Friday, February 26, 2021

Online Privacy Will Be A Thing Of The Past Very Soon:


Bokhari: Microsoft and Friends Want to Destroy Online Privacy



Microsoft has teamed up with a number of tech and media companies to create a system of tracing content around the internet that could destroy online privacy and anonymity, radically transforming the nature of the web.

Against stiff competition, the alliance of tech and media giants has devised a plan that may constitute Big Tech’s most brazen power-grab yet.


According to Microsoft’s press release, it has partnered with several other organizations to form the Coalition for Content Provenance and Authenticity (C2PA).

Put simply, the purpose of this organization is to devise a system whereby all content on the internet can be traced back to its author.


Whether it’s a meme, an audio remix, or a written article, the goal is to ensure that when content reaches the internet, it will come attached with a set of signals allowing its provenance — meaning authorship — can be detected.

Consider the companies that have signed on to this initiative. Leading the pack is Microsoft, which operates Word, Paint, Notepad, Edge, and the Office Suite. If you create a .doc or a .jpg, a Microsoft service is probably involved in some capacity.


Then there’s Adobe, the company behind Photoshop, Illustrator, Acrobat, and Premiere Pro, as well as several other market-leading applications for publishing photos, videos, and documents.

There’s also Truepic, a company that has developed technology to track the provenance of photos from the very moment they are captured on a smartphone.

Finally, there’s Intel, which dominates the market in laptop and desktop central processing units (CPUs). The CPU is responsible for processing virtually all information on computers. Whether you’re typing a sentence or taking a screenshot, it’s the CPU that is processing that data.


Accessing the CPU is the ultimate form of digital surveillance. Even if you’re disconnected from the internet, the CPU still sees what your computer is doing.

The combination of these forces creates the potential to track and de-anonymize information from the moment it is created on a computer. Signals could be attached to information to ensure it is censored and suppressed wherever it travels online. Even if someone else is sharing the information, it could be suppressed simply because of its point of origin. And, of course, the signals could be used to identify the creators of dissident content.






No comments: