Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

Spectrum of privacy 2017 01-10

1,869 views

Published on

Consumers' private info and privacy are being violated without their consent or knowledge. This is context for the series of privacy forward services that consumers may choose to use to protect themselves -- because no one else will (protect them).

Published in: Internet
  • Be the first to comment

  • Be the first to like this

Spectrum of privacy 2017 01-10

  1. 1. January 2017 / Page 0marketing.scienceconsulting group, inc. linkedin.com/in/augustinefou Spectrum of Privacy Less private More sensitive More private Less sensitive secret personal public anonymous • passwords • social sec # • passport • name • address • email • phone # • social media • geolocation • cookies • ad tech / retargeting • ? Meta data No meta data “services which leak meta data are less private”
  2. 2. January 2017 / Page 1marketing.scienceconsulting group, inc. linkedin.com/in/augustinefou Set of Privacy-Forward Services crpt.info pass.wd netw.rk • secure messaging • no meta data • strong passwords • easy to use for humans • device-to- device comms • atomic permissions No meta data brow.sr • session based keys • perfect forward privacy meta data Key problem to solve: weak passwords single private key d2d comms + + Meta data Phone # and email used to identify endpoints reveal identity and meta data. • ownership • permissions to spend ++ mon.ey undemo- cratic
  3. 3. crpt.info 1. anything you want tracked and saved for later, use EMAIL 2. anything you do not want tracked, with no meta data about the transmission, use crpt.info “the anti-email” consumer alpha currently available at http://crpt.info
  4. 4. January 2017 / Page 3marketing.scienceconsulting group, inc. linkedin.com/in/augustinefou personal mail lockbox only you have private key for decrypting messages dropped into your lock box public phone senders use a public phone to anonymously create and send messages to your lock box Offline Analogies – no meta data
  5. 5. January 2017 / Page 4marketing.scienceconsulting group, inc. linkedin.com/in/augustinefou 1. No meta data (no phone # or email required) 2. Endpoints are anonymous, not associatable 3. Message encrypted with recipient’s public key 4. Every part of transmission is “transient” ? ?njbf8nw8cw9casssddnasda3131wcwyfkj01 Public key encryption Private key decryption Top Features

×