ClearView IT Blog

ClearView IT has been serving the Phoenix area since 2005, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

What If All Data Was Leaked at Once?

What If All Data Was Leaked at Once?

When you take a long look at cybersecurity, you need to understand that the main purpose of it is to protect people’s ideas, people’s identities, and people’s effort. It isn’t all about protecting money, even though that obviously is a consideration. This notion led us to a thought experiment that Gizmodo recently undertook: What would happen if all the data stored in the world was suddenly leaked, open for the world to see? We’ve put together some of the responses. 

You Would See Immediate Indignation

One of the experts suggested that an immediate and total loss of data privacy would result in utter chaos. You would see people being fired by the dozen. A large percentage of marriages would fail immediately. The amount of litigation you would see immediately afterward would be incredible, and most people would have their most sensitive moments shared online, creating a culture of shaming. 

After this initial whirlwind, however, something known as the Privacy Paradox would likely stabilize things. The Privacy Paradox, is the theory that people quickly adapt to any new news, even if it is shocking. It’s fair to assume that since everyone would be in the same situation, people would accept the things that would normally be shocking to find out about another person. In a world of no secrets, you may find that you are “normal” compared to people you looked up to. 

People would quickly get tired of scandal, because the morality and ethical norms would be so much different than they are today when most people’s search histories, browser histories, messages, etc. remain private. That’s not to say that people would be accepting of evil deeds, just that the deeds that would be considered immoral or unethical would not be as immoral or unethical when it came out that a large percentage of people participated in the same behaviors.

It’s also fair to assume that the first notion people would have is to look up the data of the people they come into contact with the most, but we posit that most people would immediately look themselves up to see what kind of data they have out there. It doesn’t matter how subversive a person’s dataset would be, it would be shocking for everyone to have to live down their worst actions online as they sift through years and decades of online data. 

Wealth Disparity Would Increase

Another popular opinion amongst the polled group is that the information asymmetry (a situation where one person knows more than the other) would result in relationships that were formed on the basis of trust, to fall apart quickly. In business, this would have dire consequences for many relationships; and it would destroy the idea of a trade secret. This would give the people with more wealth the ability to overtake any business they choose, since intellectual property would be effectively public information. This would result in small businesses failing at an alarming rate and a society where a large percentage would be quickly impoverished. 

Total Societal Entropy

The first part of this has to do with how this massive data dump is presented to people. If it is just dumped on society, it would take millions of years to sift through it, but if it were dumped on society in the form of a giant searchable database, it would be overwhelmed almost immediately. No computing structure in the world could welcome that kind of traffic. 

The second part would be the end of organized society as we know it. The financial institutions, the governments, and any other major private or public institution would have to halt operations immediately to account for all the nefarious activities that would go on. 

The third part would be a complete restructuring of everything. Any security that was mitigated by the giant data dump would have to be rebuilt, which would take years.

What’s worse is that if this happened, people would be in fear of it happening again. It would send society back at least 100 years, but more likely it would either be an extinction event or it would unify society. 

Pretty bleak? Yes. Thankfully, it’s just a conceptual thought experiment. It goes to show how important your privacy is.

Luckily, the horrific event of a massive data dump that would expose all the world’s information is not something that will happen if we have anything to say about it. If you need help securing your business’ data, or to learn more about what we can do to give you options regarding data privacy, call us today at 866-326-7214.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Monday, 05 May 2025
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Tag Cloud

Tip of the Week Security Technology Best Practices Business Computing Hackers Productivity Software Privacy Network Security Data Cloud Business User Tips IT Support Internet Hardware Innovation Email Hosted Solutions Malware Efficiency Workplace Tips Computer Google Microsoft Collaboration Android Business Management Phishing Cybersecurity IT Services Backup Data Backup Ransomware communications Smartphone Microsoft Office Upgrade Smartphones Small Business Network Mobile Devices Managed IT Services Communication Data Recovery Productivity Quick Tips Users Social Media VoIP Mobile Device Automation Tech Term Business Continuity Facebook Windows 10 Covid-19 Disaster Recovery Passwords Holiday Managed Service Windows 10 IT Support Browser Apps Cloud Computing Outsourced IT Miscellaneous Data Management Remote Work Internet of Things Managed Service Provider Saving Money Operating System Government Networking Windows Workplace Strategy Artificial Intelligence Managed IT services Gadgets Mobile Device Management Server App Information Virtualization Remote Spam WiFi Business Technology Bandwidth Blockchain Encryption Gmail History Office Apple Two-factor Authentication Employee/Employer Relationship Information Technology Office 365 Budget Conferencing Access Control Big Data Data Security Health Analytics BDR Cybercrime Wi-Fi Employer-Employee Relationship Help Desk Hacking Cost Management Patch Management Vendor Remote Monitoring Remote Computing Document Management Hacker Save Money Voice over Internet Protocol IT Management Compliance Training Search... Website Computing Vendor Management Best Practice Hard Drive Retail Alert Applications Hiring/Firing Legal Project Management Outlook Vulnerabilities Data storage Password Money Customer Service Unified Threat Management Mobile Office Firewall Managed Services Augmented Reality Word Data loss BYOD IBM Router Update Storage The Internet of Things YouTube Data Breach Twitter Paperless Office Law Enforcement Antivirus Laptop End of Support Maintenance User Printer Windows 11 Monitoring Healthcare Chrome Websites Sports Travel Remote Workers Social SaaS Mobility DDoS Virtual Reality Meetings Social Engineering Cryptocurrency Windows 7 Black Market Free Resource Google Maps Scam Mobile Computing iPhone Cleaning Education Cortana Robot How To Marketing Content Filtering VPN Running Cable Solid State Drive Tech Terms Images 101 Co-Managed IT Integration Display Entertainment Processors Managed IT Digital Virtual Assistant Chromebook Drones Employees Automobile Taxes Avoiding Downtime Holidays How To Processor Wireless Technology Microchip Flexibility HIPAA eWaste Cooperation Video Conferencing Physical Security Downtime Virtual Machines Hack Safety Identity Theft Computer Repair Multi-factor Authentication Notifications Start Menu Unified Communications Professional Services Virtual Desktop Downloads Computer Care Google Docs Experience Vulnerability Saving Time Bluetooth Distributed Denial of Service Office Tips Managed Services Provider Software as a Service Private Cloud PowerPoint Memory Data Protection Computers Bitcoin Administration Virtual Private Network Disaster Telephone Presentation Specifications Current Events IT Consultant Politics Machine Learning Settings Lithium-ion battery Excel Solutions Customer Relationship Management Fileless Malware Tablet Smart Devices Business Intelligence G Suite Tip of the week Tracking Company Culture Mouse Business Metrics VoIP Gamification Remote Working Computer Accessories Hosted Solution Telephone System AI Regulations Trend Micro Be Proactive Securty Books Directions Digital Security Cameras Domains Language Backup and Disaster Recovery Electronic Health Records Society Web Server Transportation Digital Payment Desktop Wasting Time SharePoint Content Electronic Medical Records Monitors Worker Accountants eCommerce Visible Light Communication Modem Workplace Strategies Reading Videos Access Database Surveillance Windows 8 Public Cloud Managing Costs Time Management Relocation Health IT Public Speaking Displays Equifax Advertising SSID Streaming Media Audit Media Troubleshooting Work/Life Balance Spyware Tactics Development Tech Support Hard Drive Disposal Employer/Employee Relationships Keyboard File Sharing Virtual Machine Username Redundancy Reviews Hard Drives Startup Optimization Freedom of Information Smart Technology In Internet of Things Navigation 2FA Cache Addiction intranet email scam Teamwork Shortcut Network Congestion Workers Mobile Security Hypervisor Wireless Hacks Unified Threat Management Data Storage Reliable Computing User Tip Shopping Heating/Cooling Writing Legislation Environment News Medical IT Windows XP Printing Evernote Paperless Business Owner Network Management Social Networking CCTV SQL Server Licensing Touchscreen PCI DSS Scalability Emergency Proxy Server Gig Economy Emails Humor Computer Malfunction Fake News Supply Chain Administrator Business Communications Text Messaging Vendor Mangement Service Level Agreement Internet Service Provider Proactive IT Computing Infrastructure Azure Samsung Device security Managed IT Service Bring Your Own Device Management Regulations Compliance Uninterrupted Power Supply Wireless Headphones Memes Webcam Microsoft Excel Workplace Tech Human Resources Inbound Marketing Business Mangement Going Green Net Neutrality Music Business Cards Tablets Staffing Error Financial Data Bookmark Risk Management IP Address IT Scams Botnet Google Calendar Term Google Apps Download Supercomputer Piracy Micrsooft HTML Electronic Payment Rental Service Virus Telework Browsers Smartwatch Flash Nanotechnology Communitications Motion Sickness Microsoft 365 Cables Comparison Google Play Telephone Systems Google Drive Upload Procurement Business Growth Software License Phone System Competition Recovery Social Network FinTech Knowledge Data Analysis CES Corporate Profile Screen Reader IT Assessment Point of Sale LiFi Television Security Cameras Banking Telephony Trends Supply Chain Management Entrepreneur Google Wallet Employer Employee Relationship Mobile Technology Value Customer Resource management Organization Application Deep Learning Cabling Devices Cyber security Shortcuts Documents Messenger

Blog Archive

Recent Comments

No comments yet.

Interested In A Free Consultation?