We Live In A Transient Internet

One of the original purposes of the early Internet, beyond endless information, chat rooms and porn, was its offer of anonymity and privacy. Today, the role of Internet is as a remote tool designed for the kind of conversation you might have in a public house or cafe, which could be both highly personal and private and you hope nobody is listening in. 

Posting, sharing, then your thoughts and messages disappearing, was part of the fundamental appea for millions of users. Not any more.

The Internet, cloud computing and the evolution of social networks has led to a significant transition. We have now moved from carrying paper images around, to having digital ones on our smartphone and the smartphone has taken over from the camera. 

As time went on and more of ourselves were placed online, the need to erase our digital paper trail grew at the same rate as our inability to do so. The modern Internet's capacity for privacy has dissolved with the arrival of mainstream social media and the  appeal it has for creating a personal shop window. 

The evolution of social media has been fueled by the human impulse to communicate is a story about using technology to establish personal connections at massive scale. By the time Snapchat launched in the autumn of 2012, the itch for a return to the ephemeral disappearing Internet was prevalent. Eight years later, Snapchat is really a messaging service on steroids, with all the benefits of a real conversation, visual stimulus, speed, and the contents being left to human memory. 

What Snapchat unlocked was a desperate desire for users to not have their digital actions follow them around, fulfilling the wish that your posts need not  live on in your timeline forever. 

Through fulfilling this need, Snapchat and others like it unlocked a new era of disappearing content, in stark contrast to   most mainstream platforms, where content in your timeline is almost impossible to expunge - as anybody who has ever tried to close their Facebook account can tell you.

Fulfillment of this need  lies behind the latest initiative from Twitter  with their new “fleets”  - posts that, like Instagram Stories, disappear after 24 hours. Fleets are so named because they are fleeting - the work of a moment.  They sit at the top of your mobile screen and can display pictures or screenshots of tweets users feel deserve a second showing and then they are gone. 

Twitter is a platform that is frequently accused of a powerful source of misinformation and abuse, largely because because the evidence is so easily accessible. Journalists and fact checkers can easily report on Twitter’s many trends because they are so readily available. Twitter data is searchable and can  be quickly aggregated. It can derive thousands of results from a single word search.

Twitter is also the biggest megaphone for some of the world’s most powerful people including Donald Trump who, without editorial mediation, can tweet whatever he wants, even with some warnings about his message content inserted by Twitter .But with Fleets, Twitter has created a new opportunity for for its more questionable users to do their work far less publicly.

The implications of un-traceability for dangerous people, dangerous ideas and those who hold power are now crystallised on the platform where they are given an unchecked voice.

Social media is great for making friends and exploring interests, it is also great for radicalising lonely young people and spreading misinformation that can cost lives. The problem may not be struggling to find disappearing content from popular accounts, but that the millions of small accounts whose tweets are traceable will be able to post the same content while making it impossible to track the mass effect. 

Fleets may just become another ill-conieived andely-used feature. and may eventually be undone simply because in the end nobody uses them. The important question is who benefits the most out of our posted content automatically disappearing. Is it the normal people who don’t want to be plagued by every online action, particularly those who’ve had access to social media their entire lives? Or, will it be those malicious users who are already twisting the Internet into their own version of reality, who have made misinformation and abuse normal. 

Some of the dangerous ideals popularised in the last decade began in online spaces free of personal accountability. The hope to be free of our digital footprint and to be afforded true privacy is a valid wish. However, the capacity for co-option when everything online becomes impermanent will never not exist.

This complexity will only be untangled if we start honestly answering the question: Who wins most on the ephemeral Internet? Do the benefits outweigh the costs?  These are serious questions for the next generation to deal with as the Internet’s effects on fake news and the financial problems for the established publishing companies, who are losing the commercial ability to produce real truth in news. 

New Statesman:        Forbes:          AE Daily:      Maryville University

You Might Also Read: 

Coming Soon: Regulation Of Social Media

Facebook Fights Fake News - Poorly:

 

« In The Age of Risk, Cyber Security Is The Leading Concern
The Cause Of Amazon’s Cloud Outage »

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 8,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Tines

Tines

The Tines security automation platform helps security teams automate manual tasks, making them more effective and efficient.

rPeople Staffing

rPeople Staffing

rPeople provides direct placement in all areas of your organization, including and specializing in Technical and Executive hiring.

Pyramid Computer

Pyramid Computer

Pyramid Computer provides custom enterprise solutions for Industrial PC, Imaging, Network, Security, POS, Indoor Positioning and Automation.

Jumpsec

Jumpsec

Jumpsec provides penetration testing, security assessments, social engineering testing, cyber incident response, training and consultancy services.

ESG Elektroniksystem- und Logistik-GmbH

ESG Elektroniksystem- und Logistik-GmbH

ESG offer a comprehensive portfolio of cyber and IT services ranging from consulting, solutions and operations to testing, simulation and training.

Futurex

Futurex

Futurex is a globally recognized provider of enterprise-class data encryption solutions.

Somansa

Somansa

Somansa is a global leader in Data Security and Compliance solutions designed to protect valuable company information from leakage and help meet regulatory compliance requirements.

Dark Cubed

Dark Cubed

Dark Cubed is an easy-to-use cyber security software as a service (SaaS) platform that deploys instantly and delivers enterprise-grade threat identification and protection at a fraction of the cost.

GOVCERT.lu

GOVCERT.lu

GOVCERT.lu is responsible for the treatment of all computer related incidents jeopardising the information systems of the government and defined critical infrastructure operators in Luxembourg.

IPQualityScore (IPQS)

IPQualityScore (IPQS)

IPQS anti-fraud tools provide a real-time fraud score to analyze how likely a user or visitor is to engage in fraudulent behavior.

Kickstart

Kickstart

Kickstart supports your startup in scaling deep technology businesses in Switzerland in areas such as AI, Blockchain and Cybersecurity.

Real Protect

Real Protect

Real Protect is a Brazilian provider of managed security (MSS) and cyber defense services.

Hawk AI

Hawk AI

Hawk AI’s mission is to help financial institutions detect financial crime more effectively and efficiently using AI to enhance rules and find anomalies.

Netcraft

Netcraft

Netcraft is a global leader in cybercrime detection and disruption, combining cutting-edge technology with decades of experience to protect organizations of all sizes from digital threats and attacks.

Iron Mountain

Iron Mountain

Iron Mountain Incorporated is a global business dedicated to storing, protecting and managing, information and assets.

LevelBlue

LevelBlue

LevelBlue simplify cybersecurity through award-winning managed security services, experienced strategic consulting, threat intelligence and renowned research.

RAH Infotech

RAH Infotech

RAH Infotech is India’s leading value added distributor and solutions provider in the Network and Security domain. We are specialists in Enterprise and App Security and Application Delivery.