首页
外语
计算机
考研
公务员
职业资格
财经
工程
司法
医学
专升本
自考
实用职业技能
登录
外语
For anyone who is really concerned about keeping their thoughts private there is only one reliable technology: write with a pen
For anyone who is really concerned about keeping their thoughts private there is only one reliable technology: write with a pen
admin
2019-10-13
101
问题
For anyone who is really concerned about keeping their thoughts private there is only one reliable technology: write with a pen on paper, and burn what you’ve written when you’re done. The devices we now carry with us everywhere give us access to various information, but simultaneously offer vast quantities of information about us. Thus, to go online is to descend into a world as transparent as an aquarium (水族箱) that is full of sharks.
It would be a mistake to see these problems as primarily technological, because technological solutions will work only within a legal and political context. The real threats to privacy come not from vulnerable gadgets but weak laws, careless users and feeble oversight. A cruel government would not hesitate to hack into a company’s networks at the first opportunity. And against sufficient cruelty and physical power, technology is ultimately no defense.
Adding to this problem is the increasingly interchangeable border between state and non-state actors. When the FBI could not crack the iPhone used in shootings, it turned to an Israeli private company, which, however, has in turn been hacked, and meanwhile many of the devices designed for use by law enforcement, which can get all the information out of a captured mobile phone, can be bought freely over the Internet by any private company.
These threats can seem very distant, but commercially motivated attacks on privacy fill the whole of the Internet, and in fact fund most of it today. Websites routinely collect as much information as they can about the users and then sell it on to data brokers for use in personally targeted advertising campaigns. Facebook has built its entire titanic empire on this trade. Even when this data is anonymized, the protection is leaky, and someone who knows everything about you except your name is in a much stronger position than one who knows your name but nothing else.
But the real danger comes when these two kinds of loss of privacy combine so that the knowledge gained for commercial ends is used for political manipulation too. It is in the interests of advertisers to short-circuit rational thought and careful consideration, but it is even more in the interests of wicked leaders to do so. Against this we must rely on moral and intellectual defenses much more than the supposed magic of advanced technology.
The word "aquarium" is mentioned in the first paragraph to emphasize that______.
选项
A、the Internet can provide various information
B、there is always easy access to the Internet
C、there is little that is secret online
D、our information online is well protected
答案
C
解析
文章第一段最后一句涉及一个句式to do…is to do…,表示“做……就等于(无异于)……”,如to visit this ancient town today is to take a trip back in time(今天参观这个古镇感觉就像时光倒流)。文章中这句话的大意是:上网就等于进入一个像水族箱一样透明的世界,而且水族箱里还有鲨鱼。这表明用户无法掩饰任何隐私,而且危机四伏。
转载请注明原文地址:https://www.kaotiyun.com/show/3XHO777K
0
研究生英语学位课统考(GET)
相关试题推荐
TheUnitedNationsPopulationFundhaspickedOctober31asthedaytheworldwillbehometo7billionpeople.Forbettera
Ifsustainablecompetitiveadvantagedependsonwork-forceskills,Americanfirmshaveaproblem.Humanresourcemanagementisn
WhenIdecidedtoquitmyfulltimeemploymentitneveroccurredtomethatImightbecomeapartofanewinternationaltrend.
Verysoon,unimaginablypowerfultechnologieswillremakeourlives.Thiscouldhavedangerousconsequences,especiallybecause
Mainstreampro-marketeconomistsallagreethatcompetitionisan______spurtoefficiencyandinnovation.(厦门大学2014年试题)
Managementoperatesthroughvarious______,oftenclassifiedasplanningorganleading/motivatingandcontrolling.(中国人民大学2010年试题
ThefirsteditionofThomasKuhn’s"TheStructureofScientificRevolutions"appearedin1962.【T1】Hisvisionrevolutionizedthe
Unfortunately,hisdamagingattacksontheramificationsoftheeconomicpolicyhavebeen______byhiswholeheartedacceptanceo
A、Tobecomeanintern.B、Tochallengetraditions.C、Tostartupherownbusiness.D、Togetafull-timejob.D男士说:Nicole在一家新创业的公司
A、Sheisgoingtobefired.B、She’llhavehersalaryraised.C、Sheissatisfiedwithherpay.D、Shecan’tgetapayrisenow.D女
随机试题
杀死炭疽芽孢杆菌的芽孢可采用1:2500________浸泡或干烤________℃3h。
e国电子商务网站的订单处理系统是建立在_________平台上,而数据库采用的________数据库,服务器是_______系列。该网站承诺_________小时送货到位,送货员的主要交通工具是_________。
Whatcouldbecuterthanyourpuppygivinghisdoggyfriendakissonthenose?Nothing,really.Butisyourdogactuallyplanti
A.月经黄体细胞B.妊娠黄体细胞C.胚泡滋养层细胞D.胎盘绒毛合体滋养层细胞妊娠10周前,血中孕激素是来自
某家长带一个2岁男孩来门诊检查身体发育各项情况。
背景资料:某水利枢纽工程2004年5月进行引水隧洞施工开挖时,隧洞处于高地应力区的脆硬完整岩体中,岩体中形成很高的初始应力。由于形成初始应力场的因素错综复杂,承包商在开挖前的实测和试验工作的深度不够,岩体开挖后出现自由边界,切向应力剧增,能量高度
按照《中华人民共和国会计法》的规定,记账人员与经济业务事项和会计事项的()人员的职责权限应当明确,并相互分离、相互制约。
皮日休《汴河怀古》诗:“尽道隋亡为此河,至今千里赖通波。若无水殿龙舟事,共禹论功不较多。”可见作者认为大运河的开凿()。
关于因特网中主机名和IP地址的描述中,正确的是()。
YouarerequiredtowritealetterforcomplaintaccordingtothefollowinginformationgiveninChinese.Donottranslateword
最新回复
(
0
)