Big Mother Vs Big Brother
"Collect everything, it is all about the data" I say.
But with this data one can often fall into being ‘big brother’; controlling and influencing without your knowledge or consent.
I like to think that you can build “big mother" systems vs ‘big brother’.
Big mother, is empowering, humane, protective, augmenting your abilities, ultimately making you and your life better.
Big Mother:
- Asks for permission.
- Defaults as ‘opt out’ vs ‘opt in’
- Is transparent, and open
- protects your data
- Annonomizes and aggregates as much as possible.
- No single root user should be able to fully access everything, there should be layers of encryption, hashing, logging, key management, and/or other techniques to protect even your shadow behavior information.
- Uses only what it needs for the capability it is providing. (though it may capture more for anonymous and aggregation use)
Big mother systems can still have creepy unintended consequences, but they try to keep the basic ethos of protecting, vs exploiting the user.
Unintended consequences are impossible to predict. Much rests on the shoulders of the staunch ethics and efforts of our system admins, developers and network engineers to build and maintain big mother systems vs big brother.
Original Linkedin Post: http://bit.ly/2JRbvEX