SlideShare a Scribd company logo
1 of 20
Casual Privacy “ a design pattern for sharing non-public information using out-of-band exchange of unguessable tokens.” because most privacy isn’t worth it.
[object Object],How to do we get more people to share more information, and more interesting information? Is there information you’re sharing more widely right now then you feel comfortable with? Is there information you’d share with more people if it was easy that you don’t want to tell GoogleBot? Assertion: Open Questions:
Current Privacy Options 1. Share Nothing 2. Share Everything 3. Manage a crowd
Everything Private Sucks ,[object Object],[object Object],[object Object],[object Object]
Share Everything? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Sharing:  Because it works! ,[object Object],[object Object],[object Object],[object Object]
Manage a crowd ,[object Object],[object Object],[object Object],[object Object],[object Object],friend, family, contact, acquaintance, met, co-worker, colleague, co-resident, neighbor, child, parent, sibling, spouse, kin, muse, crush, date, sweetheart, me, friend, family, contact, acquaintance, met, co-worker, colleague, co-resident, neighbor, child, parent, sibling, spouse, kin, muse, crush, date, sweetheart, me, friend, family, contact, acquaintance, met, co-worker, colleague, co-resident, neighbor, child, parent, sibling, spouse, kin, muse, crush, date, sweetheart, me, friend, family, contact, acquaintance, met, co-worker, colleague, co-resident, neighbor, child, parent, sibling, spouse, kin, muse, crush, date, sweetheart, me, acquaintance, met, co-worker, colleague, co-resident, neighbor, child, parent, sibling, spouse, kin, muse, crush, date, sweetheart, me, friend, family, contact, quasi-friend, sort-a-friend, weird-uncle, kith, annoying ex-roomate
Account proliferation! ,[object Object],[object Object],[object Object]
[object Object],http://flickr.com/gp/86712998@N00/BWk63T SUPER SEKRET URLZ!!1!
Case Study: Flickr Guest Pass ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Casual Privacy: Features ,[object Object],[object Object],[object Object]
OMG Alice isn't trustworthy and leaked the secret token! ,[object Object],[object Object],[object Object],[object Object]
Deniable ,[object Object],[object Object],[object Object],[object Object],[object Object]
Hard to Guess ,[object Object],[object Object],[object Object]
History Of ,[object Object],[object Object],[object Object]
Worse is Better ,[object Object],[object Object],[object Object]
Casual Privacy: Checklist ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Security Concerns ,[object Object],[object Object],[object Object]
Future Work ,[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]

More Related Content

What's hot

Pumping Them Up with Digital Icebreakers
Pumping Them Up with Digital IcebreakersPumping Them Up with Digital Icebreakers
Pumping Them Up with Digital IcebreakersShelly Sanchez Terrell
 
10 Myths About Social Media And Local Government
10 Myths About Social Media And Local Government10 Myths About Social Media And Local Government
10 Myths About Social Media And Local Governmentspencerblesi
 
Adlina ariffin 1071114993
Adlina ariffin 1071114993Adlina ariffin 1071114993
Adlina ariffin 1071114993xebullD
 
Yes Google Really is Trying to Take over the World
Yes Google Really is Trying to Take over the WorldYes Google Really is Trying to Take over the World
Yes Google Really is Trying to Take over the WorldDavid Tyler
 
Don't use social media
Don't use social mediaDon't use social media
Don't use social mediaMighty Jungle
 

What's hot (6)

Pumping Them Up with Digital Icebreakers
Pumping Them Up with Digital IcebreakersPumping Them Up with Digital Icebreakers
Pumping Them Up with Digital Icebreakers
 
10 Myths About Social Media And Local Government
10 Myths About Social Media And Local Government10 Myths About Social Media And Local Government
10 Myths About Social Media And Local Government
 
Adlina ariffin 1071114993
Adlina ariffin 1071114993Adlina ariffin 1071114993
Adlina ariffin 1071114993
 
Twitter. WTF?
Twitter. WTF?Twitter. WTF?
Twitter. WTF?
 
Yes Google Really is Trying to Take over the World
Yes Google Really is Trying to Take over the WorldYes Google Really is Trying to Take over the World
Yes Google Really is Trying to Take over the World
 
Don't use social media
Don't use social mediaDon't use social media
Don't use social media
 

Similar to Casual Privacy (Ignite Web2.0 Expo)

Social Networking for People Over Thirty
Social Networking for People Over ThirtySocial Networking for People Over Thirty
Social Networking for People Over ThirtyScott Gow
 
Living Up To Your Reputation
Living Up To Your ReputationLiving Up To Your Reputation
Living Up To Your Reputationlauradeisley
 
Social Networking Pp Draft 1 TEST
Social Networking Pp Draft 1 TESTSocial Networking Pp Draft 1 TEST
Social Networking Pp Draft 1 TESTCornell
 
Casott employee conference 2015
Casott employee conference 2015Casott employee conference 2015
Casott employee conference 2015Bernard Charlebois
 
Code Of Our Own
Code Of Our OwnCode Of Our Own
Code Of Our OwnLiz Henry
 
The Networking Game
The Networking GameThe Networking Game
The Networking GameLeif Smith
 
Lets Talk About Social Networking
Lets Talk About Social NetworkingLets Talk About Social Networking
Lets Talk About Social NetworkingCornell
 
Social groups for awareness
Social groups for awarenessSocial groups for awareness
Social groups for awarenessKaran Veer Singh
 
The Networking Game
The Networking GameThe Networking Game
The Networking GamePat Wagner
 
E safety training for foster carers by stephen carrick-davies jan 2013
E  safety training for foster carers by stephen carrick-davies jan 2013E  safety training for foster carers by stephen carrick-davies jan 2013
E safety training for foster carers by stephen carrick-davies jan 2013Stevecd
 
What Children Get Up To Online (and how we can try to keep them safe)
What Children Get Up To Online (and how we can try to keep them safe)What Children Get Up To Online (and how we can try to keep them safe)
What Children Get Up To Online (and how we can try to keep them safe)MrYoung
 
Internal Collab Tools Presentation
Internal Collab Tools PresentationInternal Collab Tools Presentation
Internal Collab Tools PresentationEverythingability
 
Giles's presentation at TED Global 2010
Giles's presentation at TED Global 2010Giles's presentation at TED Global 2010
Giles's presentation at TED Global 2010ON
 
The Evolution Of The Social Web
The Evolution Of The Social WebThe Evolution Of The Social Web
The Evolution Of The Social WebDan Donald
 
Social media romania day 3
Social media romania day 3Social media romania day 3
Social media romania day 3Bex Lewis
 
Internet 4 Parents
Internet 4 ParentsInternet 4 Parents
Internet 4 ParentsIwith.org
 
Newrulesforlivinginadigitalage 101101063746-phpapp01
Newrulesforlivinginadigitalage 101101063746-phpapp01Newrulesforlivinginadigitalage 101101063746-phpapp01
Newrulesforlivinginadigitalage 101101063746-phpapp01Lokinos
 

Similar to Casual Privacy (Ignite Web2.0 Expo) (20)

Riverview
RiverviewRiverview
Riverview
 
Kevin Bradshaw, Zendit
Kevin Bradshaw, ZenditKevin Bradshaw, Zendit
Kevin Bradshaw, Zendit
 
Social Networking for People Over Thirty
Social Networking for People Over ThirtySocial Networking for People Over Thirty
Social Networking for People Over Thirty
 
April27 dyc
April27 dycApril27 dyc
April27 dyc
 
Living Up To Your Reputation
Living Up To Your ReputationLiving Up To Your Reputation
Living Up To Your Reputation
 
Social Networking Pp Draft 1 TEST
Social Networking Pp Draft 1 TESTSocial Networking Pp Draft 1 TEST
Social Networking Pp Draft 1 TEST
 
Casott employee conference 2015
Casott employee conference 2015Casott employee conference 2015
Casott employee conference 2015
 
Code Of Our Own
Code Of Our OwnCode Of Our Own
Code Of Our Own
 
The Networking Game
The Networking GameThe Networking Game
The Networking Game
 
Lets Talk About Social Networking
Lets Talk About Social NetworkingLets Talk About Social Networking
Lets Talk About Social Networking
 
Social groups for awareness
Social groups for awarenessSocial groups for awareness
Social groups for awareness
 
The Networking Game
The Networking GameThe Networking Game
The Networking Game
 
E safety training for foster carers by stephen carrick-davies jan 2013
E  safety training for foster carers by stephen carrick-davies jan 2013E  safety training for foster carers by stephen carrick-davies jan 2013
E safety training for foster carers by stephen carrick-davies jan 2013
 
What Children Get Up To Online (and how we can try to keep them safe)
What Children Get Up To Online (and how we can try to keep them safe)What Children Get Up To Online (and how we can try to keep them safe)
What Children Get Up To Online (and how we can try to keep them safe)
 
Internal Collab Tools Presentation
Internal Collab Tools PresentationInternal Collab Tools Presentation
Internal Collab Tools Presentation
 
Giles's presentation at TED Global 2010
Giles's presentation at TED Global 2010Giles's presentation at TED Global 2010
Giles's presentation at TED Global 2010
 
The Evolution Of The Social Web
The Evolution Of The Social WebThe Evolution Of The Social Web
The Evolution Of The Social Web
 
Social media romania day 3
Social media romania day 3Social media romania day 3
Social media romania day 3
 
Internet 4 Parents
Internet 4 ParentsInternet 4 Parents
Internet 4 Parents
 
Newrulesforlivinginadigitalage 101101063746-phpapp01
Newrulesforlivinginadigitalage 101101063746-phpapp01Newrulesforlivinginadigitalage 101101063746-phpapp01
Newrulesforlivinginadigitalage 101101063746-phpapp01
 

More from Kellan

More women in engineering: Something that ACTUALLY WORKED.
More women in engineering: Something that ACTUALLY WORKED.More women in engineering: Something that ACTUALLY WORKED.
More women in engineering: Something that ACTUALLY WORKED.Kellan
 
Optimizing for change: Taking risks safely & e-commerce
Optimizing for change: Taking risks safely & e-commerceOptimizing for change: Taking risks safely & e-commerce
Optimizing for change: Taking risks safely & e-commerceKellan
 
Optimizing for change: Taking risks safely & e-commerce
Optimizing for change: Taking risks safely & e-commerceOptimizing for change: Taking risks safely & e-commerce
Optimizing for change: Taking risks safely & e-commerceKellan
 
More women in engineering: Something that ACTUALLY WORKED.
More women in engineering: Something that ACTUALLY WORKED.More women in engineering: Something that ACTUALLY WORKED.
More women in engineering: Something that ACTUALLY WORKED.Kellan
 
Future of handmade
Future of handmadeFuture of handmade
Future of handmadeKellan
 
Architecting for Change: QCONNYC 2012
Architecting for Change: QCONNYC 2012Architecting for Change: QCONNYC 2012
Architecting for Change: QCONNYC 2012Kellan
 
Metrics driven engineering (velocity 2011)
Metrics driven engineering (velocity 2011)Metrics driven engineering (velocity 2011)
Metrics driven engineering (velocity 2011)Kellan
 
Engineering Change
Engineering ChangeEngineering Change
Engineering ChangeKellan
 
Solving the "Brooklyn Problem"
Solving the "Brooklyn Problem" Solving the "Brooklyn Problem"
Solving the "Brooklyn Problem" Kellan
 
Social Software For Robots
Social Software For RobotsSocial Software For Robots
Social Software For RobotsKellan
 
Beyond REST? Building data services with XMPP
Beyond REST? Building data services with XMPPBeyond REST? Building data services with XMPP
Beyond REST? Building data services with XMPPKellan
 
Advanced OAuth Wrangling
Advanced OAuth WranglingAdvanced OAuth Wrangling
Advanced OAuth WranglingKellan
 

More from Kellan (12)

More women in engineering: Something that ACTUALLY WORKED.
More women in engineering: Something that ACTUALLY WORKED.More women in engineering: Something that ACTUALLY WORKED.
More women in engineering: Something that ACTUALLY WORKED.
 
Optimizing for change: Taking risks safely & e-commerce
Optimizing for change: Taking risks safely & e-commerceOptimizing for change: Taking risks safely & e-commerce
Optimizing for change: Taking risks safely & e-commerce
 
Optimizing for change: Taking risks safely & e-commerce
Optimizing for change: Taking risks safely & e-commerceOptimizing for change: Taking risks safely & e-commerce
Optimizing for change: Taking risks safely & e-commerce
 
More women in engineering: Something that ACTUALLY WORKED.
More women in engineering: Something that ACTUALLY WORKED.More women in engineering: Something that ACTUALLY WORKED.
More women in engineering: Something that ACTUALLY WORKED.
 
Future of handmade
Future of handmadeFuture of handmade
Future of handmade
 
Architecting for Change: QCONNYC 2012
Architecting for Change: QCONNYC 2012Architecting for Change: QCONNYC 2012
Architecting for Change: QCONNYC 2012
 
Metrics driven engineering (velocity 2011)
Metrics driven engineering (velocity 2011)Metrics driven engineering (velocity 2011)
Metrics driven engineering (velocity 2011)
 
Engineering Change
Engineering ChangeEngineering Change
Engineering Change
 
Solving the "Brooklyn Problem"
Solving the "Brooklyn Problem" Solving the "Brooklyn Problem"
Solving the "Brooklyn Problem"
 
Social Software For Robots
Social Software For RobotsSocial Software For Robots
Social Software For Robots
 
Beyond REST? Building data services with XMPP
Beyond REST? Building data services with XMPPBeyond REST? Building data services with XMPP
Beyond REST? Building data services with XMPP
 
Advanced OAuth Wrangling
Advanced OAuth WranglingAdvanced OAuth Wrangling
Advanced OAuth Wrangling
 

Recently uploaded

A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 

Recently uploaded (20)

A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 

Casual Privacy (Ignite Web2.0 Expo)

  • 1. Casual Privacy “ a design pattern for sharing non-public information using out-of-band exchange of unguessable tokens.” because most privacy isn’t worth it.
  • 2.
  • 3. Current Privacy Options 1. Share Nothing 2. Share Everything 3. Manage a crowd
  • 4.
  • 5.
  • 6.
  • 7.
  • 8.
  • 9.
  • 10.
  • 11.
  • 12.
  • 13.
  • 14.
  • 15.
  • 16.
  • 17.
  • 18.
  • 19.
  • 20.