Think twice before you like


Did you ever get an email from a strange address (an advertisement, spam, for instance) and then you wonder how did they have your email address? I did, so many times, despite the fact that I rarely share my personal information on the Internet and I never expose my information on the sites I feel unreliable. Though I’m always aware of the risk of the Internet but I was a bit surprise to know that our data is a kind of merchandise that is not to difficult to get (or to buy).

Every action, every click we make on the Internet is recorded. When we click accept on an agreement to visit a site, we are giving up our data by exchanging it with the provider for the right to access. When we delete an item, we think we actually deleted it, and we’re safe now. But it’s not. That’s is how the modern feudalism, the iFeudalism, works. As Kevin Kelly said:

The internet is a copy machine. At its most foundational level, it copies every action, every character, every thought we make while we ride upon it. In order to send a message from one corner of the internet to another, the protocols of communication demand that the whole message be copied along the way several times.  Every bit of data ever produced on any computer is copied somewhere. The digital economy is thus run on a river of copies. Unlike the mass-produced reproductions of the machine age, these copies are not just cheap, they are free.

It is hard to control our data when we go online because we are always tracked. Whilst, only a few of Internet users are aware of the problem:

And because we can’t control the flow, it’s better to consider what to put into that flow.


This poster was captured at my workplace. When I first started working here, I was told not to mention the company name on any media platform if I want to stay away from supervision and trouble.


2 responses to “Think twice before you like

  1. I love the infographic you used, it was so informative. I found the numbers fascinating; most people are blissfully unaware of how much personal information a simple Google search can give away. Moreover, plenty of people do seem to know, but do they care? To provide you with a specific example, I’ll use Facebook. This ‘Wired’ article ( explains exactly what data Facebook takes from its users and what it is used for. It uses both the ‘likes’ and links you interact with inside Facebook, but also other factors, such as your browser history, which I believe raises several ethical questions. There are ways to combat this; these are further discussed in the link I posted above.
    Claire 🙂


  2. This is such an interesting post and I think we all have experienced the strange email address! You have backed up all comments with great statistical pictures that reaffirm your point. It’s scary to think that nothing is ever actually fully removed when “deleting” it. This is a great article that explains how to see which companies are tracking you on Facebook:


Leave a Reply

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out /  Change )

Google+ photo

You are commenting using your Google+ account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )


Connecting to %s