Blog

What Would Happen if All Data Was Publically Available?

What Would Happen if All Data Was Publically Available?

What if I were to tell you that, by the time you finished reading this sentence, all personal data in existence was exposed? If every text sent, every Google search executed, every website visited, everything we had ever done online, was made public? Gizmodo recently reached out to an assortment of experts for their insights. Here, we’ve assembled their responses for you to consider.

Expectation: Short-Lived Outrage, Long-Term Adjustment

One hypothesis essentially boils down the aftermath of such an event down to these two environments. Let’s consider what could be safely anticipated as immediate results of a complete loss of data privacy:

  • Widespread firings
  • Widespread marital issues and divorces
  • Widespread lawsuits and arrests
  • Widespread shaming

However, it is important that we also consider what is known as the Privacy Paradox, or the tendency that people exhibit to quickly adapt to revealed secrets. While there would certainly be a period characterized by outrage and general shellshock, this would quickly be adopted as the new status quo. In the long term, many of these hidden actions and behaviors may grow to be more socially acceptable, as it would be made clear how many people actively participated in them.

Basically, we would collectively grow tired of scandal, and victimless behaviors that are now taboo would become more acceptable as it was revealed how many people actually partake in them.

This acceptance, of course, wouldn’t be an all-encompassing rule. There are plenty of behaviors that are frowned upon despite their prevalence, like lying. However, many shameful secrets would become less of a burden once people knew how many others shared that shame.

It is also important to consider whose data we would collectively be most interested in reviewing. While we might assume that most people would look to dig up dirt on those around them, it is far more likely that the first step most would take would be to look themselves up to find out what other people will soon learn. Most people experience what is known as a positivity bias about the other people they care for and wouldn’t risk that bias being disproven without some serious consideration and emotional fortification.

Expectation: Increased Wealth Disparity

Another theory dove more into the influence that such a shift would have on the business landscape. Defining a secret as nothing more than intentional “information asymmetry” (a situation where one person knows more than the other), the idea here is that every human interaction relies on some level of information asymmetry. While these asymmetries can be used to cause harm, most of their use comes in the form of relationship management. In other words, our ability to keep information to ourselves is beneficial to our relationships.

As this pertains to business, consider what would happen if there was no such thing as a trade secret from this point on. Right now, the very concept of a trade secret allows new businesses to be created and grow, disrupting the status quo and carving out their own piece of the market. Without these secrets, however (and remember, all secrets are now exposed) existing corporations and large businesses could latch onto these innovative ideas and develop them more quickly.

The result: big businesses get bigger, rich people get richer. Not ideal for society, as history has shown.

Expectation: Complete Societal Reset in Three Parts

Yet another prediction incorporates a few phases into describing the overall impact of such a data dump. First and foremost (and most predictably), there would likely be chaos. This is dependent upon how all information was presented. If it was all in a single file… good luck. If it were somehow searchable, the massive influx of queries would likely result in a huge Denial-of-Service incident. The searches that are successful would likely have some tragic consequences.

Secondly, any systems that rely on secrecy and privacy would shut down to avoid a massive influx of abusive behaviors. The financial systems we have in place would have to freeze immediately, and modern voting systems would be nullified.

Third, everyone on Earth would have to adapt to the knowledge that was shared, and deal with the resulting consequences as best they could. Any information that can be made invalid, like passwords, should be changed, and others (infidelities and the like) would have to be processed.

This would all be influenced by the likelihood of a repeat incident. If it could repeat, new security protocols would need to be devised, and society would likely see some fundamental changes in response. Otherwise, life would continue, with a few hurdles as new tidbits from the disclosure came to light.

Expectation: Unification

Finally, another theory posited that—contrary to what might be assumed—complete disclosure would ultimately bring people closer together. In many ways, this theory is like the one we reviewed first. This one just skips over the outrage.

In a way, this makes sense. After all, if you were suddenly made aware that someone in your life had x, y, and z secrets, while your secrets q, r, and s were revealed at the same time, the social balance wouldn’t likely shift all that much. Furthermore, these secrets being exposed could ultimately help to resolve many of them. The endgame here would be an increase in common ground between people.

The Importance of Secrets Today

Of course, because we still have personal data, it is important that you do everything you can to protect that which your business has collected from its clients and staff. White Mountain IT Services is here to help you implement the security solutions and best practices that help to prevent you becoming the cause of a data leak.

To learn more about what we can do, give our team a call at 603-889-0800.

Related Posts

Today’s headlines are dominated by stories of major companies getting hacked, making the average computer user feel uneasy about their security. If you’re solely dependent on a measly password to protect you from hackers, then you’ve got good reason ...
Your business’s data is one of the most important assets your company has, and with the bat of an eyelash, it could all be gone. Imagine an unexpected hardware failure causing your business downtime and severe data loss. All businesses should be awar...
You can’t have IT without information, you can’t have information without data, and technology is what creates data so that you can better use your company’s technology to increase sales. Got it? Understanding the flow of data can be confusing. It’s ...
Unless you have been vigilant about covering your digital tracks, you’ve likely got your personal information floating all over cyberspace and it’s being used for who knows what. Most of this personal data is used for marketing purposes, but hackers ...
People use and reuse old passwords time and again, and then they get two-factor authentication to augment their fifteen-character passwords. Wouldn’t it be great if your computer could recognize you just by how well you recognize others?...
Your organization is constantly at risk of being attacked by malicious entities. This is a fact that modern businesses have to live with. If this is the first time you’re seriously contemplating cyber security, you need to take all potential options ...
For all of you who have Windows 10, you probably have realized that it is, without a doubt, one of the most refined versions of the Windows operating system released by Microsoft in recent years. In a way, it takes the best aspects of Windows 7, comb...
Since you run a business, you know that your business’s network requires a secure firewall in order to keep threats out. In fact, the firewall is the most basic of security protocol that you should be taking advantage of. Knowing what a firewall prot...
The Internet of Things is constantly growing. Seemingly every commercially-available product now has a corresponding app or some sort of connectivity to the web. As this entity grows bigger still, you begin to see things that have very little intrins...
Most of your business’ technology is a direct result of your need to quickly and securely disseminate information. While there are solutions meant to improve efficiency peppered in there, the vast majority of IT solutions are designed to create, shar...
There’s a reason why IT professionals think that the Internet of things is a major security discrepancy. Around 5.5 million new devices are being connected to the Internet every day, and are giving security experts a run for their money. The Internet...
Getting hacked is a scary occurrence. It’s a major reason why you have security measures put into place. You try to avoid it as much as you can, but getting outsmarted by hackers happens to the best of us. The good news is that as long as you approac...

Onsite Service Coverage Area

Although we provide remote services and support to businesses in over 20 states, onsite services are limited to within reasonable driving distance from our office in NH.  For locations outside of our service area, we will manage a local vendor to provide onsite assistance when needed.

 

Onsite Computer Support Services are available to businesses within 100 miles of Nashua New Hampshire. We have excellent onsite coverage from Concord NH, south through Manchester NH, and then down into Boston. From Northern and Central Mass, we cover from Worcester, east to the North Shore, including the Salem and Portsmouth NH area.

 

White Mountain IT Services
33 Main Street, Suite 302
Nashua, New Hampshire 03064

 

603-889-0800

map nashua4 1

 

Open Positions