首页
外语
计算机
考研
公务员
职业资格
财经
工程
司法
医学
专升本
自考
实用职业技能
登录
外语
For anyone who is really concerned about keeping their thoughts private there is only one reliable technology: write with a pen
For anyone who is really concerned about keeping their thoughts private there is only one reliable technology: write with a pen
admin
2019-10-13
74
问题
For anyone who is really concerned about keeping their thoughts private there is only one reliable technology: write with a pen on paper, and burn what you’ve written when you’re done. The devices we now carry with us everywhere give us access to various information, but simultaneously offer vast quantities of information about us. Thus, to go online is to descend into a world as transparent as an aquarium (水族箱) that is full of sharks.
It would be a mistake to see these problems as primarily technological, because technological solutions will work only within a legal and political context. The real threats to privacy come not from vulnerable gadgets but weak laws, careless users and feeble oversight. A cruel government would not hesitate to hack into a company’s networks at the first opportunity. And against sufficient cruelty and physical power, technology is ultimately no defense.
Adding to this problem is the increasingly interchangeable border between state and non-state actors. When the FBI could not crack the iPhone used in shootings, it turned to an Israeli private company, which, however, has in turn been hacked, and meanwhile many of the devices designed for use by law enforcement, which can get all the information out of a captured mobile phone, can be bought freely over the Internet by any private company.
These threats can seem very distant, but commercially motivated attacks on privacy fill the whole of the Internet, and in fact fund most of it today. Websites routinely collect as much information as they can about the users and then sell it on to data brokers for use in personally targeted advertising campaigns. Facebook has built its entire titanic empire on this trade. Even when this data is anonymized, the protection is leaky, and someone who knows everything about you except your name is in a much stronger position than one who knows your name but nothing else.
But the real danger comes when these two kinds of loss of privacy combine so that the knowledge gained for commercial ends is used for political manipulation too. It is in the interests of advertisers to short-circuit rational thought and careful consideration, but it is even more in the interests of wicked leaders to do so. Against this we must rely on moral and intellectual defenses much more than the supposed magic of advanced technology.
The main idea of this passage is that______.
选项
A、the safety of our online information is at risk
B、the Internet has advantages and disadvantages
C、advanced technology can keep our privacy safe
D、online information can be a good source of income
答案
A
解析
本文重点关注个人网上信息的安全,指出了问题的根源,告诫用户提防危险。
转载请注明原文地址:https://kaotiyun.com/show/JXHO777K
0
研究生英语学位课统考(GET)
相关试题推荐
Sexprejudicesarebasedonandjustifiedbytheideologythatbiologyisdestiny.Accordingtothisideology,basicbiological
Anupsurgeofnewresearchsuggestsanimalshaveamuchhigherlevelofbrainpowerthanpreviousthought.Beforedefininganimal
Thatexperiencesinfluencesubsequentbehaviourisevidenceofanobviousbutneverthelessremarkableactivitycalledrememberin
AdamSmith,writinginthe1770s,wasthefirstpersontoseetheimportanceofthedivisionoflaborandtoexplainpartofits
Howmenfirstlearnttoinventwordsisunknown;inotherwords,theoriginoflanguageisamystery.Allwereallyknowisthat
Femaleapplicantstopostdoctoralpositionsingeosciencewerenearlyhalfaslikelytoreceiveexcellentlettersofrecommendat
Myfatherwasanuclearengineer,averyacademically______manwithmultipledegreesfromprestigiousinstitutions.
Thetouchexcitesnodefensiveresponseunlesstheapproachisfromabovewherethespidercanseethemotion,______onitshind
Theamazingsuccessofhumansasa【C1】______istheresultoftheevolutionarydevelopmentofourbrainswhichhasled,amongoth
A、Atacoffeeshop.B、Inthestreet.C、Atone’shome.D、Inarestaurant.C女士说:Max!真是太巧了!我正要给你打电话呢。男士说:我恰巧在附近,所以想顺道来拜访一下。女士说:请进吧,
随机试题
中国封建中央集权专制体制的矛盾主要包括()
A.下颌骨体有大小不等的多房阴影B.下颌骨内有单房透明阴影,四周有白色骨质线C.颌骨内虫蚀状骨质破坏区,四周骨质可有破坏D.下颌角见骨质疏松脱钙,并有骨质增生E.下颌骨体有骨质破坏,并有死骨形成
下列药物中不含升丹的是
背景材料:某跨海大桥,上部结构为9m×50m+9m×50m+12m×50m三联等跨等截面预应力混凝土连续箱梁桥,横向为两个独立的单箱,梁高2.75m,单箱顶面宽为11.30m。箱梁采用移动式模架逐跨施工,整套设备从瑞士某公司引进。施工单位在施工组织设计中
M有限责任公司(以下简称M公司)以人民币作为记账本位币,外币业务采用交易发生日的即期汇率折算,按季计算外币账户的汇兑差额。 (1)M公司2012年第四季度发生以下交易或事项: ①10月8日,收到国外N公司追加的外币资本投资1000万美元,款项于当日
属于听证范围的案件,税务机关应在当事人提出听证要求的()日之内举行听证,并在举行听证的()日前将《税务行政处罚听证通知书》送达当事人。
俄罗斯著名小说《战争与和平》和《安娜·卡列尼娜》的作者是()。
物品运输合理化的重要意义主要体现()。
[*]
PC机中,I/O端口常用的地址范围是( )。
最新回复
(
0
)