首页
外语
计算机
考研
公务员
职业资格
财经
工程
司法
医学
专升本
自考
实用职业技能
登录
外语
For anyone who is really concerned about keeping their thoughts private there is only one reliable technology: write with a pen
For anyone who is really concerned about keeping their thoughts private there is only one reliable technology: write with a pen
admin
2019-10-13
80
问题
For anyone who is really concerned about keeping their thoughts private there is only one reliable technology: write with a pen on paper, and burn what you’ve written when you’re done. The devices we now carry with us everywhere give us access to various information, but simultaneously offer vast quantities of information about us. Thus, to go online is to descend into a world as transparent as an aquarium (水族箱) that is full of sharks.
It would be a mistake to see these problems as primarily technological, because technological solutions will work only within a legal and political context. The real threats to privacy come not from vulnerable gadgets but weak laws, careless users and feeble oversight. A cruel government would not hesitate to hack into a company’s networks at the first opportunity. And against sufficient cruelty and physical power, technology is ultimately no defense.
Adding to this problem is the increasingly interchangeable border between state and non-state actors. When the FBI could not crack the iPhone used in shootings, it turned to an Israeli private company, which, however, has in turn been hacked, and meanwhile many of the devices designed for use by law enforcement, which can get all the information out of a captured mobile phone, can be bought freely over the Internet by any private company.
These threats can seem very distant, but commercially motivated attacks on privacy fill the whole of the Internet, and in fact fund most of it today. Websites routinely collect as much information as they can about the users and then sell it on to data brokers for use in personally targeted advertising campaigns. Facebook has built its entire titanic empire on this trade. Even when this data is anonymized, the protection is leaky, and someone who knows everything about you except your name is in a much stronger position than one who knows your name but nothing else.
But the real danger comes when these two kinds of loss of privacy combine so that the knowledge gained for commercial ends is used for political manipulation too. It is in the interests of advertisers to short-circuit rational thought and careful consideration, but it is even more in the interests of wicked leaders to do so. Against this we must rely on moral and intellectual defenses much more than the supposed magic of advanced technology.
The main idea of this passage is that______.
选项
A、the safety of our online information is at risk
B、the Internet has advantages and disadvantages
C、advanced technology can keep our privacy safe
D、online information can be a good source of income
答案
A
解析
本文重点关注个人网上信息的安全,指出了问题的根源,告诫用户提防危险。
转载请注明原文地址:https://kaotiyun.com/show/JXHO777K
0
研究生英语学位课统考(GET)
相关试题推荐
ThemiserablefateofEnron’semployeeswillbealandmarkinbusinesshistory,oneofthoseawfuleventsthateveryoneagreesm
Bothversionsofthemyth—theWestasaplaceofescapefromsocietyandtheWestasastageonwhichthemoralconflictsconf
Bythemid-nineteenthcentury,theterm"ice-box"hadenteredtheAmericanlanguage,buticewasstillonlybeginningtoaffect
It’saroughworldoutthere.Stepoutsideandyoucouldbreakalegslippingonyourdoormat.Lightupthestoveandyoucould
Afterthegovernor’sthirdtriptooverseas,voterscomplainedthathewaspayingtoolittleattentionto______affairs.
Emailisaconvenient,highlydemocraticinformalmediumforconveyingmessagesthat______welltohumanneeds.(北京航空航天大学2016年试题)
Itwilltakeustwentyminutestogettotherailwaystation,______trafficdelays.
Themostexcitingkindofeducationisalsothemostpersonal.Nothingcan【C1】______thejoyofdiscoveringforyourselfsomethin
Themostconvincingevidencefortheimportanceofadultinfluenceonachild’sintelligencecomesfromastudyof""atrisk""c
Theamazingsuccessofhumansasa【C1】______istheresultoftheevolutionarydevelopmentofourbrainswhichhasled,amongoth
随机试题
湿式系统在准工作状态时,由消防水箱或稳压泵、气压给水设备等稳压设施维持管道内充水的压力。()
Theageofgildedyouthisover.Today’sunderthirtiesarethefirstgenerationforacenturywhocanexpectalowerlivingsta
Forthispart,writingaparagraphinabout100-120wordsbasedonthefollowingsituation.RemembertowriteitclearlyonANS
与急性血吸虫病鉴别的疾病主要包括
慢性支气管炎患者的植物神经功能失调表现为
放坡基坑施工中,常用的护坡措施有()等。
某社区靠近市郊,绿树成荫,风景秀丽,居民生活非常惬意。但是,商业经济的发展逐渐影响着这里。为了给日益增多的汽车让路,路旁的绿化树被无情砍伐,一个接一个的建筑施工使附近的居民深受噪音、粉尘等的困扰,昔日颇有韵味的古建筑被商业区代替。宁静美丽的社区逐渐被繁杂与
以下不属于定性研究常用方法的是( )。
某教师想激发学生对高中政治的学习兴趣和热情,依据课程资源开发与利用的相关理论,请给该教师提几条建议。
Today,airtravelisfarsaferthan【B1】______acaronabusymotorway.Butthereisadangerthatgrowseveryyear.Fromthemom
最新回复
(
0
)