SlideShare a Scribd company logo
1 of 51
Download to read offline
Jim Gumbley 
@jgumbley 
<jgumbley@thoughtworks.com> 
Christoph Kluenter 
<ckluente@thoughtworks.com> 
Privacy, Responsibility and 
the Internet
RESPONSIBILITY 
ETHICS
Jim Gumbley
“However much they may dislike it, they 
have become the command-and-control 
networks of choice for terrorists and 
criminals, who find their services as 
transformational as the rest of us.”
“If you have something that you don't 
want anyone to know, maybe you 
shouldn't be doing it in the first place.”
The value of privacy to us isn't primarily 
about our privacy but about those who play a 
more active role in the operation of a 
democratic system of government. 
Such activity often involves bothering people 
who have power, and those with power are 
likely to use their power to suppress the 
bothersome. But without all that bothering, 
democracy withers. 
http://martinfowler.com/articles/bothersome-privacy.html
Quelle: Wikipedia
196 000 000 000 
Quelle: http://www.radicati.com/wp/wp-content/uploads/2014/01/Email-Statistics-Report-2014-2018-Executive-Summary.pdf
Big 
5 
=, 
Germany 
To 
p 
8, 
Market share of the “big 5” 
email providers worldwide To 
p 
4, 
USA 
Quellen: MailChimp, 2011, statista.com, 2013, znet.com, 2010
PIXELATED
verify_ssl=FALSE
LEAP
LEAP
DC3F E0CB 7FAB FD56 A2A1 707B B4DE 29D9 E969 1A14
LEAP
LEAP 
PIXELATED
LEAP
THANK YOU 
ckluente@thoughtworks.com 
DC3F E0CB 7FAB FD56 A2A1 707B B4DE 29D9 E969 1A14 
jgumbley@thoughtworks.com> 
AEEE F98F DBC7 A52F B859 044B B622 734E B114 3879 
team@pixelated-project.org 
504A 14EA 39DE 1800 B676 9619 FF0E A8AE D649 7991 
https://pixelated-project.org 
@pixelatedteam
THE SOFTWARE ARCHITECTURE
ENCRYPTION

More Related Content

Viewers also liked

Case of willful whistleblower
Case of willful whistleblower Case of willful whistleblower
Case of willful whistleblower Pallavi Mishra
 
Ethical management (1)
Ethical management (1)Ethical management (1)
Ethical management (1)thiru777
 
Whistleblowingfinal.....
Whistleblowingfinal.....Whistleblowingfinal.....
Whistleblowingfinal.....humaapkeliye
 
case willful whistel blower
case willful whistel blowercase willful whistel blower
case willful whistel blowerManish Jounwal
 
Whistle Blower - Another Reason why Open Government is Important
Whistle Blower - Another Reason why Open Government is ImportantWhistle Blower - Another Reason why Open Government is Important
Whistle Blower - Another Reason why Open Government is ImportantMujtaba Hussain
 
Mobile surveillance recruitment campaign - Gamification in recruitment - Ma...
 Mobile surveillance recruitment campaign - Gamification in recruitment  - Ma... Mobile surveillance recruitment campaign - Gamification in recruitment  - Ma...
Mobile surveillance recruitment campaign - Gamification in recruitment - Ma...manumelwin
 
Whistleblowing-- with detailed case studies on Jeffrey Wigand & Paul Assange
Whistleblowing-- with detailed case studies on Jeffrey Wigand & Paul AssangeWhistleblowing-- with detailed case studies on Jeffrey Wigand & Paul Assange
Whistleblowing-- with detailed case studies on Jeffrey Wigand & Paul AssangeRajdeep Das
 
Ethics Seminar—Discussion on The Insider (film)
Ethics Seminar—Discussion on The Insider (film)Ethics Seminar—Discussion on The Insider (film)
Ethics Seminar—Discussion on The Insider (film)Joshua, Weng Yew Wong
 
Whistle Blower Policy
Whistle Blower PolicyWhistle Blower Policy
Whistle Blower PolicyMRP Rao
 
NSA: Edward Snowden Case Study
NSA: Edward Snowden Case StudyNSA: Edward Snowden Case Study
NSA: Edward Snowden Case StudyMichael Nickle
 
Snowden slides
Snowden slidesSnowden slides
Snowden slidesDavid West
 
Ethical Case Study, Enron's Fraud and Scandal
Ethical Case Study, Enron's Fraud and ScandalEthical Case Study, Enron's Fraud and Scandal
Ethical Case Study, Enron's Fraud and ScandalTravel Till You Drop
 
Business Ethics - Whistleblowing and Employee Loyalty
Business Ethics - Whistleblowing and Employee LoyaltyBusiness Ethics - Whistleblowing and Employee Loyalty
Business Ethics - Whistleblowing and Employee LoyaltyRetno Nindya
 
Am I being spied on: Low-tech ways of detecting high-tech surveillance (DEFCO...
Am I being spied on: Low-tech ways of detecting high-tech surveillance (DEFCO...Am I being spied on: Low-tech ways of detecting high-tech surveillance (DEFCO...
Am I being spied on: Low-tech ways of detecting high-tech surveillance (DEFCO...Philip Polstra
 
Case study on whistleblowing
Case study on whistleblowingCase study on whistleblowing
Case study on whistleblowingParveen Bano
 
WHISTLE-BLOWING
WHISTLE-BLOWINGWHISTLE-BLOWING
WHISTLE-BLOWINGAjeesh Mk
 

Viewers also liked (20)

Case of willful whistleblower
Case of willful whistleblower Case of willful whistleblower
Case of willful whistleblower
 
Ethical management (1)
Ethical management (1)Ethical management (1)
Ethical management (1)
 
Whistle blowing
Whistle blowingWhistle blowing
Whistle blowing
 
Whistleblowingfinal.....
Whistleblowingfinal.....Whistleblowingfinal.....
Whistleblowingfinal.....
 
case willful whistel blower
case willful whistel blowercase willful whistel blower
case willful whistel blower
 
Whistle Blower - Another Reason why Open Government is Important
Whistle Blower - Another Reason why Open Government is ImportantWhistle Blower - Another Reason why Open Government is Important
Whistle Blower - Another Reason why Open Government is Important
 
Whistle blower final
Whistle blower finalWhistle blower final
Whistle blower final
 
Mobile surveillance recruitment campaign - Gamification in recruitment - Ma...
 Mobile surveillance recruitment campaign - Gamification in recruitment  - Ma... Mobile surveillance recruitment campaign - Gamification in recruitment  - Ma...
Mobile surveillance recruitment campaign - Gamification in recruitment - Ma...
 
Whistleblowing-- with detailed case studies on Jeffrey Wigand & Paul Assange
Whistleblowing-- with detailed case studies on Jeffrey Wigand & Paul AssangeWhistleblowing-- with detailed case studies on Jeffrey Wigand & Paul Assange
Whistleblowing-- with detailed case studies on Jeffrey Wigand & Paul Assange
 
Enron
EnronEnron
Enron
 
Ethics Seminar—Discussion on The Insider (film)
Ethics Seminar—Discussion on The Insider (film)Ethics Seminar—Discussion on The Insider (film)
Ethics Seminar—Discussion on The Insider (film)
 
Whistle Blower Policy
Whistle Blower PolicyWhistle Blower Policy
Whistle Blower Policy
 
NSA: Edward Snowden Case Study
NSA: Edward Snowden Case StudyNSA: Edward Snowden Case Study
NSA: Edward Snowden Case Study
 
Snowden slides
Snowden slidesSnowden slides
Snowden slides
 
Ethical Case Study, Enron's Fraud and Scandal
Ethical Case Study, Enron's Fraud and ScandalEthical Case Study, Enron's Fraud and Scandal
Ethical Case Study, Enron's Fraud and Scandal
 
Business Ethics - Whistleblowing and Employee Loyalty
Business Ethics - Whistleblowing and Employee LoyaltyBusiness Ethics - Whistleblowing and Employee Loyalty
Business Ethics - Whistleblowing and Employee Loyalty
 
Am I being spied on: Low-tech ways of detecting high-tech surveillance (DEFCO...
Am I being spied on: Low-tech ways of detecting high-tech surveillance (DEFCO...Am I being spied on: Low-tech ways of detecting high-tech surveillance (DEFCO...
Am I being spied on: Low-tech ways of detecting high-tech surveillance (DEFCO...
 
Whistleblowing
WhistleblowingWhistleblowing
Whistleblowing
 
Case study on whistleblowing
Case study on whistleblowingCase study on whistleblowing
Case study on whistleblowing
 
WHISTLE-BLOWING
WHISTLE-BLOWINGWHISTLE-BLOWING
WHISTLE-BLOWING
 

Similar to Defending the Free Internet - Our Responsibility to Defeat Mass Surveillance

The Economic Collapse 1st issue infowars magazine
The Economic Collapse 1st issue infowars magazineThe Economic Collapse 1st issue infowars magazine
The Economic Collapse 1st issue infowars magazineinfowarrior78
 
Debate research paper
Debate research paperDebate research paper
Debate research papertrhall14
 
Aljeraiwi 1Aljeraiwi 5AProfessor Martin English 1.docx
 Aljeraiwi 1Aljeraiwi 5AProfessor Martin English 1.docx Aljeraiwi 1Aljeraiwi 5AProfessor Martin English 1.docx
Aljeraiwi 1Aljeraiwi 5AProfessor Martin English 1.docxarnit1
 
Cyberterrorism can be in the form of Information attacks which a.docx
Cyberterrorism can be in the form of Information attacks which a.docxCyberterrorism can be in the form of Information attacks which a.docx
Cyberterrorism can be in the form of Information attacks which a.docxwhittemorelucilla
 
Moldova Open Data Journalism Workshop
Moldova Open Data Journalism WorkshopMoldova Open Data Journalism Workshop
Moldova Open Data Journalism WorkshopAlexander Howard
 
Marsden #Regulatingcode MIT
Marsden #Regulatingcode MITMarsden #Regulatingcode MIT
Marsden #Regulatingcode MITChris Marsden
 
We Media L20 mock exam revision
We Media L20 mock exam revisionWe Media L20 mock exam revision
We Media L20 mock exam revisionchrisianwelch
 
Privacy guest lecture 3.31.15 T316
Privacy guest lecture 3.31.15 T316Privacy guest lecture 3.31.15 T316
Privacy guest lecture 3.31.15 T316Ryland Sherman
 
The digital divide in the post-Snowden era
The digital divide in the post-Snowden eraThe digital divide in the post-Snowden era
The digital divide in the post-Snowden eraIan Clark
 
Ed Snowden: hero or villain? And the implications for media and democracy
Ed Snowden: hero or villain? And the implications for media and democracyEd Snowden: hero or villain? And the implications for media and democracy
Ed Snowden: hero or villain? And the implications for media and democracyPOLIS LSE
 
Reveal & Reduce the threat of Deep Fake Technology
Reveal & Reduce the threat of Deep Fake TechnologyReveal & Reduce the threat of Deep Fake Technology
Reveal & Reduce the threat of Deep Fake Technologystuwilson.co.uk
 
We Media 10 surveillance 1
We Media 10 surveillance 1We Media 10 surveillance 1
We Media 10 surveillance 1chrisianwelch
 
Internet Freedom and its Discontents
Internet Freedom and its DiscontentsInternet Freedom and its Discontents
Internet Freedom and its DiscontentsMsifry
 

Similar to Defending the Free Internet - Our Responsibility to Defeat Mass Surveillance (20)

The Economic Collapse 1st issue infowars magazine
The Economic Collapse 1st issue infowars magazineThe Economic Collapse 1st issue infowars magazine
The Economic Collapse 1st issue infowars magazine
 
The Digital Divide in the Post Snowden Era Presentation
The Digital Divide in the Post Snowden Era PresentationThe Digital Divide in the Post Snowden Era Presentation
The Digital Divide in the Post Snowden Era Presentation
 
Debate research paper
Debate research paperDebate research paper
Debate research paper
 
Roger And Me Essay
Roger And Me EssayRoger And Me Essay
Roger And Me Essay
 
Evgeny Morozov
Evgeny MorozovEvgeny Morozov
Evgeny Morozov
 
Algorithm ethics
Algorithm ethicsAlgorithm ethics
Algorithm ethics
 
Aljeraiwi 1Aljeraiwi 5AProfessor Martin English 1.docx
 Aljeraiwi 1Aljeraiwi 5AProfessor Martin English 1.docx Aljeraiwi 1Aljeraiwi 5AProfessor Martin English 1.docx
Aljeraiwi 1Aljeraiwi 5AProfessor Martin English 1.docx
 
Cyberterrorism can be in the form of Information attacks which a.docx
Cyberterrorism can be in the form of Information attacks which a.docxCyberterrorism can be in the form of Information attacks which a.docx
Cyberterrorism can be in the form of Information attacks which a.docx
 
Sifry: Obama e-democracy
Sifry: Obama e-democracySifry: Obama e-democracy
Sifry: Obama e-democracy
 
Moldova Open Data Journalism Workshop
Moldova Open Data Journalism WorkshopMoldova Open Data Journalism Workshop
Moldova Open Data Journalism Workshop
 
Marsden #Regulatingcode MIT
Marsden #Regulatingcode MITMarsden #Regulatingcode MIT
Marsden #Regulatingcode MIT
 
We Media L20 mock exam revision
We Media L20 mock exam revisionWe Media L20 mock exam revision
We Media L20 mock exam revision
 
Essay Of Democracy
Essay Of DemocracyEssay Of Democracy
Essay Of Democracy
 
Privacy guest lecture 3.31.15 T316
Privacy guest lecture 3.31.15 T316Privacy guest lecture 3.31.15 T316
Privacy guest lecture 3.31.15 T316
 
The digital divide in the post-Snowden era
The digital divide in the post-Snowden eraThe digital divide in the post-Snowden era
The digital divide in the post-Snowden era
 
Ed Snowden: hero or villain? And the implications for media and democracy
Ed Snowden: hero or villain? And the implications for media and democracyEd Snowden: hero or villain? And the implications for media and democracy
Ed Snowden: hero or villain? And the implications for media and democracy
 
Reveal & Reduce the threat of Deep Fake Technology
Reveal & Reduce the threat of Deep Fake TechnologyReveal & Reduce the threat of Deep Fake Technology
Reveal & Reduce the threat of Deep Fake Technology
 
Master Switch
Master Switch Master Switch
Master Switch
 
We Media 10 surveillance 1
We Media 10 surveillance 1We Media 10 surveillance 1
We Media 10 surveillance 1
 
Internet Freedom and its Discontents
Internet Freedom and its DiscontentsInternet Freedom and its Discontents
Internet Freedom and its Discontents
 

More from Thoughtworks

Design System as a Product
Design System as a ProductDesign System as a Product
Design System as a ProductThoughtworks
 
Designers, Developers & Dogs
Designers, Developers & DogsDesigners, Developers & Dogs
Designers, Developers & DogsThoughtworks
 
Cloud-first for fast innovation
Cloud-first for fast innovationCloud-first for fast innovation
Cloud-first for fast innovationThoughtworks
 
More impact with flexible teams
More impact with flexible teamsMore impact with flexible teams
More impact with flexible teamsThoughtworks
 
Culture of Innovation
Culture of InnovationCulture of Innovation
Culture of InnovationThoughtworks
 
Developer Experience
Developer ExperienceDeveloper Experience
Developer ExperienceThoughtworks
 
When we design together
When we design togetherWhen we design together
When we design togetherThoughtworks
 
Hardware is hard(er)
Hardware is hard(er)Hardware is hard(er)
Hardware is hard(er)Thoughtworks
 
Customer-centric innovation enabled by cloud
 Customer-centric innovation enabled by cloud Customer-centric innovation enabled by cloud
Customer-centric innovation enabled by cloudThoughtworks
 
Amazon's Culture of Innovation
Amazon's Culture of InnovationAmazon's Culture of Innovation
Amazon's Culture of InnovationThoughtworks
 
When in doubt, go live
When in doubt, go liveWhen in doubt, go live
When in doubt, go liveThoughtworks
 
Don't cross the Rubicon
Don't cross the RubiconDon't cross the Rubicon
Don't cross the RubiconThoughtworks
 
Your test coverage is a lie!
Your test coverage is a lie!Your test coverage is a lie!
Your test coverage is a lie!Thoughtworks
 
Docker container security
Docker container securityDocker container security
Docker container securityThoughtworks
 
Redefining the unit
Redefining the unitRedefining the unit
Redefining the unitThoughtworks
 
Technology Radar Webinar UK - Vol. 22
Technology Radar Webinar UK - Vol. 22Technology Radar Webinar UK - Vol. 22
Technology Radar Webinar UK - Vol. 22Thoughtworks
 
A Tribute to Turing
A Tribute to TuringA Tribute to Turing
A Tribute to TuringThoughtworks
 
Rsa maths worked out
Rsa maths worked outRsa maths worked out
Rsa maths worked outThoughtworks
 

More from Thoughtworks (20)

Design System as a Product
Design System as a ProductDesign System as a Product
Design System as a Product
 
Designers, Developers & Dogs
Designers, Developers & DogsDesigners, Developers & Dogs
Designers, Developers & Dogs
 
Cloud-first for fast innovation
Cloud-first for fast innovationCloud-first for fast innovation
Cloud-first for fast innovation
 
More impact with flexible teams
More impact with flexible teamsMore impact with flexible teams
More impact with flexible teams
 
Culture of Innovation
Culture of InnovationCulture of Innovation
Culture of Innovation
 
Dual-Track Agile
Dual-Track AgileDual-Track Agile
Dual-Track Agile
 
Developer Experience
Developer ExperienceDeveloper Experience
Developer Experience
 
When we design together
When we design togetherWhen we design together
When we design together
 
Hardware is hard(er)
Hardware is hard(er)Hardware is hard(er)
Hardware is hard(er)
 
Customer-centric innovation enabled by cloud
 Customer-centric innovation enabled by cloud Customer-centric innovation enabled by cloud
Customer-centric innovation enabled by cloud
 
Amazon's Culture of Innovation
Amazon's Culture of InnovationAmazon's Culture of Innovation
Amazon's Culture of Innovation
 
When in doubt, go live
When in doubt, go liveWhen in doubt, go live
When in doubt, go live
 
Don't cross the Rubicon
Don't cross the RubiconDon't cross the Rubicon
Don't cross the Rubicon
 
Error handling
Error handlingError handling
Error handling
 
Your test coverage is a lie!
Your test coverage is a lie!Your test coverage is a lie!
Your test coverage is a lie!
 
Docker container security
Docker container securityDocker container security
Docker container security
 
Redefining the unit
Redefining the unitRedefining the unit
Redefining the unit
 
Technology Radar Webinar UK - Vol. 22
Technology Radar Webinar UK - Vol. 22Technology Radar Webinar UK - Vol. 22
Technology Radar Webinar UK - Vol. 22
 
A Tribute to Turing
A Tribute to TuringA Tribute to Turing
A Tribute to Turing
 
Rsa maths worked out
Rsa maths worked outRsa maths worked out
Rsa maths worked out
 

Recently uploaded

Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 

Recently uploaded (20)

Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 

Defending the Free Internet - Our Responsibility to Defeat Mass Surveillance

  • 1. Jim Gumbley @jgumbley <jgumbley@thoughtworks.com> Christoph Kluenter <ckluente@thoughtworks.com> Privacy, Responsibility and the Internet
  • 4.
  • 5.
  • 6.
  • 7.
  • 8.
  • 9.
  • 10.
  • 11.
  • 12.
  • 13.
  • 14. “However much they may dislike it, they have become the command-and-control networks of choice for terrorists and criminals, who find their services as transformational as the rest of us.”
  • 15.
  • 16.
  • 17.
  • 18. “If you have something that you don't want anyone to know, maybe you shouldn't be doing it in the first place.”
  • 19.
  • 20.
  • 21.
  • 22.
  • 23.
  • 24. The value of privacy to us isn't primarily about our privacy but about those who play a more active role in the operation of a democratic system of government. Such activity often involves bothering people who have power, and those with power are likely to use their power to suppress the bothersome. But without all that bothering, democracy withers. http://martinfowler.com/articles/bothersome-privacy.html
  • 25.
  • 27.
  • 28.
  • 29. 196 000 000 000 Quelle: http://www.radicati.com/wp/wp-content/uploads/2014/01/Email-Statistics-Report-2014-2018-Executive-Summary.pdf
  • 30.
  • 31.
  • 32.
  • 33. Big 5 =, Germany To p 8, Market share of the “big 5” email providers worldwide To p 4, USA Quellen: MailChimp, 2011, statista.com, 2013, znet.com, 2010
  • 35.
  • 36.
  • 38. LEAP
  • 39. LEAP
  • 40.
  • 41. DC3F E0CB 7FAB FD56 A2A1 707B B4DE 29D9 E969 1A14
  • 42.
  • 43.
  • 44. LEAP
  • 46. LEAP
  • 47.
  • 48.
  • 49. THANK YOU ckluente@thoughtworks.com DC3F E0CB 7FAB FD56 A2A1 707B B4DE 29D9 E969 1A14 jgumbley@thoughtworks.com> AEEE F98F DBC7 A52F B859 044B B622 734E B114 3879 team@pixelated-project.org 504A 14EA 39DE 1800 B676 9619 FF0E A8AE D649 7991 https://pixelated-project.org @pixelatedteam