this post was submitted on 10 Nov 2023
435 points (95.0% liked)

Technology

59340 readers
6021 users here now

This is a most excellent place for technology news and articles.


Our Rules


  1. Follow the lemmy.world rules.
  2. Only tech related content.
  3. Be excellent to each another!
  4. Mod approved content bots can post up to 10 articles per day.
  5. Threads asking for personal tech support may be deleted.
  6. Politics threads may be removed.
  7. No memes allowed as posts, OK to post as comments.
  8. Only approved bots from the list below, to ask if your bot can be added please contact us.
  9. Check for duplicates before posting, duplicates may be removed

Approved Bots


founded 1 year ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
[–] thehatfox@lemmy.world 2 points 1 year ago (1 children)

how can we realistically protect something we broadcast.

With appropriate privacy laws and security measures. A smartphone is publicly broadcasting information, in that any other person could receive the radio transmissions emitted from them. But such eavesdropping would be illegal in most cases, and is mostly encrypted to hinder bad actors who don’t obey such laws.

It’s important we act now to ensure there are suitable privacy provisions in place now for all biometrics, before such things as mass DNA collection and sequencing are practical. Once such technology is available, perhaps we will also have to adapt our behaviour in public to prevent leakage of unprotected biometric assets.

Time to start advocating for biometric privacy, and investing in bodysuits and hair nets.

you are completely ignoring the fact that a global genetic database is not only in progress, it is inevitable.

you cannot protect something you not only broadcast to the entire world with every breathe, but are also incapable of stopping or encrypting that data, or breaking its chain back to the other humans to which you got yours from.

we absolutely should protect humans from corporations looking to abuse this data, but you need to understand. its public data, and there is zero you can do about its existence or aggregation.