Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.
Lutz Schmitt - Twitter: @luxux - IA Summit 2017 - Vancouver
PRIVACY BY DEFAULT
illustration by Lutz Schmitt – licensed und...
A CONCEPT FOR PRIVACY IN A WORLD WITH THE INTERNET OF THINGS
PRIVACY BY DEFAULT
illustration by Lutz Schmitt – licensed un...
Missing parts for a world with ambient
intelligence, that I would
want to live in.
PREAMBLE
SECURITY IS FUNDAMENTAL
it isn‘t really worth talking about privacy
in an insecure environment
IT‘S ALL ABOUT SOCIETY
and how technology is used to help shaping it.
AND IT‘S ABOUT BUSINESS
https://twitter.com/MetroUK/status/776150782194376704
ABOUT PRIVACY
you VERSUS the others
THE RIGHT TO BE LET ALONE
The Right to Privacy (Brandeis & Warren)
Harvard Law Review, 15 Dec 1890
1. The right to privacy does not prohibit any
publication … which is of public … interest
4. The right to privacy ceases u...
Would you hand over your Facebook-
Login to a stranger?
Photo by Beatrice Murch on flickr. Licensed under cc-by-sa 2-0
At JFK Airport Immigration you will.
Would you hand over yo...
you AND the others
Alan Westin in Privacy and Freedom, 1968
STATES OF PRIVACYaccording to Alan Westin
SOLITUDE privacy of individuals
INTIMACY privacy of groups
ANONYMITY unidentifia...
STATES OF PRIVACYaccording to Alan Westin, extended by me
SOLITUDE privacy of individuals
INTIMACY privacy of groups
ANONY...
No one shall be subjected to arbitrary
interference with his privacy, family, home or
correspondence, nor to attacks upon ...
ABOUT THE
INTERNET
THE INTERNET
IS BROKEN.
photo by Wally Gobetz on flickr.com licensed under cc-by-nc-nd 2.0
the internet is not
a public place
Facebook is
Mark Zuckerberg‘s living room.
photo by Danny Howard on flickr.com licensed under cc-by-nc 2.0
His living room...
photo by Wally Gobetz on flickr.com licensed under cc-by-nc-nd 2.0
the internet is not free
neither as in freedom, nor as ...
remember the fight for
net neutrality?
photo by NewbleRunner on flickr.com licensed under cc-by-sa 2.0
and it‘s getting worse
with the Internet of Things
ABOUT
THE INTERNET
OF THINGS
photo by Philips. Released as press material. All rights reserved.
Remote controlling your lightbulbs,
is not the IoT. It‘...
photo by revolv. Press material.
are not the Internet of Things. That‘s just DRM for the physical world.
devices that need...
Source: https://www.hackread.com/samsung-smart-tv-listening-conversations/
illustration by Lutz Schmitt published under cc-by-nc 4.0
we have reached zero effective cost
THE VISION FOR THE
INTERNET OF THINGS
THAT HOOKED ME
computers begin to be inseperably weaved
into the fabric of our physi...
photo by Sarah Leo on flickr.com – licensed under cc-by-sa 2.0
Mark Weiser, The Computer for the 21st Century, 1991
SOME ISSUES
THAT NEED
TO BE SOLVED
ISSUE #1
a friend, on how to use smartphones and stay private
AMBIENT INTELLIGENCE WON‘T
COME WITH A POWER BUTTON
photo by Juan Ignacio Sánchez Lara on flickr. Licensed under cc-by-nc-...
WHAT MEANS OF CONTROL
CAN BE ESTABLISHED
If shutting down is no option anymore?
Still from 2001: A Space Odyssey. Source: ...
ISSUE #2
we need to trust and believe
the more technology develops, the less we are able understand
photo 7th gen Intel Core die by...
Arthur C. Clarke, Hazards of Prophecy, 1962
Still from Her. Source: Press material.
How do we design this magic reality,
that people mustn‘t fear it, but are empowere...
ISSUE #3
decisions and setups all the time
may it be an app, a website, a washing machine or else
teaching and answering computers
is a sisyphean task already
HOW CAN WE AVOID
INTERACTION
OVERLOAD?
ISSUE #4
the IoT is dissolving our places
and meanings of the physical world
Photo by Deraman Uskratzt on flickr.com. Licensed under cc-by-sa 2.0.
How must we architect the virtual
dimension of thing...
ISSUE #5
mass surveillance is a reality
and those in control are not willing to let it go
Photo by Jeremy Brooks on flickr.com. Lic...
Screenshot. Source: the internet
between individual interests and those of corporations, governments and the public
WE LAC...
HOW CAN WE ESTABLISH A FAIR BALANCE,
instead of increasing the unequality?
PRECONDITIONS FOR THE
INTERNET (OF THINGS)
TO HAVE ANY KIND OF
PRIVACY AT ALL.
TECHNOLOGY
MUST BE
SECURE
THE NETWORK
MUST BE
PUBLIC
EVERYTHING
IDENTIFIABLE
MUST BE
COMMUNICATION
REFUSABLE
MUST BE
A PERSON‘S INTENT
KNOWN
MUST BE
A CONCEPT FOR PRIVACY IN A WORLD WITH THE INTERNET OF THINGS
PRIVACY BY DEFAULT
illustration by Lutz Schmitt – licensed un...
INTRODUCING
IDENTITY
IDENTITY IS WHO WE ARE
to ourselves and to others
WE HAVE MANY IDENTITIES
friend, professional, internet troll, public speaker, …
PSEUDO
IDENTITIES
CORE
IDENTITY
PUBLIC
IDENTITY
FACTUAL
IDENTITIES
UNIQUE TRUE SELF
GENERAL PUBLIC APPEARANCE
CONTEXTUAL
T...
unverifyable &
questionable
verifyable &
trustworthy
PSEUDO
IDENTITIES
CORE
IDENTITY
PUBLIC
IDENTITY
FACTUAL
IDENTITIES
PSEUDO
IDENTITIES
CORE
IDENTITY
PUBLIC
IDENTITY
FACTUAL
IDENTITIES
A HUMAN PERSON‘S IDENTITY SET
this identity model is the basic rule set
to define our virtual behaviour and representation and
that allows to manage dif...
EVERYBODY AND EVERYTHING
NEEDS AN IDENTITY STRUCTURE
state
representation
companies &
organisations
artificial
intelligenc...
THE WHOLE COMMUNICATION CHAIN IDENTIFIABLE
EVERYTHING IS OWNED BY PERSONS
THE WHOLE COMMUNICATION CHAIN IDENTIFIABLE
COMMUNICATION IS ALWAYS BETWEEN PERSONS
IDENTITIES REACT ON THE CONTEXT
INTRODUCING
PRIVACY SPHERES
The boundaries of communication
PUBLIC
RESERVED
INTIMATE
PERSONAL ONLY YOU
WITH ACTIVE GRANT
WITH PASSIVE GRANT
EVERYBODY
privacy spheres
INTIMATE RESERVED PUBLICPERSONAL
secret
diary
pictures
from last
night
employee
ID
grant
home
access
home
access
pseudo
co...
by default similar data may not be exposed
to a more open level of privacy,
without the person‘s intent.
INTIMATE RESERVED PUBLICPERSONAL
diary
entry 1
diary
entry 2
EVERY IDENTITY HAS A DEFAULT,
where data or rights are located
INTIMATE RESERVED PUBLICPERSONAL
right to
manage
use
right to
use
sensor
data
unique
ID
object
info
combining identity and privacy spheres
INTIMATE RESERVED PUBLICPERSONAL
UID24298723459
MADAMEPOMPADILLE
HR42CHOPKINS
PUBLIC IDENTITY
INTIMATE RESERVED PUBLICPERSONAL
UID24298723459
right to
manage
use
right to
use
sensor
data
unique
ID
object
info
INTIMATE RESERVED PUBLICPERSONAL
UID24298723459
right to
manage
use
right to
use
sensor
data
unique
ID
object
info
IDENTITY
COMMUNICATION
INTIMATE RESERVED PUBLIC INTIMATERESERVED
OK, but rules apply
INTIMATE RESERVED PUBLIC INTIMATERESERVED
person’s active grant needed
INTIMATE RESERVED PUBLIC INTIMATERESERVED
no response at all
INTIMATE RESERVED PUBLIC INTIMATERESERVED
“I CREATED THE WWW TO CONNECT PEOPLE NOT MACHINES“
Sir Tim Berners-Lee
CONCLUSION
privacy is vital to society
and a human right to everyone
the IoT will happen
and this is a great thing
we need to solve those privacy issues
and I‘m sure we can
photo by mere41782 on flickr.com – licensed under cc by nd 2.0
LET US BUILD A MAGIC FUTURE,
NOT A DYSTOPIA.
THANK YOU.
@lu...
Privacy by Default - IA Summit 2017
Privacy by Default - IA Summit 2017
Privacy by Default - IA Summit 2017
You’ve finished this document.
Download and read it offline.
Upcoming SlideShare
A Taxonomist, a Software Engineer, and a UX Researcher Walk Into a Bar: Bridging AI and User Experience Methods at Etsy
Next
Upcoming SlideShare
A Taxonomist, a Software Engineer, and a UX Researcher Walk Into a Bar: Bridging AI and User Experience Methods at Etsy
Next
Download to read offline and view in fullscreen.

7

Share

Privacy by Default - IA Summit 2017

Download to read offline

presenting a concept for privacy in a world with the Internet of Things. While we already have serious privacy issues, many of them will become even worse with computers that are always on, everywhere and not even perceivable as computers anymore. This presentation holds a proposal to solve some of these issues

Related Books

Free with a 30 day trial from Scribd

See all

Related Audiobooks

Free with a 30 day trial from Scribd

See all

Privacy by Default - IA Summit 2017

  1. 1. Lutz Schmitt - Twitter: @luxux - IA Summit 2017 - Vancouver PRIVACY BY DEFAULT illustration by Lutz Schmitt – licensed under cc-by-nd 4.0
  2. 2. A CONCEPT FOR PRIVACY IN A WORLD WITH THE INTERNET OF THINGS PRIVACY BY DEFAULT illustration by Lutz Schmitt – licensed under cc-by-nd 4.0
  3. 3. Missing parts for a world with ambient intelligence, that I would want to live in.
  4. 4. PREAMBLE
  5. 5. SECURITY IS FUNDAMENTAL it isn‘t really worth talking about privacy in an insecure environment
  6. 6. IT‘S ALL ABOUT SOCIETY and how technology is used to help shaping it.
  7. 7. AND IT‘S ABOUT BUSINESS
  8. 8. https://twitter.com/MetroUK/status/776150782194376704
  9. 9. ABOUT PRIVACY
  10. 10. you VERSUS the others
  11. 11. THE RIGHT TO BE LET ALONE The Right to Privacy (Brandeis & Warren) Harvard Law Review, 15 Dec 1890
  12. 12. 1. The right to privacy does not prohibit any publication … which is of public … interest 4. The right to privacy ceases upon the publication of the facts by the individual, or with his consent. LIMITATIONS TO THE RIGHT TO PRIVACY
  13. 13. Would you hand over your Facebook- Login to a stranger?
  14. 14. Photo by Beatrice Murch on flickr. Licensed under cc-by-sa 2-0 At JFK Airport Immigration you will. Would you hand over your Facebook- Login to a stranger?
  15. 15. you AND the others
  16. 16. Alan Westin in Privacy and Freedom, 1968
  17. 17. STATES OF PRIVACYaccording to Alan Westin SOLITUDE privacy of individuals INTIMACY privacy of groups ANONYMITY unidentifiability in public RESERVE (psychological) barriers / resilience
  18. 18. STATES OF PRIVACYaccording to Alan Westin, extended by me SOLITUDE privacy of individuals INTIMACY privacy of groups ANONYMITY unidentifiability in public RESERVE (psychological) barriers / resilience PSEUDONYMITY choice of identification
  19. 19. No one shall be subjected to arbitrary interference with his privacy, family, home or correspondence, nor to attacks upon his honour and reputation. Everyone has the right to the protection of the law against such interference or attacks. Article 12 Universal Declaration of Human Rights http://www.un.org/en/universal-declaration-human-rights/
  20. 20. ABOUT THE INTERNET
  21. 21. THE INTERNET IS BROKEN.
  22. 22. photo by Wally Gobetz on flickr.com licensed under cc-by-nc-nd 2.0 the internet is not a public place
  23. 23. Facebook is Mark Zuckerberg‘s living room. photo by Danny Howard on flickr.com licensed under cc-by-nc 2.0 His living room, his rules.
  24. 24. photo by Wally Gobetz on flickr.com licensed under cc-by-nc-nd 2.0 the internet is not free neither as in freedom, nor as in free beer
  25. 25. remember the fight for net neutrality? photo by NewbleRunner on flickr.com licensed under cc-by-sa 2.0
  26. 26. and it‘s getting worse with the Internet of Things
  27. 27. ABOUT THE INTERNET OF THINGS
  28. 28. photo by Philips. Released as press material. All rights reserved. Remote controlling your lightbulbs, is not the IoT. It‘s remote controlling your lightbulbs.
  29. 29. photo by revolv. Press material. are not the Internet of Things. That‘s just DRM for the physical world. devices that need a cloud connection
  30. 30. Source: https://www.hackread.com/samsung-smart-tv-listening-conversations/
  31. 31. illustration by Lutz Schmitt published under cc-by-nc 4.0 we have reached zero effective cost
  32. 32. THE VISION FOR THE INTERNET OF THINGS THAT HOOKED ME computers begin to be inseperably weaved into the fabric of our physical reality illustration by Lutz Schmitt published under cc-by-nc 4.0
  33. 33. photo by Sarah Leo on flickr.com – licensed under cc-by-sa 2.0 Mark Weiser, The Computer for the 21st Century, 1991
  34. 34. SOME ISSUES THAT NEED TO BE SOLVED
  35. 35. ISSUE #1
  36. 36. a friend, on how to use smartphones and stay private
  37. 37. AMBIENT INTELLIGENCE WON‘T COME WITH A POWER BUTTON photo by Juan Ignacio Sánchez Lara on flickr. Licensed under cc-by-nc-sa-2
  38. 38. WHAT MEANS OF CONTROL CAN BE ESTABLISHED If shutting down is no option anymore? Still from 2001: A Space Odyssey. Source: https://youtu.be/l2c_rSLXq6U
  39. 39. ISSUE #2
  40. 40. we need to trust and believe the more technology develops, the less we are able understand photo 7th gen Intel Core die by Intel Corp. Source: Presskit release on 2017-01-03
  41. 41. Arthur C. Clarke, Hazards of Prophecy, 1962
  42. 42. Still from Her. Source: Press material. How do we design this magic reality, that people mustn‘t fear it, but are empowered?
  43. 43. ISSUE #3
  44. 44. decisions and setups all the time may it be an app, a website, a washing machine or else
  45. 45. teaching and answering computers is a sisyphean task already
  46. 46. HOW CAN WE AVOID INTERACTION OVERLOAD?
  47. 47. ISSUE #4
  48. 48. the IoT is dissolving our places and meanings of the physical world
  49. 49. Photo by Deraman Uskratzt on flickr.com. Licensed under cc-by-sa 2.0. How must we architect the virtual dimension of things and places, that our perception of reality won‘t be broken?
  50. 50. ISSUE #5
  51. 51. mass surveillance is a reality and those in control are not willing to let it go Photo by Jeremy Brooks on flickr.com. Licensed under cc-by-nc 2.0.
  52. 52. Screenshot. Source: the internet between individual interests and those of corporations, governments and the public WE LACK BALANCE
  53. 53. HOW CAN WE ESTABLISH A FAIR BALANCE, instead of increasing the unequality?
  54. 54. PRECONDITIONS FOR THE INTERNET (OF THINGS) TO HAVE ANY KIND OF PRIVACY AT ALL.
  55. 55. TECHNOLOGY MUST BE SECURE
  56. 56. THE NETWORK MUST BE PUBLIC
  57. 57. EVERYTHING IDENTIFIABLE MUST BE
  58. 58. COMMUNICATION REFUSABLE MUST BE
  59. 59. A PERSON‘S INTENT KNOWN MUST BE
  60. 60. A CONCEPT FOR PRIVACY IN A WORLD WITH THE INTERNET OF THINGS PRIVACY BY DEFAULT illustration by Lutz Schmitt – licensed under cc-by-nd 4.0
  61. 61. INTRODUCING IDENTITY
  62. 62. IDENTITY IS WHO WE ARE to ourselves and to others
  63. 63. WE HAVE MANY IDENTITIES friend, professional, internet troll, public speaker, …
  64. 64. PSEUDO IDENTITIES CORE IDENTITY PUBLIC IDENTITY FACTUAL IDENTITIES UNIQUE TRUE SELF GENERAL PUBLIC APPEARANCE CONTEXTUAL TRUE SELVES CONTEXTUAL PRETENDED SELVES
  65. 65. unverifyable & questionable verifyable & trustworthy PSEUDO IDENTITIES CORE IDENTITY PUBLIC IDENTITY FACTUAL IDENTITIES
  66. 66. PSEUDO IDENTITIES CORE IDENTITY PUBLIC IDENTITY FACTUAL IDENTITIES A HUMAN PERSON‘S IDENTITY SET
  67. 67. this identity model is the basic rule set to define our virtual behaviour and representation and that allows to manage different situations
  68. 68. EVERYBODY AND EVERYTHING NEEDS AN IDENTITY STRUCTURE state representation companies & organisations artificial intelligences objects animals places
  69. 69. THE WHOLE COMMUNICATION CHAIN IDENTIFIABLE
  70. 70. EVERYTHING IS OWNED BY PERSONS
  71. 71. THE WHOLE COMMUNICATION CHAIN IDENTIFIABLE
  72. 72. COMMUNICATION IS ALWAYS BETWEEN PERSONS
  73. 73. IDENTITIES REACT ON THE CONTEXT
  74. 74. INTRODUCING PRIVACY SPHERES The boundaries of communication
  75. 75. PUBLIC RESERVED INTIMATE PERSONAL ONLY YOU WITH ACTIVE GRANT WITH PASSIVE GRANT EVERYBODY privacy spheres
  76. 76. INTIMATE RESERVED PUBLICPERSONAL secret diary pictures from last night employee ID grant home access home access pseudo contact details geo location shirt‘s product info work contact details coffee maker‘s fill status shirt‘s unique ID THAT pictures bitcoin vallet
  77. 77. by default similar data may not be exposed to a more open level of privacy, without the person‘s intent.
  78. 78. INTIMATE RESERVED PUBLICPERSONAL diary entry 1 diary entry 2
  79. 79. EVERY IDENTITY HAS A DEFAULT, where data or rights are located
  80. 80. INTIMATE RESERVED PUBLICPERSONAL right to manage use right to use sensor data unique ID object info
  81. 81. combining identity and privacy spheres
  82. 82. INTIMATE RESERVED PUBLICPERSONAL UID24298723459 MADAMEPOMPADILLE HR42CHOPKINS PUBLIC IDENTITY
  83. 83. INTIMATE RESERVED PUBLICPERSONAL UID24298723459 right to manage use right to use sensor data unique ID object info
  84. 84. INTIMATE RESERVED PUBLICPERSONAL UID24298723459 right to manage use right to use sensor data unique ID object info
  85. 85. IDENTITY COMMUNICATION
  86. 86. INTIMATE RESERVED PUBLIC INTIMATERESERVED
  87. 87. OK, but rules apply INTIMATE RESERVED PUBLIC INTIMATERESERVED
  88. 88. person’s active grant needed INTIMATE RESERVED PUBLIC INTIMATERESERVED
  89. 89. no response at all INTIMATE RESERVED PUBLIC INTIMATERESERVED
  90. 90. “I CREATED THE WWW TO CONNECT PEOPLE NOT MACHINES“ Sir Tim Berners-Lee
  91. 91. CONCLUSION
  92. 92. privacy is vital to society and a human right to everyone
  93. 93. the IoT will happen and this is a great thing
  94. 94. we need to solve those privacy issues and I‘m sure we can
  95. 95. photo by mere41782 on flickr.com – licensed under cc by nd 2.0 LET US BUILD A MAGIC FUTURE, NOT A DYSTOPIA. THANK YOU. @luxux www.lutzschmitt.com Photo by Rick Schwartz on flickr.com. Licensed under cc-by-nc 2.0.
  • SaskiaSchulzeSchwering

    Sep. 28, 2017
  • SalmanNazir6

    May. 20, 2017
  • MorganeLOPVET

    May. 17, 2017
  • flexmatt

    Apr. 4, 2017
  • jcolman

    Mar. 31, 2017
  • cogarch

    Mar. 26, 2017
  • KhatiPaul

    Mar. 25, 2017

presenting a concept for privacy in a world with the Internet of Things. While we already have serious privacy issues, many of them will become even worse with computers that are always on, everywhere and not even perceivable as computers anymore. This presentation holds a proposal to solve some of these issues

Views

Total views

2,680

On Slideshare

0

From embeds

0

Number of embeds

103

Actions

Downloads

55

Shares

0

Comments

0

Likes

7

×