On Oct. 10, 2016, 8 p.m. by Hussain Almohri
Identity theft.. Can we escape it?
Even if you're not connected, your privacy can be violated, with Internet. There're users who will follow their paranoid feelings about privacy and avoid connection to Internet whenever possible. They avoid connecting to public wifi networks (or even avoid LTE), rarely connect their laptops to Internet, and are afraid of any software or website they are about to use. This might be too extreme but I can assure the same users that they can't escape Internet. One example is that evil app that lets users search for a phone number to find the phone owner's name. Yes, I know, you won't use it but guess what: your friend will use it and that is enough. These apps work by collecting their users' contacts and generating large databases of names associated with phone numbers. That is how these apps generate their data. This is a subtle but simple example of how a person's info can unwillingly be shared across the globe without his or her consent or even knowledge.
The examples of privacy violations are numerous, especially in Kuwait. The users are generally unaware of them and are willing to use the services that absolutely violate their privacies. There is no way for anyone to stop many of those services, which in many cases are associated with the users' civil identification numbers. That is a single number that will give you access to a wealth of critical user private data, that if exposed, might cause extreme damage to the users' reputation or affect them in other ways. To give you an impression on the magnitude of the problem, go ahead and search for "civil id kuwait" and see the images! Given the simplicity of administrative procedures, users can be at risk at many levels.
For those who are curious and would like to change the world, I'll leave you with this: What can software do to protect your identity in Kuwait or in similar systems?