WhatsApp, Facebook, and the Compromise of Digital Privacy

A case study into the world of digital privacy fell right across my path this week, and it has an unfortunate crossover with a personal incident that has made me consider the consequences of this kind of thing much more closely.

Facebook_Privacy

One of the PhD candidates in the Department of International Development at LSE, Emrys Schoemaker, researches social media uptake in Pakistan and the various consequences that arise when patriarchal societies attempt to integrate these digital platforms into their culture.

Emrys recently contributed to an article in which it was revealed that Pakistani nationals had become caught up in the colourful fad of ‘pride’ profile pictures. A number of men had adopted the rainbow overlay, only to later feel tricked when the real implications of the trend became apparent.

He has also written a short analysis to demonstrate why women in Pakistan prefer using WhatsApp to Facebook.

Facebook is seen to be a much more public channel where profiles and identities are more readily available (and in turn are more easily compromised). WhatsApp, by contrast, is seen to be a more private form of communication – a messaging service rather than a broader networking experience.

colour-gradient-8

Gradients of Public

On the face of it, it seems a little odd to be thinking about the publicness of different forms of social media. Whatever ‘social’ is, it would appear to have public as its main purpose. But when cultures with specific behavioural traditions come to use these systems, their relative publicness becomes important.

It’s an interesting thought. In my latest piece, on Marvell and print, I’m also thinking about a “gradient” of publicness, derived in part from a definition from Harold Love. Love determined that publication was “a move from a private realm of creativity to a public realm of consumption”. Inevitably, there are many different forms that this publicity can take.

At one end of the scale is material that is written for publication and then printed and distributed widely. At the other end of the scale is the otherwise ‘private’ text that may have been shown to one other person (i.e. ceased to be private) but where that is impossible to prove. And there’s a great deal that falls in between.

Clearly, determining the scale of publicness is just as prevalent in the move from print to digital as it was in the widespread move from manuscript to print centuries ago.

The challenge is, of course, where forms of privacy are compromised.

It’s relatively easy to make something more public; it’s far more difficult to make something less public.

And when you feel that this is breached, there will always be consequences.

Shadow Faces

The Strangely Private Consequence

One of the most unpleasant consequences of the digital age is the new opportunities it opens for extortion. Emrys points out that the use of Facebook by women in Pakistan can allow opportunists to manipulate their images for blackmail.

More bizarre, though, is where the consequences are only visible to oneself. One witnesses the loss of public-private sanctity, as well as the processes that have conspired to hatch one’s privacy in the hopes of boasting public social activity.

I’m a cautious animal by habit. I may seem perfectly comfortable in my own social skin, but I am notoriously careful about who sees what (a requirement from LiveJournal days), and I take every precaution against identity compromise.

But it only takes one slip, and many years of caution can erode quickly. Ten days ago, I logged into Facebook using my phone browser rather than the app to retrieve a message that was too old for Messenger to find.

This allowed Facebook to access more than I wanted it to – namely, my WhatsApp history – and (to borrow Love again) a Promethean relevation occurred.

A host of past contacts suddenly became featured friend suggestions. Ouch!

The ironic sting in the tail is that the very reason for logging in this way opened a Pandora’s Box of similar histories: failed dates; tricksters; people who stood me up; radars I fell off; and those who considered me one out of ten.

Suddenly, first-names, nicknames, and numbers that I’d hoped were a distant memory all came flashing back – pushed vividly to the front of my attention, with profiles, identities, and far more information at my fingertips than I would’ve otherwise been privy to.

Reminders of a sorry past. A history of second best.

And there, the flitter between these two apparently different social platforms became very clear to see.

Cherry Blossom

A Brand New Benign Harvester

The questions continue to mount for me.

Are these people now being recommended my profile in the same way? Have they been offered it before?

I’ve never been against ‘interlinkedness’; it fulfils a role in a cyber-connected world.

But as somebody who has a good deal of difficulty in letting go of the past, to have it masqueraded before my eyes because a public networking tool has decided to harvest information from a private one is, at best, challenging, and at worst, catastrophic.

(When you’re not sure whether to laugh or cry, do both. c. 3:40)

Advertisements

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s