Privacy Enhancing Computation

 Privacy Enhancing Computation

Is your web camera of the laptop closed? If so, Why? If it is not, Why?
Privacy enhancing computation is most wanted feature in nowadays. Privacy is used to protect our personal data and let our personal data be personal. According to global researcher Gartner, 82% of internet users submit fake details while different websites ask to enter personal details.

There are two main categories under Privacy enhancing computation. They are Soft privacy and Hard privacy. Soft privacy is to keep information safe and process data while having full control over data. Hard privacy allows online users to protect their privacy through different services.

Also, privacy enhancing is one of the top ten 2021 trends of Gartner’s research. In order to enhance what is the status of privacy in computation now? Hiding the real identification of email address and IP address and replacing them with one-time email address and random IP address, Shared bogus online accounts, digital signature algorithm called EPID (Enhanced Privacy ID) and Secure multi party computation like GitHub? e.t.c. Privacy option in our social media accounts can be also considered as a very simple example which is used in our day-to-day life.

We are so concern about Privacy enhancing for harm prevention; if our social media, bank account details and cloud information are not secured, sometimes it might affect your image, your money can be stolen and even your pictures or documents of various projects in cloud can be also unsafe. Some parties use your personal data to blackmail you threatening they will publish your personal data which you don’t want to publish. There are privacy threats in almost all sectors.

If we can trust the machine which we have been working whole the day with, that will be a huge help for all of us. There are lots of data in our mind or sometimes written on books as we cannot trust computers to submit those data. We delete so many photos and we step back to keep our pictures in clouds or drives, because of the fear and less trust. We human has invented this machine computer. So, why can’t we give some of human qualities to our dear friend computer?

Most of the hackers do unethical hacking, If you ever have visited threatmap.checkpoint.com you can understand how many hackings happen within a day or even within 5 minutes. That has been a problem personally and also to huge companies. Everyone talks about ethical hacking. Cannot we use those hackers as a huge safe wall for our privacy enhancing. If they can identify the holes in our systems or privacy or connections, most of them have thew ability to suggest how to recover it. I know there are some companies which use this method but what if there is a common forum for hackers to compete with fellows around the world to protect privacy of computers and data. It will be a huge advantage to companies if their work is tracked, we can identify the holes in our privacy efficiently.

We must reveal our personal data in many organizations daily, at banks, at supermarkets or at shopping malls. What if all our data is centralized at one specific highly safe place, and we receive an identification card with a bar code or some secure technology. Our name, contact number, card number will not appear on any other machine. Instead, just for our clarification a picture or an icon which we have selected while submitting our data to the centralized system will only appear at supermarket machine screens, bank screens and any other public place.

Like that there will be many more future enhancements to come. 27% of internet users which never enter personal details will have a trustworthy computer, website, internet connection in near future. Privacy is very important. Check whether your privacy switch is on.

Post a Comment

0 Comments