The Value of Data

Discover why data privacy is crucial in today's digital world.

2/1/20242 min read

Data is now the most valuable commodity in the world. It is how big tech giants such as Google and Meta make profits. They collect our data as we use their "free" products, and then sell it to the highest bidder. Even if they stopped selling it, they would still save it for their own internal marketing purposes. This alone is a major risk because data leaks and hacks are inevitable. Sooner or later your personal data is going to end up somewhere you don't want it.

The Equifax hack of 2017 is a great example of how insecure our private data is. Equifax is one of the 3 large credit reporting bureaus in the United States. They gather and store the credit history of almost every single American, and in 2017 they got hacked and half of all Americans had their private data stolen (https://www.fbi.gov/news/stories/chinese-hackers-charged-in-equifax-breach-021020).

We don't like that our data is so carelessly gathered, stored, and traded as though our privacy isn't important.

Below is some of the data that big tech collects from you (if you're using default settings):

Microsoft (Source: https://privacy.microsoft.com/en-us/data-collection-windows)

  • - Keystrokes and recordings

  • - Browsing history and search term history

  • - What apps you use and how often

  • - Device manufacturer, device settings, network scans, and details about other peripherals.

  • - Alternative Options: LINUX or any other open source operating system

Google (Source: https://www.security.org/resources/data-tech-companies-have/)

  • - Name, phone number, payment information, email addresses and send/recieve history, uploaded photos, videos, and files, Google reviews and Youtube comments.

  • - IP address and other network info, system activity, URL request history, information about apps you have installed and use, purchases you make, GPS data, sensor data.

  • - Alternative Options: DuckDuckGo, Rumble, GrapheneOS, CalyxOS, or any other opensource / small tech options. Proton for email, calander, and cloud storage.

Facebook / Meta (Source: https://www.security.org/resources/data-tech-companies-have/)

  • - Name, phone number, payment information, email addresses, pictures / videos (along with their meta data such as date and location of the picture / video), messages you send and recieve, content you view, ads you interact with, your contacts and communication history, time / frequency / duration of use.

  • - IP address, sensor data, network details.

  • - Alternative Options: NOSTR based apps, Mastodon, EBAY, Craigslists

Amazon (Source: https://www.security.org/resources/data-tech-companies-have/)

  • - Name, username, password, phone number, payment information, physical address, social security number, drivers license number, email address, search history, movies / videos watched, purchase history, reviews you make.

  • - IP address, browser type, operating system, GPS data, sensor data.

  • - Alternative Options: Shop in person at local small businesses and pay with cash.

Apple (Source: https://www.security.org/resources/data-tech-companies-have/)

  • - Name, phone number, payment information, email addresses, physical address, email history, search history, time / frequency / duration of activity.

  • - IP address and other network details, device type, operating system, time zone, GPS data.

  • - Alternative Options: Linux, GrapheneOS, CalyxOS, or any other opensource operating systems. Proton for email, calander, and cloud storage.

Twitter (Source: https://www.security.org/resources/data-tech-companies-have/)

  • - Name, username, password, phone number, message history, content / videos viewed, ads you interact with, contact history and communication history, browsing history, time / frequency / duration of use.

  • - IP address and other network details, browser type, device type, carrier name, operating system, time zone, GPS data, privacy settings.

  • - Alternative Options: NOSTR based apps, Mastodon

worm's eye-view photography of ceiling
worm's eye-view photography of ceiling