Written by Lan 2022 Cohort
Orwell: Keeping an eye on you is a story-rich puzzle game that breaks the fourth wall. In this game, you must be an investigator, using Orwell’s government security system to solve cases. The system can view any trace left by everyone in this country on the Internet, monitor all private communications, and access any computer. With this power, you can discover anyone’s secret without notice. Being in this position sounds pretty awesome, but let’s think differently; what if you are the one that’s been monitored?
The fact is, it happens every day. Nowadays, everything is recorded and uploaded online, whether voluntarily or involuntarily. Personal information is no longer just traditional content such as location and calls records. With the prevalence of electronic payment and face recognition, biometric features such as face ID, iris, and fingerprints have become new personal sensitive information. Once, a face-swapping app called acting with an idol was sought after by netizens. But only one day later, the company was exposed to having taken the uploaded portrait as its own and could use and re-authorize it at will, and it fell from the altar instantly. Some even wondered for a while: Could someone use this to change my face and steal my money?
And even if you don’t use apps that require your personal information, chances are that you can’t avoid the leak of your privacy. Most of the apps on the market are trying to acquire excessive access to permissions. For example, a credit card app used for electronic use has obtained licenses such as location, camera, microphone, and address book, and even an app used to watch videos has also obtained location permissions so that it knows where you are at all times. Some over-obtained sensitive permissions were granted because users did not read the instructions carefully, and some were quietly obtained. Have you ever had such an experience: you were chit-chatting with your friends about a specific item, and the next second, your phone just suggested that exact item to you? The apps are listening and even filming. We’re almost naked on the Internet.
To prevent such things from happening, first of all, laws on Internet privacy should be complemented. Once the law is established, companies must abide by it. On the other hand, it is also essential for Internet users to be aware of protecting their personal information. However, Rome was not built in a day. This requires the endeavour of us all, and I hope that one day, cyber security is no longer a problem.