It seems that in the coming years we are waiting for a new stage of browser wars – the battle for user privacy. Now users are more and more thinking about the protection of their personal data and security while surfing the net. In the latest version of Firefox, the Enhanced Tracking Protection option is enabled by default, and Apple continues to embed privacy-oriented features in its Safari browser.
privacy
Privacy differential: It boasts Apple, Microsoft and Google created it uses
These days the developer conference held Apple, and during the WWDC keynote address that 2016 was a specific reserved for an issue that Apple is particularly proud section: the protection of privacy.
Speaking of his new efforts in this area, Apple mentioned the use of a discipline that few had heard: it is the “differential privacy”, a statistical system to collect and analyze data without compromising the identity and privacy of those who provided consciously or unconsciously. Do you know who created the concept? Microsoft, among others.
Collect data without violating privacy it is (mathematically) possible
The differential privacy is indeed a unique concept, especially now that all large companies based much of its activity to study our activity. Google, Facebook, Microsoft or Amazon do not stop to collect our data and then used in artificial intelligence engines, or advertising systems, or the way we recommend products and content.
Backdoor, security and privacy, there is the right balance? Experts say
Security against privacy, is it possible to enjoy both at once? And if not, as they seem to demonstrate the measures that we applied again and again in our society, what is more important for citizens? This is the question again and again opens delicate debates for years.
In one of the last chapters of this debate we have seen how the FBI case against Apple has been the trigger for another derivative question: Are the really necessary rear doors? Should security forces have indiscriminate access to these devices when needed, as claimed by the FBI? It is what we have tried to elucidate with several experts in the field of computer security.