What is the use of privacy laws and rights if a single easy-to-deploy criminal activity can involve their continuous breach through the monitoring and analyzing of the telematic communications of millions, and the detection of such crime is very very difficult and unlikely to happen (or pardoned by presidential decree)?
We believe that to be the case today. We believe that such huge loss of privacy is not an unavoidable price to pay for the comforts of information technology innovations. It is based on the type of software running in current mainstream electronic communication devices and services.
And such software can be substituted, modified directly by users and providers, and indirectly by government through legislations.
Two solutions are therefore available:
- Convince legislative body to enact for reaching rules, detection and enforcement processes, that effectively enable all citizens to affordable access to most telematics devices and services with levels of security that are very very high and fully user-verifiable.
- A group of citizens, organizations or even a municipality could develop and deploy “user-verifiable telematics” for its members.