Internet Privacy Control Your Computing Before It Controls You
In the age of cloud computing, technology companies decide which programs users can load on to their smart phones, while Facebook sells personal data to other companies to use. Internet users need to swim against the stream if they want to protect their privacy.
The World Wide Web, developed by Tim Berners-Lee in 1990 as a system for publishing and viewing information, is slowly being transformed into a system of remote computing. It will store your data, and data about you, often limiting your access to it but allowing the Federal Bureau of Investigation (FBI) access at any time. It will do your computing for you, but you cannot control what it does. It provides various tempting attractions, but you must resist them.
In the 1980s, most people did not use computers; those who did, mostly used personal computers or timesharing services (ed's note: the simultaneous use of a central computer by a large number of users). Both allowed you to install software of your choice. Both allowed you full control over your data, though it is not clear what access the timesharing services gave to the FBI. In any case, the timesharing services mostly faded away by the 1990s.
This does not mean that these users had control of their computing. With software, either the users control the program (free software) or the program controls the users (proprietary or nonfree software). Those users were running proprietary software because that's all there was at the time. The users could not change it, or even tell what it really did.
The abusiveness of proprietary software has intensified since then; nowadays, it is likely to spy on you, intentionally restrict you and/or have back doors. Some examples for that kind of behavior:
- Windows updated itself without user permission.
- The Kindle gives Amazon the power to delete purchased books from customers' devices.
- Many Android phone models are designed to refuse to let the user install a modified version of the Android software.
- The iPhone restricts what applications the user can install. This is an extreme form of digital handcuffs. People who modify the iPhone to enable installation of other programs call this "jailbreaking" -- the idea being that the product, as designed, is a jail.
But even absent such abuse, it wasn't right for users to be controlled by their software. That's why I launched the free software movement in 1983. We decided to develop an operating system and applications that would be entirely free, so that the users would have control over them. I gave this system the name GNU. (You have probably heard people call it "Linux," but that's an error.) People who switch to this system, and insist on using only free software, are in a position to control their computing. We have liberated only a small part of cyberspace, as yet, but that is a foothold for freedom.
Developments in the Web threaten to negate this achievement. The first problem was the use of invisible references to sites whose mission was surveillance (perhaps for advertising). Users who visited sites A, B, X and Z did not realize that those pages contained invisible references to other sites, so each visit informed that site too, and it recorded permanently that this user had visited certain pages.
Then there is the issue of storing your data in companies' servers. The largest such companies have little respect for users' privacy. For instance, if you hand your data to Facebook, companies pay Facebook -- not you -- for the use of it. They pay Facebook -- not you -- to run ads using your face.
Merchandise, Not Clients
The timesharing companies of the 1980s usually treated their users' data with respect, even though they could occasionally abuse them, because their users were paying clients and could go elsewhere. Facebook's users do not pay, so they are not its clients. They are its merchandise, to be sold to other businesses. If the company is in the US, or is a subsidiary of a US company, the FBI can collect this data at whim without even a court order under an un-American US law, euphemistically named the "Patriot Act."
Services also offer to operate on the users' data. In effect, this means that users do their computing on the servers, and the servers take complete control of that computing.
There is a systematic marketing campaign to drive users to entrusting their computing and their data to companies they have absolutely no reason to trust. Its buzzword is "cloud computing," a term used for so many different computing structures that its only real meaning is: "Do it without thinking about what you're doing."
There is even a product, Google ChromeOS, designed so that it can only store data remotely, and the user must do her computing remotely. Ironically, it is free software, a version of GNU/Linux. Users will have access to the source code, and could change it so as to support local computing and local data storage -- if the machine has enough memory to store it, and if it permits users to install their own versions of the software. If Android phones are any guide, most ChromeOS devices will be designed to prevent users from doing that.
This does not mean Internet users can't have privacy. This does not mean that Internet users can't have control of their computing. It does mean that you'll have to swim against the current to have them.
Copyright 2011 Richard Stallman, published by SPIEGEL ONLINE. Released under the Creative Commons Attribution-NoDerivs 3.0 license.