• Partners
  • Privacy Policy
  • About Us
  • Contact Us
  • Submit an Article
Monday, June 16, 2025
Digital Boom
  • News
  • Startups
  • Marketing
    • Digital Advertising
    • Insights
  • Campaigns
  • Tech
  • Guides
  • Culture
  • Market Watch
No Result
View All Result
  • News
  • Startups
  • Marketing
    • Digital Advertising
    • Insights
  • Campaigns
  • Tech
  • Guides
  • Culture
  • Market Watch
No Result
View All Result
Digital Boom
No Result
View All Result
Home News

The death of privacy in the age of digital

Ahmed Maher by Ahmed Maher
November 8, 2018
in News
10
The Death of Privacy

Image source: Envato

84
SHARES
350
VIEWS

The year 2018 has become the year of privacy, which is striking because it’s unclear as to whether the public knows that or not. It’s true, many people in the United States are keenly aware of the Equifax breaches last year and the subsequent fallout of policy changes that have since cascaded through 2018. Less known, however, is the largest data breach of 2018, which received relatively little coverage in the United States.

On January 3rd of this year, Aadhaar disclosed officially that they had a data breach that encompassed the personal information of each of the one billion Indian citizens’ names, addresses, photos, phone numbers, and e-mail addresses.

Further examples aren’t hard to find: the car-sharing app, Careem, had a breach of fourteen million user accounts. Such breaches are shocking, but, unfortunately, are beginning to represent a trend for citizens of the world.

Large-scale data breaches are problems the companies would like to hide from us, and worse yet many services like Equifax or Aadhaar aren’t something a citizen can effectively opt out of due to their ubiquity within a society.

For example, choosing to not have Equifax record your financial data in the US is opting out of access to any line of credit for your life.

A Privacy Guarantee?

With such services being exposed to fraudulent breaches at such a large scale, internet users have started to ask themselves the obvious question: what can I do?

Recently, it seems as if the most popular answer to that question is Virtual Private Networks (VPNs).

The growing popularity of VPNs shouldn’t be shocking: while there’s little you can do to protect yourself from companies having poor data discipline and security protocols, you can protect yourself from other breaches that can be just as damaging.

Besides large-scale data breaches, smaller-scale attacks across wireless networks have proven an effective method for hackers to locate personal information, which is just as disastrous for an individual person as a large-scale data breach is.

The emergence of inexpensive VPNs, like TorGuard, has proven effective in preventing personal data breaches, as well as something slightly more nefarious: data collection.

The other half of disappearing privacy is the fact that these companies not only have had their data stores breached, but the fact that they store so much information for us. The Google searches you enter, the Amazon pages you visit, and the ads you click on are all cataloged and stored by companies seeking to learn more about you.

The information is sold, circulated around, and used to glean insight into your life to sell your products. All of these are messy byproducts of how the online economy has developed, and avoiding the corporate touch of information gathering has proven to be a very strong motivator for the interest in VPNs.

Privacy as a Service

The amount of context that surrounds privacy in the internet age can be daunting, but there is an easy-to-digest trend: people perceive VPNs as a part of the solution for personal privacy. Millions of people count on them globally. They’ve grown to become over a 20-billion-dollar industry in 2018, and their popularity shows no sign of stopping.

The business sector as a whole has picked up on the importance of personal privacy for traveling business people as well.

Very recently, Forbes published an article detailing the benefits of a VPN. The article goes into detail on exactly how easy it can be for hackers to gain access to information being transmitted on a wireless network in a public place, but the bottom line for public perception is best found in the title: “…you need a VPN.” Specifically, the article goes on to highlight one of the biggest shifts in VPNs over the past decade, which is the ease of installation.

Let’s face it, most consumers aren’t really going to be spurred into action setting up complex software no matter how dire the consequences. The ease of installation has played a huge role in the proliferation of VPNs in tandem with the context of security breaches and corporate information gathering.

Join Our Community

Previous Post

Apple services revenue reaches an all-time high of $10 billion

Next Post

Things You Need To Know Before Getting Started With SEO

Ahmed Maher

Ahmed Maher

Ahmed Maher is a marketing and growth leader with a proven track record across telecom, fintech, publishing, charity, government, e-commerce, and sports. He launched Vodafone Egypt’s digital and social media presence in 2008, setting new standards for brand engagement and performance marketing in the region. As the founder of Digital Boom, Ahmed has helped shape the voice of digital media in the Arab world. He brings a rare blend of creative vision and data-driven thinking, using digital tools and storytelling to drive measurable impact and scalable growth.

Related Stories

Germany Begins Government-Wide Exit from Microsoft Software
News

Germany Begins Government-Wide Exit from Microsoft Software

June 14, 2025
Builder.ai Ceases Operations After $1.3 Billion Valuation Collapse
News

Builder.ai Shuts Down After Layoffs and Investor Pullout

May 26, 2025 - Updated on May 28, 2025
Jordan’s U.S. Foreign Aid: 2025 Budget Cuts and Their Regional Impact
News

Jordan’s U.S. Foreign Aid: 2025 Budget Cuts and Their Regional Impact

March 20, 2025
McDonald's Sees 70% Sales Drop in Egypt Amid Gaza Boycott
News

McDonald’s Sees 70% Sales Drop in Egypt Amid Gaza Boycott

November 24, 2023 - Updated on May 17, 2025
Egypt's banks impose cash limits on withdraws abroad and internet dollar usage
News

Egypt Caps Overseas Cash Withdrawals and Spend, What It Means For Businesses?

October 6, 2022 - Updated on May 18, 2025
World Bank Signs Off $400M to Reduce Egypt’s Greenhouse Emissions
News

World Bank Signs Off $400M to Reduce Egypt’s Greenhouse Emissions

October 5, 2022
Germany Begins Government-Wide Exit from Microsoft Software

Germany Begins Government-Wide Exit from Microsoft Software

June 14, 2025
How 'Freed from Desire' Became the Viral Blueprint No Brand Could Buy

How ‘Freed from Desire’ Became the Viral Blueprint No Brand Could Buy

June 12, 2025
Google Ads for E-commerce: Complete Guide to Profitable Campaigns in 2025

Google Ads for E-commerce: Complete Guide to Profitable Campaigns in 2025

June 12, 2025 - Updated on June 14, 2025
What is Google Shopping? Definition, Optimization Tips & Complete Guide

What is Google Shopping? Definition, Optimization Tips & Complete Guide

June 12, 2025 - Updated on June 14, 2025
What is Performance Max? A Marketer’s Guide to Google’s Smartest Campaign Type

What is Performance Max? A Marketer’s Guide to Google’s Smartest Campaign Type

June 12, 2025
Woman smiling peacefully in therapy chair after AI financial counseling session, representing emotional healing from money stress through Custom Money platform

Custom Money: AI Financial Therapy Tackles Emotional Spending

June 10, 2025
  • Partners
  • Privacy Policy
  • About Us
  • Contact Us
  • Submit an Article

© 2025 Digital Boom, Inc.

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In
No Result
View All Result
  • News
  • Startups
  • Marketing
    • Digital Advertising
    • Insights
  • Campaigns
  • Tech
  • Guides
  • Culture
  • Market Watch

© 2025 Digital Boom, Inc.