Blown To Bits Chapter 3 Summary

507 Words3 Pages

Once again, chapter 3 of “Blown to Bits” talks about the privacy of our technological devices, and how we can protect ourselves. The chapter talks about how there are “Ghosts in the machines” which could mean that what we delete is not really deleted. I find this to be scary since so many things are done on technology these days. After reading this chapter it is clear that people’s information in which they store online can be easily accessed. When it comes to devices we must be careful with what we use them for so that way our privacy is protected from hackers. On the other hand I think that data not being fully deleted can be a good thing for privacy and safety reasons. Say if a criminal tried to delete evidence from their device that could be used in an investigation, some of the data may still remain. Investigators could then use this evidence against the criminal to find if they are guilty or not. The ghost in the machine is known as the data that is not fully deleted. Also just because the digital copy of the data is deleted, this does not mean that the physical copy of the data is gone. The physical copy and the digital copy of the data are not always the same thing. For instance, the data can be altered online as long as it is done the right way. The data on the device would have to be altered using a …show more content…

I was even misinformed. I did not know that what we delete is still there, or also the fact that the government is able to watch use throughout the devices in which we use. Also the fact that social media programs are allowed to use what we post as marketing and advertising, and they control everything we post whether we delete it or not. I think the phrase “Ghost in the Machine” is able to be translated to all of these chapters and what we have learned so far from

Open Document