"Why Should I Care About Privacy?"

An often-heard argument against pro-privacy movements is the idea that individuals do not require privacy if they have “nothing to hide.” This misconception is concerning as it implies that those advocating for privacy must have something to conceal or must be engaged in illicit activities. It is important to distinguish between privacy and secrecy. Just as we close the door in the bathroom for privacy, not secrecy, there are aspects of our lives—such as personal health information or sexual behavior—that we prefer to keep private, and that is perfectly acceptable. The desire for privacy is valid and essential to our humanity. Privacy is about asserting your rights over your own information, not about concealing secrets.

In today’s era of digital data exploitation, the importance of your privacy has never been more crucial. Despite some believing it to be a lost cause, it is not. Your privacy is valuable and worth protecting. Privacy holds power, and it is essential that this power is wielded responsibly. At its core, privacy is about human information, which is significant as we understand that controlling human information equates to controlling human beings.

If we value our ability to be genuine, fulfilled, and autonomous individuals, we must prioritize the regulations surrounding our personal information. Much of our contemporary society revolves around information. Whether we are shopping online, consuming news, conducting research, voting, seeking directions, or engaging in any other activity, we rely on information. In an information-driven society, our personal information holds weight, highlighting the importance of privacy.

There is often confusion between the concepts of privacy, security, and anonymity. People may mistakenly criticize products as “not private” when they are actually referring to the lack of anonymity, for instance. It is crucial to grasp the distinctions between them and recognize when each is relevant.

  • Privacy
    Privacy ensures that your data is only accessible to the intended parties. For instance, in the context of an instant messenger, end-to-end encryption maintains privacy by restricting message visibility to the sender and the recipient.

  • Security
    Security involves trusting the applications you utilize, ensuring that the involved parties are authentic and maintaining the safety of those applications. For instance, when browsing the web, security can be ensured through HTTPS certificates (digital certificate that authenticates a website’s identity and enables an encrypted connection).

  • Anonymity
    Anonymity refers to the capability to operate without a consistent identifier. Online, you can achieve this using Tor, which enables browsing the internet with a random IP address and network connection instead of your own.

While these concepts often intersect, various combinations are possible. For many individuals, the ideal scenario occurs when all three concepts align. Achieving this alignment, however, is more challenging than commonly perceived. At times, compromises may be necessary, and that is acceptable. This is where threat modeling becomes essential, enabling informed decision-making regarding the software and services you engage with. A threat model is a structured representation of all the information that affects the security of an application.

Maslow’s hierarchy of needs places emphasis on our fundamental requirements, starting with basic physiological needs, followed by physical safety, and then social belonging. This is often simplified as food, shelter, and love. Many privacy enthusiasts may interpret this as anonymous purchasing options, a ghost address, and a clean alias. For the people who claim to “not care about privacy,” I ask: Are you comfortable putting your SSN & credit card information publicly online? Majority of people would care about those things. So you do care about privacy - it’s now just a matter of scope and how much you do.


  • Image from webhostinggeeks, edited by GoNomad site admin.
1 Like