Рет қаралды 598,108
🌏 NordVPN deal exclusive to this channel ➼ nordvpn.com/ba...
Get extra months risk-free with Nord's 30-day money-back guarantee! ✌
---
The most important question in my mind is: Will I go to the Sting concert or not? Do I make the decision or just assume it is me? Or… Does big brother really exist? Am I being watched by a machine? Have no doubt. Now each of us has two stories. One is the story we tell ourselves. When we look in the mirror, we tell the story of what we see in ourselves. Our own identity. The other is the story we create in the digital world. Our digital identity.
We only tell some of it, not the whole thing. With what we do on social media, we create our profile with the applications on our mobile phone. Step by step, we write, we draw, we like what others write. If we like it, we share it. See, this is just the first layer. There, we try to show ourselves at our best, but the machine that watches us doesn't buy it. Because these, that is, what we control, do not completely reflect reality. 🙂 The machine is inspecting a second layer to crack our safes. It watches our behavior. Things we don't do consciously. Metadata that we cannot fully control. In fact, the kind of information we probably wouldn't want to share. Like our real-time location. Whether we are in the same house, in the same room, in the same bed with other profiles. What we watch, what we listen to, where we shop... Then it goes even further. For example, it measures our typing speed on the keyboard. It looks at how many mistakes we made. It tracks the order in which we use the numbers and letters, so it can even tell if your mood is depressed or not. There is a third layer beyond these two layers that we control and cannot control. There, these first two are combined and interpreted.
Our data is analyzed by various algorithms and compared with other users' data for meaningful statistical correlations. This last layer, used to unlock the safe, is concerned with not just what we do but, who we are. From our weaknesses, our psychometric profile, our IQ, our family situation, our addictions, our illnesses, whether we're about to break up or vice versa, to the point of our little, tiny obsessions. We are not even aware of them, let alone controlling them. And then I look at it and say, "Oh, Sting is going to give a concert in New York." What a coincidence.I haven't even been listening to him lately. How did this news suddenly appear before me?(!) So what are we going to do? We will protect our digital identity. We will take the necessary measures to protect our privacy. What measures are these? Use Strong and Unique Passwords: Use different and complex passwords for each account. Password managers can make these passwords easier to remember. Use Two-Factor Authentication: Two-factor authentication (2FA) helps further protect your accounts. 2FA requires both a password and a second verification step to log into your account, usually an SMS message or a code generated by an app. Make Updates: Update your devices and apps regularly. Updates usually fix security vulnerabilities. Use VPN: VPN (Virtual Private Network) encrypts your internet connection and hides your IP address so it is more difficult to track your online activities. Use Privacy Browsers and Search Engines: For example, consider using a privacy-focused search engine like DuckDuckGo instead of Google. Also, use browsers that block cookies and trackers. Review Your Social Media Settings: Adjust your privacy settings on social media platforms and only share necessary information.
Protect Your Personal Information: Only share credit card numbers, social security numbers and other personal information with trusted sources.
Be Wary of Phishing Attacks: Beware of scammers who send fake emails and messages to steal your information. Avoid opening emails from unknown sources and approach any site that asks for your information with caution.
---
Researched and Written by: Ögetay Kayalı
Organized and Presented by: Barış Özcan
Edited by: Alperen Çatak
---
The full text of the video and the sources used:
barisozcan.com