We Live In A Transient Internet

One of the original purposes of the early Internet, beyond endless information, chat rooms and porn, was its offer of anonymity and privacy. Today, the role of Internet is as a remote tool designed for the kind of conversation you might have in a public house or cafe, which could be both highly personal and private and you hope nobody is listening in. 

Posting, sharing, then your thoughts and messages disappearing, was part of the fundamental appea for millions of users. Not any more.

The Internet, cloud computing and the evolution of social networks has led to a significant transition. We have now moved from carrying paper images around, to having digital ones on our smartphone and the smartphone has taken over from the camera. 

As time went on and more of ourselves were placed online, the need to erase our digital paper trail grew at the same rate as our inability to do so. The modern Internet's capacity for privacy has dissolved with the arrival of mainstream social media and the  appeal it has for creating a personal shop window. 

The evolution of social media has been fueled by the human impulse to communicate is a story about using technology to establish personal connections at massive scale. By the time Snapchat launched in the autumn of 2012, the itch for a return to the ephemeral disappearing Internet was prevalent. Eight years later, Snapchat is really a messaging service on steroids, with all the benefits of a real conversation, visual stimulus, speed, and the contents being left to human memory. 

What Snapchat unlocked was a desperate desire for users to not have their digital actions follow them around, fulfilling the wish that your posts need not  live on in your timeline forever. 

Through fulfilling this need, Snapchat and others like it unlocked a new era of disappearing content, in stark contrast to   most mainstream platforms, where content in your timeline is almost impossible to expunge - as anybody who has ever tried to close their Facebook account can tell you.

Fulfillment of this need  lies behind the latest initiative from Twitter  with their new “fleets”  - posts that, like Instagram Stories, disappear after 24 hours. Fleets are so named because they are fleeting - the work of a moment.  They sit at the top of your mobile screen and can display pictures or screenshots of tweets users feel deserve a second showing and then they are gone. 

Twitter is a platform that is frequently accused of a powerful source of misinformation and abuse, largely because because the evidence is so easily accessible. Journalists and fact checkers can easily report on Twitter’s many trends because they are so readily available. Twitter data is searchable and can  be quickly aggregated. It can derive thousands of results from a single word search.

Twitter is also the biggest megaphone for some of the world’s most powerful people including Donald Trump who, without editorial mediation, can tweet whatever he wants, even with some warnings about his message content inserted by Twitter .But with Fleets, Twitter has created a new opportunity for for its more questionable users to do their work far less publicly.

The implications of un-traceability for dangerous people, dangerous ideas and those who hold power are now crystallised on the platform where they are given an unchecked voice.

Social media is great for making friends and exploring interests, it is also great for radicalising lonely young people and spreading misinformation that can cost lives. The problem may not be struggling to find disappearing content from popular accounts, but that the millions of small accounts whose tweets are traceable will be able to post the same content while making it impossible to track the mass effect. 

Fleets may just become another ill-conieived andely-used feature. and may eventually be undone simply because in the end nobody uses them. The important question is who benefits the most out of our posted content automatically disappearing. Is it the normal people who don’t want to be plagued by every online action, particularly those who’ve had access to social media their entire lives? Or, will it be those malicious users who are already twisting the Internet into their own version of reality, who have made misinformation and abuse normal. 

Some of the dangerous ideals popularised in the last decade began in online spaces free of personal accountability. The hope to be free of our digital footprint and to be afforded true privacy is a valid wish. However, the capacity for co-option when everything online becomes impermanent will never not exist.

This complexity will only be untangled if we start honestly answering the question: Who wins most on the ephemeral Internet? Do the benefits outweigh the costs?  These are serious questions for the next generation to deal with as the Internet’s effects on fake news and the financial problems for the established publishing companies, who are losing the commercial ability to produce real truth in news. 

New Statesman:        Forbes:          AE Daily:      Maryville University

You Might Also Read: 

Coming Soon: Regulation Of Social Media

Facebook Fights Fake News - Poorly:

 

« In The Age of Risk, Cyber Security Is The Leading Concern
The Cause Of Amazon’s Cloud Outage »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Defense Advanced Research Projects Agency (DARPA)

Defense Advanced Research Projects Agency (DARPA)

DARPA's mission is to develop breakthrough technologies for national security. The Information Innovation Office undertakes cyber security activities.

Netsparker

Netsparker

Netsparker provide a web application security scanner to automatically find security flaws in your websites, web applications and web services.

Materna Radar Cyber Security

Materna Radar Cyber Security

Radar Cyber Security is the only European supplier of Managed Detection & Response who provides its services based on inhouse developed technology.

Cybertech

Cybertech

Cybertech Conference & Exhibition presents commercial problem solving strategies and solutions for the global cyber threat that meet the diverse challenges for a wide range of sectors.

360 Total Security

360 Total Security

360 company is the largest provider of Internet and mobile security products in China.

Savanti Consulting

Savanti Consulting

Savanti provides practitioner-led cyber security services tailored to meet each organisation’s unique requirements.

Zerodium

Zerodium

Zerodium is the leading exploit acquisition platform for premium zero-days and advanced cybersecurity research.

Conduent

Conduent

Conduent delivers mission-critical technology services and solutions on behalf of businesses and governments. Solution areas include digital risk and compliance.

Drootoo

Drootoo

Drootoo is transforming businesses and making them high performing entities with its unified cloud platform.

WithSecure

WithSecure

WithSecure (formerly F-Secure Business) is your reliable cyber security partner, providing outcome-based cyber security that protects and enables operations.

443ID

443ID

443ID brings OSINT data to Identity Security professionals on any digital platform.

Fusion Cyber

Fusion Cyber

Fusion Cyber educates students in Zero Trust Risk Management, Defense, and Cyber Offense that lead to taking industry-accepted cybersecurity certifications.

Intelequia

Intelequia

Intelequia SOC is the Security Operations Center your company needs. 24x7 monitoring, protection and automated response to cyber threats.

Mindcore Technologies

Mindcore Technologies

Mindcore provide cyber security services, managed IT services and IT consulting services to businesses in NJ, FL, and throughout the United States.

Nordic Defender

Nordic Defender

Nordic Defender is the first crowd-powered modern cybersecurity solution provider in the Nordic region.

Qryptonic

Qryptonic

Qryptonic pioneers next-generation cybersecurity by leveraging the unparalleled capabilities of quantum computing to defend against evolving threats.