首页
登录
职称英语
For anyone who is really concerned about keeping their thoughts private there
For anyone who is really concerned about keeping their thoughts private there
游客
2025-03-26
21
管理
问题
For anyone who is really concerned about keeping their thoughts private there is only one reliable technology: write with a pen on paper, and burn what you’ve written when you’re done. The devices we now carry with us everywhere give us access to various information, but simultaneously offer vast quantities of information about us. Thus, to go online is to descend into a world as transparent as an aquarium (水族箱) that is full of sharks.
It would be a mistake to see these problems as primarily technological, because technological solutions will work only within a legal and political context. The real threats to privacy come not from vulnerable gadgets but weak laws, careless users and feeble oversight. A cruel government would not hesitate to hack into a company’s networks at the first opportunity. And against sufficient cruelty and physical power, technology is ultimately no defense.
Adding to this problem is the increasingly interchangeable border between state and non-state actors. When the FBI could not crack the iPhone used in shootings, it turned to an Israeli private company, which, however, has in turn been hacked, and meanwhile many of the devices designed for use by law enforcement, which can get all the information out of a captured mobile phone, can be bought freely over the Internet by any private company.
These threats can seem very distant, but commercially motivated attacks on privacy fill the whole of the Internet, and in fact fund most of it today. Websites routinely collect as much information as they can about the users and then sell it on to data brokers for use in personally targeted advertising campaigns. Facebook has built its entire titanic empire on this trade. Even when this data is anonymized, the protection is leaky, and someone who knows everything about you except your name is in a much stronger position than one who knows your name but nothing else.
But the real danger comes when these two kinds of loss of privacy combine so that the knowledge gained for commercial ends is used for political manipulation too. It is in the interests of advertisers to short-circuit rational thought and careful consideration, but it is even more in the interests of wicked leaders to do so. Against this we must rely on moral and intellectual defenses much more than the supposed magic of advanced technology. [br] Online information about us can be used politically to______.
选项
A、beat one’s rival during an election
B、help make better decisions
C、keep us from thinking clearly
D、prevent the misuse of any information
答案
C
解析
最后一段第二句的大意是:广告商希望人们无法理性思维和缺乏深思熟虑,这样对他们的业务有利,心术不正的政客有过之而无不及。所以说,政客们不希望人们能理性思维。
转载请注明原文地址:https://www.tihaiku.com/zcyy/4013703.html
相关试题推荐
Foodsafetyisascientificdisciplineconcernedwithhandling,preparation,
Whypastgenerationsregardedwomenastheweakersexisamysterytoanyone
Whypastgenerationsregardedwomenastheweakersexisamysterytoanyone
Whypastgenerationsregardedwomenastheweakersexisamysterytoanyone
Whypastgenerationsregardedwomenastheweakersexisamysterytoanyone
Foranyonewhoisreallyconcernedaboutkeepingtheirthoughtsprivatethere
Theonlything______reallymatterstotheparentsishowsoontheirchildrenc
Oneofthereallynicefeaturesaboute-mailsisthattheyallowustosend
Ireallyappreciate______tohelpme,butIamsurethatIcanmanageitmyself
Accordingtoaconcerned1997articleintheBostonGlobe,theUnitedStates
随机试题
Toourgrief,hebecame______tothedrug.A、addictedB、interestedC、amusedD、di
Nowadaysmoreandmoreforeignenterprisesandcompaniesarenolonger【C1】__
经皮肝穿刺胆管造影(PTC)的禁忌证是()A.深度黄疸 B.怀疑胰头肿瘤压
木材的强度等级是指不同树种的木材按其下列何种强度设计值划分的等级?( )A.抗
信息安全策略应该全面地保护信息系统整体的安全,网络安全体系设计是网络逻辑设计工作
体温特指机体深部(心、肺、脑和腹腔脏器等部位)的平均温度。机体深部的温度通常比较
Lb4Alll8电气工作人员在220kV高压设备区工作时,其正常活动范围与带电
1955年的万隆会议,不仅取得了圆满成功,还促进了中国同亚非各国的团结与合作,主
下列关于抵押物估价的正确说法是()。A.可以由抵押人自行评估 B.可以由债
工程监理企业只能在核定的业务范围内开展经营活动,这里所指的业务范围有()。A.工
最新回复
(
0
)