• Privacy is in the details- how do you deal with
exceptions and false positives?
• Institutionalise privacy protection
• In a high-trust environment, the more you
speak about privacy protection, the more
nervous people get about privacy
Conspiracy theories natural
The Dictator’s Guide to the Internet: How to Balkanize the Dirty Web
Ian Apperley in the National Business Review
Major online service providers
also under scrutiny
2. Take sensible steps
But accept people are human and very
poor at risk evaluation
Excellent read: http://www.schneier.com/essay-155.html
3. Consider if you are willing to pay for
privacy. Professionals and businesses
should consider confidentiality and
So, what am I doing?
1. Talking about the issues
2. Becoming a cypherpunk
“An activist advocating widespread use
of strong cryptography as a route to
social and political change”
Inspiration from the Bitcoin system
• Decentralised ledgers connected by crypto-
• Peer-to-peer, irreversible transactions
• 51% agreement = “truth”
• Very low costs, global scale
• Design systems and processes for a low or
zero trust environment.
• Customers can take more responsibility and
actions to protect their privacy.
• Cryptography is expected to be increasingly
used online routinely, just like drawing
curtains in the Panopticon.