Chapter 2 : How the internet works?
This chapter teaches you how the internet works to equip and empower your IT and networking skills as a privacy engineer.
Last updated
Was this helpful?
This chapter teaches you how the internet works to equip and empower your IT and networking skills as a privacy engineer.
Last updated
Was this helpful?
The Internet is basically a standard, a particular piece of engineering, a way for computers to communicate with each other. The Internet summed up in one word is ultimately a connection. Connection to each other and connection to information.
The internet is what connects the whole world to each other in a multitude of ways.
As computers connect to each other, they gain the ability to share files with each other.
Currently, 98% of international internet traffic flows through undersea optical fiber cables. It's a vast underwater network of optical fiber cables crisscrossing the ocean that makes it possible to share, search, send and receive information around the world at the speed of light."
Web 2.0 refers to worldwide websites which highlight user-generated content, usability, and interoperability for end users. It gave users nearly unlimited ability to create content and connect globally while giving advertisers a captive audience.
The Web 2 economy was built on a simple idea: collect a cheap resource at scale, user data, then repackage and monetize access to it as an expensive product where Facebook and Google built trillion-dollar businesses.
The Internet is perpetual to humankind, until our last day. That's what makes it special and valuable.
Instead, it is governed by a set of technical and policy-making organizations that ensure the smooth functioning and evolution of the network. So no government can lay claim to owning the Internet, nor can any company.
There are many actors hoarding information about us to create files on every person in the galaxy. The information collected from us on a daily basis includes current location, intentions, and mood/feelings at the moment and foreseeable future.
The internet has become more than just a tool. At its core, it is the ultimate weapon of micro-segmenting and subconscious manipulation.
This chapter takes a deep dive into the building blocks of the internet to equip you with the skills you need to become a privacy engineering master of the galaxy.
Nowadays, mobile phones, printers, or โsmartโ TV sets, as well as โโ devices in addition to laptop or desktop computers add up to billions of computers around the world and are exchanging data packets using the standard suite.
It is set up using and other wireless and networking technologies.
Internet is basically lots and lots of , , and connected to each other. You want one computer to talk to another computer, sending and sharing data with each other.
This is how is born and the internet is only the interconnection between networks.
Internet is the infrastructure that consists of , , data centers, , , repeaters, satellites and wifi towers that allows digital information to travel around the galaxy.
E-mail remains one of the most commonly used Internet applications, typically relying on the and to move packets of information from between connected computers.
World Wide Web relies primarily upon the to send queries and deliver information.
Web 1.0 is a that enables the showcase of the piece of information on the websites. It can be used as a personal website. It has directories that enable users to retrieve a particular piece of information.
Web 3.0 will have a strong emphasis on and make extensive use of blockchain-based technologies. Web 3.0 will also make use of machine learning and artificial intelligence (AI) to help empower more intelligent and adaptive applications.
Now more than ever, as our grow exponentially, we need to take personal action to preserve our online freedoms. Why? The Internet benefits and belongs to all of us โ thus it is our joint responsibility to protect it.
Cookie tracking and profiling gave way to other more intrusive techniques to track your overall activities online and create a detailed profile of your browsing habits based on all your online activities which are subject to being collected and analyzed by .
Intelligence agencies around the globe are forming surveillance leagues and conducting mass tracking programs like the program, which was unraveled by .
Even developed spy on their citizens by authorizing allowing the governments to monitor the Internet usage of its citizens legally.
As such it goes beyond the ' level and creates a post-modern .