PRIVACYGetting beyond ‘meh’.
– Open Mike Eagle, Dark Comedy Morning Show
“Cause Google knows what's in my cabinet
And Facebook logs all of my favorite ...
"A building circular... The prisoners in
their cells, occupying the
circumference— The officers in the
centre. By blinds a...
“This disciplinary aspect of
panoptic observation involves a
productive soul training which
encourages inmates to reflect
...
[BUT WHAT ABOUT
NATIONAL SECURITY?]
But what about
NATIONAL SECURITY?
[BUT WHAT ABOUT
NATIONAL SECURITY?]
You mean
GOVERNMENT
SURVEILLANCE?
[BUT WHAT ABOUT
NATIONAL SECURITY?]
Yeah, that.
Dragnet approaches to collecting data are inefficient
We live in a democracy,
but can we be sure we
can trust future
governments with our
personal data?
Do we need to choose?
PRIVACY SECURITY
NO
Related, but different.
PRIVACY
SECURITY
PRIVACY
…is why we put
curtains on our
windows
SECURITY
…is why we put
locks on our doors
[BUT WHAT ABOUT
NATIONAL SECURITY?]
Yeah, well people who
want privacy obviously
have something to hide.
[BUT WHAT ABOUT
NATIONAL SECURITY?]
REALLY?
How many of us use internet-enabled
devices when we’re not fully clothed?
Police called after husband and wife use Google
separately to search for innocuous items.
“What determines whether you look like
you have something to hide? The robot
builders have it in their best interests
to k...
[BUT WHAT ABOUT
NATIONAL SECURITY?]
What if I’m happy to
trade some privacy for
FREE, EASY-TO-USE
SERVICES?
[BUT WHAT ABOUT
NATIONAL SECURITY?]
You mean
CORPORATE
SURVEILLANCE?
We’re all familiar
with email spam
and people
selling contact
details…
…but what about all of that other data being
triangulated without our knowledge/consent?
“Secondary use is the exploitation of
data obtained for one purpose for an
unrelated purpose without the
subject's consent...
Privacy gives us space to play/
explore facets of our identities
(beliefs, opinions, assumptions)
“Privacy norms help regulate social
relationships such as intimate
relations, family relationships,
professional relations...
“Lampard was one of four Chelsea players who reportedly verbally abused American tourists who
had been stranded at a Heath...
"There is an emotional risk to having one’s
past perfectly preserved. If we can’t forget,
we remain tethered to our past r...
[BUT WHAT ABOUT
NATIONAL SECURITY?]
OK, so what can I do
about all of this?
[BUT WHAT ABOUT
NATIONAL SECURITY?]
1. Prevent
2. Mitigate
3. Conserve
https://myshadow.org
https://mozilla.org/lightbeam
https://epic.org/privacy/tools.html
https://prism-break.org
https://tosdr.org
dougbelshaw.com
@dajbelshaw
SPARE SLIDES
SECURITY primarily affects you
PRIVACY affects everyone
Privacy: getting beyond 'meh'
Privacy: getting beyond 'meh'
Privacy: getting beyond 'meh'
Upcoming SlideShare
Loading in...5
×

Privacy: getting beyond 'meh'

5,560

Published on

A presentation for SuperMondays on Monday 28th July 2014.

Published in: Internet, Technology
0 Comments
84 Likes
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total Views
5,560
On Slideshare
0
From Embeds
0
Number of Embeds
20
Actions
Shares
0
Downloads
65
Comments
0
Likes
84
Embeds 0
No embeds

No notes for slide

Transcript of "Privacy: getting beyond 'meh'"

  1. 1. PRIVACYGetting beyond ‘meh’.
  2. 2. – Open Mike Eagle, Dark Comedy Morning Show “Cause Google knows what's in my cabinet And Facebook logs all of my favorite sandwiches And what they need the damn data for To analyze the shit they'd need a whole 'nother labor force”
  3. 3. "A building circular... The prisoners in their cells, occupying the circumference— The officers in the centre. By blinds and other contrivances, the Inspectors concealed... from the observation of the prisoners: hence the sentiment of a sort of omnipresence — The whole circuit reviewable with little, or... without any, change of place. One station in the inspection part affording the most perfect view of every cell." – Jeremy Bentham Proposal for a New and Less Expensive mode of Employing and Reforming Convicts (1798)
  4. 4. “This disciplinary aspect of panoptic observation involves a productive soul training which encourages inmates to reflect upon the minutia of their own behaviour in subtle and ongoing efforts to transform their selves.” – Michel Foucault, Discipline and Punish: The Birth of a Prison (1975)
  5. 5. [BUT WHAT ABOUT NATIONAL SECURITY?] But what about NATIONAL SECURITY?
  6. 6. [BUT WHAT ABOUT NATIONAL SECURITY?] You mean GOVERNMENT SURVEILLANCE?
  7. 7. [BUT WHAT ABOUT NATIONAL SECURITY?] Yeah, that.
  8. 8. Dragnet approaches to collecting data are inefficient
  9. 9. We live in a democracy, but can we be sure we can trust future governments with our personal data?
  10. 10. Do we need to choose? PRIVACY SECURITY
  11. 11. NO
  12. 12. Related, but different. PRIVACY SECURITY
  13. 13. PRIVACY …is why we put curtains on our windows SECURITY …is why we put locks on our doors
  14. 14. [BUT WHAT ABOUT NATIONAL SECURITY?] Yeah, well people who want privacy obviously have something to hide.
  15. 15. [BUT WHAT ABOUT NATIONAL SECURITY?] REALLY?
  16. 16. How many of us use internet-enabled devices when we’re not fully clothed?
  17. 17. Police called after husband and wife use Google separately to search for innocuous items.
  18. 18. “What determines whether you look like you have something to hide? The robot builders have it in their best interests to keep that secret: otherwise, the people with something to hide would simply start gaming the system. Yet this can also result in a chilling effect: innocent people self-censoring their online behavior based on what they think the robots might be looking for.” – Atul Varma, Does Privacy Matter?
  19. 19. [BUT WHAT ABOUT NATIONAL SECURITY?] What if I’m happy to trade some privacy for FREE, EASY-TO-USE SERVICES?
  20. 20. [BUT WHAT ABOUT NATIONAL SECURITY?] You mean CORPORATE SURVEILLANCE?
  21. 21. [BUT WHAT ABOUT NATIONAL SECURITY?] Er, yeah.
  22. 22. We’re all familiar with email spam and people selling contact details…
  23. 23. …but what about all of that other data being triangulated without our knowledge/consent?
  24. 24. “Secondary use is the exploitation of data obtained for one purpose for an unrelated purpose without the subject's consent. How long will personal data be stored? How will the information be used? What could it be used for in the future? The potential uses of any piece of personal information are vast.” – The Chronicle Review, Why Privacy Matters Even if You Have 'Nothing to Hide' READ
  25. 25. Privacy gives us space to play/ explore facets of our identities (beliefs, opinions, assumptions)
  26. 26. “Privacy norms help regulate social relationships such as intimate relations, family relationships, professional relationships including those between a physician and a patient, a lawyer or accountant and a client, a teacher and a student, and so on. Thus privacy enhances social interaction on a variety of levels.” – Stanford Encyclopedia of Philosophy, Privacy
  27. 27. “Lampard was one of four Chelsea players who reportedly verbally abused American tourists who had been stranded at a Heathrow Airport hotel in the aftermath of 9/11 attacks. The drunken midfielder, then 23, and his teammates mocked them, stripped, swore and vomited in front of the group of Americans.”
  28. 28. "There is an emotional risk to having one’s past perfectly preserved. If we can’t forget, we remain tethered to our past rather than being able to act in the present." – Viktor Mayer-Schonberger, Professor of Internet Governance, Oxford University
  29. 29. [BUT WHAT ABOUT NATIONAL SECURITY?] OK, so what can I do about all of this?
  30. 30. [BUT WHAT ABOUT NATIONAL SECURITY?] 1. Prevent 2. Mitigate 3. Conserve
  31. 31. https://myshadow.org
  32. 32. https://mozilla.org/lightbeam
  33. 33. https://epic.org/privacy/tools.html
  34. 34. https://prism-break.org
  35. 35. https://tosdr.org
  36. 36. dougbelshaw.com @dajbelshaw
  37. 37. SPARE SLIDES
  38. 38. SECURITY primarily affects you
  39. 39. PRIVACY affects everyone

×