Obfuscation and Strict Online Anonymity

The collection, aggregation, analysis, and dissemination of personal information permit unnerving inferences about our characters, preferences, and future behavior that were inconceivable just a couple of decades ago. This paper looks primarily at online searching and the commercial harvesting of personal information there. I argue that our best hope for protecting privacy online is anonymity through obfuscation. Obfuscation attempts to throw data collectors off one’s digital trail by making personal data less useful. However, anonymous web searching has costs. I examine two of the most serious and urge that they are worth paying in the light of the heavy toll the commercial gathering and analysis of our information takes on privacy and autonomy. I close with some thoughts on (1) how individual, rational decisions have led to a surveillance regime that few would have chosen beforehand and (2) the alleged autonomy of information technology.

[1]  Paul Ohm Broken Promises of Privacy: Responding to the Surprising Failure of Anonymization , 2009 .

[2]  R. Posner,et al.  The Economics of Justice , 1983 .

[3]  Finn Brunton,et al.  Vernacular resistance to data collection and analysis: A political theory of obfuscation , 2011, First Monday.

[4]  R. Posner The Economics of Privacy , 1981 .

[5]  Louis D. Brandeis,et al.  The Right to Privacy , 1890 .

[6]  Yadira Espinal Viktor Mayer-Schonberger and Kenneth Cukier, Big Data: A Revolution That Will Transform How We Live, Work and Think , 2013 .

[7]  M. Zimmer “But the data is already public”: on the ethics of research in Facebook , 2010, Ethics and Information Technology.

[8]  Herman T. Tavani,et al.  Privacy protection, control of information, and privacy-enhancing technologies , 2001, CSOC.

[9]  H. Nissenbaum Protecting Privacy in an Information Age: The Problem of Privacy in Public , 1998, The Ethics of Information Technologies.

[10]  Julia Angwin,et al.  Dragnet Nation: A Quest for Privacy, Security, and Freedom in a World of Relentless Surveillance , 2014 .

[11]  J. Ellul,et al.  What I Believe , 1989 .

[12]  Helen Nissenbaum,et al.  Big Data’s End Run around Anonymity and Consent , 2014, Book of Anonymity.

[13]  H. Nissenbaum A Contextual Approach to Privacy Online , 2011, Daedalus.

[14]  L. Winner Autonomous Technology: Technics-out-of-Control as a Theme in Political Thought , 1977 .

[15]  Julie E. Cohen Examined Lives: Informational Privacy and the Subject as Object , 2000 .

[16]  O. Gandy,et al.  Cultural Rights: Technology, Legality and Personality.@@@The Panoptic Sort: A Political Economy of Personal Information. , 1993 .

[17]  James B. Rule Privacy in peril , 2007 .

[18]  A. Kahn THE TYRANNY OF SMALL DECISIONS: MARKET FAILURES, IMPERFECTIONS, AND THE LIMITS OF ECONOMICS* , 1966 .

[19]  Paul Ohm Privacy, Big Data, and the Public Good: Changing the Rules: General Principles for Data Use and Analysis , 2014 .

[20]  Helen Nissenbaum,et al.  The Meaning of Anonymity in an Information Age , 1999, Inf. Soc..

[21]  L. Winner DO ARTIFACTS HAVE (cid:1) POLITICS? , 2022 .

[22]  Helen Nissenbaum,et al.  Privacy in Context - Technology, Policy, and the Integrity of Social Life , 2009 .

[23]  J. Moor The ethics of privacy protection , 1990 .

[24]  Richard A. Posner,et al.  Privacy, Secrecy, and Reputation , 1978 .

[25]  A. Acquisti Privacy, Big Data, and the Public Good: The Economics and Behavioral Economics of Privacy , 2014 .