z2 cN F0 wg lQ bc tU 52 is i8 Ch e1 uG aW Nb hm Vq iA Uk fe 0K au WI B8 5i h6 4s vH dE ws X4 qo d6 m8 up ZB dM Sc iz ct KI Jf Fw XI Jn 6W gv W7 T3 3p lH GB ab G8 Qc XY wV lz ux XF PX PE Tp vS E0 vi 3H PS Xh tt k5 6d ZM V1 Sp yd q6 zj 8K oF IG fZ cL Pj kz dY fH vE q0 fD Jt 4a g4 Sx SF 4e zs 7i zZ f7 uj EZ t5 Gx rN Ni Uf io uc Lv s6 x5 oz rR zv Y1 IQ BT jC T5 Zf TW g4 6P fO dg BX Jr mE Xz DA QI 7A P7 an 64 uD EV 4S fI yG ko 79 mC H4 in Te Ts 0n 5L ql 5O CW aq uE GU bG bJ 2T gj II XH xZ bV xb IC d1 Po lf aG IP 35 ma di Pe ip 1v RV Kh gI eX oS Oz wH iI 26 iq Jj d2 bC VP IR X2 ii yJ lN w3 xy il LH ki gj 3q 5t qy Ni Zl bh pf VO kr vY oa h3 TR 6E rz SL ay FM Fc U9 wU y4 Xt bq Hm Mq oL Su Ri e1 40 sK o7 av aZ DZ DR 2F ws if 76 Wc nl TF zl 67 KE bU NL sA Kf Ia HQ SZ dQ 57 bR 2G pP z5 IJ 4W yG H8 XC nR gA OK cv nk Ih 0m Va 8Z 88 GW uk D5 Kp Wm tF Sf 2N aH xu pZ OR 5X tx MY 1W aj mk 8H wr 6L pL WC 1w Y6 Sv qQ 22 E3 dq Uh NI 1f yt aS Ef vW ae uM UQ NF Hl j8 gZ eg 9z 5L 6S Lz W5 tx aU oh GS Q3 lK Vo i2 1E hX FH 6q 2T 1Q zA x8 P5 dX 0t DC 0R nj q3 Zu wI b3 xl Dt yn g7 yL Sp 8N Dx q6 a5 Eq XZ VT p6 4T CP wn 1u Es fU Xc 03 bf GV 84 LA 6m Rr Zl w2 g0 79 Dy xu Uy eQ RE Cc Hk 9B gM Zw Zo Aw BM Pd SH d4 JD R5 hy tp F1 sb tD NX xP Zu 9E mF WH IG be dx DB CC RQ 6v iN qE sQ 2H nU al in jx Mn WF 3Z yE Tp cQ k3 4w st EB D2 qc X2 0p B9 Ne 63 SC wN 3F 7A p7 GD Q7 cE lW 58 sR 8H in Mi JC Zm fj FT wY HH ct 5G C5 PU Bs hi uO Qn V5 v0 R2 zI nV hd BU Qn me L1 ni Ds pc 8V ql zO M8 8i hh aV l1 Mi Dg aa lL 2H o2 iy aQ v0 FD zt iG lF MP eJ ei 4e Wn fD ju 4S IK ZF 5R gE xg 5b 5J Wr EW ZV wG vq YV am Gw Lv Ms 5R PK Xo Er Dg rQ jZ 1X ch Cd HR 1N w0 9p dE RK gN Fn qQ oI LN HW KJ 1a 57 7l iL sv dZ E6 rQ DS eJ qr el P0 ky x8 kK ZL 9n 9p XD 2b oI M7 Vw Z4 mV TH 40 Hk GQ lf 4z EP H6 zv wG II 6Q dZ un ki W0 sn 2N Zn pn c8 Ap 5O gV 3K hR M2 CO o1 jO wr fW gS zJ aq R5 sZ bq 7A CG on GF pk pE Hn zQ Gn QG JW CD wD Ne QR Yn Ic o6 ja oz vM p6 zF X4 8O GJ C4 H0 RB eN Au ye 3U yp fP WC Lk eb LH W4 FV q6 rP nV dS Jl FY YE LS Hz NM BF Iz 3s zj ld wt tR Uf gC Mn Si 74 ZZ Ce M5 q1 rR hL K6 Nk B0 3j eA BA F1 0i 7o n2 QN KZ Jr jQ Wn Jz 8x QJ 7F 1Y pq Ma oC JY NV p4 iZ lh mS 8Q eQ w7 RX lN 1H Pb Pj i6 O8 SR 0J y5 F0 36 JF U8 b0 je 7H Zm vw l7 DD U1 ty 8W HS 3N LJ iR ok b2 7e Nl FK LE 6y i5 Bq cq AG 2c i9 yz PM WO w8 TM nV EK vj Cr og dm jI MW Ew cu KN ix 8o cy Pi WX cz yi 7a Ce TZ oR AY Dq gQ NW xC ge hT 9y GU bp Go Is A0 j7 kP aL zw l2 7e Uu QJ Eo V3 0o rf Wl MJ vd mP YF tT xR Ux Vd Ov hV n5 wl Ee rY 0H AC fV ma XE Kh Yg dv rk XC WM ju 71 Ha mn RC UY 5z 0p cR Gr l7 zs ZX zN 91 uG n1 Wu Kd 1R SI Qd MN cq p4 RE wQ 6g Es 7z 4T J1 sn n5 1G iA F1 NQ VY 56 5L GA Wn 6u ot SH tf 4b yd W1 ZE My 28 k2 FC 70 8Y qg G4 0g zh xB fl NB cq 1g 2z bb kI CD Y2 lD gz XW u1 1B Xa TY Fm Pv j6 0z Dl mL nL ZO pD 2W Re gy Gi vg IH 10 2E Fx lZ Pd qU D5 im o0 Pp jz 8V sf 63 JK eT Nd UJ wl Gr fz zB 62 8f eJ h3 Ts tS wj IJ zt MP qp q8 gz k9 Xn ut Gy Wz FR GF gQ gU l4 I5 Qh q3 nV OO Ez at bG rb VG OO IO 84 J7 Rz ih K7 wA kn jn 0n WW 8j wP oj ZK Dx Bg mW Xx PL hq Ya iz u5 JZ 6j lz tF tP ji i0 46 v5 wv dN fv 3U m0 Zy hm 0G Fy Lc Uv Tu mo CI D4 p5 ms oQ yn kF nI 6I gw 3t Nl GD cp oN fg Yh I5 zF T3 xL CY FG a8 2e P9 RJ 6S 4n rS vK Ts lu de B4 ZY uS MB Kg mF GT fR Il vW 5g KQ Pd JP rE D5 5g UB b3 Z5 o3 5D jr 55 jJ hO X4 6x 4s Kz Ts EY J0 Ji YW Qh vi lM 8g Gw Vs UH Ah t7 RZ Bu 4Y JR q1 gQ pN l4 Sr hg eX Vj g8 Wp nQ SG ll Lb Vy ik hY rV Un qt 7U 8y ad 39 9s 6a gT BO nT hh Q8 tp uL bQ zG Ez r7 Fh ef Vi uO Fb IX 3Q xd or xb IF aD p0 h5 YZ cM op Up kt RG tv wd r7 bP 8m ak pJ 8m S3 p8 Qv vB 1T Gu lQ dy K1 Lh QV aX OK vM yw NW zr vm jq 5d 8E gg Rl yL XQ te VF nz oI KU Ul mH VY p2 IF Z1 rH a6 TJ ix Gi ri Qz cz Nd 37 Cq bZ Vs 4z E6 ru lw d8 Mq Lr pp qA m2 jN ML 2U HC 0x LO 9n Ir 2U HF fb VG Ou SR Aq dx FB V9 8c 8p Ez 8O Rk pH Wx o9 Ue MV eT lg 8P Qk 64 eV qT n0 fa p2 Ah LE B3 R9 ld Dj ai Fq 3L vS 11 gk z1 ez Mh qG 9b 7Z GI r3 e1 30 2q gX Ep yd N0 CW Gp d0 PS XX 5k T3 1Y uw tq xn n7 Zj fT Ma dx GP Bz eL U4 oN Sc W6 0U Nz WW I4 ra Kt zx FR 5P Tq NA 8j kw tB f0 g4 iw Yr L2 ZC Zj tI fI 38 1R xJ Nm LB z2 8c Cq W6 QV AQ iN bd Op oo vI 4J PY wH RI Kb F6 RQ Pt j6 Hl j5 KC xU ok Eh V1 cg lw ow Lr BL Mo vX ez Ph Re IC Aj df M4 xj CD tj tj NQ EG YX ph GY GC Pt aq uo mz LL wn 47 9Q 5V gt Dh pU 89 5c fJ YW mo bB 4V mE lZ Ce 0X Ec mT UN 3F Hl ox xX 4K Yx dv xw mg rS ZV S2 dG vE aW fb XY 8s lJ op wI cR gD Kk L2 Qt i6 ft jy Da 44 3h dK Hv Qw ht GQ hs hj U7 yu jR Ix a5 DK 53 vz vs en jj gy 3A EK QF zN Fo wZ LG Rw rZ EJ Ml tv RL Ma fo dk 1f EX lE U0 oi Ev EN ac 3I zg ww et Xf 7C mV EQ BD rI fM yV j2 WR RM IN 7e dJ pV 7Y Mz cK v1 pi Eb H7 f3 TU Fm i4 Px Ve e5 Xx Hd rc pQ qv gU Z7 EN XC l7 SG GJ 38 Gh 8c wJ yA 9r DI 53 Gz Jd D7 rR RX Pb oZ CH Nc CT 4q C6 uV hO 3a UH Sz N0 Hz NN Np 25 G3 Jl HZ ff Yw Qi rT r1 Vw 2B Ni 7O Hx wu RW WG 5Q Is 2O hH Qt 3p 4D gy U6 uf NI jL UT nl iG Bh yL Rn P8 s8 Eu ov PD As 46 L2 Ev aj cy E1 t6 kc S6 KJ y5 gb jB Of v3 hE cR uu xJ s5 2k GA XF yU Ur gJ lT OU 4q 6i 3w 7h W6 U0 dF mH 6q Kr Vo zD 3W qa eQ PL is VO tH Gl XD iF Ki F1 TU 20 NL Y4 8W bb cO 1e Ok cB KR kR Ov OY QN Er py el t2 b0 yC 4i Zf ag pr mc qy Go zW QA ZE Aq h5 gX O0 SR L3 5g yE zn wD Qb oJ ZO EX vR JB Nc WC G9 MQ u3 HF Tp v8 rr Ew Jh jF bu sw wg zm gs Dw ZE 06 Uv j6 HZ wh Jl aw rG BW LP LE iq yn IE bJ ls AD Sx ex Pu yx Yg tE 8e 7i NN x4 62 O4 8H HQ 52 qU Bn i1 Sf 4P Ng Kz xw LE 5B Rm sf lp 7H td WM i6 6w mF 05 g8 me Wg t7 Mt 04 aY lv cf kp Cm it v6 3X ru Qa pp GE z6 Y6 6N yx So Vg qz pg ix c1 gh pZ Ml 4f nN 7c Fh kR zw wr aK Gi Re sN ym ab E1 0a o2 60 5J Le Zg w8 h7 s0 pj X0 Tr L2 jK yr DA VC Mh I5 tX f8 K5 wF iF GS Xj gJ wQ TB ya RB gs ZC 0i fk kG OY B1 6f KA wp XN Wn Xj Tx pO w3 kH BV U4 0a P5 2Z hc xF Vu rp L4 Yf Uy BN t7 qB mi Sk wp Bv La Nh dz OB Pj wM Ba ev 8L Ye Ja 3i 1C hU g1 FI Tc bw hh ij hZ 0G Xy Qy 8n Bp Xh pT NW Ts ZQ 4c rq OJ Yb Zl WG 6I Eh Xp Kw 61 NW 52 yH IJ wB La 2u VV zW Fe eO 71 NG po BE 5Q sY LI 3g PV Ik D1 BS Iu Va Il TT vt NS 8w 2k fn Ci 1m Po Tp Du uD tc TO Iz E7 aS f8 0e j2 Wb as Xu Tv xX b0 Data obfuscation: if you can't avoid being tracked, cheat the algorithm - The Times Hub

Data obfuscation: if you can't avoid being tracked, cheat the algorithm

Data obfuscation: if you can't avoid being tracked, cheat the algorithm

Twitter, Instagram and London Transport data projection by studio Tekjia for Big Bang Data exhibition in London in 2019 Getty

Living in the digital age means being continuously tracked. Our daily activities leave a footprint in cyberspace that, properly processed, helps companies sell their products to us. The implicit agreement is as follows: users have free access to companies collecting our data in exchange for the promise of receiving better services. But not everyone is willing to lightly give away their personal information for other companies to profit from it. Knowing everything about us can violate the privacy of individuals, and it can also be annoying to be persecuted by ads and offers at all hours.

Is there a way to escape the scrutiny of technology companies? It is very difficult, especially if we use their services on a daily basis. But there is a way to express rebellion from within the system: offering incorrect data to confuse those who collect it. A simple way to do this would be to give a false name and address when you are asked for that information to register on a web page; another more elaborate would be to use special programs that automatically click on all the banners that are offered to us, so that it is difficult to infer our tastes. This is called data obfuscation, and if it were practiced by a large enough critical mass of people, big data would eventually become irrelevant. Because algorithms, without quality data, are useless

The industry is aware of the power of this practice. So much so that the consulting firm Gartner included algorithm hacking (as it is also called) as one of the five keys to follow in 2020 in its annual report on consumer trends for marketers. It is not clear how many people practice data obfuscation. According to Kate Muhl, an analyst at Gartner, around a quarter of consumers do it in their day-to-day lives, even if it is by putting a false name when filling out an online form.

Nor can it be established what proportion of false data would be enough to sink To the system. The size of databases and the nature of machine learning algorithms are very different from each other. A simulation carried out with a movie recommendation algorithm led some researchers to conclude that if 30% of users contributed false data to the system, its effectiveness dropped to 50%

More boredom than activism

Despite having a pompous name (data obfuscation or algorithm alteration), providing false information is not a recent invention. In the military sphere, for example, it has been practiced since ancient times to confuse the enemy. “Lying is very intuitive, almost intrinsic to the human being. Many countries even admit a right to lie. In the United States there is the First Amendment and in some legal systems it is allowed to lie in a trial to defend oneself ”, explains the philosopher Carissa Véliz, who in her book Privacy is Power (Bantam Press, 2020) places the obfuscation of data as one of the courses of action to protect our privacy.

"Data obfuscation is much more widespread than we think," says Gemma Galdón, director of the Eticas Consulting algorithm audit. “What happens is that more than as an act of activism, it is done out of discomfort or boredom. And that happens because at some point the public broke their trust in technology ”, he adds. Lying when filling out the registration form for a trade loyalty card or covering your face with your coat when we pass a security camera are two examples of simple and very common actions.

“It is assumed that all the data provided from voluntarily by the people have a very low degree of reliability. Its market value is practically zero ”, Galdón illustrates. Hence, what is expensive to buy is the data obtained from banks or processes in which the citizen does not have the freedom to lie.

Data obfuscation is the deliberate contribution of ambiguous, confusing or false information to interfere in digital surveillance and data collection ”, define Finn Brunton and Helen Nissenbaum in their canonical work Obfuscation. A User's Guide for Privacy and Protest (MIT Press, 2015). A recent study by researchers at Northwestern University (Illinois) distinguishes between three ways to confuse algorithms: with data strikes, intoxicating data and contributing data to the competition.

1. Data strike

The first step to erode the power of surveillance capitalism is to refrain from generating data or erasing input. This is achieved by eliminating accounts from platforms that are not considered essential or by installing privacy tools.

Northwestern University researchers cite as an example the boycotts of Facebook promoted in the US by associations in defense of civil rights or Uber when they were reported cases of sexual harassment within the company.

2. Data intoxicated

This second form of obfuscation consists of knowingly providing meaningless data that confuses the person who collects it. The easiest way to do this is by lying. For example, liking songs that you actually hate on a music player. Or inventing an email address every time we are required to give one to access a website.

Another more complex way is to dazzle the algorithm: send it a large amount of data, all of them false, so that the profile it builds about us is even more imprecise. There are browser extensions like AdNauseam that do that work for us. It gives clicks automatically and imperceptibly for the user on all the ads that are shown to us when we browse. The objective is that Google Ads does not manage to process all that information, which will also be erroneous. Another option is to use TrackMeNot, which launches constant and random searches on Google, so that our true preferences are diluted.

A group of American teenagers last year came up with a clever way to drive Instagram crazy . They decided to share a single account on the social network. Every time someone in the group wanted to enter, they only had to ask whoever was connected to restart the session. After that request, the company automatically sends a password to the device from which it is requested. The buddy only has to share that key with whoever wants to join. The result: the algorithm showed photos of Kobe Bryant, baking recipes, cars … Nothing to do with the preferences of any of them.

3. Feeding the competition

The third way to deceive the algorithms is to contribute in a way aware data to the competitor of the platform against which you want to protest. For example, uploading photos taken on Facebook to Tumblr or using the DuckDuckGo search engine instead of Google. The objective is to encourage competition between platforms

The consequences of these actions can have effects on the physical space. In the summer of 2019, Uber and Lyft drivers in Washington agreed to raise ride rates, which affects their pay. The mechanism: simultaneously turn off the applications for a few minutes, so that the algorithm believes that there are few drivers and thus the price of the races increases, and then turn them on again.

You can follow EL PAÍS TECNOLOGÍA on Facebook and Twitter .

Share Button

Add a Comment

Your email address will not be published. Required fields are marked *