Online Privacy
A Customer’s Perspective
2
Source: https://www.youtube.com/watch?v=vVTKHI5ovyc
In the last 7 years
3
4
Source: http://www.slideshare.net/kumar641/presentation-to-tp-forum-sep-2007
3 lessons
• Privacy is in the details- how do you deal with
exceptions and false positives?
• Institutionalise privacy pro...
But trust is rapidly eroding
6
And is actually worse in reality
7
Source: http://www.theguardian.com/world/interactive/2013/jul/31/nsa-xkeyscore-program-...
Pervasive, ubiquitous surveillance
8
Source: http://www.theguardian.com/world/interactive/2013/jul/31/nsa-xkeyscore-progra...
Pervasive, ubiquitous surveillance
9
Conspiracy theories natural
10
Source: http://www.nbr.co.nz/article/dictators-guide-internet-how-balkanize-dirty-web-ck-14...
Major online service providers
also under scrutiny
11
Source: http://www.metafilter.com/95152/Userdriven-discontent#3256046
12
Source: http://www.ideachampions.com/weblogs/archives/2010/06/the_value_of_co_1.shtml
Mandatory notifications?
13
For major security breaches, a good
idea but...
14
1. Anonymity online is a myth
15
2. Take sensible steps
Source: http://mashable.com/2013/04/30/facebook-graph-search-privacy-infographic/
But accept peo...
16
3. Consider if you are willing to pay for
privacy. Professionals and businesses
should consider confidentiality and
leg...
17
So, what am I doing?
Source: http://romanticactoftheday.blogspot.co.nz/2012/09/your-gold-plated-word.html
1. Talking about the issues
18
Source: http://internetganesha.wordpress.com/
2. Becoming a cypherpunk
19
“An activist advocating widespread use
of strong cryptography as a route to
social and politic...
20
1x 1x
1 million x
Customer’s perspective
21
Don’t be a low
hanging victim
Send sealed letter,
not postcard
Crypto for the masses
• Perceived need
• It has to just work
• No compromise in functionality
• Real security requires end...
23
What’s next?
Source: http://my-squidoo-lens.blogspot.co.nz/2010/10/animal-psychology.html
Inspiration from the Bitcoin system
• Decentralised ledgers connected by crypto-
enforced contracts
• Peer-to-peer, irreve...
Takeaways
• Design systems and processes for a low or
zero trust environment.
• Customers can take more responsibility and...
Questions / comments
Vikram Kumar
CEO, Mega Ltd.
Email: vikram@mega.co.nz
Twitter: @vikram_nz
26
Upcoming SlideShare
Loading in...5
×

Online Privacy: A Customer's Perspective

1,309

Published on

Presentation to the Digital Identity & Security Conference, Wellington, New Zealand

Published in: Technology, News & Politics
0 Comments
1 Like
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total Views
1,309
On Slideshare
0
From Embeds
0
Number of Embeds
7
Actions
Shares
0
Downloads
8
Comments
0
Likes
1
Embeds 0
No embeds

No notes for slide

Transcript of "Online Privacy: A Customer's Perspective"

  1. 1. Online Privacy A Customer’s Perspective
  2. 2. 2 Source: https://www.youtube.com/watch?v=vVTKHI5ovyc
  3. 3. In the last 7 years 3
  4. 4. 4 Source: http://www.slideshare.net/kumar641/presentation-to-tp-forum-sep-2007
  5. 5. 3 lessons • Privacy is in the details- how do you deal with exceptions and false positives? • Institutionalise privacy protection • In a high-trust environment, the more you speak about privacy protection, the more nervous people get about privacy 5
  6. 6. But trust is rapidly eroding 6
  7. 7. And is actually worse in reality 7 Source: http://www.theguardian.com/world/interactive/2013/jul/31/nsa-xkeyscore-program-full-presentation
  8. 8. Pervasive, ubiquitous surveillance 8 Source: http://www.theguardian.com/world/interactive/2013/jul/31/nsa-xkeyscore-program-full-presentation
  9. 9. Pervasive, ubiquitous surveillance 9
  10. 10. Conspiracy theories natural 10 Source: http://www.nbr.co.nz/article/dictators-guide-internet-how-balkanize-dirty-web-ck-143819 The Dictator’s Guide to the Internet: How to Balkanize the Dirty Web Ian Apperley in the National Business Review
  11. 11. Major online service providers also under scrutiny 11 Source: http://www.metafilter.com/95152/Userdriven-discontent#3256046
  12. 12. 12 Source: http://www.ideachampions.com/weblogs/archives/2010/06/the_value_of_co_1.shtml
  13. 13. Mandatory notifications? 13 For major security breaches, a good idea but...
  14. 14. 14 1. Anonymity online is a myth
  15. 15. 15 2. Take sensible steps Source: http://mashable.com/2013/04/30/facebook-graph-search-privacy-infographic/ But accept people are human and very poor at risk evaluation Excellent read: http://www.schneier.com/essay-155.html
  16. 16. 16 3. Consider if you are willing to pay for privacy. Professionals and businesses should consider confidentiality and legal risks. Source: http://paranoia.dubfire.net/2011/11/two-honest-google-employees-our.html
  17. 17. 17 So, what am I doing? Source: http://romanticactoftheday.blogspot.co.nz/2012/09/your-gold-plated-word.html
  18. 18. 1. Talking about the issues 18 Source: http://internetganesha.wordpress.com/
  19. 19. 2. Becoming a cypherpunk 19 “An activist advocating widespread use of strong cryptography as a route to social and political change” Source: http://en.wikipedia.org/wiki/Cypherpunk Source: http://goldenageofgaia.com/2010/12/cypherpunk-the-origin-of-wikileaks/
  20. 20. 20 1x 1x 1 million x
  21. 21. Customer’s perspective 21 Don’t be a low hanging victim Send sealed letter, not postcard
  22. 22. Crypto for the masses • Perceived need • It has to just work • No compromise in functionality • Real security requires end-to-end encryption 22
  23. 23. 23 What’s next? Source: http://my-squidoo-lens.blogspot.co.nz/2010/10/animal-psychology.html
  24. 24. Inspiration from the Bitcoin system • Decentralised ledgers connected by crypto- enforced contracts • Peer-to-peer, irreversible transactions • 51% agreement = “truth” • Very low costs, global scale 24
  25. 25. Takeaways • Design systems and processes for a low or zero trust environment. • Customers can take more responsibility and actions to protect their privacy. • Cryptography is expected to be increasingly used online routinely, just like drawing curtains in the Panopticon. 25
  26. 26. Questions / comments Vikram Kumar CEO, Mega Ltd. Email: vikram@mega.co.nz Twitter: @vikram_nz 26
  1. A particular slide catching your eye?

    Clipping is a handy way to collect important slides you want to go back to later.

×