Contact us today!

FRS Pros Blog

What Would Happen if All Data Was Publically Available?

What Would Happen if All Data Was Publically Available?

What if I were to tell you that, by the time you finished reading this sentence, all personal data in existence was exposed? If every text sent, every Google search executed, every website visited, everything we had ever done online, was made public? Gizmodo recently reached out to an assortment of experts for their insights. Here, we’ve assembled their responses for you to consider.

Expectation: Short-Lived Outrage, Long-Term Adjustment

One hypothesis essentially boils down the aftermath of such an event down to these two environments. Let’s consider what could be safely anticipated as immediate results of a complete loss of data privacy:

  • Widespread firings
  • Widespread marital issues and divorces
  • Widespread lawsuits and arrests
  • Widespread shaming

However, it is important that we also consider what is known as the Privacy Paradox, or the tendency that people exhibit to quickly adapt to revealed secrets. While there would certainly be a period characterized by outrage and general shellshock, this would quickly be adopted as the new status quo. In the long term, many of these hidden actions and behaviors may grow to be more socially acceptable, as it would be made clear how many people actively participated in them.

Basically, we would collectively grow tired of scandal, and victimless behaviors that are now taboo would become more acceptable as it was revealed how many people actually partake in them.

This acceptance, of course, wouldn’t be an all-encompassing rule. There are plenty of behaviors that are frowned upon despite their prevalence, like lying. However, many shameful secrets would become less of a burden once people knew how many others shared that shame.

It is also important to consider whose data we would collectively be most interested in reviewing. While we might assume that most people would look to dig up dirt on those around them, it is far more likely that the first step most would take would be to look themselves up to find out what other people will soon learn. Most people experience what is known as a positivity bias about the other people they care for and wouldn’t risk that bias being disproven without some serious consideration and emotional fortification.

Expectation: Increased Wealth Disparity

Another theory dove more into the influence that such a shift would have on the business landscape. Defining a secret as nothing more than intentional “information asymmetry” (a situation where one person knows more than the other), the idea here is that every human interaction relies on some level of information asymmetry. While these asymmetries can be used to cause harm, most of their use comes in the form of relationship management. In other words, our ability to keep information to ourselves is beneficial to our relationships.

As this pertains to business, consider what would happen if there was no such thing as a trade secret from this point on. Right now, the very concept of a trade secret allows new businesses to be created and grow, disrupting the status quo and carving out their own piece of the market. Without these secrets, however (and remember, all secrets are now exposed) existing corporations and large businesses could latch onto these innovative ideas and develop them more quickly.

The result: big businesses get bigger, rich people get richer. Not ideal for society, as history has shown.

Expectation: Complete Societal Reset in Three Parts

Yet another prediction incorporates a few phases into describing the overall impact of such a data dump. First and foremost (and most predictably), there would likely be chaos. This is dependent upon how all information was presented. If it was all in a single file… good luck. If it were somehow searchable, the massive influx of queries would likely result in a huge Denial-of-Service incident. The searches that are successful would likely have some tragic consequences.

Secondly, any systems that rely on secrecy and privacy would shut down to avoid a massive influx of abusive behaviors. The financial systems we have in place would have to freeze immediately, and modern voting systems would be nullified.

Third, everyone on Earth would have to adapt to the knowledge that was shared, and deal with the resulting consequences as best they could. Any information that can be made invalid, like passwords, should be changed, and others (infidelities and the like) would have to be processed.

This would all be influenced by the likelihood of a repeat incident. If it could repeat, new security protocols would need to be devised, and society would likely see some fundamental changes in response. Otherwise, life would continue, with a few hurdles as new tidbits from the disclosure came to light.

Expectation: Unification

Finally, another theory posited that—contrary to what might be assumed—complete disclosure would ultimately bring people closer together. In many ways, this theory is like the one we reviewed first. This one just skips over the outrage.

In a way, this makes sense. After all, if you were suddenly made aware that someone in your life had x, y, and z secrets, while your secrets q, r, and s were revealed at the same time, the social balance wouldn’t likely shift all that much. Furthermore, these secrets being exposed could ultimately help to resolve many of them. The endgame here would be an increase in common ground between people.

The Importance of Secrets Today

Of course, because we still have personal data, it is important that you do everything you can to protect that which your business has collected from its clients and staff. FRS Pros is here to help you implement the security solutions and best practices that help to prevent you becoming the cause of a data leak.

To learn more about what we can do, give our team a call at 561-795-2000.

Tip of the Week: Gmail’s Newly-Improved Collaborat...
Phishing is a Threat, Even By Phone

By accepting you will be accessing a service provided by a third-party external to

Mobile? Grab this Article!


Tag Cloud

Tip of the Week Security Technology Best Practices Productivity Business Computing Network Security Privacy Hackers Internet User Tips Google Software Cloud Innovation Efficiency Hardware Microsoft Data Hosted Solutions Email Business Management Computer Communication Windows 10 Tech Term Malware Cybersecurity Smartphones Android Mobile Devices IT Support Small Business IT Services Data Backup Business Workplace Tips Disaster Recovery Smartphone Backup Browser Collaboration Office 365 Outsourced IT Upgrade VoIP Data Recovery Users Gadgets Internet of Things Information Phishing Windows Communications Apps Cloud Computing Data Security Miscellaneous Ransomware Network Cybercrime Business Continuity Passwords Automation Saving Money Managed IT Services Operating System Covid-19 Managed Service Social Media Microsoft Office Facebook Quick Tips Wireless Mobile Device Management Vulnerability Law Enforcement OneNote Blockchain Health Employer-Employee Relationship Two-factor Authentication Money Artificial Intelligence Server Alert Mobile Office Best Practice Mobile Device Holiday Applications Chrome Managed IT Networking Virtualization IT Support Conferencing Spam Managed IT Services Information Technology Access Control Telephone Systems Printing Bring Your Own Device Data Breach Data Storage Tech Support WiFi Password Router Google Drive Settings Managed Service Provider Windows 7 Hacking Gmail Windows 10 Retail Wi-Fi Save Money Unsupported Software Augmented Reality Computers BYOD Word Bandwidth App Project Management Patch Management Devices Proactive IT Paperless Office SaaS Management Robot Productivity The Internet of Things Application Sports Mobile Security Touchscreen VPN iPhone Remote Encryption Vendor HIPAA Safety Telephony Google Assistant Travel Hybrid Cloud File Sharing Battery History Excel Apple Fraud Remote Workers Audit Voice over Internet Protocol Data Protection Meetings Risk Management Hosted Solution Evernote Search User Error Business Technology Avoiding Downtime Mobility IT Management Software as a Service Cost Management Cortana Hard Drive Display Marketing Update Human Resources Data Loss WannaCry Shortcut Commerce Politics Budget Going Green Social Payment Cards BDR Wireless Technology Government Google Docs Data Management Wireless Charging Windows Ink Scams Organization Lithium-ion battery Employees Humor Gifts Computing AI Remote Monitoring Samsung Streaming Media Employee Comparison Telephone Licensing Updates Firewall PCI DSS IT solutions Security Cameras Microsoft Excel IT budget eCommerce Projects Personal Information Outlook Workstation Legal Access Google Maps Spyware Virtual Private Network iOS WIndows Server 2008 OneDrive Credit Cards Smartwatch App store Antivirus Chromecast PowerPoint Admin Regulations Compliance Windows 10s HBO Compliance Break/Fix Specifications Virus Hosted Desktop Hyperlink Reputation Microsoft Word Processor Machine Learning Data storage Fiber Optics Computer Care Nanotechnology Identity Printers Development Telework Screen Mirroring Internet Exlporer Remote Computing Innovations Instant Messaging Hacker Employee-Employer Relationship Server Maintenance Remote Work Unified Threat Management Wireless Internet Saving Time Benchmarks Policy Solid State Drive Emergency Uninterrupted Power Supply Medical IT Sales Proactive Smart Devices Value Wasting Time Tablets Maintenance Amazon Downtime Storage Social Engineering Holidays Root Cause Analysis Point of Sale Data Privacy Sync Micrsosoft Audits Emails Cast Keyboard Shortcuts Edge Managed IT Service Remote Working Computer Fan Keyboard FAQ Investment Net Neutrality Upgrades Entertainment Gamification eWaste Myths Procedure Hard Disk Drive 5G Laptop Sabotage Websites Troubleshooting Identity Theft Accessory Transportation NFL DDoS Virtual Assistant E-Commerce Identities Copiers Office Files Private Cloud Business Intelligence Solutions Memory Ciminal Managed Services Provider Disaster Testing Charger ROI Internet Service Provider Recovery Device Security Threats Video Conferencing IT Solutions YouTube Touchpad PC Data Theft CRM Vendor Management Computer Forensics Peripheral Alexa for Business Legislation Language Inventory Scam Chromebook Co-Managed Services Adobe Workers Digital Signage Printer Webinar Financial Payroll Facebook Privacy Training Education Camera Windows Server 2008 R2 Consultant Administrator Relocation Virtual Reality Work/Life Balance Electronic Medical Records Thank You Communitications Television CrashOverride Crowdsourcing Employer Employee Relationship Current Events Company Culture Benefits Phone System Save Time Congratulations PDF Computer Accessories Smart Technology Mobile Computing es Flexibility Music Regulation Text Messaging Scalability Analytics Black Market Cleaning Office tips Twitter Advertising Automobile Big Data Managing Stress USB Worker Cache How To Books End of Support Monitors Hiring/Firing HaaS Video Games Experience