Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

A conversation on privacy

564 views

Published on

Richard Zwicky talks about your online Privacy at the Emerging Media Conference in 2011. Download the presentation and/or watch videos from this and other presentations from EmMeCon at http://wappow.com/resources/videos

Published in: Technology
  • Be the first to comment

  • Be the first to like this

A conversation on privacy

  1. 1. PrivacyWas it Good For You?<br />Richard Zwicky<br />Founder, Enquisite / Eightfold Logic<br />@rzwicky<br />
  2. 2. About Me, and Why I’m Here<br />@rzwicky<br />
  3. 3. @rzwicky<br />
  4. 4. Implications of Privacy Loss<br />@rzwicky<br />
  5. 5. @rzwicky<br />
  6. 6. Voluntary, and Stupid<br />@rzwicky<br />
  7. 7. Involuntary Loss of Privacy<br />@rzwicky<br />
  8. 8. What’s Private, but Public<br /><ul><li>Birthdate
  9. 9. Birthplace
  10. 10. Ancestry
  11. 11. Social Insurance #
  12. 12. Credit History (Anchor document)
  13. 13. Credit cards/consumer history
  14. 14. utilities
  15. 15. Parking tickets
  16. 16. Associations
  17. 17. Friends
  18. 18. Work History
  19. 19. Education History
  20. 20. Personal History</li></ul>@rzwicky<br />
  21. 21. Stuff You Never Think About<br /><ul><li>IP: every site logs you & your actions
  22. 22. Data retention
  23. 23. General server policy & systems
  24. 24. ISP backups: every file, action and transaction saved, just in case
  25. 25. VPS snapshots
  26. 26. Intentional footprints
  27. 27. Network cookies</li></ul>@rzwicky<br />
  28. 28. Devolution of Privacy<br />@rzwicky<br />
  29. 29. False Perceptions of Security & Privacy<br /><ul><li>Email – Secure?
  30. 30. USB/CDROM – Secure?
  31. 31. Cloud - Secure?
  32. 32. SSL</li></ul>@rzwicky<br />
  33. 33. False Sense of Security<br /><ul><li>Private Browsing
  34. 34. SSL
  35. 35. PGP
  36. 36. Email (averages 10 hops)
  37. 37. Texting
  38. 38. “Delete”
  39. 39. How about those TSA body Scans?</li></ul>@rzwicky<br />
  40. 40. What is Encryption (AKA 101)<br />@rzwicky<br />
  41. 41. Browser/Server Model    <br /><ul><li>All ecommerce
  42. 42. All web apps (Google, Microsoft, Facebook etc)
  43. 43. SSL
  44. 44. From browser to server = Encrypted
  45. 45. On server = Unencrypted</li></ul>@rzwicky<br />
  46. 46. The Ideal Secure Mix    <br /><ul><li>Document / data encryption
  47. 47. Transport encryption
  48. 48. Storage (during transport)
  49. 49. Recipientexclusivity
  50. 50. Storage / longterm encryption</li></ul>@rzwicky<br />
  51. 51. Who Needs Secure Privacy (not wants)<br /><ul><li>Corporate Privacy
  52. 52. Cornerstone of capitalism is Privacy
  53. 53. Trade Secrets /IP
  54. 54. Communications
  55. 55. Government
  56. 56. Communications (WikiLeaks)
  57. 57. Constituent privacy
  58. 58. Security
  59. 59. Financial Institutions
  60. 60. Healthcare (HIPAA)
  61. 61. Legal - disclaimer on legal email</li></ul>@rzwicky<br />
  62. 62. Your Declining Balance <br />Privacy is at 95% at birth<br />Once lost, privacy doesn’t come back<br />Data is forever<br />@rzwicky<br />
  63. 63. What’s Possible to Keep Private?<br />Your Thoughts.<br />@rzwicky<br />
  64. 64. @rzwicky<br />

×