Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.
Contextual Identity:
Freedom to be
All Your Selves
Monica Chew, Sid Stamm
Mozilla
{mmc,sid}@mozilla.com
Contextual Identity
Be who you want, when you want
Multiple identities abound!
Josephine Baker
Colleen Lachowicz
Snoop Dogg (Snoop Lion)
All your identities in one big identity
"Having two identities for yourself is an
example of a lack of integrity."
- Mark ...
All your identities in one big identity
source: www.facebook.com/help/112146705538576/
“Facebook is a community where
peop...
Mr. Burns is not pleased
A real world example
Bobbi Duncan Taylor McCormick
Outed when the choir director added them to a
public Facebook group, Qu...
Fuck you, Google
I use my private Gmail account to email my boyfriend and my mother.
There’s a BIG drop-off between them a...
Twitter Direct Messaging Failures
sources: twitter.com/dmfail, wikipedia.org/wiki/Weinergate
catalyst: typing '@' instead ...
What's in our privacy toolbox?
● Cryptography [RSA, AES, Diffie-Hellman]
● Contextual integrity [Barth et al.]
● Access co...
Access control: state of the art?
Changes are hard to track
source: http://mattmckeon.com/facebook-privacy/
Changes are hard to track
source: http://mattmckeon.com/facebook-privacy/
Changes are hard to track
source: http://mattmckeon.com/facebook-privacy/
Changes are hard to track
source: http://mattmckeon.com/facebook-privacy/
Changes are hard to track
source: http://mattmckeon.com/facebook-privacy/
Changes are hard to track
source: http://mattmckeon.com/facebook-privacy/
Be who you want, when
you want
How do we get there?
Call to action
Study mental models
What makes up online identity?
sites you visit once
devices you own
devices you borrow
devices you lend
sites you never vi...
Call to action
Study identity management techniques
Multiple browsers
Multiple devices
Multiple profiles
Alternate identities
Privacy mode
Challenge
People value community
Challenge
People want their data everywhere
Popemobiles make it hard to share
Think different.
Hey, W2SP.
● Obscurity can be enough
● Embarrassment reduction
● Troll avoidance
● Mistake recovery
Room for imperfect solutions
How can we make things better?
● Question our own notions of identity, privacy
and publicity
● Write software for how user...
Open questions
● How can we design privacy and sharing to
be less brittle, more flexible?
● How can we balance desire for ...
Works in progress
● Blushproof [with David Keeler]
● Cookiemonster [with David Dahl]
● Behavioral segmentation [Mozilla UR]
Questions?
Upcoming SlideShare
Loading in …5
×

Contextual identity w2sp

30,585 views

Published on

Published in: Technology, News & Politics
  • Be the first to comment

Contextual identity w2sp

  1. 1. Contextual Identity: Freedom to be All Your Selves Monica Chew, Sid Stamm Mozilla {mmc,sid}@mozilla.com
  2. 2. Contextual Identity Be who you want, when you want
  3. 3. Multiple identities abound!
  4. 4. Josephine Baker
  5. 5. Colleen Lachowicz
  6. 6. Snoop Dogg (Snoop Lion)
  7. 7. All your identities in one big identity "Having two identities for yourself is an example of a lack of integrity." - Mark Zuckerberg, The Facebook Effect "If you have something that you don't want anyone to know, maybe you shouldn't be doing it in the first place." - Eric Schmidt, interview on CNBC
  8. 8. All your identities in one big identity source: www.facebook.com/help/112146705538576/ “Facebook is a community where people use their real identities. We require everyone to provide their real names, so you always know who you're connecting with. This helps keep our community safe.”
  9. 9. Mr. Burns is not pleased
  10. 10. A real world example Bobbi Duncan Taylor McCormick Outed when the choir director added them to a public Facebook group, Queer Chorus
  11. 11. Fuck you, Google I use my private Gmail account to email my boyfriend and my mother. There’s a BIG drop-off between them and my other “most frequent” contacts. You know who my third most frequent contact is? My abusive ex-husband. Which is why it’s SO EXCITING, Google, that you AUTOMATICALLY allowed all my most frequent contacts access to my Reader, including all the comments I’ve made on Reader items, usually shared with my boyfriend, who I had NO REASON to hide my current location or workplace from, and never did. All your services in one big service source: www.fugitivus.net/2010/02/11/fuck-you-google/ catalyst: Google Buzz/Reader/Contacts integration
  12. 12. Twitter Direct Messaging Failures sources: twitter.com/dmfail, wikipedia.org/wiki/Weinergate catalyst: typing '@' instead of 'd'
  13. 13. What's in our privacy toolbox? ● Cryptography [RSA, AES, Diffie-Hellman] ● Contextual integrity [Barth et al.] ● Access control [Bell, LaPadula] ● Anonymizers [Dingledine, Marlinspike] ● Blockers [AdBlockPlus, Disconnect.me] Our tools are necessary but not sufficient.
  14. 14. Access control: state of the art?
  15. 15. Changes are hard to track source: http://mattmckeon.com/facebook-privacy/
  16. 16. Changes are hard to track source: http://mattmckeon.com/facebook-privacy/
  17. 17. Changes are hard to track source: http://mattmckeon.com/facebook-privacy/
  18. 18. Changes are hard to track source: http://mattmckeon.com/facebook-privacy/
  19. 19. Changes are hard to track source: http://mattmckeon.com/facebook-privacy/
  20. 20. Changes are hard to track source: http://mattmckeon.com/facebook-privacy/
  21. 21. Be who you want, when you want How do we get there?
  22. 22. Call to action Study mental models
  23. 23. What makes up online identity? sites you visit once devices you own devices you borrow devices you lend sites you never visit sites you often visit topics you like
  24. 24. Call to action Study identity management techniques
  25. 25. Multiple browsers
  26. 26. Multiple devices
  27. 27. Multiple profiles
  28. 28. Alternate identities
  29. 29. Privacy mode
  30. 30. Challenge People value community
  31. 31. Challenge People want their data everywhere
  32. 32. Popemobiles make it hard to share
  33. 33. Think different. Hey, W2SP.
  34. 34. ● Obscurity can be enough ● Embarrassment reduction ● Troll avoidance ● Mistake recovery Room for imperfect solutions
  35. 35. How can we make things better? ● Question our own notions of identity, privacy and publicity ● Write software for how users are, not how we wish them to be
  36. 36. Open questions ● How can we design privacy and sharing to be less brittle, more flexible? ● How can we balance desire for spontaneous interaction with the need for privacy?
  37. 37. Works in progress ● Blushproof [with David Keeler] ● Cookiemonster [with David Dahl] ● Behavioral segmentation [Mozilla UR]
  38. 38. Questions?

×