By Rex M. Lee
During the proliferation of the internet in the 1990s, the internet was decentralized enabling free trade and commerce on an equal basis where content creators were free to publish anything at will.
Although the internet today is still theoretically decentralized, we cannot discount the fact that the internet, artificial intelligence (AI), and connected technology have been centralized by a handful of multinational corporations that include Google, Apple, and Microsoft.
Google, Apple, and Microsoft control access to internet trade and commerce by way of their operating systems that support intrusive apps while controlling app distribution.
Google, Apple, and Microsoft control app distribution by way of preinstalled app agreements and third-party app distribution via Google Play, Apple App Store, and Microsoft Windows App Store.
Preinstalled app agreements enable Microsoft, Google, and Apple to sell access to their OS end users to tech giants that include Meta (Facebook), Amazon, Twitter, and ByteDance (TikTok) leading to a handful of companies that control access to internet trade and commerce.
Furthermore, products and services supported by AI such as generative pretrained transformers (Chatbots) are being centralized by the same tech giants that dominate internet trade and commerce such as Alphabet (Google), Microsoft, Meta, and ByteDance.
Their operating systems, intrusive apps, social media platforms, and AI support billions of smartphones, tablet PCs, connected products and PCs.
Today only a handful of multinational corporations control access to internet trade and commerce while having the authority to control AI, the publishing of content, ideas, news, entertainment, music, books, and political viewpoints leading to internet and technology centralization.
Internet and technology centralization has led to the proliferation of predatory surveillance and data mining business practices that are rooted in “Surveillance Capitalism.”
What is Internet and Technology Centralization?
Centralization is a business model that delegates decision-making power to a central point of authority such as a group of companies where a few people in power make all the decisions.
Centralization can occur across many industries such as tech where a handful of companies control access to internet trade and commerce.
Over the past 20 years the tech industry has been centralized by Google, Apple, and Microsoft by way of the operating systems that support smartphones, PCs, and connected products coupled with the control over application (app) distribution.
There are many benefits to centralization such as intuitive and easy to use operating systems, web browsers, apps, social media, and artificial intelligence (AI).
There are also many threats posed by internet and technology centralization which are highlighted below:
Before we understand how to protect ourselves from these threats, we first must understand the importance of civil liberties such as privacy.
Why Privacy Matters
Today people have been desensitized by tech giants such as Google, Apple, and Microsoft to discard the importance for human rights such as privacy.
For example, a smartphone owner loses their security and privacy when they click on “I agree” to accept the predatory terms of service that support operating systems, apps, social media platforms, and cloud storage services.
As a result, there are no secure or private smartphones, tablet PCs, connected product, or PCs that are supported by the Android OS, Apple iOS, or Microsoft Windows according to T-Mobile and Verizon.
According to the framers of the U.S. Constitution, such as James Madison, privacy is the cornerstone of freedom, for without privacy there is no freedom which is why the U.S. Bill of Rights addresses privacy.
There are amendments that guarantee privacy which include the following:
The number one human right under attack today is the right to privacy, which is the most important human right according to many framers of the U.S. constitution.
Not only is privacy important to individuals, but privacy is equally important to businesses and government.
There are many security, privacy, safety, and civil liberty threats associated with the loss of privacy that need to be addressed by individuals, businesses, and governments.
Over the past 15 years people have inadvertently given multinational companies, including those from China and Russa, access to their confidential information that includes:
Privacy is not the only civil liberty people are giving up to multinational corporations, human rights such as free speech, freedom of the press, and the right to assemble peacefully are also under attack due to the rise of “Surveillance Capitalism”.
The Solution- Decentralized Security Strategy & Guide
Businesses, organizations, and government agencies need to adopt a top/down decentralized security strategy to secure the boardroom, C-suite, management, frontline employee, elected/government official, and frontline government employee.
Security and privacy professionals talk about decoupling from big tech and/or internet centralization, but do not know how to decouple from centralization.
There are new secure and private solutions that are being developed such as decentralized operating systems that include PureOS which is supported by decentralized apps and social media platforms that are not supported by an ad-based business model.
There are also smartphones, laptop PCs, and servers that are being manufactured in the U.S. such as Purim’s new Liberty Phone supported by PureOS.
For more information on decentralized technology, feel free to reach out to Rex M. Lee at email@example.com
Rex M. Lee is a Privacy and Cybersecurity Advisor, Tech Journalist and a Senior Tech/Telecom Industry Analyst for BlackOps Partners, Washington, DC. Find more information at CyberTalkTV.com