Image for post
Image for post

Communication is a Two-Way Street … Hopefully not a Dead End

With each passing week we must face the developing realization that the expectation of our digital communication remaining private is no long valid. Sony’s troubles appear to be the tip of the iceberg with this week’s news that Russian hackers accessed unclassified emails from the White House just a year after achieving similar access at the Pentagon.

Seeing this happening at an increasing rate, renowned VC Fred Wilson recently authored this post on his blog about the new reality of email no longer being private in the post-Sony Hack world. The convergence of the hacker culture and the increasing volume and value of the information we communicate digitally has led to the unfortunate fact that we can no longer assume our emails will remain between us and the recipient. In fact, Wilson believes we’ve reached a point where the opposite is true. We should now assume that our emails will assuredly become public and write them accordingly. This goes beyond a pure data dump; you can now search the entirety of the Sony hack emails on Wikileaks.

With leaks happening at such a high rate that one of his commenters even used the term “email leak fatigue,” IT teams are scrambling internally to ramp up their security. The issue, though, is that communication is a two-way street. Regardless of how much you beef up your own security, you are still at the mercy of the other side. Fred Wilson didn’t have his email hacked, Sony did. And the recently released Kate Upton photos in the iCloud hack weren’t taken from her phone but rather from that of her boyfriend.

We must remember that the precautions we take on our side are simply not enough anymore. Our digital messages are traveling back and forth creating access points on both the senders’ and receivers’ side. And The Cloud is up there storing and replicating communications which creates even more opportunities for hackers to insert themselves.

This leaves only a few options. The first is the approach Wilson says he has adopted — assuming your digital communication (email, IM, chat, DM, etc.) is going to be exposed. Option two is the telephone but our hyper-scheduled, on-the-go lifestyles make it inconvenient. Option three is a move towards ephemeral messaging which leaves no copies behind. Clearly we’re advocating the third approach but regardless of which one you pick, keep in mind that it’s not simply about you and your privacy precautions. It takes two to tango and if the other side of your communication isn’t up to snuff, you must confront the reality that these messages, whether they be photos, texts or emails, might be fair game for hacker and Wikileaks fodder.

Confide Blog

Your Confidential Messenger

Medium is an open platform where 170 million readers come to find insightful and dynamic thinking. Here, expert and undiscovered voices alike dive into the heart of any topic and bring new ideas to the surface. Learn more

Follow the writers, publications, and topics that matter to you, and you’ll see them on your homepage and in your inbox. Explore

If you have a story to tell, knowledge to share, or a perspective to offer — welcome home. It’s easy and free to post your thinking on any topic. Write on Medium

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store