Sunday, March 12, 2017

Fake News: The Secret of Deception and Deceit

The world is full of deception and deceit. This statement personifies anyone who believes everything is true on the Internet. It is a highly technical and digital world now. Some even believe the facts and figures of every article, every story, every vlogger, every website posting, and every Facebook wall.

Because some people believe in the Internet’s full disclosure policy, the deception and deceit moves into high gear. This is what fuels the realms of digital leaks, a powerful new way to get information, unfiltered and unreliable, to the masses, 24/7. With a rising culture dedicated to reading news online (some 57% of users in a recent poll), there is some just cause for concern.

That also applies to “fake news”—a rather new, powerful, political development.

With “fake news,” you can alter the real storyline into an abstract argument. Although you can argue either way about the philosophies and the ideologies presented in each news story, there’s always a possibility someone (a writer with an evil mission) will twist the truth, twist the meaning, and twist the facts, presenting it online as fact, as truth, as whatever you want it to be.

Information, then, is plentiful in cyberland. The secret of “fake news” is to get the information out there—in any shape, form or style—and let people decide for themselves what they think is real or not.

With so much information available, the global audience is rather confused. They have mindless amounts of information at their fingertips. Digital information is a vast, ever-growing, ever-expanding overload of raw facts and figures, growing larger and larger each day due to the daily use and need for technology with users. Users feed raw data from their computers, smartphones and tablets at an astounding rate per day—some 4 million hours of video content go to YouTube; some 4 million Facebook posts; some 246 billion emails. You see, information keeps pouring in like water.

By definition, digital leaks are unauthorized disclosures of sensitive information that could have substantial repercussions to the safety and well-being of any country. This is such a sensitive issue that server companies that host fake news immediately get attacked by political groups, forcing them into the limelight with negative media stories and threats of legal action.

Viral activities are common events on the Internet. You must consider that a “post” can go viral within a matter of hours, not weeks. You don’t have to wait for the 9 o’clock news, or even wait for the paper to be delivered late, late in the afternoon. Instant means instant; now means now; viral means global.

In a recent political manifestation about unclassified digital leaks, President Donald J. Trump claims that “the leaks are real, but the news is fake.” Whether you agree or disagree with what he is saying, it is true that certain websites post false and misleading articles about mainstream media stories. The hope is that people will get false impressions and characterizations about certain individuals or controversial mainstream headlines. The fact is more than one billion websites worldwide are up and running as of 2014, so there’s no way to monitor the originality of any piece of information; there’s no way to control the quality of Internet postings; there’s no way to authenticate a “viral” event.

All of these false claims and false reports lead to a world full of deception and deceit. The Internet is the cause of all these problems. In the end, people are deceived and swindled out of the truth, a truth that should otherwise be available to access from their handheld technical gadgets with ease. The Internet loses some credibility over the lack of its own credentials. People are then forced to decide for themselves whether something is real or not, leaving many people to cry foul and turn angry and judgmental before anything can be verified or nullified about a fact or figure presented online.

Let’s face it: we live in a technical world. The idea is to expose all fakes. We must allow for the truth to find its way through all the trappings of a digital world. Humans created this tool; humans must learn to manage it better.

You can review and study more about fake news websites by visiting the following website link:

Author's Note: Fake news is real. Because of the mindless amounts of active websites, there's no telling how many "fake news" outlets feed the average mind. Users become interested in and follow certain websites because they believe in what they are reporting. You can become a fan of anything on the Internet, a cheerleader for the cause, a supporter for the needy, and a follower of the strange. Literally overnight, you can cast a viral shadow over the world, leaving many to believe that what they read and saw stands as the overall and definitive truth. Kind of sounds like George Orwell's classic novel "1984," doesn't it?     

Need a break from this digital world? Here's some honest thoughts: Ordinary Reflections

Sunday, February 26, 2017

What Real Privacy is Left in 2017?

Privacy. It can be closely examined within difference broad viewpoints, especially into aspects of your personal life, your digital life, your lifestyle, your relationships, your interests, and into your basic human rights as an individual. Each of these broad viewpoints paint a portrait of your most-guarded secrets. In an age of server data breaches and Russian hacking attempts capturing the media’s undivided attention, you wonder what real privacy is left in 2017? There’s so little privacy left that if you hid under a rock today, the Internet would know about it tomorrow.

First, let’s define privacy in simple terms. Merriam-Webster defines privacy with two distinct clauses: 1) the quality or state of being apart from company or observation (seclusion) or 2) freedom from unauthorized intrusion (one's right to privacy). Both clauses seem to describe privacy as a given right, a human right entitled since birth. That means every human being, regardless of their social media or smartphone usage, is granted this right. Former U.S. Justice Louis Brandeis (1856-1941) calls it “the right to be left alone,” which he first declared in 1890.

This digital world doesn’t allow for any privacy. Ever since the invention of the Internet, it’s been nothing more than an open book with new pages being written 24 hours a day; it’s a money-making machine where new data flows in with a price and gives huge financial gains for finding the “dirt” on someone else’s life; it’s a library filled with endless books, movies and videos on topics beyond human comprehension; it’s a data goldmine worth more than all the gold on Earth. Digital privacy, you see, is turning into a systematic way to control people, to influence people’s behaviors, to influence government leaders, to stir human ethics, to cause a revolution without setting a foot in another country, and to allow for terrorists, hackers, and other evildoers an equal chance to destroy whatever good there is left in this world.

But it’s a human right. Is it not? It’s a basic fulfillment of human decency that protects us from someone’s watchful eye and judgmental opinion. In a private world, you can succeed or fail, can have good relationships or not, can be yourself or transition into something else without anyone knowing, without anyone commenting on these aspects of your character. There’s no timelines. There’s no one writing commentary on your life’s choices. Therefore, that would be your human right (with privacy leading the way).

The fourth amendment of 1789 (rev. 1992) hints at privacy, stating that “The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no Warrants shall issue, but upon probable cause, supported by Oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized.” It’s close to defining privacy, but not the type of privacy that defines today’s digital world. It doesn’t define the trappings of social media, smartphone usage, Twitter and Facebook content, email content, stolen digital identities, private digital images, security breaches, and the hacking of financial and private data. Another revision needs to be made in order to get privacy back into the forefront of the American dream.  

But in truth, privacy is almost fully extinct.
Keeping all this in mind, different aspects of your privacy are threatened by this digital world. Here’s a summary of what they mean to you:

  • Personal Privacy—this protects you against observation and intrusion. Do you just want to be left alone each day? No more cameras spying on you in grocery stores and gas stations. This is considered your personal space and your daily ritual of living. It’s everything to you to have intimate private moments that don’t end up going viral.

  • Digital Privacy—this can best be described as the protection of your information as a private citizen who uses digital mediums. Do you feel like your digital cookies are being tracked? How about your digital purchases online? What about date and time of your searches? Or things you read about online? No one should know these interests.

  • Human Rights Privacy—this protects against existential threats resulting from information collection or theft. Do you feel threatened by the actions of a government or other entity? Is your freedom at stake? These are threats that could change your life in an instant.

  • Contextual Privacy—this protects you against unwanted intimacy or contact. What about others knowing your relationship status? Your sexual orientation? Your personal philosophy? Your religious views? Any of these topics could lead to unwanted advances from others.

Author's Note: This is becoming a very intense, intimate topic in this digital era. The problem really is with the actual definition of our fourth amendment rights, rights that don't clearly define the type of privacy we desire in today's digital world. It doesn't define social media's power and its data-collection trappings; it doesn't define anything about contextual privacy or human rights privacy; it doesn't define the advent of security breaches and the release of private information to the public; and it doesn't define the new addition of fake content and news  that seems to be popping up every day. Is our privacy fully extinct? Time will tell.

Is your private life at risk? Read this to bring back your sanity: Ordinary Reflections

Another Article of Interest

Reality Check: Biggest Ransomware Ever Hits Everyone

Ransomware. Malware. Viruses. Stick-ups. Crime. Bad hombres. Evil doers. Burglars. Terrorists. Cyber-attacks. This world has many types of ...

Popular Posts