Privacy, Security, and Digital Inequality

Total Page:16

File Type:pdf, Size:1020Kb

Privacy, Security, and Digital Inequality Privacy, Security, and Digital Inequality MARY MADDEN Privacy, Security, and Digital Inequality: How Technology Experiences and Resources Vary by Socioeconomic Status, Race, and Ethnicity 09.27.2017 MARY MADDEN Summary of Findings Among the many dimensions of digital inequality is the unequal distribution of the risks and resources associated with online life. Americans with lower levels of income and education are acutely aware of a range of digital privacy-related harms that could upend their financial, professional, or social well- being. And these concerns are often accompanied by low levels of trust in the institutions and companies that these Americans rely on to be responsible stewards of their data. At the same time, there are significant racial disparities when looking at privacy-related concerns; in particular, foreign- born Hispanic adults stand out for both their privacy sensitivites and their desire to learn more about safeguarding their personal information. Yet, many of those who feel most vulnerable to data-related harms also feel as though it would be difficult for them to find the tools and strategies needed to better protect their personal information online. These are among the key findings of a newly-released survey conducted by the Data & Society Research Institute and supported by a grant from the Digital Trust Foundation. The nationally representative survey was fielded in November and December of 2015 among 3,000 American adults, including an oversample of adults with annual household incomes of less than $40,000. The survey provides new insights into the privacy and security experiences of low-socioeconomic status (low-SES) populations and aims to contribute to a deeper understanding of their technology-related behaviors and beliefs. Data & Society Research Institute www.datasociety.net Understanding the Privacy and Security Experiences of Low-SES Populations 2 Americans with lower levels of income and education express heightened concerns about their informational and physical privacy and security. The survey includes a range of questions about various digital privacy and security concerns. For each of these questions, those living in households with annual incomes of less than $20,000 per year are considerably more likely to say that they are “very concerned” about the possibility of these harms when compared with those in households earning $100,000 or more per year: • 60% of those in the lowest-income households say the loss or theft of financial information is something they are “very concerned” about, while just 38% of those in the highest-earning households say the same. • 52% of those in the lowest-earning households say that not knowing what personal information is being collected about them or how it is being used makes them “very concerned,” compared with 37% of those in the highest-income households. • 48% of those in the lowest-income group say they are “very concerned” about becoming the victim of an internet scam or fraud, while just 24% adults in the highest-earning group report this. • 38% of those in the lowest-income households say they are “very concerned” that they or someone in their family may be the target of online harassment, while only 12% of adults in the highest-earning households report this level of concern. Variations by education level are also pronounced, with those who have less than a high school degree expressing roughly the same level of concern as those earning less than $20,000 per year. In addition, the digital privacy and security concerns that low-income Americans express often overlap with the daily challenges of coping with physical or financial insecurities—whether that means dealing with violence in one’s neighborhood or finding enough money to cover basic expenses for their families: • 56% of the lowest-income group say they are “very concerned” about not being able to access or afford the healthcare they or their family needs, while only 21% of adults in the highest-earning group report this as a major concern. Similarly, 56% of those with less than a high school degree are “very concerned” about losing access to healthcare, while just 24% of college graduates share this level of concern. • 48% of the lowest-income group say they are “very concerned” about losing their primary source of income, while just 19% of adults in the highest-earning group report this. Likewise, 47% of those with less than a high school degree are “very concerned” about losing their primary source of income, while just 19% of college graduates share this level of concern. Data & Society Research Institute www.datasociety.net Understanding the Privacy and Security Experiences of Low-SES Populations 3 Privacy and security concerns, by annual household income % of all adults who are "very" concerned about the following issues, by annual household income 60 Annual household Having your financial 50 income info lost or stolen 42 33 Less than $20,000 38 $20,000-39,999 Not knowing what info 52 $40,000-74,999 is being collected 44 about you or how it is 37 $75,000-99,999 35 being used 37 $100,000 or more Not being able to 56 access or afford the 45 34 healthcare you or your 24 family needs 21 48 Being the victim of an 35 26 Internet scam or fraud 23 24 48 Losing your primary 38 source of income, such 28 as your job 18 19 38 Being unfairly targeted 31 20 by law enforcement 15 16 36 Becoming a victim of 29 violent crime in the 15 area where you live 11 12 38 You or someone in your 25 familiy being the target 18 of online harrassment 8 12 Source: Data & Society Privacy and Security Experience of Low-Socioeconomic Status Populations Survey, November 18-December 23, 2015, including an oversample of adults living in households earning less than $40,000 per year. Interviews were conducted in English and Spanish (Total n=3,000 U.S. adults age 18 and older). Foreign-born Hispanic adults, who already lack many resources, feel exceptionally vulnerable online and offline. Beyond broad variations in income and education, this report examines the experiences of different racial and ethnic groups. It also includes a new analysis of Hispanic adults that considers their nativity, Data & Society Research Institute www.datasociety.net Understanding the Privacy and Security Experiences of Low-SES Populations 4 comparing those born in the U.S. with those born in other countries.1 In particular, foreign-born Hispanic adults, who are currently among the lowest-earning and least-educated groups in the U.S., stand out in a number of ways. While 73% of foreign-born Hispanic adults report household incomes of less than $40,000 per year, just 38% of whites report the same. The share of black adults (59%) and U.S.-born Hispanics (62%) in that income category is comparable, but the groups report drastically different educational experiences. Fully 50% of foreign-born Hispanic adults have not completed high school, while just 16% of black adults report this. By comparison, 11% of U.S.-born Hispanics say they have less than a high school degree, and only 8% of whites say this. Foreign-born Hispanic adults report the lowest levels of income and educational attainment Among various racial, ethnic, and nativity groups, the % at each income and eduation level $40,000 22 or more 33 31 55 Less than 73 $40,000 59 62 38 White Black Hispanic (US) Hispanic (FB) 9 18 17 College grad 33 19 Some college 34 35 22 HS grad 30 Less than HS 32 36 28 50 16 8 11 White Black Hispanic (US) Hispanic (FB) Source: Data & Society Privacy and Security Experience of Low-Socioeconomic Status Populations Survey, November 18-December 23, 2015, including an oversample of adults living in households earning less than $40,000 per year. Interviews were conducted in English and Spanish (Total n=3,000 U.S. adults age 18 and older). It is within this context of limited resources that foreign-born Hispanics are navigating their own use of technology amid a variety of daily worries that are not front-of-mind for most Americans. The range 1 According to Pew Research Center data from 2015, Hispanics accounted for 17.6% of the total U.S. population. Among adult Hispanics, 47.9% are foreign-born. For a more detailed statistical portrait, see: http://www.pewhispanic.org/2017/09/18/facts-on-u-s-latinos/#share-foreign-born Data & Society Research Institute www.datasociety.net Understanding the Privacy and Security Experiences of Low-SES Populations 5 of concerns they express about their financial, informational, and physical security suggest a climate of vulnerability that extends across a number of critical areas in their lives. In particular, the intensity of these concerns often stands in stark contrast to the worries expressed by U.S.-born Hispanics and white adults in our sample. In most cases—though not all—foreign-born Hispanic adults are also significantly more likely to report strong concerns than black adults. Among the largest gaps: • 65% of foreign-born Hispanic adults say they are “very concerned” about becoming a victim of violent crime in the area where they live. That compares with 41% of black adults, 32% of U.S.-born Hispanics, and just 12% of white adults expressing this level of concern about crime in their neighborhoods. • 62% of foreign-born Hispanic adults say they are “very concerned” about being unfairly targeted by law enforcement, compared with 32% of U.S.-born Hispanics and only 13% of whites. In this case, black adults share a comparable level of concern: 54% say they are “very concerned” about law enforcement targeting them unfairly.
Recommended publications
  • Privacy on the Internet: the Vole Ving Legal Landscape Debra A
    View metadata, citation and similar papers at core.ac.uk brought to you by CORE provided by Santa Clara University School of Law Santa Clara High Technology Law Journal Volume 16 | Issue 2 Article 10 January 2000 Privacy on the Internet: The volE ving Legal Landscape Debra A. Valentine Follow this and additional works at: http://digitalcommons.law.scu.edu/chtlj Part of the Law Commons Recommended Citation Debra A. Valentine, Privacy on the Internet: The Evolving Legal Landscape , 16 Santa Clara High Tech. L.J. 401 (2000). Available at: http://digitalcommons.law.scu.edu/chtlj/vol16/iss2/10 This Symposium is brought to you for free and open access by the Journals at Santa Clara Law Digital Commons. It has been accepted for inclusion in Santa Clara High Technology Law Journal by an authorized administrator of Santa Clara Law Digital Commons. For more information, please contact [email protected]. PRIVACY ON THE INTERNET: THE EVOLVING LEGAL LANDSCAPE Prepared Remarks of Debra A. Valentinet TABLE OF CONTENTS I. Introduction ................................................................................ 401 II. Privacy on the Internet-The Evolving Legal Landscape ............. 403 A. Federal Trade Commission Act and Informational Privacy ........... 404 B. Other Federal Statutes and Informational Privacy ......................... 408 C. Federal Intemet-Law ................................................................... 410 III. Current Federal Policy on Internet Privacy .................................. 412 IV. The U.S. Approach
    [Show full text]
  • Privacy and Cyber Security Emphasizing Privacy Protection in Cyber Security Activities
    Privacy and Cyber Security Emphasizing privacy protection in cyber security activities December 2014 Table of Contents Abstract ................................................................................................................................................................... 1 Introduction ............................................................................................................................................................ 1 1. Cyber Security Challenges ................................................................................................................................. 2 2. Cyber Security Policy Developments ................................................................................................................. 5 3. Conclusion: Emphasizing privacy protection in cyber security activities .......................................................... 7 ________________________________________________________________________________________________________ 30 Victoria Street – 1st Floor, Gatineau, QC K1A 1H3 • Toll-free: 1-800-282-1376 • Fax: (819) 994-5424 • TDD (819) 994-6591 www.priv.gc.ca • Follow us on Twitter: @privacyprivee Abstract This research report examines the common interests and tensions between privacy and cyber security. It explores how challenges for cyber security are also challenges for privacy and data protection, considers how cyber security policy can affect privacy, and notes how cyberspace governance and security is a global issue. Finally, it sets out key policy
    [Show full text]
  • Digital Privacy Policy
    Digital Privacy Policy This Internet Privacy Policy explains how we may collect information from you when you visit our web site or when you use our online financial services. We recognize the importance our customers place on the privacy and security of their personal information. Our goal is to protect your personal information in every way that we interact with you, whether it's on the telephone, in our lobby, at one of our ATMs, or on the Internet. We think it is important for you to be informed of the policies, procedures, and security measures that we have in place to safeguard your personal and confidential information. With that in mind, we have developed this Internet Privacy Policy to help you to understand the steps we take to protect your personal information when you utilize our online financial services. Below are several definitions of terms used within this policy: Customer Information - Customer Information refers to personally identifiable information about a consumer, customer or former customer of this Institution. Internet Protocol (IP) Address - an IP address is a unique address that devices use in order to identify and communicate with each other on a computer network. An IP address can be thought of as a street address or a phone number for a computer or other network device on the Internet. Just as each street address and phone number uniquely identifies a building or telephone, an IP address can uniquely identify a specific computer or other network device on a network. We may use IP addresses to monitor login activity and for identification purposes when necessary for security investigations.
    [Show full text]
  • The Right to Privacy and the Future of Mass Surveillance’
    ‘The Right to Privacy and the Future of Mass Surveillance’ ABSTRACT This article considers the feasibility of the adoption by the Council of Europe Member States of a multilateral binding treaty, called the Intelligence Codex (the Codex), aimed at regulating the working methods of state intelligence agencies. The Codex is the result of deep concerns about mass surveillance practices conducted by the United States’ National Security Agency (NSA) and the United Kingdom Government Communications Headquarters (GCHQ). The article explores the reasons for such a treaty. To that end, it identifies the discriminatory nature of the United States’ and the United Kingdom’s domestic legislation, pursuant to which foreign cyber surveillance programmes are operated, which reinforces the need to broaden the scope of extraterritorial application of the human rights treaties. Furthermore, it demonstrates that the US and UK foreign mass surveillance se practices interferes with the right to privacy of communications and cannot be justified under Article 17 ICCPR and Article 8 ECHR. As mass surveillance seems set to continue unabated, the article supports the calls from the Council of Europe to ban cyber espionage and mass untargeted cyber surveillance. The response to the proposal of a legally binding Intelligence Codexhard law solution to mass surveillance problem from the 47 Council of Europe governments has been so far muted, however a soft law option may be a viable way forward. Key Words: privacy, cyber surveillance, non-discrimination, Intelligence Codex, soft law. Introduction Peacetime espionage is by no means a new phenomenon in international relations.1 It has always been a prevalent method of gathering intelligence from afar, including through electronic means.2 However, foreign cyber surveillance on the scale revealed by Edward Snowden performed by the United States National Security Agency (NSA), the United Kingdom Government Communications Headquarters (GCHQ) and their Five Eyes partners3 1 Geoffrey B.
    [Show full text]
  • What Data Is Best Kept Private and Why?
    What data is best kept private and why? Hi, My name is Catherine Gicheru. I am an ICFJ Knight Fellow and the Director of the African Women Journalism Project, an initiative that works to support, train and mentor women journalists in Africa in covering underreported communities and issues. Last week Arzu Geybulla took you through what online harassment looks like, how to look after your emotional wellbeing and shared resources for psychosocial support. This week, l will be telling you about online privacy...what is it and why it's important. You will learn what information you should or shouldn't share online and how the information you share online can make you vulnerable to online attacks and targeted by bad actors. We shall also share some practical tips on what you can do to protect your privacy online. This week in addition to the videos there will be additional reading materials. I encourage you all to participate in the discussions that we shall be having throughout the week. Thank you for joining me and I look forward to working with you to better understand Online Privacy. I would like to start this second module by quickly talking about how the internet works so that you can better understand what data you share knowingly or unknowingly, and why some information should be kept private. There’s a lot of technical explanations of how the internet works, but the simplest explanation is this, the Internet is a vast, sprawling collection of networks that connect to each other. In fact, the word “Internet” comes from this concept: interconnected networks.
    [Show full text]
  • 1 Before the U.S. COPYRIGHT OFFICE, LIBRARY of CONGRESS
    Before the U.S. COPYRIGHT OFFICE, LIBRARY OF CONGRESS In the Matter of Section 512 Study Docket No. 2015-7 Additional Comments of Electronic Frontier Foundation February 21, 2017 Submitted by: Corynne McSherry Mitch Stoltz Kerry Maeve Sheehan1 Electronic Frontier Foundation 815 Eddy Street San Francisco, CA 94109 Telephone: (415) 436-9333 [email protected] The Electronic Frontier Foundation (EFF) appreciates the Copyright Office’s efforts to consider the impact of section 512 of the Digital Millennium Copyright Act. EFF is a member-supported, nonprofit, public interest organization dedicated to ensuring that copyright law advances the progress of science and the arts and enhances freedom of expression. Founded in 1990, EFF represents tens of thousands of dues-paying members, including consumers, hobbyists, computer programmers, entrepreneurs, students, teachers, and researchers, who are united in their desire for a balanced copyright system that provides adequate incentives for creators, facilitates innovation, and ensures broad access to information in the digital age. EFF has been involved, as amicus or party counsel, in numerous court cases interpreting section 512, including Lenz v Universal, Lessig v. Liberation Music, MoveOn v. Viacom, Tuteur v. Wesley Corcoran, Sapient v. Geller, SHARK v. PRCA, Viacom v. YouTube, UMG Recordings v. Veoh, and Columbia Pictures v. Fung. We regularly counsel 1 Kerry Maeve Sheehan is not admitted to practice law. 1 individuals who have been targeted by takedown notices pursuant to the DMCA regarding their rights and options. We have also represented the interests of users and innovators on multiple formal and informal public processes assessing the notice and takedown system, in the United States and abroad.
    [Show full text]
  • Is the Market for Digital Privacy a Failure?1
    Is the Market for Digital Privacy a Failure?1 Caleb S. Fuller2 Abstract Why do many digital firms rely on collecting consumer information–a practice that survey evidence shows is widely disliked? Why don’t they, instead, charge a fee that would protect privacy? This paper empirically adjudicates between two competing hypotheses. The first holds that firms pursue this strategy because consumers are ill-informed and thus susceptible to exploitation. The second holds that this strategy reasonably approximates consumer preferences. By means of survey, I test a.) the extent of information asymmetry in digital markets, b.) consumers’ valuation of privacy, and c.) whether government failure contributes to consumer mistrust of information collection. My results indicate that a.) the extent of information asymmetry is minimal, b.) there is significant divergence between “notional” and “real” demand for privacy and c.) that government contributes to consumer distrust of information collection by private firms. Significantly, almost 82% of Google users are unwilling to pay anything for increased digital privacy. JEL-Classification: D23, K29, Z18 Keywords: privacy paradox, digital privacy, survey, market failure 1 I wish to thank Alessandro Acquisti, Peter Leeson, Chris Coyne, Peter Boettke, David Lucas, Noah Gould, and Nicholas Freiling for helpful suggestions. All errors are my own. I am also indebted to the Mercatus Center for providing funding for the survey conducted by Haven Insights LLC. 2 Assistant professor of economics, Grove City College, Email: 1 INTRODUCTION Google’s motto is “Don’t Be Evil.” But the fact that the company surreptitiously collects the information of over one billion individuals annually leads some to question whether the firm’s business model runs afoul of its dictum (Hoofnagle 2009).
    [Show full text]
  • Principles of Internet Privacy
    Maurer School of Law: Indiana University Digital Repository @ Maurer Law Articles by Maurer Faculty Faculty Scholarship 2000 Principles of Internet Privacy Fred H. Cate Indiana University Maurer School of Law, [email protected] Follow this and additional works at: https://www.repository.law.indiana.edu/facpub Part of the Computer Law Commons, and the Law and Society Commons Recommended Citation Cate, Fred H., "Principles of Internet Privacy" (2000). Articles by Maurer Faculty. 243. https://www.repository.law.indiana.edu/facpub/243 This Article is brought to you for free and open access by the Faculty Scholarship at Digital Repository @ Maurer Law. It has been accepted for inclusion in Articles by Maurer Faculty by an authorized administrator of Digital Repository @ Maurer Law. For more information, please contact [email protected]. Principles of Internet Privacy FRED H. CATE* I. INTRODUCTION Paul Schwartz's InternetPrivacy and the State makes an important and original contribution to the privacy debate that is currently raging by be- ginning the process of framing a new and more useful understanding of what "privacy" is and why and how it should be protected.' The definition developed by Brandeis, Warren,2 and Prosser,3 and effectively codified by Alan Westin in 1967---"the claim of individuals, groups, or institutions to determine for themselves when, how, and to what extent information about them is communicated to others"---worked well in a world in which most privacy concerns involved physical intrusions (usually by the government) or public disclosures (usually by the media), which, by their very nature, were comparatively rare and usually discovered.
    [Show full text]
  • The Right to Privacy in the Digital Age
    The Right to Privacy in the Digital Age April 9, 2018 Dr. Keith Goldstein, Dr. Ohad Shem Tov, and Mr. Dan Prazeres Presented on behalf of Pirate Parties International Headquarters, a UN ECOSOC Consultative Member, for the Report of the High Commissioner for Human Rights Our Dystopian Present Living in modern society, we are profiled. We accept the necessity to hand over intimate details about ourselves to proper authorities and presume they will keep this information secure- only to be used under the most egregious cases with legal justifications. Parents provide governments with information about their children to obtain necessary services, such as health care. We reciprocate the forfeiture of our intimate details by accepting the fine print on every form we sign- or button we press. In doing so, we enable second-hand trading of our personal information, exponentially increasing the likelihood that our data will be utilized for illegitimate purposes. Often without our awareness or consent, detection devices track our movements, our preferences, and any information they are capable of mining from our digital existence. This data is used to manipulate us, rob from us, and engage in prejudice against us- at times legally. We are stalked by algorithms that profile all of us. This is not a dystopian outlook on the future or paranoia. This is present day reality, whereby we live in a data-driven society with ubiquitous corruption that enables a small number of individuals to transgress a destitute mass of phone and internet media users. In this paper we present a few examples from around the world of both violations of privacy and accomplishments to protect privacy in online environments.
    [Show full text]
  • Annual Privacy Report
    U.S. DEPARTMENT OF JUSTICE ANNUAL PRIVACY REPORT THE CHIEF PRIVACY AND CIVIL LIBERTIES OFFICER AND THE OFFICE OF PRIVACY AND CIVIL LIBERTIES OCTOBER 1, 2016 – SEPTEMBER 30, 2020 1 (MULTI) ANNUAL PRIVACY REPORT MESSAGE FROM THE CHIEF PRIVACY AND CIVIL LIBERTIES OFFICER I am pleased to present the Department of Justice’s (Department or DOJ) Annual Privacy Report, describing the operations and activities of the Chief Privacy and Civil Liberties Officer (CPCLO) and the Office of Privacy and Civil Liberties (OPCL), in accordance with Section 1174 of the Violence Against Women and Department of Justice Reauthorization Act of 2005. This report covers the period from October 1, 2016, through September 30, 2020. The Department’s privacy program is supported by a team of dedicated privacy professionals who strive to build a culture and understanding of privacy within the complex and diverse mission work of the Department. The work of the Department’s privacy team is evident in the care, consideration, and dialogue about privacy that is incorporated in the daily operations of the Department. During this reporting period, there has been an evolving landscape of technological development and advancement in areas such as artificial intelligence, biometrics, complex data flows, and an increase in the number of cyber security events resulting in significant impacts to the privacy of individuals. Thus, the CPCLO and OPCL have developed new policies and guidance to assist the Department with navigating these areas, some of which include the following:
    [Show full text]
  • Internet Privacy and the State
    UC Berkeley UC Berkeley Previously Published Works Title Internet Privacy and the State Permalink https://escholarship.org/uc/item/37x3z12g Author Schwartz, Paul M Publication Date 2021-06-27 Peer reviewed eScholarship.org Powered by the California Digital Library University of California Berkeley Law Berkeley Law Scholarship Repository Faculty Scholarship 1-1-1999 Internet Privacy and the State Paul M. Schwartz Berkeley Law Follow this and additional works at: http://scholarship.law.berkeley.edu/facpubs Part of the Law Commons Recommended Citation Paul M. Schwartz, Internet Privacy and the State, 32 Conn. L. Rev. 815 (1999), Available at: http://scholarship.law.berkeley.edu/facpubs/766 This Article is brought to you for free and open access by Berkeley Law Scholarship Repository. It has been accepted for inclusion in Faculty Scholarship by an authorized administrator of Berkeley Law Scholarship Repository. For more information, please contact [email protected]. Interet Privacy and the State PAUL M. SCHWARTZ" INTRODUCTION "Of course you are right about Privacy and Public Opinion. All law is a dead letter without public opinion behind it. But law and public opinion in-1 teract-and they are both capable of being made." Millions of people now engage in daily activities on the Internet, and under current technical configurations, this behavior generates finely grained personal data. In the absence of effective limits, legal or other- wise, on the collection and use of personal information on the Internet, a new structure of power over individuals is emerging. This state of affairs has significant implications for democracy in the United States, and, not surprisingly, has stimulated renewed interest in information privacy? Yet, the ensuing debate about Internet privacy has employed a deeply flawed rhetoric.
    [Show full text]
  • Piracy Versus Privacy: an Analysis of Values Encoded in the Piratebrowser
    International Journal of Communication 9(2015), 818–838 1932–8036/20150005 Piracy Versus Privacy: An Analysis of Values Encoded in the PirateBrowser BALÁZS BODÓ University of Amsterdam, Institute for Information Law The Netherlands The PirateBrowser is a Web browser that uses Tor privacy-enhancing technology to circumvent nationally implemented Internet filters blocking access to The Pirate Bay. This article analyzes the possible consequences of a mass influx of copyright pirates into the privacy domain. The article addresses the effects of the uptake of strong privacy technologies by pirates on copyright enforcement and on free speech and privacy technology domains. Also discussed are the norms and values reflected in the specific design choices taken by the developers of the PirateBrowser. Keywords: piracy, privacy, Tor, privacy-enhancing technologies, policy Introduction Tor (The Onion Router), “endorsed by Egyptian activists, WikiLeaks, NSA, GCHQ, Chelsea Manning, Snowden” (Dingledine & Appelbaum, 2013), is a volunteer network of computers that relays Web traffic through itself to provide anonymous, unobserved, and uncensored access to the Internet. It has about 4,000 relays and about 1,000 exit nodes. Tor users connect to the network, and their Web traffic is channeled through the internal relays to reach its final destination through one of the exit nodes. This arrangement makes the identification and surveillance of Tor users difficult. Anonymity is promised by the difficulty of tracing the Web traffic that appears on the exit node back to the individual who initiated the traffic, as long as there is a sufficient number of internal hops in between. Protection from surveillance is granted by the fact that each link in the communication chain is encrypted.
    [Show full text]