Privacy: getting beyond 'meh'
Upcoming SlideShare
Loading in...5
×
 

Privacy: getting beyond 'meh'

on

  • 4,627 views

A presentation for SuperMondays on Monday 28th July 2014.

A presentation for SuperMondays on Monday 28th July 2014.

Statistics

Views

Total Views
4,627
Views on SlideShare
4,360
Embed Views
267

Actions

Likes
82
Downloads
57
Comments
0

16 Embeds 267

http://127.0.0.1 98
https://twitter.com 39
http://kurso.ru 38
http://stage.kurso.ru 17
http://10.0.10.17 16
http://www.governor.co.uk 15
http://www.scoop.it 13
http://mangastorytelling.tistory.com 10
http://www.sophia.org 6
http://www.w3schools.com 5
http://yeilysb.blogspot.com 2
http://www.slideee.com 2
http://tweetedtimes.com 2
http://plus.url.google.com 2
http://dev.eventdots.jp 1
https://tweetdeck.twitter.com 1
More...

Accessibility

Categories

Upload Details

Uploaded via as Adobe PDF

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Processing…
Post Comment
Edit your comment

Privacy: getting beyond 'meh' Privacy: getting beyond 'meh' Presentation Transcript

  • PRIVACYGetting beyond ‘meh’.
  • – Open Mike Eagle, Dark Comedy Morning Show “Cause Google knows what's in my cabinet And Facebook logs all of my favorite sandwiches And what they need the damn data for To analyze the shit they'd need a whole 'nother labor force”
  • "A building circular... The prisoners in their cells, occupying the circumference— The officers in the centre. By blinds and other contrivances, the Inspectors concealed... from the observation of the prisoners: hence the sentiment of a sort of omnipresence — The whole circuit reviewable with little, or... without any, change of place. One station in the inspection part affording the most perfect view of every cell." – Jeremy Bentham Proposal for a New and Less Expensive mode of Employing and Reforming Convicts (1798)
  • “This disciplinary aspect of panoptic observation involves a productive soul training which encourages inmates to reflect upon the minutia of their own behaviour in subtle and ongoing efforts to transform their selves.” – Michel Foucault, Discipline and Punish: The Birth of a Prison (1975)
  • [BUT WHAT ABOUT NATIONAL SECURITY?] But what about NATIONAL SECURITY?
  • [BUT WHAT ABOUT NATIONAL SECURITY?] You mean GOVERNMENT SURVEILLANCE?
  • [BUT WHAT ABOUT NATIONAL SECURITY?] Yeah, that.
  • Dragnet approaches to collecting data are inefficient
  • We live in a democracy, but can we be sure we can trust future governments with our personal data?
  • Do we need to choose? PRIVACY SECURITY
  • NO
  • Related, but different. PRIVACY SECURITY
  • PRIVACY …is why we put curtains on our windows SECURITY …is why we put locks on our doors
  • [BUT WHAT ABOUT NATIONAL SECURITY?] Yeah, well people who want privacy obviously have something to hide.
  • [BUT WHAT ABOUT NATIONAL SECURITY?] REALLY?
  • How many of us use internet-enabled devices when we’re not fully clothed?
  • Police called after husband and wife use Google separately to search for innocuous items.
  • “What determines whether you look like you have something to hide? The robot builders have it in their best interests to keep that secret: otherwise, the people with something to hide would simply start gaming the system. Yet this can also result in a chilling effect: innocent people self-censoring their online behavior based on what they think the robots might be looking for.” – Atul Varma, Does Privacy Matter?
  • [BUT WHAT ABOUT NATIONAL SECURITY?] What if I’m happy to trade some privacy for FREE, EASY-TO-USE SERVICES?
  • [BUT WHAT ABOUT NATIONAL SECURITY?] You mean CORPORATE SURVEILLANCE?
  • [BUT WHAT ABOUT NATIONAL SECURITY?] Er, yeah.
  • We’re all familiar with email spam and people selling contact details…
  • …but what about all of that other data being triangulated without our knowledge/consent?
  • “Secondary use is the exploitation of data obtained for one purpose for an unrelated purpose without the subject's consent. How long will personal data be stored? How will the information be used? What could it be used for in the future? The potential uses of any piece of personal information are vast.” – The Chronicle Review, Why Privacy Matters Even if You Have 'Nothing to Hide' READ
  • Privacy gives us space to play/ explore facets of our identities (beliefs, opinions, assumptions)
  • “Privacy norms help regulate social relationships such as intimate relations, family relationships, professional relationships including those between a physician and a patient, a lawyer or accountant and a client, a teacher and a student, and so on. Thus privacy enhances social interaction on a variety of levels.” – Stanford Encyclopedia of Philosophy, Privacy
  • “Lampard was one of four Chelsea players who reportedly verbally abused American tourists who had been stranded at a Heathrow Airport hotel in the aftermath of 9/11 attacks. The drunken midfielder, then 23, and his teammates mocked them, stripped, swore and vomited in front of the group of Americans.”
  • "There is an emotional risk to having one’s past perfectly preserved. If we can’t forget, we remain tethered to our past rather than being able to act in the present." – Viktor Mayer-Schonberger, Professor of Internet Governance, Oxford University
  • [BUT WHAT ABOUT NATIONAL SECURITY?] OK, so what can I do about all of this?
  • [BUT WHAT ABOUT NATIONAL SECURITY?] 1. Prevent 2. Mitigate 3. Conserve
  • https://myshadow.org
  • https://mozilla.org/lightbeam
  • https://epic.org/privacy/tools.html
  • https://prism-break.org
  • https://tosdr.org
  • dougbelshaw.com @dajbelshaw
  • SPARE SLIDES
  • SECURITY primarily affects you
  • PRIVACY affects everyone