
Internet Adoption in Kenya
Mobile broadband, cloud, and AI are particularly key.
Think twice before posting personal details
In Summary
This contradiction makes me wonder: Are we
really in control of our own information, or are we just playing along in a
system where privacy is more illusion than reality? Even as we try to protect our personal
data, we often lose control of it. Governments and tech companies collect more
information than we might expect, not necessarily to stop us from using
technology but to monitor and influence it. Social media giants face pressure to share
user data with governments, including things like location. We may not see this
data but the people in power do. Here in Kenya, this issue feels especially
close to home. The truth is, absolute privacy does not exist. If you want to
open a bank account, apply for a government service or even get a SIM card, you
have to give up some personal information. Sure you could choose to opt out,
but at what cost? Avoiding these systems means missing out on essential
services, which you cannot do without. Then there’s the issue of credibility.
Even if you have something important to say, people may not take you seriously
if they do not know who you are. We naturally trust content from people we can
identify with. Online platforms increasingly prioritise verified accounts,
making it harder for anonymous voices to be heard. So, is staying anonymous
really worth it? At the end of the day, we are all making
trade-offs. If you want to protect your privacy, you might sacrifice
credibility and access to important services. If you want recognition and
influence, you will likely have to give up some control over your personal
data. The real question is, “Are we making these choices freely, or are we just
following the rules of a game that has already been decided for us?” This all comes down to data safety and
what measures we can put in place despite the vulnerabilities. First, being
mindful of the information you share online, think twice before posting
personal details, even on seemingly harmless platforms. Using privacy-focused
tools, such as encrypted messaging apps and virtual private networks (VPNs),
can add an extra layer of protection against prying eyes. Make it a habit to regularly review
privacy settings on social media and other digital services to maintain better
control over who has access to your information. It is also wise to limit the
use of public WiFi networks and to enable multi-factor authentication on
sensitive accounts to reduce the risk of unauthorised access. Ezekiel Mureithi is the head of marketing and communications at Crawford
International School
Mobile broadband, cloud, and AI are particularly key.