SlideShare a Scribd company logo
Practical Privacy
The Problem
There is a deluge of public and private data about each of us, and our research
subjects, including social media content, web browsing habits and location data.
The ease of accessibility is usually at the bidding of the tech organisation who
owns the data.
Technology capacities are constantly changing which means privacy definitions,
policy and enforcement have been unable to keep up.
This is obviously a problem for human rights defenders in countries with
oppressive governments, however the research community should note that some
British journalists and researchers are under dataveillance too, due to being
considered “threats to national security” by the UK government.
More than these concrete issues, privacy is enshrined in human rights conventions
because it is important in and of itself - not in context or with justification.
The research community is presented with information and communication
technologies which can lead to the violation of privacy rights, some of which are
used second hand, like email or facebook, some of which are used first hand, such
as social media analytics research.
We need to make decisions on what is the right balance between the risks and
opportunities of these tools is in the absence of up to date ethics guidelines.
The Solution
Strategy
Usually ethics guidelines are already built under the strategy and values of an
organisation, and these ethical guidelines drive decisions - however, with this area
already lacking it is important to start by building a strategy - That is, what is the
overall plan for the protection of the rights of the researcher, the research and the
research subjects.
It is necessary to understand the research subjects - who they are and what risks
they face, your research - what are the goals and what information is necessary,
and finally yourself, what are your skills, capabilities and, most importantly,
responsibilities.
Strategy
Threat Modelling
Tactical
Tech
Microsoft
(more
technical)
Threat modelling is a method to develop this strategy. Threat modelling is an in
depth risk analysis of a certain context. To carry out threat modelling you have to
think of risks and threats, their likelihood and the level of impact if they happen.
In relation to information and communication technologies it is important to ask:
● what information is needed for the threats to be carried out?
● Where will this information be held?
● What tools are you using and what or who do those tools and servers interact
with?
For all of these, the threat or the information carrier, such as the email company,
can, and probably do, collect more data than would be obvious.
So once you worked out what information you want to gain and share, and what
threats and risks are involved, then you have an overarching strategy for the
protection of your data.
5 Tactics
and supporting tools
Go Offline
The safest place for information is in your head, not said out loud at all, not
written down anywhere.
However, information and communication is what most of society is built on,
including the academic research community. The next step up from not talking at
all, is to write handwritten notes or meet face to face. The alternative is have a
computer that is completely offline, this means a computer that doesn’t even have
the capability to connect to the internet, this way no one can access the files
without having hard access to your computer.
When necessary, it is at least important to be aware of what you are putting on
the cloud, sometimes without realising it.
Fight Fire
with Fire
Encryption
(PGP)
VPN
TOR
Alternatively, you can make it harder to access the information. This might be
through covering your webcam with paper, which was once seen as the same
category as wearing a tinfoil helmet but comes now at the recommendation of the
Director of the FBI.
The other way to make it hard to access information is to fight fire with fire,
technology with technology.
That can mean encryption, for example WhatsApp and Facebook messenger offer
end to end encryption, and emails can be encrypted with PGP. PGP not only
allows you to have conversations privately but to put a public pgp out there so
people can make initial contact with you privately, this may be particularly
important for whistleblowers.
Other tools include a VPN and TOR which can help separate the originating
computer from the message.
Fight Fire
with Fire
Alternatives
(PIWIK)
D.I.Y
Encryption
(PGP)
VPN
TOR
Secondly, in relation to the tactic of fighting technology with technology,
you can use non-mainstream tools that consider privacy a core value.
There are many alternatives out there to most social media for example.
PIWIK is an alternative to google analytics that allows people to own the
data they collect.
Finally, you can make your own tools, the risks of which are discussed
later on.
ChaosLastPass
There are two aspects to the tactic of chaos:
1) How chaos can protect you from others - this tactic is useful if people are
meeting regularly but don’t want to be seen to be associated, for example
taking a different route every time and swapping oyster cards to avoid location
data and IDs being associated or patterns forming.
This also incompasses the first vital rule of protection - your password - choose
random collection of characters or at least four random words not connected to
you in anyway. Generally a password manager is recommended to allow for
complexity and randomness across all websites that require passwords.
2) How chaos can protect you from yourself.
There is a human condition “apophenia” which means seeing patterns where
they don’t exist and our preconceptions impact the patterns we see. It is
important to have good quality data, test them with others and get different
perspectives and ultimately to remember we are applying order to chaos.
The principle is to disrupt patterns.
Transparency
The fourth tactic is transparency. In some journals it is already standard to
not only publish, alongside the research, the supporting data but also the
supporting code and this should become the norm in social sciences too, with
appropriate anonymisation as necessary.
It is also important to outline which tools you are using, and the risks
involved, such as with facebook groups or email, to the subjects so they can
make decisions for themselves. Even if it means the research subjects then
want to back out, this is the responsibility of a researcher.
Take only what
you need
Eraser
Finally, the last tactic I want to discuss is to only take what you need. In this
data deluge it is very tempting to not only take more than necessary but also
keep it indefinitely.
To ensure best practice with data it is important to consider exactly what
your research is first and then collect specifically for it.
Once the research is over all sensitive data that won’t be used in the final
publications should be deleted completely. This doesn’t just mean deleting it
from the trash can, in extreme cases it means incinerating or drilling holes in
hard drives.
Perhaps more practically, it means using tools such as eraser which overwrite
many times with random data until the previous data can no longer be
retrieved by expert programs.
The Issues
There are some difficulties I have come across in achieving these tactics.
Firstly, many require technical skill which makes it more difficult to engage with.
Even software engineers know not to write their own encryption, because it is likely
they won’t make it good enough. This is one of the reasons I haven’t moved to
hosting my own server for my data, because I am not convinced I could keep it safe
from attack.
The safety of most of expert technologies used to “fight technology with technology”
is often doubted - WhatsApp’s encryption was quickly undermined when they joined
with FaceBook. TOR came under attacks for ultimately being created by the NSA.
That doesn’t stop them being useful, only to highlight the need for caution.
Many of these tactics will also mean that data collection and analysis takes longer. In
fact, many privacy activists have considered their campaign similar to the
environmental movement, that if change is desired a ‘slow computing’ approach
needs to be taken,
Furthermore, contradictions are created between many of these tactics.
For example between deleting data after use and publishing anonymised code,
particularly as anonymisation is almost impossible. In Cryptography there is a
whole art to differential privacy, which aims to provide maximum accuracy in data
with minimal risk of identification - but it is not easy.
Another example is to take only what you need for your research questions and
applying a sense of chaos in collection to avoid ingrained bias in the formulation
of questions and patterns.
There is a also substantial tension between being a researcher, relying on, and
accountable to, a transparent public profile, and protecting our own privacy.
Practical Privacy
In conclusion, this isn’t about a single answer tool but a strategy for researchers to
take in their methodologies and ethics.
The technical challenges with achieving privacy protection are sometimes not in
our control and ultimately we have to continue to demand system and culture
change with our research and from positions of authority or persuasive when we
can.
As for the contradictions, the discussion should be open and all actors should be
listened to so we can find solutions together.
Thank you for listening.

More Related Content

What's hot

Steganography using Interpolation and LSB with Cryptography on Video Images -...
Steganography using Interpolation and LSB with Cryptography on Video Images -...Steganography using Interpolation and LSB with Cryptography on Video Images -...
Steganography using Interpolation and LSB with Cryptography on Video Images -...
Editor IJCATR
 
A Review on Stegnography Data Hiding using Color Images
A Review on Stegnography Data Hiding using Color ImagesA Review on Stegnography Data Hiding using Color Images
A Review on Stegnography Data Hiding using Color Images
ijtsrd
 
Bh32379384
Bh32379384Bh32379384
Bh32379384
IJERA Editor
 
final_Paper_springer_final
final_Paper_springer_finalfinal_Paper_springer_final
final_Paper_springer_finalJoseph Emmanuel
 
Analysis of Different Steganography Algorithms and Security Issues
Analysis of Different Steganography Algorithms and Security IssuesAnalysis of Different Steganography Algorithms and Security Issues
Analysis of Different Steganography Algorithms and Security Issues
IRJAES Editor
 
data mining for security application
data mining for security applicationdata mining for security application
data mining for security applicationbharatsvnit
 
UN Global Pulse Privacy Framing
UN Global Pulse Privacy FramingUN Global Pulse Privacy Framing
UN Global Pulse Privacy Framing
Micah Altman
 
Steganography Technique of Sending Random Passwords on Receiver’s Mobile (A N...
Steganography Technique of Sending Random Passwords on Receiver’s Mobile (A N...Steganography Technique of Sending Random Passwords on Receiver’s Mobile (A N...
Steganography Technique of Sending Random Passwords on Receiver’s Mobile (A N...
IOSR Journals
 
Info leakage 200510
Info leakage 200510Info leakage 200510
APPLICATION OF DATA HIDING IN AUDIO-VIDEO USING ANTIN FORENSICS TECHNIQUE FOR...
APPLICATION OF DATA HIDING IN AUDIO-VIDEO USING ANTIN FORENSICS TECHNIQUE FOR...APPLICATION OF DATA HIDING IN AUDIO-VIDEO USING ANTIN FORENSICS TECHNIQUE FOR...
APPLICATION OF DATA HIDING IN AUDIO-VIDEO USING ANTIN FORENSICS TECHNIQUE FOR...
ijiert bestjournal
 
Christopher furton-darpa-project-memex-erodes-internet-privacy
Christopher furton-darpa-project-memex-erodes-internet-privacyChristopher furton-darpa-project-memex-erodes-internet-privacy
Christopher furton-darpa-project-memex-erodes-internet-privacyChris Furton
 
A Survey on Enhancement of Text Security Using Steganography and Cryptographi...
A Survey on Enhancement of Text Security Using Steganography and Cryptographi...A Survey on Enhancement of Text Security Using Steganography and Cryptographi...
A Survey on Enhancement of Text Security Using Steganography and Cryptographi...
ijtsrd
 

What's hot (12)

Steganography using Interpolation and LSB with Cryptography on Video Images -...
Steganography using Interpolation and LSB with Cryptography on Video Images -...Steganography using Interpolation and LSB with Cryptography on Video Images -...
Steganography using Interpolation and LSB with Cryptography on Video Images -...
 
A Review on Stegnography Data Hiding using Color Images
A Review on Stegnography Data Hiding using Color ImagesA Review on Stegnography Data Hiding using Color Images
A Review on Stegnography Data Hiding using Color Images
 
Bh32379384
Bh32379384Bh32379384
Bh32379384
 
final_Paper_springer_final
final_Paper_springer_finalfinal_Paper_springer_final
final_Paper_springer_final
 
Analysis of Different Steganography Algorithms and Security Issues
Analysis of Different Steganography Algorithms and Security IssuesAnalysis of Different Steganography Algorithms and Security Issues
Analysis of Different Steganography Algorithms and Security Issues
 
data mining for security application
data mining for security applicationdata mining for security application
data mining for security application
 
UN Global Pulse Privacy Framing
UN Global Pulse Privacy FramingUN Global Pulse Privacy Framing
UN Global Pulse Privacy Framing
 
Steganography Technique of Sending Random Passwords on Receiver’s Mobile (A N...
Steganography Technique of Sending Random Passwords on Receiver’s Mobile (A N...Steganography Technique of Sending Random Passwords on Receiver’s Mobile (A N...
Steganography Technique of Sending Random Passwords on Receiver’s Mobile (A N...
 
Info leakage 200510
Info leakage 200510Info leakage 200510
Info leakage 200510
 
APPLICATION OF DATA HIDING IN AUDIO-VIDEO USING ANTIN FORENSICS TECHNIQUE FOR...
APPLICATION OF DATA HIDING IN AUDIO-VIDEO USING ANTIN FORENSICS TECHNIQUE FOR...APPLICATION OF DATA HIDING IN AUDIO-VIDEO USING ANTIN FORENSICS TECHNIQUE FOR...
APPLICATION OF DATA HIDING IN AUDIO-VIDEO USING ANTIN FORENSICS TECHNIQUE FOR...
 
Christopher furton-darpa-project-memex-erodes-internet-privacy
Christopher furton-darpa-project-memex-erodes-internet-privacyChristopher furton-darpa-project-memex-erodes-internet-privacy
Christopher furton-darpa-project-memex-erodes-internet-privacy
 
A Survey on Enhancement of Text Security Using Steganography and Cryptographi...
A Survey on Enhancement of Text Security Using Steganography and Cryptographi...A Survey on Enhancement of Text Security Using Steganography and Cryptographi...
A Survey on Enhancement of Text Security Using Steganography and Cryptographi...
 

Viewers also liked

The Information Age
The Information AgeThe Information Age
The Information AgePhilip
 
Winning a UN Job 3 (Other Entries)
Winning a UN Job   3 (Other Entries)Winning a UN Job   3 (Other Entries)
Winning a UN Job 3 (Other Entries)
Md Siddiqur Rahman
 
창발
창발창발
창발
정우 윤
 
юні підприємці
юні підприємціюні підприємці
юні підприємці
sokal90
 
Fuerzas y-movimiento
Fuerzas y-movimientoFuerzas y-movimiento
Fuerzas y-movimiento
Erick L. Vega
 
2016年3月Facebookページ投稿クリック数ランキング20
2016年3月Facebookページ投稿クリック数ランキング202016年3月Facebookページ投稿クリック数ランキング20
2016年3月Facebookページ投稿クリック数ランキング20
新潟コンサルタント横田秀珠
 
Doppler effect
Doppler effectDoppler effect
Doppler effect
Sanganak Sam
 
Plasma para recubrimientos de materiales
Plasma para recubrimientos de materialesPlasma para recubrimientos de materiales
Plasma para recubrimientos de materiales
Ingemar David Quintero Simonpietri
 

Viewers also liked (10)

The Information Age
The Information AgeThe Information Age
The Information Age
 
Winning a UN Job 3 (Other Entries)
Winning a UN Job   3 (Other Entries)Winning a UN Job   3 (Other Entries)
Winning a UN Job 3 (Other Entries)
 
창발
창발창발
창발
 
юні підприємці
юні підприємціюні підприємці
юні підприємці
 
CustomerCopy.docx1
CustomerCopy.docx1CustomerCopy.docx1
CustomerCopy.docx1
 
nirwan_resume
nirwan_resumenirwan_resume
nirwan_resume
 
Fuerzas y-movimiento
Fuerzas y-movimientoFuerzas y-movimiento
Fuerzas y-movimiento
 
2016年3月Facebookページ投稿クリック数ランキング20
2016年3月Facebookページ投稿クリック数ランキング202016年3月Facebookページ投稿クリック数ランキング20
2016年3月Facebookページ投稿クリック数ランキング20
 
Doppler effect
Doppler effectDoppler effect
Doppler effect
 
Plasma para recubrimientos de materiales
Plasma para recubrimientos de materialesPlasma para recubrimientos de materiales
Plasma para recubrimientos de materiales
 

Similar to 5 tactics for practical privacy protection

Impact of Insecure Communications
Impact of Insecure CommunicationsImpact of Insecure Communications
Impact of Insecure Communications
Kavika Roy
 
Running Head DATA BREACH .docx
Running Head DATA BREACH                                        .docxRunning Head DATA BREACH                                        .docx
Running Head DATA BREACH .docx
todd271
 
Data security and privacy
Data security and privacyData security and privacy
Data security and privacy
rajab ssemwogerere
 
Tech Talent Meetup Hacking Security Event Recap
Tech Talent Meetup Hacking Security Event RecapTech Talent Meetup Hacking Security Event Recap
Tech Talent Meetup Hacking Security Event RecapDominic Vogel
 
4 ways to stop the unauthorized sharing of the research reports within the i...
 4 ways to stop the unauthorized sharing of the research reports within the i... 4 ways to stop the unauthorized sharing of the research reports within the i...
4 ways to stop the unauthorized sharing of the research reports within the i...
Ameva Tech
 
finl.docx
finl.docxfinl.docx
finl.docx
Vishesh Aggarwal
 
Article - 10 best data compliance practices .pdf
Article - 10 best data compliance practices .pdfArticle - 10 best data compliance practices .pdf
Article - 10 best data compliance practices .pdf
Enov8
 
Putting data science into perspective
Putting data science into perspectivePutting data science into perspective
Putting data science into perspective
Sravan Ankaraju
 
Cultivate a stronger corporate culture to enhance cybersecurity
Cultivate a stronger corporate culture to enhance cybersecurityCultivate a stronger corporate culture to enhance cybersecurity
Cultivate a stronger corporate culture to enhance cybersecurity
David X Martin
 
Need for Data Protection Training - How E-learning Can Help?
Need for Data Protection Training - How E-learning Can Help?Need for Data Protection Training - How E-learning Can Help?
Need for Data Protection Training - How E-learning Can Help?
CommLab India – Rapid eLearning Solutions
 
Building security into the internetofthings
Building security into the internetofthingsBuilding security into the internetofthings
Building security into the internetofthings
Prayukth K V
 
DIGITAL FORENSIC 25In this chapter, youll learn more about.docx
DIGITAL FORENSIC 25In this chapter, youll learn more about.docxDIGITAL FORENSIC 25In this chapter, youll learn more about.docx
DIGITAL FORENSIC 25In this chapter, youll learn more about.docx
lynettearnold46882
 
Running head PHD IT 1PHD IT 5Written Interview Qu.docx
Running head PHD IT 1PHD IT 5Written Interview Qu.docxRunning head PHD IT 1PHD IT 5Written Interview Qu.docx
Running head PHD IT 1PHD IT 5Written Interview Qu.docx
glendar3
 
Running head PHD IT 1PHD IT 5Written Interview Qu.docx
Running head PHD IT 1PHD IT 5Written Interview Qu.docxRunning head PHD IT 1PHD IT 5Written Interview Qu.docx
Running head PHD IT 1PHD IT 5Written Interview Qu.docx
todd581
 
ETHICAL ISSUES WITH CUSTOMER DATA COLLECTION
ETHICAL ISSUES WITH CUSTOMER DATA COLLECTIONETHICAL ISSUES WITH CUSTOMER DATA COLLECTION
ETHICAL ISSUES WITH CUSTOMER DATA COLLECTIONPranav Godse
 
Week 14 Discussion Ethics and Information Management (Click to Read
Week 14 Discussion Ethics and Information Management (Click to ReadWeek 14 Discussion Ethics and Information Management (Click to Read
Week 14 Discussion Ethics and Information Management (Click to Read
nicolleszkyj
 
To get round to the heart of fortress
To get round to the heart of fortressTo get round to the heart of fortress
To get round to the heart of fortressSTO STRATEGY
 
Data Maturity for Nonprofits: Three Perspectives, Nine Lessons, and Three Ass...
Data Maturity for Nonprofits: Three Perspectives, Nine Lessons, and Three Ass...Data Maturity for Nonprofits: Three Perspectives, Nine Lessons, and Three Ass...
Data Maturity for Nonprofits: Three Perspectives, Nine Lessons, and Three Ass...
Karen Graham
 
Research Paper TopicITS835 – Enterprise Risk Managemen.docx
Research Paper TopicITS835 – Enterprise Risk Managemen.docxResearch Paper TopicITS835 – Enterprise Risk Managemen.docx
Research Paper TopicITS835 – Enterprise Risk Managemen.docx
audeleypearl
 
Potential Advantages Of An Insider Attack
Potential Advantages Of An Insider AttackPotential Advantages Of An Insider Attack
Potential Advantages Of An Insider Attack
Susan Kennedy
 

Similar to 5 tactics for practical privacy protection (20)

Impact of Insecure Communications
Impact of Insecure CommunicationsImpact of Insecure Communications
Impact of Insecure Communications
 
Running Head DATA BREACH .docx
Running Head DATA BREACH                                        .docxRunning Head DATA BREACH                                        .docx
Running Head DATA BREACH .docx
 
Data security and privacy
Data security and privacyData security and privacy
Data security and privacy
 
Tech Talent Meetup Hacking Security Event Recap
Tech Talent Meetup Hacking Security Event RecapTech Talent Meetup Hacking Security Event Recap
Tech Talent Meetup Hacking Security Event Recap
 
4 ways to stop the unauthorized sharing of the research reports within the i...
 4 ways to stop the unauthorized sharing of the research reports within the i... 4 ways to stop the unauthorized sharing of the research reports within the i...
4 ways to stop the unauthorized sharing of the research reports within the i...
 
finl.docx
finl.docxfinl.docx
finl.docx
 
Article - 10 best data compliance practices .pdf
Article - 10 best data compliance practices .pdfArticle - 10 best data compliance practices .pdf
Article - 10 best data compliance practices .pdf
 
Putting data science into perspective
Putting data science into perspectivePutting data science into perspective
Putting data science into perspective
 
Cultivate a stronger corporate culture to enhance cybersecurity
Cultivate a stronger corporate culture to enhance cybersecurityCultivate a stronger corporate culture to enhance cybersecurity
Cultivate a stronger corporate culture to enhance cybersecurity
 
Need for Data Protection Training - How E-learning Can Help?
Need for Data Protection Training - How E-learning Can Help?Need for Data Protection Training - How E-learning Can Help?
Need for Data Protection Training - How E-learning Can Help?
 
Building security into the internetofthings
Building security into the internetofthingsBuilding security into the internetofthings
Building security into the internetofthings
 
DIGITAL FORENSIC 25In this chapter, youll learn more about.docx
DIGITAL FORENSIC 25In this chapter, youll learn more about.docxDIGITAL FORENSIC 25In this chapter, youll learn more about.docx
DIGITAL FORENSIC 25In this chapter, youll learn more about.docx
 
Running head PHD IT 1PHD IT 5Written Interview Qu.docx
Running head PHD IT 1PHD IT 5Written Interview Qu.docxRunning head PHD IT 1PHD IT 5Written Interview Qu.docx
Running head PHD IT 1PHD IT 5Written Interview Qu.docx
 
Running head PHD IT 1PHD IT 5Written Interview Qu.docx
Running head PHD IT 1PHD IT 5Written Interview Qu.docxRunning head PHD IT 1PHD IT 5Written Interview Qu.docx
Running head PHD IT 1PHD IT 5Written Interview Qu.docx
 
ETHICAL ISSUES WITH CUSTOMER DATA COLLECTION
ETHICAL ISSUES WITH CUSTOMER DATA COLLECTIONETHICAL ISSUES WITH CUSTOMER DATA COLLECTION
ETHICAL ISSUES WITH CUSTOMER DATA COLLECTION
 
Week 14 Discussion Ethics and Information Management (Click to Read
Week 14 Discussion Ethics and Information Management (Click to ReadWeek 14 Discussion Ethics and Information Management (Click to Read
Week 14 Discussion Ethics and Information Management (Click to Read
 
To get round to the heart of fortress
To get round to the heart of fortressTo get round to the heart of fortress
To get round to the heart of fortress
 
Data Maturity for Nonprofits: Three Perspectives, Nine Lessons, and Three Ass...
Data Maturity for Nonprofits: Three Perspectives, Nine Lessons, and Three Ass...Data Maturity for Nonprofits: Three Perspectives, Nine Lessons, and Three Ass...
Data Maturity for Nonprofits: Three Perspectives, Nine Lessons, and Three Ass...
 
Research Paper TopicITS835 – Enterprise Risk Managemen.docx
Research Paper TopicITS835 – Enterprise Risk Managemen.docxResearch Paper TopicITS835 – Enterprise Risk Managemen.docx
Research Paper TopicITS835 – Enterprise Risk Managemen.docx
 
Potential Advantages Of An Insider Attack
Potential Advantages Of An Insider AttackPotential Advantages Of An Insider Attack
Potential Advantages Of An Insider Attack
 

Recently uploaded

FP Growth Algorithm and its Applications
FP Growth Algorithm and its ApplicationsFP Growth Algorithm and its Applications
FP Growth Algorithm and its Applications
MaleehaSheikh2
 
一比一原版(Adelaide毕业证书)阿德莱德大学毕业证如何办理
一比一原版(Adelaide毕业证书)阿德莱德大学毕业证如何办理一比一原版(Adelaide毕业证书)阿德莱德大学毕业证如何办理
一比一原版(Adelaide毕业证书)阿德莱德大学毕业证如何办理
slg6lamcq
 
一比一原版(BU毕业证)波士顿大学毕业证成绩单
一比一原版(BU毕业证)波士顿大学毕业证成绩单一比一原版(BU毕业证)波士顿大学毕业证成绩单
一比一原版(BU毕业证)波士顿大学毕业证成绩单
ewymefz
 
Predicting Product Ad Campaign Performance: A Data Analysis Project Presentation
Predicting Product Ad Campaign Performance: A Data Analysis Project PresentationPredicting Product Ad Campaign Performance: A Data Analysis Project Presentation
Predicting Product Ad Campaign Performance: A Data Analysis Project Presentation
Boston Institute of Analytics
 
Opendatabay - Open Data Marketplace.pptx
Opendatabay - Open Data Marketplace.pptxOpendatabay - Open Data Marketplace.pptx
Opendatabay - Open Data Marketplace.pptx
Opendatabay
 
Machine learning and optimization techniques for electrical drives.pptx
Machine learning and optimization techniques for electrical drives.pptxMachine learning and optimization techniques for electrical drives.pptx
Machine learning and optimization techniques for electrical drives.pptx
balafet
 
Ch03-Managing the Object-Oriented Information Systems Project a.pdf
Ch03-Managing the Object-Oriented Information Systems Project a.pdfCh03-Managing the Object-Oriented Information Systems Project a.pdf
Ch03-Managing the Object-Oriented Information Systems Project a.pdf
haila53
 
一比一原版(TWU毕业证)西三一大学毕业证成绩单
一比一原版(TWU毕业证)西三一大学毕业证成绩单一比一原版(TWU毕业证)西三一大学毕业证成绩单
一比一原版(TWU毕业证)西三一大学毕业证成绩单
ocavb
 
Chatty Kathy - UNC Bootcamp Final Project Presentation - Final Version - 5.23...
Chatty Kathy - UNC Bootcamp Final Project Presentation - Final Version - 5.23...Chatty Kathy - UNC Bootcamp Final Project Presentation - Final Version - 5.23...
Chatty Kathy - UNC Bootcamp Final Project Presentation - Final Version - 5.23...
John Andrews
 
Data Centers - Striving Within A Narrow Range - Research Report - MCG - May 2...
Data Centers - Striving Within A Narrow Range - Research Report - MCG - May 2...Data Centers - Striving Within A Narrow Range - Research Report - MCG - May 2...
Data Centers - Striving Within A Narrow Range - Research Report - MCG - May 2...
pchutichetpong
 
Best best suvichar in gujarati english meaning of this sentence as Silk road ...
Best best suvichar in gujarati english meaning of this sentence as Silk road ...Best best suvichar in gujarati english meaning of this sentence as Silk road ...
Best best suvichar in gujarati english meaning of this sentence as Silk road ...
AbhimanyuSinha9
 
SOCRadar Germany 2024 Threat Landscape Report
SOCRadar Germany 2024 Threat Landscape ReportSOCRadar Germany 2024 Threat Landscape Report
SOCRadar Germany 2024 Threat Landscape Report
SOCRadar
 
【社内勉強会資料_Octo: An Open-Source Generalist Robot Policy】
【社内勉強会資料_Octo: An Open-Source Generalist Robot Policy】【社内勉強会資料_Octo: An Open-Source Generalist Robot Policy】
【社内勉強会資料_Octo: An Open-Source Generalist Robot Policy】
NABLAS株式会社
 
Malana- Gimlet Market Analysis (Portfolio 2)
Malana- Gimlet Market Analysis (Portfolio 2)Malana- Gimlet Market Analysis (Portfolio 2)
Malana- Gimlet Market Analysis (Portfolio 2)
TravisMalana
 
1.Seydhcuxhxyxhccuuxuxyxyxmisolids 2019.pptx
1.Seydhcuxhxyxhccuuxuxyxyxmisolids 2019.pptx1.Seydhcuxhxyxhccuuxuxyxyxmisolids 2019.pptx
1.Seydhcuxhxyxhccuuxuxyxyxmisolids 2019.pptx
Tiktokethiodaily
 
一比一原版(UofS毕业证书)萨省大学毕业证如何办理
一比一原版(UofS毕业证书)萨省大学毕业证如何办理一比一原版(UofS毕业证书)萨省大学毕业证如何办理
一比一原版(UofS毕业证书)萨省大学毕业证如何办理
v3tuleee
 
一比一原版(RUG毕业证)格罗宁根大学毕业证成绩单
一比一原版(RUG毕业证)格罗宁根大学毕业证成绩单一比一原版(RUG毕业证)格罗宁根大学毕业证成绩单
一比一原版(RUG毕业证)格罗宁根大学毕业证成绩单
vcaxypu
 
Levelwise PageRank with Loop-Based Dead End Handling Strategy : SHORT REPORT ...
Levelwise PageRank with Loop-Based Dead End Handling Strategy : SHORT REPORT ...Levelwise PageRank with Loop-Based Dead End Handling Strategy : SHORT REPORT ...
Levelwise PageRank with Loop-Based Dead End Handling Strategy : SHORT REPORT ...
Subhajit Sahu
 
一比一原版(UVic毕业证)维多利亚大学毕业证成绩单
一比一原版(UVic毕业证)维多利亚大学毕业证成绩单一比一原版(UVic毕业证)维多利亚大学毕业证成绩单
一比一原版(UVic毕业证)维多利亚大学毕业证成绩单
ukgaet
 
Criminal IP - Threat Hunting Webinar.pdf
Criminal IP - Threat Hunting Webinar.pdfCriminal IP - Threat Hunting Webinar.pdf
Criminal IP - Threat Hunting Webinar.pdf
Criminal IP
 

Recently uploaded (20)

FP Growth Algorithm and its Applications
FP Growth Algorithm and its ApplicationsFP Growth Algorithm and its Applications
FP Growth Algorithm and its Applications
 
一比一原版(Adelaide毕业证书)阿德莱德大学毕业证如何办理
一比一原版(Adelaide毕业证书)阿德莱德大学毕业证如何办理一比一原版(Adelaide毕业证书)阿德莱德大学毕业证如何办理
一比一原版(Adelaide毕业证书)阿德莱德大学毕业证如何办理
 
一比一原版(BU毕业证)波士顿大学毕业证成绩单
一比一原版(BU毕业证)波士顿大学毕业证成绩单一比一原版(BU毕业证)波士顿大学毕业证成绩单
一比一原版(BU毕业证)波士顿大学毕业证成绩单
 
Predicting Product Ad Campaign Performance: A Data Analysis Project Presentation
Predicting Product Ad Campaign Performance: A Data Analysis Project PresentationPredicting Product Ad Campaign Performance: A Data Analysis Project Presentation
Predicting Product Ad Campaign Performance: A Data Analysis Project Presentation
 
Opendatabay - Open Data Marketplace.pptx
Opendatabay - Open Data Marketplace.pptxOpendatabay - Open Data Marketplace.pptx
Opendatabay - Open Data Marketplace.pptx
 
Machine learning and optimization techniques for electrical drives.pptx
Machine learning and optimization techniques for electrical drives.pptxMachine learning and optimization techniques for electrical drives.pptx
Machine learning and optimization techniques for electrical drives.pptx
 
Ch03-Managing the Object-Oriented Information Systems Project a.pdf
Ch03-Managing the Object-Oriented Information Systems Project a.pdfCh03-Managing the Object-Oriented Information Systems Project a.pdf
Ch03-Managing the Object-Oriented Information Systems Project a.pdf
 
一比一原版(TWU毕业证)西三一大学毕业证成绩单
一比一原版(TWU毕业证)西三一大学毕业证成绩单一比一原版(TWU毕业证)西三一大学毕业证成绩单
一比一原版(TWU毕业证)西三一大学毕业证成绩单
 
Chatty Kathy - UNC Bootcamp Final Project Presentation - Final Version - 5.23...
Chatty Kathy - UNC Bootcamp Final Project Presentation - Final Version - 5.23...Chatty Kathy - UNC Bootcamp Final Project Presentation - Final Version - 5.23...
Chatty Kathy - UNC Bootcamp Final Project Presentation - Final Version - 5.23...
 
Data Centers - Striving Within A Narrow Range - Research Report - MCG - May 2...
Data Centers - Striving Within A Narrow Range - Research Report - MCG - May 2...Data Centers - Striving Within A Narrow Range - Research Report - MCG - May 2...
Data Centers - Striving Within A Narrow Range - Research Report - MCG - May 2...
 
Best best suvichar in gujarati english meaning of this sentence as Silk road ...
Best best suvichar in gujarati english meaning of this sentence as Silk road ...Best best suvichar in gujarati english meaning of this sentence as Silk road ...
Best best suvichar in gujarati english meaning of this sentence as Silk road ...
 
SOCRadar Germany 2024 Threat Landscape Report
SOCRadar Germany 2024 Threat Landscape ReportSOCRadar Germany 2024 Threat Landscape Report
SOCRadar Germany 2024 Threat Landscape Report
 
【社内勉強会資料_Octo: An Open-Source Generalist Robot Policy】
【社内勉強会資料_Octo: An Open-Source Generalist Robot Policy】【社内勉強会資料_Octo: An Open-Source Generalist Robot Policy】
【社内勉強会資料_Octo: An Open-Source Generalist Robot Policy】
 
Malana- Gimlet Market Analysis (Portfolio 2)
Malana- Gimlet Market Analysis (Portfolio 2)Malana- Gimlet Market Analysis (Portfolio 2)
Malana- Gimlet Market Analysis (Portfolio 2)
 
1.Seydhcuxhxyxhccuuxuxyxyxmisolids 2019.pptx
1.Seydhcuxhxyxhccuuxuxyxyxmisolids 2019.pptx1.Seydhcuxhxyxhccuuxuxyxyxmisolids 2019.pptx
1.Seydhcuxhxyxhccuuxuxyxyxmisolids 2019.pptx
 
一比一原版(UofS毕业证书)萨省大学毕业证如何办理
一比一原版(UofS毕业证书)萨省大学毕业证如何办理一比一原版(UofS毕业证书)萨省大学毕业证如何办理
一比一原版(UofS毕业证书)萨省大学毕业证如何办理
 
一比一原版(RUG毕业证)格罗宁根大学毕业证成绩单
一比一原版(RUG毕业证)格罗宁根大学毕业证成绩单一比一原版(RUG毕业证)格罗宁根大学毕业证成绩单
一比一原版(RUG毕业证)格罗宁根大学毕业证成绩单
 
Levelwise PageRank with Loop-Based Dead End Handling Strategy : SHORT REPORT ...
Levelwise PageRank with Loop-Based Dead End Handling Strategy : SHORT REPORT ...Levelwise PageRank with Loop-Based Dead End Handling Strategy : SHORT REPORT ...
Levelwise PageRank with Loop-Based Dead End Handling Strategy : SHORT REPORT ...
 
一比一原版(UVic毕业证)维多利亚大学毕业证成绩单
一比一原版(UVic毕业证)维多利亚大学毕业证成绩单一比一原版(UVic毕业证)维多利亚大学毕业证成绩单
一比一原版(UVic毕业证)维多利亚大学毕业证成绩单
 
Criminal IP - Threat Hunting Webinar.pdf
Criminal IP - Threat Hunting Webinar.pdfCriminal IP - Threat Hunting Webinar.pdf
Criminal IP - Threat Hunting Webinar.pdf
 

5 tactics for practical privacy protection

  • 3. There is a deluge of public and private data about each of us, and our research subjects, including social media content, web browsing habits and location data. The ease of accessibility is usually at the bidding of the tech organisation who owns the data. Technology capacities are constantly changing which means privacy definitions, policy and enforcement have been unable to keep up. This is obviously a problem for human rights defenders in countries with oppressive governments, however the research community should note that some British journalists and researchers are under dataveillance too, due to being considered “threats to national security” by the UK government. More than these concrete issues, privacy is enshrined in human rights conventions because it is important in and of itself - not in context or with justification.
  • 4. The research community is presented with information and communication technologies which can lead to the violation of privacy rights, some of which are used second hand, like email or facebook, some of which are used first hand, such as social media analytics research. We need to make decisions on what is the right balance between the risks and opportunities of these tools is in the absence of up to date ethics guidelines.
  • 6. Strategy Usually ethics guidelines are already built under the strategy and values of an organisation, and these ethical guidelines drive decisions - however, with this area already lacking it is important to start by building a strategy - That is, what is the overall plan for the protection of the rights of the researcher, the research and the research subjects. It is necessary to understand the research subjects - who they are and what risks they face, your research - what are the goals and what information is necessary, and finally yourself, what are your skills, capabilities and, most importantly, responsibilities.
  • 8. Threat modelling is a method to develop this strategy. Threat modelling is an in depth risk analysis of a certain context. To carry out threat modelling you have to think of risks and threats, their likelihood and the level of impact if they happen. In relation to information and communication technologies it is important to ask: ● what information is needed for the threats to be carried out? ● Where will this information be held? ● What tools are you using and what or who do those tools and servers interact with? For all of these, the threat or the information carrier, such as the email company, can, and probably do, collect more data than would be obvious. So once you worked out what information you want to gain and share, and what threats and risks are involved, then you have an overarching strategy for the protection of your data.
  • 11. The safest place for information is in your head, not said out loud at all, not written down anywhere. However, information and communication is what most of society is built on, including the academic research community. The next step up from not talking at all, is to write handwritten notes or meet face to face. The alternative is have a computer that is completely offline, this means a computer that doesn’t even have the capability to connect to the internet, this way no one can access the files without having hard access to your computer. When necessary, it is at least important to be aware of what you are putting on the cloud, sometimes without realising it.
  • 13. Alternatively, you can make it harder to access the information. This might be through covering your webcam with paper, which was once seen as the same category as wearing a tinfoil helmet but comes now at the recommendation of the Director of the FBI. The other way to make it hard to access information is to fight fire with fire, technology with technology. That can mean encryption, for example WhatsApp and Facebook messenger offer end to end encryption, and emails can be encrypted with PGP. PGP not only allows you to have conversations privately but to put a public pgp out there so people can make initial contact with you privately, this may be particularly important for whistleblowers. Other tools include a VPN and TOR which can help separate the originating computer from the message.
  • 15. Secondly, in relation to the tactic of fighting technology with technology, you can use non-mainstream tools that consider privacy a core value. There are many alternatives out there to most social media for example. PIWIK is an alternative to google analytics that allows people to own the data they collect. Finally, you can make your own tools, the risks of which are discussed later on.
  • 17. There are two aspects to the tactic of chaos: 1) How chaos can protect you from others - this tactic is useful if people are meeting regularly but don’t want to be seen to be associated, for example taking a different route every time and swapping oyster cards to avoid location data and IDs being associated or patterns forming. This also incompasses the first vital rule of protection - your password - choose random collection of characters or at least four random words not connected to you in anyway. Generally a password manager is recommended to allow for complexity and randomness across all websites that require passwords.
  • 18. 2) How chaos can protect you from yourself. There is a human condition “apophenia” which means seeing patterns where they don’t exist and our preconceptions impact the patterns we see. It is important to have good quality data, test them with others and get different perspectives and ultimately to remember we are applying order to chaos. The principle is to disrupt patterns.
  • 20. The fourth tactic is transparency. In some journals it is already standard to not only publish, alongside the research, the supporting data but also the supporting code and this should become the norm in social sciences too, with appropriate anonymisation as necessary. It is also important to outline which tools you are using, and the risks involved, such as with facebook groups or email, to the subjects so they can make decisions for themselves. Even if it means the research subjects then want to back out, this is the responsibility of a researcher.
  • 21. Take only what you need Eraser
  • 22. Finally, the last tactic I want to discuss is to only take what you need. In this data deluge it is very tempting to not only take more than necessary but also keep it indefinitely. To ensure best practice with data it is important to consider exactly what your research is first and then collect specifically for it. Once the research is over all sensitive data that won’t be used in the final publications should be deleted completely. This doesn’t just mean deleting it from the trash can, in extreme cases it means incinerating or drilling holes in hard drives. Perhaps more practically, it means using tools such as eraser which overwrite many times with random data until the previous data can no longer be retrieved by expert programs.
  • 24. There are some difficulties I have come across in achieving these tactics. Firstly, many require technical skill which makes it more difficult to engage with. Even software engineers know not to write their own encryption, because it is likely they won’t make it good enough. This is one of the reasons I haven’t moved to hosting my own server for my data, because I am not convinced I could keep it safe from attack. The safety of most of expert technologies used to “fight technology with technology” is often doubted - WhatsApp’s encryption was quickly undermined when they joined with FaceBook. TOR came under attacks for ultimately being created by the NSA. That doesn’t stop them being useful, only to highlight the need for caution. Many of these tactics will also mean that data collection and analysis takes longer. In fact, many privacy activists have considered their campaign similar to the environmental movement, that if change is desired a ‘slow computing’ approach needs to be taken,
  • 25. Furthermore, contradictions are created between many of these tactics. For example between deleting data after use and publishing anonymised code, particularly as anonymisation is almost impossible. In Cryptography there is a whole art to differential privacy, which aims to provide maximum accuracy in data with minimal risk of identification - but it is not easy. Another example is to take only what you need for your research questions and applying a sense of chaos in collection to avoid ingrained bias in the formulation of questions and patterns. There is a also substantial tension between being a researcher, relying on, and accountable to, a transparent public profile, and protecting our own privacy.
  • 27. In conclusion, this isn’t about a single answer tool but a strategy for researchers to take in their methodologies and ethics. The technical challenges with achieving privacy protection are sometimes not in our control and ultimately we have to continue to demand system and culture change with our research and from positions of authority or persuasive when we can. As for the contradictions, the discussion should be open and all actors should be listened to so we can find solutions together. Thank you for listening.

Editor's Notes

  1. There is public data about each of us, and our subjects, through digital tools such as social media, accessible, usually at the bidding of the tech company who owns the information, by governments and companies Secondly, as Snowden revelations show, are private communications aren’t safe - and there is still more happening - Yahoo have just shown that they were scanning emails for US intelligence Thirdly, privacy is changing as a concept - for some this is an obvious problem, human rights defenders in countries with dictatorships - but even journalists and some researchers are considered “threats by the UK government” - more importantly privacy is enshrined in human rights conventions and treaties because it is important in and of itself - not context or justification. So with that in mind, The research community is presented with the same tools used for surveillance, some of which are used second hand, like email or facebook, some of which are used first hand, such as social media analytics research
  2. There is public data about each of us, and our subjects, through digital tools such as social media, accessible, usually at the bidding of the tech company who owns the information, by governments and companies Secondly, as Snowden revelations show, are private communications aren’t safe - and there is still more happening - Yahoo have just shown that they were scanning emails for US intelligence Thirdly, privacy is changing as a concept - for some this is an obvious problem, human rights defenders in countries with dictatorships - but even journalists and some researchers are considered “threats by the UK government” - more importantly privacy is enshrined in human rights conventions and treaties because it is important in and of itself - not context or justification. So with that in mind, The research community is presented with the same tools used for surveillance, some of which are used second hand, like email or facebook, some of which are used first hand, such as social media analytics research
  3. There is public data about each of us, and our subjects, through digital tools such as social media, accessible, usually at the bidding of the tech company who owns the information, by governments and companies Secondly, as Snowden revelations show, are private communications aren’t safe - and there is still more happening - Yahoo have just shown that they were scanning emails for US intelligence Thirdly, privacy is changing as a concept - for some this is an obvious problem, human rights defenders in countries with dictatorships - but even journalists and some researchers are considered “threats by the UK government” - more importantly privacy is enshrined in human rights conventions and treaties because it is important in and of itself - not context or justification. So with that in mind, The research community is presented with the same tools used for surveillance, some of which are used second hand, like email or facebook, some of which are used first hand, such as social media analytics research
  4. As my research is specifically looking at at the topics of mass data collection or dataveillance, I thought it would be important to consider best possible practice for my communications as well as data collection and analysis. The following are solutions characterised by : tools, tactics and philosophies - some of which I will implement and others I have contained as they are on my radar and I’d love to hear people’s opinions in general to know how I should apply them.
  5. To develop your strategy Social contract means Know your individual and what risk they are at and what they want and need from you Understand your skills and capabilities and responsibilities This is the framing for the rest, but the rest is important even if you don’t agree with my framing
  6. To develop your strategy Social contract means Know your individual and what risk they are at and what they want and need from you Understand your skills and capabilities and responsibilities This is the framing for the rest, but the rest is important even if you don’t agree with my framing
  7. To develop your strategy Social contract means Know your individual and what risk they are at and what they want and need from you Understand your skills and capabilities and responsibilities This is the framing for the rest, but the rest is important even if you don’t agree with my framing
  8. Take your computer offline (completely) Write notes - f2f At least be aware of what you are putting on the cloud and maybe not realising - my computer was updating everything to one drive through microsoft
  9. Take your computer offline (completely) Write notes - f2f At least be aware of what you are putting on the cloud and maybe not realising - my computer was updating everything to one drive through microsoft
  10. Don’t assume that what you are already using is all you have You can find different tools Or tools that accompany yours But technical requires technical
  11. Don’t assume that what you are already using is all you have You can find different tools Or tools that accompany yours But technical requires technical
  12. Don’t assume that what you are already using is all you have You can find different tools Or tools that accompany yours But technical requires technical
  13. Don’t assume that what you are already using is all you have You can find different tools Or tools that accompany yours But technical requires technical
  14. The word for seeing patterns where they don’t exist - need to add chaos in - apophenia - random data points from time to time, random hypothesis Tactics like this are also useful if people are meeting regularly but don’t want to be seen to be associated - taking a different route every time, swapping oyster cards This one is contestable but using this sort of approach in a technical way is VPN
  15. The word for seeing patterns where they don’t exist - need to add chaos in - apophenia - random data points from time to time, random hypothesis Tactics like this are also useful if people are meeting regularly but don’t want to be seen to be associated - taking a different route every time, swapping oyster cards This one is contestable but using this sort of approach in a technical way is VPN
  16. The word for seeing patterns where they don’t exist - need to add chaos in - apophenia - random data points from time to time, random hypothesis Tactics like this are also useful if people are meeting regularly but don’t want to be seen to be associated - taking a different route every time, swapping oyster cards This one is contestable but using this sort of approach in a technical way is VPN
  17. Accountability is part of this and necessary Economists always publish data with their research should be best practice - sometimes only possible in a certain way like tweet IDs Outlining the risks of the tools you are using within your research - a digital rights slant in ethics standards
  18. Accountability is part of this and necessary Economists always publish data with their research should be best practice - sometimes only possible in a certain way like tweet IDs Outlining the risks of the tools you are using within your research - a digital rights slant in ethics standards
  19. In time as well - delete data - eraser A difficulty in this is that sometimes it is random collection - chaos - that leads to good results - how do you manage that?
  20. In time as well - delete data - eraser A difficulty in this is that sometimes it is random collection - chaos - that leads to good results - how do you manage that?