SlideShare a Scribd company logo
1 of 21
Download to read offline
Embracing Post-Privacy
  Optimism towards a future
where there is “Nothing to hide”



                Christian Heller / http://www.plomlompom.de
                                            December 29, 2008
                        25. Chaos Communication Congress
                                          bcc / Berlin, Germany
“cctv” by Subcircle (http://www.subcircle.co.uk/)
                     http://flickr.com/photos/8323834@N07/500970140/
License: Creative Commons 2.0 Attribution / http://creativecommons.org/licenses/by/2.0/deed.en
Overview
    pessimism: the end of privacy
●


    question: the meaning of privacy
●


    optimism: ideas for post-privacy dys... utopias
●


    reading recommendations
●


    discussion
●
“Secure Beneath the Watchful Eyes” by Kenneth Lu (http://subjunctive.net/klog/)
                         http://flickr.com/photos/toasty/2171185463/
License: Creative Commons 2.0 Attribution / http://creativecommons.org/licenses/by/2.0/deed.en
Privacy is doomed
    the privacy-eating monster
●


        growingly well-fed, ubiquitous, attractive, intelligent
    –

        once information is in, it cannot be removed again
    –

    the privacy-defending army
●


        laws ineffective; technology insecure
    –

        pre-MySpace generation getting old, disappearing
    –

    an uneven battle for the army
●


        cannot be won ultimately
    –

        can only be lost; easily
    –
“Privat” by Daniel Lobo (http://www.daquellamanera.org/)
                     http://flickr.com/photos/daquellamanera/311128375/
License: Creative Commons 2.0 Attribution / http://creativecommons.org/licenses/by/2.0/deed.en
What is the meaning of Privacy?
    self-determination
●


        make your own decisions about your life
    –

        freedom from interference by others
    –

    information control
●


        control what information flows from you to others
    –

        control what information flows to you from others
    –

    intimacy
●


        sharing of privacy
    –

        interpersonal trust, dependence
    –
“Tanzliedchen” by Hugo Bürkner, 1854
http://commons.wikimedia.org/wiki/File:Bürkner_Tanzliedchen.jpg
private             vs.             public
    house, backroom,             forum, parliament,
●                           ●

    home PC, head/brain          newspaper, Slashdot
    hidden                       visible
●                           ●


    secure from scrutiny         accountable to social
●                           ●

    of social norms              norms
    free individual?             controlled conformist?
●                           ●


    woman                        man
●                           ●


    isolated                     interconnected
●                           ●


    closet homosexuality         gay pride parade
●                           ●
“new tshirts” by Creative Commons (http://creativecommons.org/)
            http://flickr.com/photos/creativecommons/2294317099/in/photostream/
License: Creative Commons 2.0 Attribution / http://creativecommons.org/licenses/by/2.0/deed.en
Hiding vs. Sharing
    new information economy
●


        no zero-sum game
    –

        the more you give, the more you receive
    –

    more information better than less information
●


        market runs better with more information
    –

        information more valuable (to the owner) if shared
    –

    the Hive Mind
●


        growing with or without you
    –

        you gain more by participating than you lose
    –
“IMG_3483.JPG” by Drab Makyo (http://www.drab-makyo.com/)
                   http://flickr.com/photos/ranna/773419070/in/photostream/
License: Creative Commons 2.0 Attribution / http://creativecommons.org/licenses/by/2.0/deed.en
Redefining Normality
    diversity instead of conformism
●


        difference is good! difference is information!
    –

        personalization instead of “Gleichschaltung”
    –

    new normality: no normality
●


        no escape from ever-increasing diversity
    –

        forces tolerance increase
    –

    the googling employer?
●


        no untarnished candidates; emptiness suspicious
    –

        originality cannot yet be outsourced, automatized
    –
“Identity Thief as Paris” by David Goehring (http://flickr.com/photos/carbonnyc/)
                   http://flickr.com/photos/carbonnyc/57280104/in/photostream/
License: Creative Commons 2.0 Attribution / http://creativecommons.org/licenses/by/2.0/deed.en
Identity fluidity & volatility
    identity multiplicity
●


        one human can constitute many identities
    –

        one identity can be constituted by many humans
    –

    no static core identity anymore
●


        identity hyper-dynamism; 15 minutes of identity x
    –

        identity viruses may freely change their hosts
    –

    no more identity prison
●


        be what's fun to be, not what you supposedly “are”
    –

        the end of guilt
    –
“Restaurant Surveillance Sign” by Richard Smith (http://flickr.com/people/smith/)
                            http://flickr.com/photos/smith/55403952/
License: Creative Commons 2.0 Attribution / http://creativecommons.org/licenses/by/2.0/deed.en
Surveillance vs. Sousveillance
    equiveillance
●


        watching, documenting actions of police & co.
    –

        document yourself; Hasan Elahi alibi
    –

    transparency of force
●


        no secret watching; open the camera feeds!
    –

        more powerful → more transparency
    –

    freedom through total transparency?
●


        worst case scenario, “better than alternative”
    –

        still room for secrets of any kind?
    –
“WHAT ARE YOU LOOKING AT?” by nolifebeforecoffee
                         (http://www.nolifebeforecoffee.blogspot.com/)
                    http://flickr.com/photos/nolifebeforecoffee/124659356/
License: Creative Commons 2.0 Attribution / http://creativecommons.org/licenses/by/2.0/deed.en
Control vs. Trust
    lack of information: less freedom
●


        fear, suspicion, mistrust
    –

        need for control, deterrence
    –

        many strict, general laws; strong punishments
    –

    –

    abundance of information: more freedom
●


        trust
    –

        less need for strict control or deterrence
    –

        few, precise laws; easy punishments
    –
“Pyramid with the all-seeing eye on the back side of the US 1-Dollar bill”
   http://commons.wikimedia.org/wiki/File:Dollarnote_siegel_hq.jpg
Reading recommendations
    “Privacy” in: “Stanford Encyclopedia of
●

    Philosophy”, 2006
        http://plato.stanford.edu/entries/privacy/
    –

    “The Value of Privacy”, Beate Rössler, 1995
●


    “The Fall of Public Man”, Richard Sennett, 1977
●


    “Facebook and the Social Dynamics of
●

    Privacy”, James Grimmelmann, 2008
        http://works.bepress.com/james_grimmelmann/20/
    –

    “The Transparent Society”, David Brin, 1998
●

More Related Content

What's hot

Building Community with Social Media
Building Community with Social MediaBuilding Community with Social Media
Building Community with Social MediaNick Westergaard
 
Graphic Facilitation for SIKM Presentation
Graphic Facilitation for SIKM PresentationGraphic Facilitation for SIKM Presentation
Graphic Facilitation for SIKM PresentationNancy Wright White
 
Why Radical Librarianship?
Why Radical Librarianship?Why Radical Librarianship?
Why Radical Librarianship?CILIPScotland
 
Faster horses & slow elevators: where does innovation come from?
Faster horses & slow elevators: where does innovation come from?Faster horses & slow elevators: where does innovation come from?
Faster horses & slow elevators: where does innovation come from?Franco Papeschi
 
Out in the Open Range
Out in the Open RangeOut in the Open Range
Out in the Open RangeAlan Levine
 
Building Sites Around Social Objects - Web 2.0 Expo SF 2009
Building Sites Around Social Objects - Web 2.0 Expo SF 2009Building Sites Around Social Objects - Web 2.0 Expo SF 2009
Building Sites Around Social Objects - Web 2.0 Expo SF 2009Jyri Engeström
 
Digital Civil Rights (Bits of Freedom)
Digital Civil Rights (Bits of Freedom)Digital Civil Rights (Bits of Freedom)
Digital Civil Rights (Bits of Freedom)Hans de Zwart
 

What's hot (8)

Building Community with Social Media
Building Community with Social MediaBuilding Community with Social Media
Building Community with Social Media
 
Graphic Facilitation for SIKM Presentation
Graphic Facilitation for SIKM PresentationGraphic Facilitation for SIKM Presentation
Graphic Facilitation for SIKM Presentation
 
Drawing On Walls N Voice2008
Drawing On Walls N Voice2008Drawing On Walls N Voice2008
Drawing On Walls N Voice2008
 
Why Radical Librarianship?
Why Radical Librarianship?Why Radical Librarianship?
Why Radical Librarianship?
 
Faster horses & slow elevators: where does innovation come from?
Faster horses & slow elevators: where does innovation come from?Faster horses & slow elevators: where does innovation come from?
Faster horses & slow elevators: where does innovation come from?
 
Out in the Open Range
Out in the Open RangeOut in the Open Range
Out in the Open Range
 
Building Sites Around Social Objects - Web 2.0 Expo SF 2009
Building Sites Around Social Objects - Web 2.0 Expo SF 2009Building Sites Around Social Objects - Web 2.0 Expo SF 2009
Building Sites Around Social Objects - Web 2.0 Expo SF 2009
 
Digital Civil Rights (Bits of Freedom)
Digital Civil Rights (Bits of Freedom)Digital Civil Rights (Bits of Freedom)
Digital Civil Rights (Bits of Freedom)
 

Viewers also liked

Killing (the Power of) Time. Archiving selves, cities, histories and universes.
Killing (the Power of) Time. Archiving selves, cities, histories and universes.Killing (the Power of) Time. Archiving selves, cities, histories and universes.
Killing (the Power of) Time. Archiving selves, cities, histories and universes.Christian Heller
 
Metodos contracetivos quimicos
Metodos contracetivos quimicosMetodos contracetivos quimicos
Metodos contracetivos quimicosgracindabento
 

Viewers also liked (9)

Datenschutz Als Ideologie
Datenschutz Als IdeologieDatenschutz Als Ideologie
Datenschutz Als Ideologie
 
Killing (the Power of) Time. Archiving selves, cities, histories and universes.
Killing (the Power of) Time. Archiving selves, cities, histories and universes.Killing (the Power of) Time. Archiving selves, cities, histories and universes.
Killing (the Power of) Time. Archiving selves, cities, histories and universes.
 
Datenschutz Als Ideologie
Datenschutz Als IdeologieDatenschutz Als Ideologie
Datenschutz Als Ideologie
 
Datenschutz Als Ideologie
Datenschutz Als IdeologieDatenschutz Als Ideologie
Datenschutz Als Ideologie
 
Datenschutz Als Ideologie
Datenschutz Als IdeologieDatenschutz Als Ideologie
Datenschutz Als Ideologie
 
Datenschutz Als Ideologie
Datenschutz Als IdeologieDatenschutz Als Ideologie
Datenschutz Als Ideologie
 
Nothing To Hide
Nothing To HideNothing To Hide
Nothing To Hide
 
Datenschutz Als Ideologie
Datenschutz Als IdeologieDatenschutz Als Ideologie
Datenschutz Als Ideologie
 
Metodos contracetivos quimicos
Metodos contracetivos quimicosMetodos contracetivos quimicos
Metodos contracetivos quimicos
 

Similar to Embracing Postprivacy: Optimism towards a future where there is "Nothing to hide"

Five myths about the future of culture and the commons
Five myths about the future of culture and the commonsFive myths about the future of culture and the commons
Five myths about the future of culture and the commonsMike Linksvayer
 
Identity Wars: the End of Human Society
Identity Wars: the End of Human SocietyIdentity Wars: the End of Human Society
Identity Wars: the End of Human SocietyChristian Heller
 
Society vs Privacy: the impossible dilemma
Society vs Privacy: the impossible dilemma Society vs Privacy: the impossible dilemma
Society vs Privacy: the impossible dilemma Mathias Klang
 
Privacy by Default - IA Summit 2017
Privacy by Default - IA Summit 2017Privacy by Default - IA Summit 2017
Privacy by Default - IA Summit 2017Lutz Schmitt
 
"If you love your content, set it free" ?
"If you love your content, set it free" ?"If you love your content, set it free" ?
"If you love your content, set it free" ?Mike Ellis
 
Cryptoanarchism
CryptoanarchismCryptoanarchism
Cryptoanarchismq3XKFc5XR
 
20130724 ted x-marc smith-digital health futures empowerment or coercion
20130724 ted x-marc smith-digital health futures empowerment or coercion20130724 ted x-marc smith-digital health futures empowerment or coercion
20130724 ted x-marc smith-digital health futures empowerment or coercionMarc Smith
 
Future of Android ... And How To Stop It!
Future of Android ... And How To Stop It!Future of Android ... And How To Stop It!
Future of Android ... And How To Stop It!Terence Eden
 
Legal Aspects Of New Media Quirk 2008
Legal Aspects Of New Media   Quirk   2008Legal Aspects Of New Media   Quirk   2008
Legal Aspects Of New Media Quirk 2008Paul Jacobson
 
The digital divide in the post-Snowden era
The digital divide in the post-Snowden eraThe digital divide in the post-Snowden era
The digital divide in the post-Snowden eraIan Clark
 
The Hacker Perspective
The Hacker PerspectiveThe Hacker Perspective
The Hacker Perspectivejjtay
 
Privacy in social media: so what?
Privacy in social media: so what?Privacy in social media: so what?
Privacy in social media: so what?Mathias Klang
 
Social Secrets Workshop
Social Secrets WorkshopSocial Secrets Workshop
Social Secrets Workshopannehelmond
 
Week 4: Social Media Ecologies
Week 4: Social Media EcologiesWeek 4: Social Media Ecologies
Week 4: Social Media EcologiesRay Brannon
 
Personal But Not Private
Personal But Not PrivatePersonal But Not Private
Personal But Not PrivateMathias Klang
 
Off the Grid: Is anonymity possible?
Off the Grid: Is anonymity possible?Off the Grid: Is anonymity possible?
Off the Grid: Is anonymity possible? Mathias Klang
 
Exploring the Future: Quantified Self and Learning
Exploring the Future: Quantified Self and LearningExploring the Future: Quantified Self and Learning
Exploring the Future: Quantified Self and LearningHans de Zwart
 

Similar to Embracing Postprivacy: Optimism towards a future where there is "Nothing to hide" (20)

Five myths about the future of culture and the commons
Five myths about the future of culture and the commonsFive myths about the future of culture and the commons
Five myths about the future of culture and the commons
 
Identity Wars: the End of Human Society
Identity Wars: the End of Human SocietyIdentity Wars: the End of Human Society
Identity Wars: the End of Human Society
 
Society vs Privacy: the impossible dilemma
Society vs Privacy: the impossible dilemma Society vs Privacy: the impossible dilemma
Society vs Privacy: the impossible dilemma
 
Privacy by Default - IA Summit 2017
Privacy by Default - IA Summit 2017Privacy by Default - IA Summit 2017
Privacy by Default - IA Summit 2017
 
"If you love your content, set it free" ?
"If you love your content, set it free" ?"If you love your content, set it free" ?
"If you love your content, set it free" ?
 
Drm and crypto
Drm and cryptoDrm and crypto
Drm and crypto
 
Cryptoanarchism
CryptoanarchismCryptoanarchism
Cryptoanarchism
 
The Digital Divide in the Post Snowden Era Presentation
The Digital Divide in the Post Snowden Era PresentationThe Digital Divide in the Post Snowden Era Presentation
The Digital Divide in the Post Snowden Era Presentation
 
Drm and crypto
Drm and cryptoDrm and crypto
Drm and crypto
 
20130724 ted x-marc smith-digital health futures empowerment or coercion
20130724 ted x-marc smith-digital health futures empowerment or coercion20130724 ted x-marc smith-digital health futures empowerment or coercion
20130724 ted x-marc smith-digital health futures empowerment or coercion
 
Future of Android ... And How To Stop It!
Future of Android ... And How To Stop It!Future of Android ... And How To Stop It!
Future of Android ... And How To Stop It!
 
Legal Aspects Of New Media Quirk 2008
Legal Aspects Of New Media   Quirk   2008Legal Aspects Of New Media   Quirk   2008
Legal Aspects Of New Media Quirk 2008
 
The digital divide in the post-Snowden era
The digital divide in the post-Snowden eraThe digital divide in the post-Snowden era
The digital divide in the post-Snowden era
 
The Hacker Perspective
The Hacker PerspectiveThe Hacker Perspective
The Hacker Perspective
 
Privacy in social media: so what?
Privacy in social media: so what?Privacy in social media: so what?
Privacy in social media: so what?
 
Social Secrets Workshop
Social Secrets WorkshopSocial Secrets Workshop
Social Secrets Workshop
 
Week 4: Social Media Ecologies
Week 4: Social Media EcologiesWeek 4: Social Media Ecologies
Week 4: Social Media Ecologies
 
Personal But Not Private
Personal But Not PrivatePersonal But Not Private
Personal But Not Private
 
Off the Grid: Is anonymity possible?
Off the Grid: Is anonymity possible?Off the Grid: Is anonymity possible?
Off the Grid: Is anonymity possible?
 
Exploring the Future: Quantified Self and Learning
Exploring the Future: Quantified Self and LearningExploring the Future: Quantified Self and Learning
Exploring the Future: Quantified Self and Learning
 

More from Christian Heller

Was kommt nach der Privatheit?
Was kommt nach der Privatheit?Was kommt nach der Privatheit?
Was kommt nach der Privatheit?Christian Heller
 
Was da noch auf die Politik zugerollt kommt
Was da noch auf die Politik zugerollt kommtWas da noch auf die Politik zugerollt kommt
Was da noch auf die Politik zugerollt kommtChristian Heller
 
Supercomputer Earth: The Future of Civilization (& Africa\'s part in it)
Supercomputer Earth: The Future of Civilization (& Africa\'s part in it)Supercomputer Earth: The Future of Civilization (& Africa\'s part in it)
Supercomputer Earth: The Future of Civilization (& Africa\'s part in it)Christian Heller
 

More from Christian Heller (10)

pie_beta
pie_betapie_beta
pie_beta
 
roguelike_delta
roguelike_deltaroguelike_delta
roguelike_delta
 
Datenschutz Als Ideologie
Datenschutz Als IdeologieDatenschutz Als Ideologie
Datenschutz Als Ideologie
 
Datenschutz Als Ideologie
Datenschutz Als IdeologieDatenschutz Als Ideologie
Datenschutz Als Ideologie
 
Gestern Volk, morgen Netz
Gestern Volk, morgen NetzGestern Volk, morgen Netz
Gestern Volk, morgen Netz
 
Was kommt nach der Privatheit?
Was kommt nach der Privatheit?Was kommt nach der Privatheit?
Was kommt nach der Privatheit?
 
Mind Upload Cheat Codes
Mind Upload Cheat CodesMind Upload Cheat Codes
Mind Upload Cheat Codes
 
Was da noch auf die Politik zugerollt kommt
Was da noch auf die Politik zugerollt kommtWas da noch auf die Politik zugerollt kommt
Was da noch auf die Politik zugerollt kommt
 
Das egoistische Mem
Das egoistische MemDas egoistische Mem
Das egoistische Mem
 
Supercomputer Earth: The Future of Civilization (& Africa\'s part in it)
Supercomputer Earth: The Future of Civilization (& Africa\'s part in it)Supercomputer Earth: The Future of Civilization (& Africa\'s part in it)
Supercomputer Earth: The Future of Civilization (& Africa\'s part in it)
 

Recently uploaded

The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxBkGupta21
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 

Recently uploaded (20)

The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptx
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 

Embracing Postprivacy: Optimism towards a future where there is "Nothing to hide"

  • 1. Embracing Post-Privacy Optimism towards a future where there is “Nothing to hide” Christian Heller / http://www.plomlompom.de December 29, 2008 25. Chaos Communication Congress bcc / Berlin, Germany
  • 2. “cctv” by Subcircle (http://www.subcircle.co.uk/) http://flickr.com/photos/8323834@N07/500970140/ License: Creative Commons 2.0 Attribution / http://creativecommons.org/licenses/by/2.0/deed.en
  • 3. Overview pessimism: the end of privacy ● question: the meaning of privacy ● optimism: ideas for post-privacy dys... utopias ● reading recommendations ● discussion ●
  • 4. “Secure Beneath the Watchful Eyes” by Kenneth Lu (http://subjunctive.net/klog/) http://flickr.com/photos/toasty/2171185463/ License: Creative Commons 2.0 Attribution / http://creativecommons.org/licenses/by/2.0/deed.en
  • 5. Privacy is doomed the privacy-eating monster ● growingly well-fed, ubiquitous, attractive, intelligent – once information is in, it cannot be removed again – the privacy-defending army ● laws ineffective; technology insecure – pre-MySpace generation getting old, disappearing – an uneven battle for the army ● cannot be won ultimately – can only be lost; easily –
  • 6. “Privat” by Daniel Lobo (http://www.daquellamanera.org/) http://flickr.com/photos/daquellamanera/311128375/ License: Creative Commons 2.0 Attribution / http://creativecommons.org/licenses/by/2.0/deed.en
  • 7. What is the meaning of Privacy? self-determination ● make your own decisions about your life – freedom from interference by others – information control ● control what information flows from you to others – control what information flows to you from others – intimacy ● sharing of privacy – interpersonal trust, dependence –
  • 8. “Tanzliedchen” by Hugo Bürkner, 1854 http://commons.wikimedia.org/wiki/File:Bürkner_Tanzliedchen.jpg
  • 9. private vs. public house, backroom, forum, parliament, ● ● home PC, head/brain newspaper, Slashdot hidden visible ● ● secure from scrutiny accountable to social ● ● of social norms norms free individual? controlled conformist? ● ● woman man ● ● isolated interconnected ● ● closet homosexuality gay pride parade ● ●
  • 10. “new tshirts” by Creative Commons (http://creativecommons.org/) http://flickr.com/photos/creativecommons/2294317099/in/photostream/ License: Creative Commons 2.0 Attribution / http://creativecommons.org/licenses/by/2.0/deed.en
  • 11. Hiding vs. Sharing new information economy ● no zero-sum game – the more you give, the more you receive – more information better than less information ● market runs better with more information – information more valuable (to the owner) if shared – the Hive Mind ● growing with or without you – you gain more by participating than you lose –
  • 12. “IMG_3483.JPG” by Drab Makyo (http://www.drab-makyo.com/) http://flickr.com/photos/ranna/773419070/in/photostream/ License: Creative Commons 2.0 Attribution / http://creativecommons.org/licenses/by/2.0/deed.en
  • 13. Redefining Normality diversity instead of conformism ● difference is good! difference is information! – personalization instead of “Gleichschaltung” – new normality: no normality ● no escape from ever-increasing diversity – forces tolerance increase – the googling employer? ● no untarnished candidates; emptiness suspicious – originality cannot yet be outsourced, automatized –
  • 14. “Identity Thief as Paris” by David Goehring (http://flickr.com/photos/carbonnyc/) http://flickr.com/photos/carbonnyc/57280104/in/photostream/ License: Creative Commons 2.0 Attribution / http://creativecommons.org/licenses/by/2.0/deed.en
  • 15. Identity fluidity & volatility identity multiplicity ● one human can constitute many identities – one identity can be constituted by many humans – no static core identity anymore ● identity hyper-dynamism; 15 minutes of identity x – identity viruses may freely change their hosts – no more identity prison ● be what's fun to be, not what you supposedly “are” – the end of guilt –
  • 16. “Restaurant Surveillance Sign” by Richard Smith (http://flickr.com/people/smith/) http://flickr.com/photos/smith/55403952/ License: Creative Commons 2.0 Attribution / http://creativecommons.org/licenses/by/2.0/deed.en
  • 17. Surveillance vs. Sousveillance equiveillance ● watching, documenting actions of police & co. – document yourself; Hasan Elahi alibi – transparency of force ● no secret watching; open the camera feeds! – more powerful → more transparency – freedom through total transparency? ● worst case scenario, “better than alternative” – still room for secrets of any kind? –
  • 18. “WHAT ARE YOU LOOKING AT?” by nolifebeforecoffee (http://www.nolifebeforecoffee.blogspot.com/) http://flickr.com/photos/nolifebeforecoffee/124659356/ License: Creative Commons 2.0 Attribution / http://creativecommons.org/licenses/by/2.0/deed.en
  • 19. Control vs. Trust lack of information: less freedom ● fear, suspicion, mistrust – need for control, deterrence – many strict, general laws; strong punishments – – abundance of information: more freedom ● trust – less need for strict control or deterrence – few, precise laws; easy punishments –
  • 20. “Pyramid with the all-seeing eye on the back side of the US 1-Dollar bill” http://commons.wikimedia.org/wiki/File:Dollarnote_siegel_hq.jpg
  • 21. Reading recommendations “Privacy” in: “Stanford Encyclopedia of ● Philosophy”, 2006 http://plato.stanford.edu/entries/privacy/ – “The Value of Privacy”, Beate Rössler, 1995 ● “The Fall of Public Man”, Richard Sennett, 1977 ● “Facebook and the Social Dynamics of ● Privacy”, James Grimmelmann, 2008 http://works.bepress.com/james_grimmelmann/20/ – “The Transparent Society”, David Brin, 1998 ●