Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

Privacy by Default - IA Summit 2017

1,916 views

Published on

presenting a concept for privacy in a world with the Internet of Things. While we already have serious privacy issues, many of them will become even worse with computers that are always on, everywhere and not even perceivable as computers anymore. This presentation holds a proposal to solve some of these issues

Published in: Internet
  • Hey guys! Who wants to chat with me? More photos with me here 👉 http://www.bit.ly/katekoxx
       Reply 
    Are you sure you want to  Yes  No
    Your message goes here
  • @Bonnie L. Bradley I never said, that it shall be centralized and I second your argument. Think more in the ways of public-private-Keys, blockchain and so on. We have the proofs, that we don't necessarly need centralized identification providers. Yet for some situations you want something like that, but we need to discuss, who that will be and for what.
       Reply 
    Are you sure you want to  Yes  No
    Your message goes here
  • You are singing my song! I've been wandering the desert of ignorance and avarice for decades preaching this. Well said!!! (that being said, the notion that any centralized identity system will possibly be "safe" is a non-starter.)
       Reply 
    Are you sure you want to  Yes  No
    Your message goes here
  • BTW: I'm really sorry about the bad visual quality. It's all courtesy of Slideshare.
       Reply 
    Are you sure you want to  Yes  No
    Your message goes here

Privacy by Default - IA Summit 2017

  1. 1. Lutz Schmitt - Twitter: @luxux - IA Summit 2017 - Vancouver PRIVACY BY DEFAULT illustration by Lutz Schmitt – licensed under cc-by-nd 4.0
  2. 2. A CONCEPT FOR PRIVACY IN A WORLD WITH THE INTERNET OF THINGS PRIVACY BY DEFAULT illustration by Lutz Schmitt – licensed under cc-by-nd 4.0
  3. 3. Missing parts for a world with ambient intelligence, that I would want to live in.
  4. 4. PREAMBLE
  5. 5. SECURITY IS FUNDAMENTAL it isn‘t really worth talking about privacy in an insecure environment
  6. 6. IT‘S ALL ABOUT SOCIETY and how technology is used to help shaping it.
  7. 7. AND IT‘S ABOUT BUSINESS
  8. 8. https://twitter.com/MetroUK/status/776150782194376704
  9. 9. ABOUT PRIVACY
  10. 10. you VERSUS the others
  11. 11. THE RIGHT TO BE LET ALONE The Right to Privacy (Brandeis & Warren) Harvard Law Review, 15 Dec 1890
  12. 12. 1. The right to privacy does not prohibit any publication … which is of public … interest 4. The right to privacy ceases upon the publication of the facts by the individual, or with his consent. LIMITATIONS TO THE RIGHT TO PRIVACY
  13. 13. Would you hand over your Facebook- Login to a stranger?
  14. 14. Photo by Beatrice Murch on flickr. Licensed under cc-by-sa 2-0 At JFK Airport Immigration you will. Would you hand over your Facebook- Login to a stranger?
  15. 15. you AND the others
  16. 16. Alan Westin in Privacy and Freedom, 1968
  17. 17. STATES OF PRIVACYaccording to Alan Westin SOLITUDE privacy of individuals INTIMACY privacy of groups ANONYMITY unidentifiability in public RESERVE (psychological) barriers / resilience
  18. 18. STATES OF PRIVACYaccording to Alan Westin, extended by me SOLITUDE privacy of individuals INTIMACY privacy of groups ANONYMITY unidentifiability in public RESERVE (psychological) barriers / resilience PSEUDONYMITY choice of identification
  19. 19. No one shall be subjected to arbitrary interference with his privacy, family, home or correspondence, nor to attacks upon his honour and reputation. Everyone has the right to the protection of the law against such interference or attacks. Article 12 Universal Declaration of Human Rights http://www.un.org/en/universal-declaration-human-rights/
  20. 20. ABOUT THE INTERNET
  21. 21. THE INTERNET IS BROKEN.
  22. 22. photo by Wally Gobetz on flickr.com licensed under cc-by-nc-nd 2.0 the internet is not a public place
  23. 23. Facebook is Mark Zuckerberg‘s living room. photo by Danny Howard on flickr.com licensed under cc-by-nc 2.0 His living room, his rules.
  24. 24. photo by Wally Gobetz on flickr.com licensed under cc-by-nc-nd 2.0 the internet is not free neither as in freedom, nor as in free beer
  25. 25. remember the fight for net neutrality? photo by NewbleRunner on flickr.com licensed under cc-by-sa 2.0
  26. 26. and it‘s getting worse with the Internet of Things
  27. 27. ABOUT THE INTERNET OF THINGS
  28. 28. photo by Philips. Released as press material. All rights reserved. Remote controlling your lightbulbs, is not the IoT. It‘s remote controlling your lightbulbs.
  29. 29. photo by revolv. Press material. are not the Internet of Things. That‘s just DRM for the physical world. devices that need a cloud connection
  30. 30. Source: https://www.hackread.com/samsung-smart-tv-listening-conversations/
  31. 31. illustration by Lutz Schmitt published under cc-by-nc 4.0 we have reached zero effective cost
  32. 32. THE VISION FOR THE INTERNET OF THINGS THAT HOOKED ME computers begin to be inseperably weaved into the fabric of our physical reality illustration by Lutz Schmitt published under cc-by-nc 4.0
  33. 33. photo by Sarah Leo on flickr.com – licensed under cc-by-sa 2.0 Mark Weiser, The Computer for the 21st Century, 1991
  34. 34. SOME ISSUES THAT NEED TO BE SOLVED
  35. 35. ISSUE #1
  36. 36. a friend, on how to use smartphones and stay private
  37. 37. AMBIENT INTELLIGENCE WON‘T COME WITH A POWER BUTTON photo by Juan Ignacio Sánchez Lara on flickr. Licensed under cc-by-nc-sa-2
  38. 38. WHAT MEANS OF CONTROL CAN BE ESTABLISHED If shutting down is no option anymore? Still from 2001: A Space Odyssey. Source: https://youtu.be/l2c_rSLXq6U
  39. 39. ISSUE #2
  40. 40. we need to trust and believe the more technology develops, the less we are able understand photo 7th gen Intel Core die by Intel Corp. Source: Presskit release on 2017-01-03
  41. 41. Arthur C. Clarke, Hazards of Prophecy, 1962
  42. 42. Still from Her. Source: Press material. How do we design this magic reality, that people mustn‘t fear it, but are empowered?
  43. 43. ISSUE #3
  44. 44. decisions and setups all the time may it be an app, a website, a washing machine or else
  45. 45. teaching and answering computers is a sisyphean task already
  46. 46. HOW CAN WE AVOID INTERACTION OVERLOAD?
  47. 47. ISSUE #4
  48. 48. the IoT is dissolving our places and meanings of the physical world
  49. 49. Photo by Deraman Uskratzt on flickr.com. Licensed under cc-by-sa 2.0. How must we architect the virtual dimension of things and places, that our perception of reality won‘t be broken?
  50. 50. ISSUE #5
  51. 51. mass surveillance is a reality and those in control are not willing to let it go Photo by Jeremy Brooks on flickr.com. Licensed under cc-by-nc 2.0.
  52. 52. Screenshot. Source: the internet between individual interests and those of corporations, governments and the public WE LACK BALANCE
  53. 53. HOW CAN WE ESTABLISH A FAIR BALANCE, instead of increasing the unequality?
  54. 54. PRECONDITIONS FOR THE INTERNET (OF THINGS) TO HAVE ANY KIND OF PRIVACY AT ALL.
  55. 55. TECHNOLOGY MUST BE SECURE
  56. 56. THE NETWORK MUST BE PUBLIC
  57. 57. EVERYTHING IDENTIFIABLE MUST BE
  58. 58. COMMUNICATION REFUSABLE MUST BE
  59. 59. A PERSON‘S INTENT KNOWN MUST BE
  60. 60. A CONCEPT FOR PRIVACY IN A WORLD WITH THE INTERNET OF THINGS PRIVACY BY DEFAULT illustration by Lutz Schmitt – licensed under cc-by-nd 4.0
  61. 61. INTRODUCING IDENTITY
  62. 62. IDENTITY IS WHO WE ARE to ourselves and to others
  63. 63. WE HAVE MANY IDENTITIES friend, professional, internet troll, public speaker, …
  64. 64. PSEUDO IDENTITIES CORE IDENTITY PUBLIC IDENTITY FACTUAL IDENTITIES UNIQUE TRUE SELF GENERAL PUBLIC APPEARANCE CONTEXTUAL TRUE SELVES CONTEXTUAL PRETENDED SELVES
  65. 65. unverifyable & questionable verifyable & trustworthy PSEUDO IDENTITIES CORE IDENTITY PUBLIC IDENTITY FACTUAL IDENTITIES
  66. 66. PSEUDO IDENTITIES CORE IDENTITY PUBLIC IDENTITY FACTUAL IDENTITIES A HUMAN PERSON‘S IDENTITY SET
  67. 67. this identity model is the basic rule set to define our virtual behaviour and representation and that allows to manage different situations
  68. 68. EVERYBODY AND EVERYTHING NEEDS AN IDENTITY STRUCTURE state representation companies & organisations artificial intelligences objects animals places
  69. 69. THE WHOLE COMMUNICATION CHAIN IDENTIFIABLE
  70. 70. EVERYTHING IS OWNED BY PERSONS
  71. 71. THE WHOLE COMMUNICATION CHAIN IDENTIFIABLE
  72. 72. COMMUNICATION IS ALWAYS BETWEEN PERSONS
  73. 73. IDENTITIES REACT ON THE CONTEXT
  74. 74. INTRODUCING PRIVACY SPHERES The boundaries of communication
  75. 75. PUBLIC RESERVED INTIMATE PERSONAL ONLY YOU WITH ACTIVE GRANT WITH PASSIVE GRANT EVERYBODY privacy spheres
  76. 76. INTIMATE RESERVED PUBLICPERSONAL secret diary pictures from last night employee ID grant home access home access pseudo contact details geo location shirt‘s product info work contact details coffee maker‘s fill status shirt‘s unique ID THAT pictures bitcoin vallet
  77. 77. by default similar data may not be exposed to a more open level of privacy, without the person‘s intent.
  78. 78. INTIMATE RESERVED PUBLICPERSONAL diary entry 1 diary entry 2
  79. 79. EVERY IDENTITY HAS A DEFAULT, where data or rights are located
  80. 80. INTIMATE RESERVED PUBLICPERSONAL right to manage use right to use sensor data unique ID object info
  81. 81. combining identity and privacy spheres
  82. 82. INTIMATE RESERVED PUBLICPERSONAL UID24298723459 MADAMEPOMPADILLE HR42CHOPKINS PUBLIC IDENTITY
  83. 83. INTIMATE RESERVED PUBLICPERSONAL UID24298723459 right to manage use right to use sensor data unique ID object info
  84. 84. INTIMATE RESERVED PUBLICPERSONAL UID24298723459 right to manage use right to use sensor data unique ID object info
  85. 85. IDENTITY COMMUNICATION
  86. 86. INTIMATE RESERVED PUBLIC INTIMATERESERVED
  87. 87. OK, but rules apply INTIMATE RESERVED PUBLIC INTIMATERESERVED
  88. 88. person’s active grant needed INTIMATE RESERVED PUBLIC INTIMATERESERVED
  89. 89. no response at all INTIMATE RESERVED PUBLIC INTIMATERESERVED
  90. 90. “I CREATED THE WWW TO CONNECT PEOPLE NOT MACHINES“ Sir Tim Berners-Lee
  91. 91. CONCLUSION
  92. 92. privacy is vital to society and a human right to everyone
  93. 93. the IoT will happen and this is a great thing
  94. 94. we need to solve those privacy issues and I‘m sure we can
  95. 95. photo by mere41782 on flickr.com – licensed under cc by nd 2.0 LET US BUILD A MAGIC FUTURE, NOT A DYSTOPIA. THANK YOU. @luxux www.lutzschmitt.com Photo by Rick Schwartz on flickr.com. Licensed under cc-by-nc 2.0.

×