Your SlideShare is downloading. ×
Shmoocon
Upcoming SlideShare
Loading in...5
×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

×

Saving this for later?

Get the SlideShare app to save on your phone or tablet. Read anywhere, anytime - even offline.

Text the download link to your phone

Standard text messaging rates apply

Shmoocon

1,193
views

Published on


0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
1,193
On Slideshare
0
From Embeds
0
Number of Embeds
3
Actions
Shares
0
Downloads
4
Comments
0
Likes
0
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
No notes for slide

Transcript

  • 1. An Analysis of the Online Identity Battleground aestetix Shmoocon 2013Monday, February 18, 13
  • 2. Do you... Google?Monday, February 18, 13
  • 3. ... wait, wtf?Monday, February 18, 13
  • 4. Thesis Statements ✤ Identity is multifaceted (“prismatic”) ✤ There is no such thing as a “real” name ✤ Imposing a singular identity is not only harmful, it doesn’t workMonday, February 18, 13
  • 5. What is NSTIC? ✤ Created by Obama Administration to address current challenges in digital identity (passwords, identity theft, etc) ✤ Update from the February 2013 PlenaryMonday, February 18, 13
  • 6. What is NSTIC?Monday, February 18, 13
  • 7. What is NSTIC?Monday, February 18, 13
  • 8. Myth #1 Only pedophiles, criminals, and cyber- bullies do not want to use their legal names online! What is this “nym” thing? http://mythbustersresults.com/photos/adam-savage-mythbusters.jpgMonday, February 18, 13
  • 9. What is a “name”?Monday, February 18, 13
  • 10. What is a “name”? ✤ Identity is not the same thing as a name ✤ Name: a label or symbol that is used to identify a person, thing, or concept within a given contextMonday, February 18, 13
  • 11. Various Nom de Plumes ✤ Publius ✤ J.K. Rowling ✤ Nicholas Bourbaki ✤ Ian Donald Calvin Euclid Zappa ✤ Richard Bachman, Deep Throat, Voltaire, George Eliot, the Bronte Sisters...Monday, February 18, 13
  • 12. Various Nom de PlumesMonday, February 18, 13
  • 13. Why do names matter? ✤ Valerie Plaine ✤ Witness Protection Program ✤ Odysseus and the Cyclops ✤ AOL and Netflix databases http://hamzasdiary.files.wordpress.com/2011/05/cyclops.jpgMonday, February 18, 13
  • 14. What are social networks? ✤ A “social network” is a force that brings people or their personas together on a regular basis. ✤ A “friend” is a person that you would choose to be in contact with. ✤ An “institution” is a custom, practice, relationship, or significant behavior pattern within a social network.Monday, February 18, 13
  • 15. Exploring Identity Is identity internal or external? ✤ Self image (“id, ego and superego”) ✤ Reputation and the Citizen Kane style construct ✤ “The only thing worse than being talked about is not being talked about.” --Oscar Wilde http://en.wikipedia.org/wiki/Citizen_KaneMonday, February 18, 13
  • 16. Defining “identity” ✤ Carl Jung: ✤ Rational or “Conscious” ✤ Emotional or “Unconscious”Monday, February 18, 13
  • 17. Bringing Identity Online ✤ aestetix’s Method (draft spec):Monday, February 18, 13
  • 18. So, what’s a “nym”? ✤ Pseudonym - a name often used to hide a base name ✤ Polynym - a name consisting of multiple words or symbols ✤ Mononym - a name consisting of one word or symbol ✤ Autonym - a name bestowed upon oneself ✤ Anonym - a name representing anonymityMonday, February 18, 13
  • 19. Why not “real” name? ✤ Negative implications ✤ Lack of agency ✤ Easily substituted with better alternatives ✤ Where does this concept come from, anyways? http://www.shescribes.com/2011/07/i-cant-believe-its-not-butter-toast-tweet-100-giveaway.htmlMonday, February 18, 13
  • 20. What are social networks? ✤ Joseph Campbell: right hand path, left hand path, and the Hero’s Journey ✤ General Petraeus ✤ Why do hacker handles matter?Monday, February 18, 13
  • 21. A quick caveat... ✤ Zooko’s Triangle http://www.skyhunter.com/marcs/petnames/IntroPetNames.htmlMonday, February 18, 13
  • 22. Myth #2 We can stop cyber-bullying by forcing people to use their legal names People who do not use their legal names do not contribute positively to discussions http://mythbustersresults.com/photos/adam-savage-mythbusters.jpgMonday, February 18, 13
  • 23. Do Names Matter?Monday, February 18, 13
  • 24. Do Names Matter?Monday, February 18, 13
  • 25. Do Names Matter? http://en.wikipedia.org/wiki/Phineas_Gage http://circularabsurdity.blogspot.com/2010/11/my-steampunk-art.htmlMonday, February 18, 13
  • 26. Do Names Matter? ✤ Case Study: TechCrunchMonday, February 18, 13
  • 27. Do Names Matter? ✤ Case Study: TechCrunchMonday, February 18, 13
  • 28. Do Names Matter? ✤ Case Study: TechCrunchMonday, February 18, 13
  • 29. Do Names Matter? ✤ Case Study: Disqus, 60+ million users (Jan 10, 2012) http://disqus.com/research/pseudonyms/Monday, February 18, 13
  • 30. Do Names Matter? ✤ Case Study: Disqus, 60+ million users (Jan 10, 2012) http://disqus.com/research/pseudonyms/Monday, February 18, 13
  • 31. Total Lack of Names ✤ Social Number (launched Dec 2012)Monday, February 18, 13
  • 32. Total Lack of Names ✤ Social Number (launched Dec 2012)Monday, February 18, 13
  • 33. Total Lack of Names ✤ Social Number (launched Dec 2012)Monday, February 18, 13
  • 34. Myth #3 We cannot trust anyone who does not use their legal name onlineMonday, February 18, 13
  • 35. Trust and Reputation https://twitter.com/AntDeRosa/status/292796075348197376Monday, February 18, 13
  • 36. Trust and ReputationMonday, February 18, 13
  • 37. Trust and ReputationMonday, February 18, 13
  • 38. Trust and Reputation ✤ “Klout” scores http://www.socialbrite.org/2010/07/22/klout-measure-your-twitter-influence/Monday, February 18, 13
  • 39. Trust and Transparency ✤ What does transparency mean? ✤ Is there such a thing as full transparency? ✤ Who decides how transparent we get to be? ✤ Active versus Passive communication of personal informationMonday, February 18, 13
  • 40. Myth #4 We can trust online “identity providers” like Google and FacebookMonday, February 18, 13
  • 41. Does Identity Matter? Eric Schmidt, Executive Chairman at Google: ✤ “The only way to manage this is true transparency and no anonymity. In a world of asynchronous threats, it is too dangerous for there not to be some way to identify you. We need a [verified] name service for people. Governments will demand it.” (Techonomy, August 2010) ✤ “If you have something that you dont want anyone to know, maybe you shouldnt be doing it in the first place."(CNBC Interview, December 2009)Monday, February 18, 13
  • 42. Does Identity Matter? Mark Zuckerberg, CEO at Facebook: ✤ “The days of you having a different image for your work friends or co-workers and for the other people you know are probably coming to an end pretty quickly. Having two identities for yourself is an example of a lack of integrity.” (Interview, October 2011) http://allinio.com/2012/12/holiday-carol-good-king-zuckerberg/Monday, February 18, 13
  • 43. Does Identity Matter? Chris “moot” Poole, Founder of 4chan ✤ “The portrait of identity online is often painted in black and white. Who you are online is who you are offline. “Human identity doesnt work like that online or offline. Its not who you share with, its who you share as.’ Identity is prismatic.” (Web 2.0) http://www.hollywood.com/news/New_Yogi_Bear_Poster_Reveals_His_Darkest_Secret/7082914Monday, February 18, 13
  • 44. Recap of 2011 ✤ My G+ account was suspended ✤ Confusion over “common name” ✤ Request for government issued ID ✤ Questions about ID != common name ✤ Account suddenly reinstated http://www.tumblr.com/tagged/nym%20warsMonday, February 18, 13
  • 45. Recap of 2011Monday, February 18, 13
  • 46. I Wasn’t Alone!Monday, February 18, 13
  • 47. Where are we now? ✤ Updates to the Google+ policy (as of 10/27/2012): ✤ Limiting name changes (3 every 2 years) ✤ Names appeal (includes “significant following”) ✤ Nicknames policyMonday, February 18, 13
  • 48. Where are we now? ✤ Google’s idea of “pseudonyms”:Monday, February 18, 13
  • 49. Where are we now? ✤ Google patent #8271894 (granted Sep 18, 2012)Monday, February 18, 13
  • 50. Where are we now?Monday, February 18, 13
  • 51. Where are we now?Monday, February 18, 13
  • 52. Where are we now?Monday, February 18, 13
  • 53. Bringing Identity Online ✤ Google’s Method:Monday, February 18, 13
  • 54. Where are we now? ✤ “Snitchgate” (September 2012)Monday, February 18, 13
  • 55. Where are we now? ✤ Instagram Fiasco (Jan 22, 2013) http://news.cnet.com/8301-1023_3-57565293-93/instagram-account-crackdown-alarms-members-who-think-theyve-been-hacked/Monday, February 18, 13
  • 56. Where are we now? ✤ Instagram FiascoMonday, February 18, 13
  • 57. Where are we now? ✤ Instagram FiascoMonday, February 18, 13
  • 58. Where are we now? ✤ Questions for thought: ✤ Who are Google and Facebook trying to “impress”? ✤ Who else might have access to this data? ✤ Why would Chewbacca, an 8-foot-tall Wookie, want to live on Endor with a bunch of 2-foot- tall Ewoks? Is that his real name? https://en.wikipedia.org/wiki/File:0330chewbacca.jpgMonday, February 18, 13
  • 59. Myth #5 We are currently fixing this through legislation.Monday, February 18, 13
  • 60. Legal issues? ✤ South Korea Real Name Verification Law (2003-2012) ✤ Required Resident Registration Number to be used for verification to improve “quality” ✤ Repealed in 2012 after Korea Communications Commission found a 0.9% change ✤ Follow-up study by Carnegie-MellonMonday, February 18, 13
  • 61. Legal issues? ✤ Strengthening Network Internet Protection (China) ✤ Passed on 28 December 2012 ✤ Section VI: Network service providers that handle website access services for users, handle fixed telephone, mobile telephone and other surfing formalities, or provide information publication services to users, shall, when concluding agreements with users or affirming the provision of service, require users to provide real identity information. http://chinacopyrightandmedia.wordpress.com/2012/12/28/national-peoples-congress-standing-committee-decision-concerning-strengthening-network-information-protection/Monday, February 18, 13
  • 62. Legal issues? ✤ California Proposition 35 (passed Nov 6, 2012) ✤ Californians Against Sexual Exploitation (“CASE”) ✤ Section 290.014 (b): If any person who is required to register pursuant to the Act adds or changes his or her account with an Internet service provider or adds or changes an Internet identifier, the person shall send written notice of the addition or change to the law enforcement agency or agencies with which he or she is currently registered within 24 hours. ...” ✤ EFF filed lawsuit, injunction granted as of Jan 11, 2013Monday, February 18, 13
  • 63. Legal issues? ✤ German Telemedia Act (passed 26 February 2007) ✤ Section 13 (6): “The service provider must enable the use of telemedia and payment for them to occur anonymously or via a pseudonym where this is technically possible and reasonable. The recipient of the service is to be informed about this possibility.” ✤ Ongoing lawsuit with Facebook http://www.cgerli.org/fileadmin/user_upload/interne_Dokumente/Legislation/Telemedia_Act__TMA_.pdfMonday, February 18, 13
  • 64. Moving Forward ✤ Join NymRights! (www.nymrights.org) ✤ Anyone can be an IDESG/NSTIC member!Monday, February 18, 13
  • 65. Questions? ✤ @aestetixMonday, February 18, 13