Self-Destruct Bypassing

Improved Essays
Moral Argument: Creation of a self-destruct bypassing tool undermines privacy. Allowing a bypassing tool to come in to existence is wrong. A self-destruct bypassing tool that undermines privacy is wrong (Dean).
This argument is a moral argument that centers on the moral principle of privacy. In premise one, creation of a self-destruct bypassing tool undermines privacy, is the nonmoral statement with in this argument (Vaughn). This statement shows that privacy applies to this case by linking it to the self-destruct bypassing tool that is currently being debated. Premise two, allowing a bypassing tool to come in to existence is wrong, is the moral statement that informs one of the action of actually bring this tool in to the world is bad (Vaughn).

Related Documents

  • Decent Essays

    In Rebecca Solnit’s article, “Easy Chair” I realized that we do not have privacy at all if we use the technology and take care of our things online on the Internet. The article Poison Apple made me realize that we do not have privacy at all if we use technology. For example, Rebecca Solnit mentioned, “Google is the world’s biggest advertising company, watching you on nearly every website you visit’’ (Solnit 5). This passage demonstrates how technology has been part of everyday human's life. Google knows everything about everyone’s interests and it can share this information with its partnerships and use it for their benefits.…

    • 166 Words
    • 1 Pages
    Decent Essays
  • Improved Essays

    Loo1 Unit 2 Research Paper

    • 1344 Words
    • 6 Pages

    Blackboard Name: Sanya Murgai PSID: 1264832 LO1: Discuss information privacy and methods for improving the privacy of information. LO2: Explain the effects on information privacy of e-mail, data collection, and censorship. In today’s day and age, privacies definition can be manipulated to personal preferences. Once we put something on the internet, it will be accessible forever even if we delete it.…

    • 1344 Words
    • 6 Pages
    Improved Essays
  • Decent Essays

    Analysis: Blown To Bits

    • 312 Words
    • 2 Pages

    Chapter two of Blown to Bits by Hal Abelson, Ken Ledeen, and Harry Lewis was about how technology affects our privacy. In this chapter, the authors discussed how our privacy is being stripped away, the willingness with which we give this privacy away, and privacy policies. As experts in technology, Abelson, Ledeen, and Lewis discuss how technology has aided this progression of human ideologies to lead increasingly more public lives. Our privacy is constantly being stripped away from us thanks to the technological innovations. As technology becomes more and more widely used, more and more personal information is being stored through technological means.…

    • 312 Words
    • 2 Pages
    Decent Essays
  • Superior Essays

    To oversimplify, matters surrounding privacy can be color coded. There are some issues that are very black and white related to the need to “violate” privacy. However, there are also quite a few gray areas where more research needs to be conducted and statistics gathered to formulate guidelines to determine when it is indeed necessary. Privacy in general needs to be treated in a way that is different from other rights and based on the serious consequences of not revealing facts that would be considered “private”.…

    • 1280 Words
    • 6 Pages
    Superior Essays
  • Improved Essays

    Post 9/11 Privacy

    • 1178 Words
    • 5 Pages

    However, the scope of this tradeoff has overreached their expectations of reasonable privacy infringement and this balance between security and personal privacy has become the hallmark of the privacy debate. In fact, the events of 9/11 helped to solidify the already growing situation in which technology developments were making information gathering simpler and existing laws for information gathering were undergoing drastic changes (Shamsi & Abado,…

    • 1178 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    Dbq Privacy

    • 800 Words
    • 4 Pages

    Privacy should be kept intact even for sake of security. One of the main supporting arguments for security is that if an individual has nothing to hide, then they have nothing to fear. In The Accountability Matrix by David Brin, Brin highlights the fact of having tools…

    • 800 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    However, despite all of are major accomplishments in the past forty years, we’re facing a major problem with our privacy. As a result of almost 90% of Americans using the internet on a day to day basis, the Senate of the United States has just passed a resolution that removes our very right to privacy. As of matter of fact, the resolution known as “SJ Resolution 34” has been passed as a law and will remain a law until a supreme court justice deems it unconstitutional or the legislation repeals it. Presently, as of May…

    • 713 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    “Privacy is not an option, and it shouldn't be the price we accept for just getting on the Internet,” stated Gary Kovacs the president of several software companies (Kovacs). However, since the implementation of the Patriot Act in 2001, the loss of American privacy is one of the many results of the new set of revised laws that have been rewritten to give the government more freedom in observing our electronic fingerprint (“Surveillance Under the Patriot Act”). In their hurry to act on the tragedy of 9/11, Congress passed the Act a mere 45 days of the event, with little to no debate. The result of it’s ratification, was a drastic change in the surveillance laws and restrictions of the federal government (“End Mass Surveillance Under the Patriot…

    • 1537 Words
    • 7 Pages
    Improved Essays
  • Superior Essays

    Many people say that the government needs to be able to have control over people's cell phones and they need to know what everyone is doing on the internet. This issue is called Privacy v.s. Safety. Many people would want to give up their ‘right to privacy’ in order to be safe and other people would just rather have their privacy.…

    • 1088 Words
    • 5 Pages
    Superior Essays
  • Improved Essays

    Apple should not provide the encryption code to unlock the iPhone of Syed Farook- one of the San Bernardino Shooters. Though the U.S government is seeking this encryption code in the name of national security, this access to millions of American’s personal information can too easily lead to the compromise of people’s 4th amendment rights. Moreover, this access may increase the targeting of minority groups such as Muslim American and African Americans. Using examples from Rampage and The New Jim Crow, I will demonstrate that this breach of privacy should be avoided and prove that it is inessential to combating domestic terrorism.…

    • 1154 Words
    • 5 Pages
    Improved Essays
  • Great Essays

    The vantage points taken by many to make headway in the controversy over abortion are endless, and Don Marquis is one of the many who argue for the impermissibility of the action. In my paper, I will object to Marquis’ conclusion that abortion is wrong by posing a thought experiment described by Michael Tooley. This serves the purpose of presenting a situation where an action that is morally wrong by Marquis’ logic is not intuitively impermissible. Similarly, I hope that by analyzing his argument through a Utilitarian lens it will become evident that the argument forged by Marquis is inadequate for determining the permissibility of abortion. In summary, by analyzing Marquis’ premises and subsequent conclusion through a Utilitarian perspective and by conducting a thought experiment I hope the reader will be convinced that the argument for the impermissibility of abortion posed by Marquis is inconclusive at best.…

    • 1552 Words
    • 7 Pages
    Great Essays
  • Improved Essays

    Personal privacy is an important aspect needed to maintain a healthy, strong, confident individual and community. Life itself is extremely personal as each individual’s life occurrences and private details pertain to only them. If an individual raid’s ones house, rips apart one’s paperwork, and trashes ones items there is nothing left. Everything they had known about their own life was for everyone else to know to. If the life of all is to be open to the public then the significance and meaning of one’s own life is gone.…

    • 1100 Words
    • 5 Pages
    Improved Essays
  • Superior Essays

    National security vs personal privacy has been a hot topic post-9/11. President Obama gave a speech on January 17, 2014 where he stated “in our rush to respond …. , the risk of government overreach – the possibility that we lose some of our core liberties in pursuit of security – also became more pronounced.” (Office of the Press Secretary) Due to the tragic event on September 11th, 2001, our government was placed under extraordinary pressures to find the terrorists and bring them to justice using whatever means possible. This brings around questions regarding ethical dilemmas as they relate to security and our right to privacy.…

    • 978 Words
    • 4 Pages
    Superior Essays
  • Improved Essays

    Also, the Apple’s privacy argument is all about safeguarding the public safety of all the good people using their products. On the other hand, the Government’s national security argument is that, the true culprits of the San Bernandino case could be brought be caught and brought into light. Explanation:…

    • 701 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Technology and media play a significant role in most people 's lives in today 's society. Digital devices are starting to rule over people 's lives. In Fahrenheit 451, Ray Bradbury illustrates a fictional society that revolves around electronics. The people living in Bradbury 's creation are brainwashed by the government, almost programmed to be the same, with a world in which reading books is illegal. The novel sends a clear warning to the real world showing how electronics can destroy freedom and independence.…

    • 1601 Words
    • 7 Pages
    Improved Essays