ClearView IT Blog

ClearView IT has been serving the Phoenix area since 2005, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

What If All Data Was Leaked at Once?

What If All Data Was Leaked at Once?

When you take a long look at cybersecurity, you need to understand that the main purpose of it is to protect people’s ideas, people’s identities, and people’s effort. It isn’t all about protecting money, even though that obviously is a consideration. This notion led us to a thought experiment that Gizmodo recently undertook: What would happen if all the data stored in the world was suddenly leaked, open for the world to see? We’ve put together some of the responses. 

You Would See Immediate Indignation

One of the experts suggested that an immediate and total loss of data privacy would result in utter chaos. You would see people being fired by the dozen. A large percentage of marriages would fail immediately. The amount of litigation you would see immediately afterward would be incredible, and most people would have their most sensitive moments shared online, creating a culture of shaming. 

After this initial whirlwind, however, something known as the Privacy Paradox would likely stabilize things. The Privacy Paradox, is the theory that people quickly adapt to any new news, even if it is shocking. It’s fair to assume that since everyone would be in the same situation, people would accept the things that would normally be shocking to find out about another person. In a world of no secrets, you may find that you are “normal” compared to people you looked up to. 

People would quickly get tired of scandal, because the morality and ethical norms would be so much different than they are today when most people’s search histories, browser histories, messages, etc. remain private. That’s not to say that people would be accepting of evil deeds, just that the deeds that would be considered immoral or unethical would not be as immoral or unethical when it came out that a large percentage of people participated in the same behaviors.

It’s also fair to assume that the first notion people would have is to look up the data of the people they come into contact with the most, but we posit that most people would immediately look themselves up to see what kind of data they have out there. It doesn’t matter how subversive a person’s dataset would be, it would be shocking for everyone to have to live down their worst actions online as they sift through years and decades of online data. 

Wealth Disparity Would Increase

Another popular opinion amongst the polled group is that the information asymmetry (a situation where one person knows more than the other) would result in relationships that were formed on the basis of trust, to fall apart quickly. In business, this would have dire consequences for many relationships; and it would destroy the idea of a trade secret. This would give the people with more wealth the ability to overtake any business they choose, since intellectual property would be effectively public information. This would result in small businesses failing at an alarming rate and a society where a large percentage would be quickly impoverished. 

Total Societal Entropy

The first part of this has to do with how this massive data dump is presented to people. If it is just dumped on society, it would take millions of years to sift through it, but if it were dumped on society in the form of a giant searchable database, it would be overwhelmed almost immediately. No computing structure in the world could welcome that kind of traffic. 

The second part would be the end of organized society as we know it. The financial institutions, the governments, and any other major private or public institution would have to halt operations immediately to account for all the nefarious activities that would go on. 

The third part would be a complete restructuring of everything. Any security that was mitigated by the giant data dump would have to be rebuilt, which would take years.

What’s worse is that if this happened, people would be in fear of it happening again. It would send society back at least 100 years, but more likely it would either be an extinction event or it would unify society. 

Pretty bleak? Yes. Thankfully, it’s just a conceptual thought experiment. It goes to show how important your privacy is.

Luckily, the horrific event of a massive data dump that would expose all the world’s information is not something that will happen if we have anything to say about it. If you need help securing your business’ data, or to learn more about what we can do to give you options regarding data privacy, call us today at 866-326-7214.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Saturday, 05 July 2025
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Tag Cloud

Tip of the Week Security Technology Best Practices Business Computing Hackers Productivity Software Network Security Privacy Data Cloud Business User Tips IT Support Internet Hardware Innovation Malware Email Hosted Solutions Efficiency Workplace Tips Computer Microsoft Google Collaboration Android Cybersecurity Phishing Business Management IT Services Backup Ransomware Data Backup communications Smartphone Small Business Upgrade Smartphones Microsoft Office Network Mobile Devices Data Recovery Communication Managed IT Services Quick Tips Productivity Social Media VoIP Users Mobile Device Automation Tech Term Facebook Windows 10 Business Continuity Passwords Holiday Covid-19 Disaster Recovery IT Support Browser Apps Managed Service Windows 10 Cloud Computing Outsourced IT Miscellaneous Remote Work Managed Service Provider Internet of Things Data Management Saving Money Operating System Government Gadgets Artificial Intelligence Managed IT services Networking Workplace Strategy Windows App Virtualization WiFi Business Technology Spam Blockchain Mobile Device Management Remote Bandwidth Server Information Encryption Office Budget Two-factor Authentication Office 365 Employee/Employer Relationship Apple Information Technology History Gmail BDR Analytics Wi-Fi Conferencing Access Control Cybercrime Data Security Health Big Data Help Desk Hacking Remote Computing IT Management Training Hacker Cost Management Compliance Employer-Employee Relationship Patch Management Voice over Internet Protocol Document Management Vendor Save Money Remote Monitoring Hiring/Firing Outlook Password BYOD Computing Data loss Vendor Management Money Hard Drive Customer Service Unified Threat Management Firewall Search... Augmented Reality Legal Best Practice Word Mobile Office IBM Applications Data storage Retail Website Alert Managed Services Project Management Vulnerabilities User Monitoring Social Engineering How To Cryptocurrency The Internet of Things Black Market Healthcare YouTube Websites Windows 11 Cleaning Meetings Mobility Robot Chrome Laptop Google Maps Scam Mobile Computing VPN Social Sports SaaS DDoS Twitter Marketing Update Running Cable Law Enforcement End of Support iPhone Printer Education Cortana Data Breach Storage Remote Workers Content Filtering Paperless Office Antivirus Windows 7 Free Resource Maintenance Router Travel Virtual Reality Multi-factor Authentication Office Tips Memory Solutions Start Menu Private Cloud Computer Care Downloads Integration Vulnerability Images 101 Saving Time Display Software as a Service Wireless Technology Politics Settings Bitcoin eWaste Data Protection Machine Learning Computers Employees Telephone Avoiding Downtime Downtime Solid State Drive Safety PowerPoint Holidays Administration Excel Chromebook Drones Presentation Virtual Desktop Experience Cooperation Specifications IT Consultant Tech Terms Automobile Video Conferencing Managed IT Virtual Machines Virtual Assistant Customer Relationship Management Digital How To Computer Repair Co-Managed IT Microchip Entertainment Disaster Flexibility Professional Services Taxes Identity Theft Lithium-ion battery Processor Hack Notifications Managed Services Provider Unified Communications Virtual Private Network Physical Security Processors Google Docs Bluetooth Distributed Denial of Service Current Events HIPAA Touchscreen FinTech Fake News Smart Technology Emergency CES Proxy Server IT Assessment Emails Computer Malfunction Botnet Supply Chain Management Service Level Agreement Value Computing Infrastructure Vendor Mangement Organization Management Samsung Rental Service Cyber security Device security Micrsooft Business Owner Flash Microsoft Excel Uninterrupted Power Supply Smart Devices Wireless Headphones Public Speaking Webcam Remote Working Going Green Telephone Systems Business Cards Business Growth Tech Streaming Media Business Mangement AI Error Tablets Trend Micro Keyboard Transportation Supply Chain Digital Security Cameras Bookmark Electronic Health Records Hard Drives Download Supercomputer Banking Wasting Time Piracy intranet Google Wallet Google Calendar Term Virus Wireless Messenger eCommerce HTML Shortcut Deep Learning Modem Inbound Marketing Motion Sickness Environment Workplace Videos Browsers Surveillance Nanotechnology Heating/Cooling Google Drive Upload Business Metrics Managing Costs Software License Social Networking Hosted Solution Comparison Google Play Windows XP Social Network Books SSID Language Employer/Employee Relationships Scams Electronic Payment Society Knowledge Media Data Analysis Corporate Profile Development Screen Reader Telephony Trends Employer Employee Relationship Virtual Machine Mobile Technology Television Security Cameras Visible Light Communication Reviews Customer Resource management Cabling Reading Optimization Devices Monitors G Suite Teamwork Tip of the week Cables Windows 8 Phone System 2FA Fileless Malware Tablet VoIP Data Storage Gamification Tracking Hypervisor Company Culture Mouse Advertising Shopping Telephone System Staffing Relocation Regulations Displays Medical IT IP Address Web Server Work/Life Balance SQL Server Point of Sale Tech Support Paperless Directions Backup and Disaster Recovery PCI DSS Content Digital Payment Licensing Desktop SharePoint Shortcuts Computer Accessories Gig Economy Electronic Medical Records Worker Humor Accountants Database Azure Business Communications Access In Internet of Things Internet Service Provider Time Management Regulations Compliance Public Cloud Hacks Managed IT Service Network Congestion Be Proactive Health IT Recovery Reliable Computing Memes Equifax Competition Writing Net Neutrality Tactics Hard Drive Disposal Audit Human Resources Spyware LiFi Financial Data Username File Sharing Entrepreneur Freedom of Information Workplace Strategies Redundancy Risk Management Documents Scalability IT Startup Application Addiction Text Messaging email scam Business Intelligence Proactive IT Google Apps Navigation Cache Administrator Unified Threat Management Telework Workers Bring Your Own Device Mobile Security Troubleshooting Microsoft 365 News Smartwatch User Tip Securty Communitications Legislation Procurement Network Management Domains CCTV Music Printing Evernote

Blog Archive

Recent Comments

No comments yet.

Interested In A Free Consultation?