Jeff Greene, CEO of Trade Desk, an advertising technology company based in Ventura, Calif., said working behind the scenes with major advertising companies is critical to the nature of the web behind the scenes war.
“The Internet answers a question that has been wrestling for decades, namely: How does the Internet pay for itself?” he said.
Target falling can hurt brands that rely on advertising, and people can get their products. It may hurt technology companies like Facebook at first — but not for long. Instead, businesses that can no longer track people but still need to advertise are likely to spend more on their larger technology platforms.
David Cohen, chief executive of product group Interactive Advertising Bureau, said the changes would “make money and focus on Google, Facebook and Twitter”.
Transfers are complicated by the need to keep track of how conflicting Google and Apple’s views are. Apple wants its customers to have the right to pay a premium for the iPhone and stop tracking altogether. But Google executives suggested that the offer be made available to those who have access to purchase Apple products.
For many people, the Internet will begin to differ based on the products they use. In Apple gadgets, ads are only relevant to an individual’s interests, in contrast to targeted ads in Google’s web. Brendan Eich, founder of the private web browser Brave, said website developers can choose to page so that some sites that work well with Google’s browser don’t even load in Apple’s browser.
“It will be a tale of two internets,” he said.
It is dangerous to run businesses that cannot follow change. Just as Netflix charges monthly fees for video streaming, media publishers and weather program apps also charge subscription fees. Some e-commerce sites are considering raising product prices to maintain their profits.
The latest battle in the longest cyber war
Netscape Navigator The Internet has fought many battles since the opening of the web to popular, universal use in the mid-1990s. Internet policy winners know about the “War on Cyber Terrorism”, “War on Cyber Crime”, “Internet Election Interface”, “War on Internet Disinformation” and more. But when Apple announced an effort to help tackle child hunting by automatically reviewing photos taken by iPhone users, a new war recently broke out in an age-old Internet war. The war between activists seeking to curb cyber-child hunting and those for stronger personal privacy has intensified over the past 25 years – as the most recent war has shown – and has not ended.
Parents successfully controlled what their children were allowed to enjoy before the Stone Age, and as children grew into teenagers, conflicts always arise between parents and children. One of the most important factors for parental control – as any parent knows – is to prevent a child from being abused or abused by an adult predator. In the physical world, the parent’s task is complex but straightforward: controlling the child’s physical movements and where they are. Although the origins of telephone and broadcast are relatively direct to parental controls: telephone, radio and television are nationally controlled services, where users rely on relatively large, physical devices. . Thus, relying on service providers and managing access to the child’s TV or telephone equipment is managed. Once navigators and the World Wide Web created the image (later video), it was relatively easy to move, and because of pocket size, cheap smartphones became the primary tool for web users, based on parental controls. The main body law began to change.
Since the mid-1990s, activists and authorities have sought to stop the use of the Internet for child pornography – primarily by banning child pornography and punishing child predators – with new laws, regulations, and stronger law enforcement and cooperation. and involving the participation of technology companies everywhere. Level.
In the decades since Navigator’s introduction, it has gradually become clear that the Internet offers the greatest imaginable opportunity for widespread, electronic tracking of individuals. Old-fashioned phone wiretapping or the occasional close-up circuit TV cameras can’t even come close to the potential of Internet surveillance because for most users, the Internet follows you wherever you go. Web-based services are made up of different layers and components, most of which can be used for independent monitoring.
Edward Snowden unveiled US government Internet surveillance in 2015, gradually revealing the extent of user surveillance by technology companies, and that many non-US governments had comprehensive plans for Internet surveillance, and privacy on the Internet since 2000. Became a popular practice at the beginning of the decade. Activists and privacy officials have called for the cooperation and participation of technology companies at every level, along with new laws and regulations to protect individuals from cyber surveillance.
These separate child protection and privacy interests have clashed time and again, and now we see the latest battle: “Should privacy be compromised to avoid child protection?” or “Should the protection of children from predators be compromised to protect privacy?”
So, when it was announced that iPhone users would automatically begin reviewing photos created by Apple to prevent child abuse by reporting suspicious photos to US law enforcement, the response from privacy advocates was strong and unexpected. This is partly because the iPhone is one of the most popular smartphones in the world, and Apple is looking to differentiate itself from other technology companies as a protector of customer privacy. But the main reason for this is that the new tracking system does not have user approval.
Many child advocates and activists trying to stop child poaching on the Internet see the move as an important step in protecting children from online predators, while at the same time protecting consumer privacy with the use of sophisticated software. do balance. Only photos stored on Apple’s own computer will be scanned automatically. in any other case.
What many privacy advocates today expressed serious concern is that if Apple automatically searches users’ photos for US law enforcement, will law enforcement in other countries (since most iPhones are sold outside the US) do the same? can do? Also, if Apple can automatically scan child pornography, can it automatically scan images for terrorism, sex crimes, and many other crimes? The problem for privacy lawyers is that automatic image scanning for child pornography is limited because once we establish that images are automatically scanned for a subject, governments can use it. To justify the endless list of subjects for automatic scanning. .
Despite the typical war being resolved between cyber privacy advocates and lawyers for greater protection of children on the Internet, the basic discussion will continue. But practical compromises, technical work, market reactions and legal conflicts that have emerged from this current war will not end the war.
Given the vast variety of technologies that occur on the Internet, it is almost certain that new testing of priorities may develop at any time at the level of software, devices, networks, infrastructure, laws, contracts, agreements, terms and cases. and market.
Roger Cochetti provides counseling and counseling services in Washington, DC. . Policy Officer for Verizon and Committee Director for CompTIA. He served on the State Department’s Advisory Committee on International Communications and Information Policy during the Bush and Obama administrations, testified several times on cyber policy issues, and served on advisory committees on the FTC and others. Other United Nations System. He is the author of Handbook of Mobile Satellite Communities.