Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

Spectrum of privacy 2017 01-10


Published on

Consumers' private info and privacy are being violated without their consent or knowledge. This is context for the series of privacy forward services that consumers may choose to use to protect themselves -- because no one else will (protect them).

Published in: Internet
  • Very nice tips on this. In case you need help on any kind of academic writing visit our website ⇒ ⇐ and place your order
    Are you sure you want to  Yes  No
    Your message goes here
  • Be the first to like this

Spectrum of privacy 2017 01-10

  1. 1. January 2017 / Page 0marketing.scienceconsulting group, inc. Spectrum of Privacy Less private More sensitive More private Less sensitive secret personal public anonymous • passwords • social sec # • passport • name • address • email • phone # • social media • geolocation • cookies • ad tech / retargeting • ? Meta data No meta data “services which leak meta data are less private”
  2. 2. January 2017 / Page 1marketing.scienceconsulting group, inc. Set of Privacy-Forward Services pass.wd netw.rk • secure messaging • no meta data • strong passwords • easy to use for humans • device-to- device comms • atomic permissions No meta data • session based keys • perfect forward privacy meta data Key problem to solve: weak passwords single private key d2d comms + + Meta data Phone # and email used to identify endpoints reveal identity and meta data. • ownership • permissions to spend ++ mon.ey undemo- cratic
  3. 3. 1. anything you want tracked and saved for later, use EMAIL 2. anything you do not want tracked, with no meta data about the transmission, use “the anti-email” consumer alpha currently available at
  4. 4. January 2017 / Page 3marketing.scienceconsulting group, inc. personal mail lockbox only you have private key for decrypting messages dropped into your lock box public phone senders use a public phone to anonymously create and send messages to your lock box Offline Analogies – no meta data
  5. 5. January 2017 / Page 4marketing.scienceconsulting group, inc. 1. No meta data (no phone # or email required) 2. Endpoints are anonymous, not associatable 3. Message encrypted with recipient’s public key 4. Every part of transmission is “transient” ? ?njbf8nw8cw9casssddnasda3131wcwyfkj01 Public key encryption Private key decryption Top Features