Call me paranoid but I’m that person who rips off and shreds the address and name label off of every package or piece of mail I receive. So what if the movie Identity Thief actually had a happy and endearing ending? No one has the time to drive cross-country to single-handedly, with no police assistance, catch a psychopath who keeps using your credit card.
Anyways, what I’m getting at is the relatively new service of cloud storage sites and their questionable intellectual safety. Large corporations like Google, Apple, and Amazon offer it, as is the focus of this very recent article. My concern with the service resolves around the privacy aspect of it that will inevitably be called into question, and sooner or later into a court of law. Apple, Amazon, and Google are large enough corporations to have put into place high-level security checks to prevent against identity theft and the like. However, despite the underlying security measures that these companies undoubtedly implemented, innovative technology is prone to having numerous flaws and loopholes, especially in its early stages.
We haven’t talked about this in class (yet) but I firmly believe that advances in technology are blending the line between what is private and what is public. They tell you not to post anything on Facebook that you wouldn’t want your future employee to see, or be tagged in any weekend photos you don’t want grandma to stumble upon. Sure, it might be convenient to click one button and share an entire album of your Yorkie puppy with 800 of your closest friends and to access your history essay on every Apple product you own, but in all actuality, is it worth it? With the right knowledge, anything on the Internet can be dug up, even if it was previously “deleted.”
That’s a lot of regretful Instagram pics. Files are uploaded onto a cloud to be saved for personal use, but the internet is nonetheless public and relatively easily accessible to everyone. In addition to over-sharing, there is also the issue of theft that must be taken into consideration. Even with preventative measures, it just still doesn’t seem like the safest way to store important documents. This could be the best defense technique for everything?
Bottom line is, use at your own caution and be sure to do your research about the providers’ user agreements and policies, especially if it’s not the most well known company. Despite all the fancy new ways to chat with your best friend studying abroad in Australia, or the existence of wifi literally everywhere, always treat your blog posts like your grandmother will be reading it.