Cybersecurity company Surfshark organised a social experiment at a Manhattan cafe, showcasing people’s level of awareness on data privacy. During the one-day event titled “Food for Data,” cafe visitors were presented with a menu of drinks and snacks, but instead of regular dollar prices, customers were asked to provide personal data. For instance, a cappuccino cost your full name, and a flat white cost your email address. The social experiment revealed that 78% of cafe visitors were willing to give away their personal data for something as minor as a cup of coffee.
"Surfshark’s cafe experiment highlights the real price tag behind ‘free’ products or services: our personal data. Just as patrons exchanged their information for a cup of coffee, online users often give up their data without much thought. But once you put your data out there, its fate is uncertain — it could fall into the wrong hands and be exploited without your knowledge. Surfshark’s research shows that in the past 20 years, over 3 billion US email addresses have been leaked, opening people up to all sorts of dangerous cybercrimes, from identity theft to carefully crafted phishing schemes. We want to encourage people to protect their data vigilantly to avoid these risks", said Vytautas Kaziukonis, Surfshark’s founder and CEO.
Surfshark has been vocal about data breaches for years — their Data Breach Map reveals that:
Surfshark’s cybersecurity lead Aleksandr Valentij explains in more detail the risks users face when they overshare their personal data:
“First off, oversharing your data can lead to increased spam. But that’s just the tip of the iceberg. If your data ends up leaked on the dark web, you’re at risk of:
To protect yourself from these risks, be vigilant before sharing your data, especially data as sensitive as your home address or phone number. It’s always better to err on the side of caution.”, Aleksandr stated.
Disclaimer: no data was actually collected during the event. As a cybersecurity company, Surfshark takes user privacy very seriously (this is reflected in the no-logs policy).