The three potential threats to the internet we can't control what we want to delete

Source: Internet
Author: User
Keywords Chairman Google US Schmidt

Intermediary transaction http://www.aliyun.com/zixun/aggregation/6858.html ">seo diagnose Taobao guest cloud host technology Hall

On March 22, Google's chairman, Schmidt, said the internet was not a "utopia" when he attended the National News Foundation Awards dinner. He cites three potential threats to the Internet: hackers and criminals, no delete buttons that lead to privacy leaks, and internet censorship. But in my opinion, these three threats are, in the final analysis, a threat: we cannot control what we want to delete.

Some information, we have been exposed to the Internet, but after a while, we do not want this information to remain, but the large and small forwarding, reprint, screenshots, has made it impossible for us to delete this information. Our credit card transactions--well, we did--but we also couldn't decide to delete it, so hackers and cyber criminals could take advantage. In the end, Internet crime is not stealing information? On the other hand, the software has secretly taken over some of the right to delete, for example, without our permission, some "our" information has been deleted.

The development of information technology makes it extremely easy to "save", and there is never a media device that can keep all kinds of information as carefully as a computer. But the question is, do we need to save this?

Microsoft has a software, called Microsoft Money, which is actually a bookkeeping software that allows you to record your daily payments and output your spending habits. I used this software and had to be amazed at some of my spending habits I didn't know: I spent a lot of money on the taxi. Well, it seems that the software is very good and helps finance. But a small inconvenience is, each income and expenditure situation need me to manually input, over time, I also lazy to play with this software. The interesting result: I don't have any signs of personal financial deterioration.

Of course, I don't rule out that some people do have a bookkeeping habit, but Microsoft Money doesn't seem to be a very well known software-at least it's totally out of proportion to Microsoft's reputation. The software is not selling well and is proving to some extent that people are less keen on the need for such software. Technology is always as accurate as possible, but the human life, sometimes blurred a little in fact, the loss is not huge, but the precise and save the result is: once the illegal use, the loss far more than you gain.

The question is whether you can control the deletion. The first time I used money for this software, the Internet is far from popular (at least not in China), I can delete all the records in the software, and I'm not worried about whether Microsoft is secretly transmitting my data-poor dial-up Internet era, most of the computer is in offline time. As long as the data stays local and I can control it, the downside of this software is limited. But as the computer network more and more time, cloud services more and more prosperous, today, Microsoft to do this money software, I will not try anyway, because once the data upload, delete the power, it is not in my hands.

"Relationship" is actually a kind of information. A numerical law is called the "Dayton Number", known as the 150 rule. Robintonbar, an anthropologist at Oxford University, believes that people can handle more than 148 pairs of relationships--let's say 150. People's attitude towards the relationship is very much like the bear snapping corn, add a relationship today, will be the original relationship slowly alienated one of them. This is a factual judgment, but if you add value to judgment: Is that okay?

Internet industry SNS (here refers to the broad sense of SNS, that is, social receptacle service), all think that this is not a good thing. So they invented a variety of services to make you break through the limits of the Dayton. Early MSN also adhere to this principle (you can only have 150 connections), and then as the SNS services become more and more prosperous, MSN gave up this seemingly very dogmatic very nerdy rules. In a variety of SNS services, from IM chat tools, to social networking sites, beyond the 150 groups of users, many more. There are some services tied to the mobile phone, such as mobile flying letter, but also allow you in the so-called friend's birthday, automatically send a blessing message to this friend, to show that I am very concerned about you. This concern, in my view, is nothing but "technological hypocrisy".

A little bit of technical hypocrisy is no harm, but the human treatment of relations, some are natural forgotten, and some are deliberately erased. For example, ex-boyfriend (or ex-girlfriend), such as former career partner but for some reason and a big fight a separate way. Basically, people do not want to restore this relationship, but the technology does "save" your past relationship, and very smart to restore it, this is the circle of q+.

Q Circle launched, micro-blog Quite a few users exclaimed "Too strong", these four words are not necessarily commendatory, but with a color of fear. The human brain has "erased" the message, but let the technology be restored to you. In the past, people's worry about Tencent is only the leakage of the chat record, the 3Q War to rise to the computer all the files scanned, and in the Q circle This moment, people found that Tencent's relationship with people, also very happy to save. The so-called "people are the sum of social relations", Q Circle, is the real sense of human monitoring.

Here I do not want to accuse Tencent too much, internet service providers are addicted to the preservation of this matter, even if the reference to Google, although its chairman is aware of the great harm of the delete button. Google has a web page called "Social relationships and content," documenting your various relationships and relationships generated by some services. Although it does not like the Q circle in the G circle to show you immediately and shock, but to say that it has no record, it is impossible.

Don't believe you try it in Google search box? When you get a search results page, break your own network, and then click on a result link, pay attention to the address bar, see what happened? Oh, Google in the record of your This click-assuming you click on an erotic page, I'm sorry, Even if you don't want anyone to know you've had this action, a small program is silently recorded and you can't delete it.

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.