Can You Trust Centralized Big Tech?

Apple Decentralization Facebook Privacy
Ad Disclosure
Ad Disclosure

We believe in full transparency with our readers. Some of our content includes affiliate links, and we may earn a commission through these partnerships. However, this potential compensation never influences our analysis, opinions, or reviews. Our editorial content is created independently of our marketing partnerships, and our ratings are based solely on our established evaluation criteria. Read More
Last updated:
Ad Disclosure
Ad Disclosure

We believe in full transparency with our readers. Some of our content includes affiliate links, and we may earn a commission through these partnerships. However, this potential compensation never influences our analysis, opinions, or reviews. Our editorial content is created independently of our marketing partnerships, and our ratings are based solely on our established evaluation criteria. Read More
Author
Laurin Weissinger
Author Categories
About Author

Last updated:
Why Trust Cryptonews
Cryptonews has covered the cryptocurrency industry topics since 2017, aiming to provide informative insights to our readers. Our journalists and analysts have extensive experience in market analysis and blockchain technologies. We strive to maintain high editorial standards, focusing on factual accuracy and balanced reporting across all areas - from cryptocurrencies and blockchain projects to industry events, products, and technological developments. Our ongoing presence in the industry reflects our commitment to delivering relevant information in the evolving world of digital assets. Read more about Cryptonews
Ad DisclosureWe believe in full transparency with our readers. Some of our content includes affiliate links, and we may earn a commission through these partnerships. Read more
Source: iStock/Nikada

Laurin Weissinger, Lecturer in Cybersecurity, Tufts University.
____

Apple’s plan to scan customers’ phones and other devices for images depicting child sexual abuse generated a backlash over privacy concerns, which led the company to announce a delay.

Apple, Facebook, Google and other companies have long scanned customers’ images that are stored on the companies’ servers for this material. Scanning data on users’ devices is a significant change.

However well-intentioned, and whether or not Apple is willing and able to follow through on its promises to protect customers’ privacy, the company’s plan highlights the fact that people who buy iPhones are not masters of their own devices. In addition, Apple is using a complicated scanning system that is hard to audit. Thus, customers face a stark reality: If you use an iPhone, you have to trust Apple.

Specifically, customers are forced to trust Apple to only use this system as described, run the system securely over time, and put the interests of their users over the interests of other parties, including the most powerful governments on the planet.

Despite Apple’s so-far-unique plan, the problem of trust isn’t specific to Apple. Other large tech companies also have considerable control over customers’ devices and insight into their data.

What is trust?

Trust is “the willingness of a party to be vulnerable to the actions of another party,” according to social scientists. People base the decision to trust on experience, signs and signals. But past behavior, promises, the way someone acts, evidence and even contracts only give you data points. They cannot guarantee future action.

Therefore, trust is a matter of probabilities. You are, in a sense, rolling the dice whenever you trust someone or an organization.

Trustworthiness is a hidden property. People collect information about someone’s likely future behavior, but cannot know for sure whether the person has the ability to stick to their word, is truly benevolent and has the integrity – principles, processes and consistency – to maintain their behavior over time, under pressure or when the unexpected occurs.

Trust in Apple and Big Tech

Apple has stated that their scanning system will only ever be used for detecting child sexual abuse material and has multiple strong privacy protections. The technical details of the system indicate that Apple has taken steps to protect user privacy unless the targeted material is detected by the system. For example, humans will review someone’s suspect material only when the number of times the system detects the targeted material reaches a certain threshold. However, Apple has given little proof regarding how this system will work in practice.

After analyzing the “NeuralHash” algorithm that Apple is basing its scanning system on, security researchers and civil rights organizations warn that the system is likely vulnerable to hackers, in contrast to Apple’s claims.

Critics also fear that the system will be used to scan for other material, such as indications of political dissent. Apple, along with other Big Tech players, has caved to the demands of authoritarian regimes, notably China, to allow government surveillance of technology users. In practice, the Chinese government has access to all user data. What will be different this time?

It should also be noted that Apple is not operating this system on its own. In the US, Apple plans to use data from, and report suspect material to, the nonprofit National Center for Missing and Exploited Children. Thus, trusting Apple is not enough. Users must also trust the company’s partners to act benevolently and with integrity.

Big Tech’s less-than-encouraging track record

This case exists within a context of regular Big Tech privacy invasions and moves to further curtail consumer freedoms and control. The companies have positioned themselves as responsible parties, but many privacy experts say there is too little transparency and scant technical or historical evidence for these claims.

Another concern is unintended consequences. Apple might really want to protect children and protect users’ privacy at the same time. Nevertheless, the company has now announced – and staked its trustworthiness to – a technology that is well-suited to spying on large numbers of people. Governments might pass laws to extend scanning to other material deemed illegal.

Would Apple, and potentially other tech firms, choose to not follow these laws and potentially pull out of these markets, or would they comply with potentially draconian local laws? There’s no telling about the future, but Apple and other tech firms have chosen to acquiesce to oppressive regimes before. Tech companies that choose to operate in China are forced to submit to censorship, for example.

Weighing whether to trust Apple or other tech companies

There’s no single answer to the question of whether Apple, Google or their competitors can be trusted. Risks are different depending on who you are and where you are in the world. An activist in India faces different threats and risks than an Italian defense lawyer. Trust is a matter of probabilities, and risks are not only probabilistic but also situational.

It’s a matter of what probability of failure or deception you can live with, what the relevant threats and risks are, and what protections or mitigations exist. Your government’s position, the existence of strong local privacy laws, the strength of rule of law and your own technical ability are relevant factors. Yet, there is one thing you can count on: Tech firms typically have extensive control over your devices and data.

Like all large organizations, tech firms are complex: Employees and management come and go, and regulations, policies and power dynamics change.

A company might be trustworthy today but not tomorrow.

[Over 100,000 readers rely on The Conversation’s newsletter to understand the world. Sign up today.]

Big Tech has shown behaviors in the past that should make users question their trustworthiness, in particular when it comes to privacy violations. But they have also defended user privacy in other cases, for example in the San Bernadino mass shooting case and subsequent debates about encryption.

Last but not least, Big Tech does not exist in a vacuum and is not all-powerful. Apple, Google, Microsoft, Amazon, Facebook and others have to respond to various external pressures and powers. Perhaps, considering these circumstances, greater transparency, more independent audits by journalists and trusted people in civil society, more user control, more open-source code and genuine discourse with customers might be a good start to balance different objectives.

While only a first step, consumers would at least be able to make more informed choices about what products to use or buy.The Conversation

This article is republished from The Conversation under a Creative Commons license. Read the original article.

___
Learn more:
NFT Insider Trading On OpenSea Highlights Benefits of Decentralization 
Decentralization in Crypto Is a Hard to Measure Ideal 

Web 3.0 Is Coming, and Crypto Will Be Essential to It 
Facebook Launches USD 50M Investment In Metaverse Research, Partnerships

Turn Your Own Bitcoin Node, Urge Bitcoiners as Chainalysis Reportedly Set a Trap 
How Countries Use Digital ID to Exclude Vulnerable People 

More Articles

Industry Talk
Meme Coin Market Plunges, But Could This Be the Setup for an Explosive Rebound?
Alejandro Arrieche
Alejandro Arrieche
2025-02-06 16:47:46
Features
Can Ondo’s Global Markets Take on Giants Like BlackRock in Tokenized RWA Race?
Olga Primakova
Olga Primakova
2025-02-06 16:46:37
Crypto News in numbers
editors
Authors List + 66 More
2M+
Active Monthly Users Around the World
250+
Guides and Reviews Articles
8
Years on the Market
70
International Team Authors