Abstract
Privacy is an often controversial, misunderstood, and underestimated concept, including on purpose by actors like governments or the Silicon Valley giants of Google, Apple, Facebook, and Amazon (GAFA). Unfortunately, due to today’s technologies, the potential for intrusions into personal privacy have increased exponentially. Even though there are different laws that protect privacy (i.e. GDPR) what is considered to be private by individuals and what is legally protected as private can differ. Different apps have different privacy policies, which leads to the protection of usually limited types of information, but not others. This situation is dangerous for social movements. Hackers and academics have been developing tools like Tor and Signal to encrypt our messages, and protect the right to privacy and anonymity. However, so much more needs to be done, both from a technical perspective, and through advocacy. Individuals, NGOs, activists: Everyone is a potential target of surveillance. In this paper we discuss the impact of privacy violations on social movements and the tools for encrypted messaging currently used by social movements. We show that the misunderstandings around privacy by users and the causes that prevent the developing of better tools for social movements.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Notes
- 1.
- 2.
- 3.
- 4.
- 5.
- 6.
References
McDermott, M.: State surveillance of black social movements lives on in 2017. Telesur (2017)
Joseph, G., Hussain, M.: FBI tracked an activist involved with black lives matter as they travelled across the U.S., documents show. The intercept (2018)
Leistert, O.: Resistance against cyber-surveillance within social movements and how surveillance adapts. Surveill. Soc. 9(4), 441 (2012)
Mayer, J., Mutchler, P., Mitchell, J.C.: Evaluating the privacy properties of telephone metadata. Proc. Nat. Acad. Sci. 113(20), 5536–5541 (2016)
Risen, J., Poitras, L.: N.S.A. gathers data on social connections of U.S. citizens. The Guardian (2013)
Johansen, C., Mujaj, A., Arshad, H., Noll, J.: The Snowden phone: a comparative survey of secure instant messaging mobile applications (authors’ version). arXiv preprint arXiv:1807.07952 (2018)
Sayadi, E.: Would your internet activity put you at risk of going to jail in Egypt? Accessnow (2018)
Halpin, H., Ermoshina, K., Musiani, F.: Co-ordinating developers and high-risk users of privacy-enhanced secure messaging protocols. In: Cremers, C., Lehmann, A. (eds.) SSR 2018. LNCS, vol. 11322, pp. 56–75. Springer, Cham (2018). https://doi.org/10.1007/978-3-030-04762-7_4
Abu-Salma, R., Sasse, M.A., Bonneau, J., Danilova, A., Naiakshina, A., Smith, M.: Obstacles to the adoption of secure communication tools. In: 2017 IEEE Symposium on Security and Privacy (SP), pp. 137–153. IEEE (2017)
Wyke, T.: Is science becoming too hard even for scientists? Experts worry academic papers are now so unintelligible that no one can read them. MailOnline (2015)
Schröder, S., Huber, M., Wind, D., Rottermanner, C.: When signal hits the fan: on the usability and security of state-of-the-art secure mobile messaging. In: European Workshop on Usable Security. IEEE (2016)
Syverson, P., Dingledine, R., Mathewson, N.: Tor: the second generation onion router. In: Usenix Security (2004)
Acknowledgments
We would like to thank the reviewers for their helpful comments and suggestions, and to Moxie Marlinspike for clarifying the situation with regards to Wire and phone number collection. The author is funded in part by the European Commission H2020 NEXTLEAP Project (Grant No. 6882).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Switzerland AG
About this paper
Cite this paper
Ben Guirat, I. (2019). Privacy and Social Movements. In: Bodrunova, S., et al. Internet Science. INSCI 2018. Lecture Notes in Computer Science(), vol 11551. Springer, Cham. https://doi.org/10.1007/978-3-030-17705-8_19
Download citation
DOI: https://doi.org/10.1007/978-3-030-17705-8_19
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-17704-1
Online ISBN: 978-3-030-17705-8
eBook Packages: Computer ScienceComputer Science (R0)