There is a particular move that precedes most of the privacy violations I have observed, and it is made before the violation occurs.
The move is this: I wouldn’t mind becomes you shouldn’t mind.
It happens quickly, below the level of conscious reasoning, and produces in the person making it, a genuine sense of innocence.
They are not, in their own understanding, ignoring your preferences. They are applying their own—which they have tested, found reasonable, and extended to you by default. The assumption of your consent is experienced not as an imposition but as a kindness. They have spared you the inconvenience of being asked.
The result is a form of consent that was never requested, never given, and will be defended afterward with complete sincerity by someone who genuinely cannot understand what the problem is.
Jay had read my book. Not a casual reading—a book specifically about low-level, pervasive, interpersonal abuse, which is to say a book whose subject is precisely the kind of harm that proceeds from one person treating another person’s boundaries as optional. The book contained a statement about how I value my privacy. It was not incidental. It was explicit. The author telling you, plainly, something important about how they move through the world.
Jay uploaded my private files to a public site.
When I raised this, Jay’s explanation was that she doesn’t care about her own intellectual property because she doesn’t have any. She had applied her own relationship with intellectual property—indifferent, untroubled, unbothered by questions of ownership and consent—to mine. Her indifference was the measure she used. Since the thing didn’t matter to her, the assumption was that it didn’t matter, or shouldn’t matter, or needn’t be checked on before proceeding.
The book she had read before doing this had told her it mattered. The explicit statement she had encountered had told her it mattered. These were not ambiguous signals requiring interpretation. They were direct statements of the kind that, in the structure I described, would constitute a boundary clearly stated.
The boundary was ignored not because Jay had weighed it and decided to override it. It was ignored because Jay’s own indifference had already answered the question the boundary was raising. She had consulted herself. The consultation of me was not part of the process because the consultation of herself had already provided the relevant data.
Their indifference becomes the measure of your exposure.
Fred’s case is structurally identical and phenomenologically different, which is what makes it worth examining separately.
Fred doesn’t care about his own privacy. This is a genuine position, arrived at through temperament or simply the particular way Fred has arranged his relationship with information about himself. Fred shares freely, discloses readily, has no strong feelings about who knows what about him, and has found this a perfectly workable way to move through the world.
Fred shared my data.
When this was raised with him, Fred’s response was that he hadn’t shared my data—or more precisely, that he didn’t understand how what he had done constituted sharing in any meaningful sense, because he doesn’t experience data sharing as a harmful category. His own privacy is not something he guards, so the concept of a privacy breach—the specific harm that occurs when information moves from a context where it belongs to a context where it doesn’t, without the consent of the person it concerns—is not fully available to him as a concept. He has no personal reference point for it. He cannot feel the breach from the inside because from the inside, for Fred, there is nothing to breach.
This is not malice. It is a more interesting and more difficult thing than malice—it is the genuine incapacity to perceive a harm that your own configuration has made invisible to you. Fred is not pretending not to understand. He actually doesn’t understand. His indifference to his own privacy has produced a blind spot and that blind spot is so complete that it doesn’t register as a blind spot. It registers as a reasonable assessment of a situation in which no harm occurred, because no harm of the kind Fred recognises occurred.
He did not share my data because he does not share data. He does not share data because he does not experience data as something worth protecting. The fact that I experience it differently is, in Fred’s framework, a difference in preference rather than a difference in what happened. He cannot locate the breach because he cannot locate the category the breach belongs to.
Their indifference becomes the measure of your exposure.
Jay and Fred are not the same person making the same error. Jay acted on an explicit contradiction—she had been told, in writing, in a book she had read, that privacy mattered to the person whose files she was uploading. The knowledge was present. The substitution was made anyway, the knowledge overridden by the easier arithmetic of her own indifference. This is the projection of tolerance in its most exposed form—the one where the available information has already been disqualified before the action is taken.
Fred acted without the explicit contradiction—or rather, with a different kind of one. He had not been told, in those terms, that I valued privacy, but the assumption that another person’s relationship with their own information matches yours is itself a claim that requires evidence. The evidence is the other person’s stated or observable preferences. Fred did not seek that evidence because his own position had already answered the relevant question. The question was never, in Fred’s process, whether I would mind. It was whether the action was, by Fred’s lights, worth minding about.
Both cases involve the same substitution. One person’s tolerance for exposure is used in place of another person’s consent to it.
The mechanics of this substitution are worth being precise about because they explain why it is so difficult to address after the fact.
When I raised the issue with Jay, she had a complete and internally consistent account of her actions that did not include a violation. She had done something she wouldn’t have minded someone doing to her. She had, if anything, been helpful—sharing content, making things available, operating in the spirit of open exchange that she finds natural and reasonable. The account was not a fabrication. It was her genuine experience of what had happened, filtered through a set of assumptions that had already processed my preferences out of the picture.
Challenging the action required, first, challenging the framework in which the action made sense. Not just this was wrong but the way you understood this situation was missing a category—specifically, the category of the person whose preferences differ from yours and whose consent is therefore not a function of your own tolerance.
That is a more demanding conversation than you did something wrong. It requires the other person to recognise not just a specific error but a systematic gap in how they reason about other people’s inner lives. It requires them to accept that their own experience of a thing—indifference to intellectual property, indifference to privacy—does not settle the question of how the thing functions for someone else. That another person is not simply a self arranged differently.
This is, for some people, genuinely difficult. Not because they are incurious or cruel but because the assumption that others share your configuration is one of the mind’s more efficient shortcuts, and efficiency has a cost. The cost is the person whose configuration differs and who watches their preferences processed through someone else’s defaults and emerge as consent they never gave.
The defence afterward has a characteristic form that is also worth recognising.
I didn’t think you’d mind. Which is true—they didn’t think it, because they didn’t think about it, because thinking about it would have required consulting a source other than themselves. I wouldn’t have minded. Which is also true, and entirely beside the point. I was only trying to help. Which may also be true, and which is the most disorienting version because it is the hardest to argue with.
The defence is not dishonest. It accurately describes the internal experience of someone who substituted their own tolerance for another person’s consent and found, on reflection, that their own tolerance was perfectly adequate for the purpose. The gap between their experience and yours is not, in their account, a gap they created. It is a gap that exists because you have unusual preferences—preferences that differ from theirs, which are the implicit standard against which preferences are being measured.
You shouldn’t mind was always the assumption underneath I wouldn’t mind. The defence makes this explicit. Your minding is the anomaly. Their not-minding is the baseline. The baseline was applied. That you fell outside it is your distinction to explain, not theirs to have anticipated.
What connects the café photograph and Jay’s upload and Fred’s data sharing is not intent. None of these people set out to violate anything. What connects them is a prior decision—made below the level of conscious choice, embedded in the assumptions they brought to the situation—that their own relationship with the thing in question was the relevant measure.
The woman at the café had decided, before she approached, that visibility in public space is not something people reasonably object to, because she doesn’t object to it. Jay had decided, before she uploaded, that intellectual property is not something people reasonably guard, because she doesn’t guard it. Fred had decided, before he shared, that privacy is not something people reasonably protect, because he doesn’t protect it.
In each case the decision was made about themselves and applied to someone else. The application felt natural because their own position felt universal—not as an explicit claim but as a default, the water they swam in, the standard against which other positions were measured and found, not wrong exactly, but unusual.
Consent is no longer requested. It is assumed, projected, and defended after the fact.
The assumption is made in good faith. It is made in the complete absence of the one piece of information that would have made it unnecessary.
The other person’s actual answer to the question that was never asked.