SlideShare a Scribd company logo
Who will control the
Next Billion? – A Case
of Chat Apps from Asia
(or Why I think it’s important to help improve data protection in East
Asia if you really care about personal data of the internet Next Billion)

@bact
Arthit Suriyawongkul
Thai Netizen Network

Silicon Valley, 4 March 2014
Lead to Summary
●

Mobile chat apps are now everywhere in East
and Southeast Asia
–
–

●

becomes a mobile identity – provides authentication service for 3rd party apps
mobile social network platform – built for mobile from day one (unlike Facebook)

These “chat apps” grow globally fast
–
–

●

manufacturing influence (bundled to mobile handsets)
“soft-power” cultural influence (K-Pop, J-Pop, Manga)

Data of the mobile Next Billion will be more
transmitted to/processed in East Asia
Summary
●

●

Data will no longer concentrated in US/Europe,
so should the attention of data protection too?
Human rights standards so vary in other parts of
the world and the protection may not cross-border
–

●

e.g. ASEAN Human Rights Declaration

Privacy/cyber-security laws of East Asian
jurisdictions will affect more people globally
–

your communication data and personal data could be one day regulated by Chinese law

–

through monetary and educational assistants, China and Japan already have influence
in SE Asia cyber-security policy
The Apps and
the Culture
All the Communications and Sharing
(Group) Chat, Voice/Video Call, Media/Location Sharing, GAMES, AUTHEN/IDENTITY
Plus Cute Characters (Stickers)

Where’s my sticker shop on ChatSecure and Cryptocat? :p
Asian People Love It
How Big They Are Now?
Chat App
WhatsApp

Country
of Origin
US

Number of
Users
400M

Line

Japan

300M
(50M in Japan)

WeChat

China

300M
(200M in China)

KakaoTalk

Korea

130M

ChatON

Korea

100M
Growth Trends
●

●

●

●

“Line, WeChat: Asian social networks move to
conquer Europe” – AFP (29 Sep 2013)
“How WeChat, Line plan to taken on Facebook,
Skype” – The Times of India (30 Sep 2013)
“Asian Messaging Apps WeChat and Line Challenge
Silicon Valley. China’s WeChat and Japan’s Line Are
Threatening the Global Growth of WhatsApp and
Facebook.” – The Wall Street Journal (9 Oct 2013)
… and the Facebook’s WhatsApp deal recently
Where is the Next Billion?
●

Mobile internet users in Africa, China, South
America, South Asia and Southeast Asia
The Control
Protections Across Borders
“We want LINE Corp. to be the the first line of
surveillance and send us any ‘suspicious’ activity
on their app.” – Technology Crime Suppression
Division, Royal Thai Police (2013)
LINE Corp. in Japan said there’s no official
request from Thai Police. Any request for personal
data should be done under Japanese law.
http://advocacy.globalvoicesonline.org/2013/08/19/thailand-wants-to-monitor-conversations-on-line-app/
http://www.telecomasia.net/content/naver-denies-collaborating-thai-govt
Violations Across Borders
●

●

●

●

●

Some Chinese keywords got
censored in LINE
Study from Citizen Lab found
regionally-based Keyword
Censorship in LINE
LINE in China operated by a
Chinese company
Censorship follows user,
go across borders
https://citizenlab.org/2013/11/asia-chats-investigating-regionally-ba
sed-keyword-censorship-line/
Assumption (That Not Goes)
Across Borders
●

LINE did no encryption on 2G/3G network

●

Metadata and entire conversations in plain text

●

●

With small changes in data request string, can
pull historical chat logs up to two months old.
Made a wrong assumption that the 2G/3G
network is already secure (in many countries, it’s
not)

●

http://www.telecomasia.net/blog/content/line-vulnerable-man-middle-attack

●

https://citizenlab.org/2013/11/asia-chats-analyzing-information-controls-privacy-asian-messaging-applications/
Who will control the Next Billion?
●

●

●

●

South Korea, Japan, China, and Taiwan are
exporters of popular IT apps and devices. These
countries have huge influence in Southeast Asia
and emerging markets.
Political, economical, and/or cultural.
LINE is based in Japan. A subsidiary of a South
Korean company. LINE China (“Lianwo”) is
operated by a Chinese licensee.
WeChat (“Weixin”) is based in China.
Japan/China Influences on
Cyberpolicy (tech/law) in SE Asia
●
●

●
●

●
●

Japan-ASEAN Information Security Policy Meeting
Japan-ASEAN Ministerial Policy Meeting on Cyber
Security Cooperation
ASEAN Smart Network Initiative
ASEAN-Japan Joint Information Security Awareness
Raising Initiatives
China-ASEAN Defence Ministers' Meeting
ASEAN-China Information Superhighway Working
Group
Asian values in your pocket
●

●

●

●

As these chat apps/social network are growing, more data
will be transmitted to, stored and processed in East Asia.
“Asian values” embedded in these countries’ information
laws will play more role in information freedom globally.
Often times, in these countries, companies
cooperate/collaborate with authority. No Transparency
Report. Communication protocol is not open. Everything is
behind the door.
Asian values? From Japan? From South Korea? From
China? From where?
What We Can Do?
Together, we can do more of this
EFF’s “Who's Doing What?” (Tech)

EFF’s “Who Has Your Back?” (Law)

and this...

?????
?????
?????

?????
?????
@bact
Arthit Suriyawongkul
Thai Netizen Network
arthit@thainetizen.org
●

Parts of this presentation was presented at
●

Regional Consultation on Freedom of Expression for Civil
Liberties in Asia (22 Nov 2013, Bangkok)

●

●

●

CNXP (6 Dec 2013, Chiang Mai)
FOSSASIA (1 Mar 2014, Phnom Penh)

Thanks for all the comments from those forums and social media.

More Related Content

Viewers also liked

A survey on cyber law
A survey on cyber lawA survey on cyber law
A survey on cyber law
Santosh Panda
 
Global Cyber-Laws and E-Commerce & Strategic Implication for E-Commerce
Global Cyber-Laws and E-Commerce & Strategic Implication for E-CommerceGlobal Cyber-Laws and E-Commerce & Strategic Implication for E-Commerce
Global Cyber-Laws and E-Commerce & Strategic Implication for E-Commerce
welcometofacebook
 
The cyber law regime in India
The cyber law regime in IndiaThe cyber law regime in India
The cyber law regime in India
Shankey Gupta
 
Cybercrime Legislation in the Middle East
Cybercrime Legislation in the Middle EastCybercrime Legislation in the Middle East
Cybercrime Legislation in the Middle East
Mohamed N. El-Guindy
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
Ranjan Som
 
Legal aspects of handling cyber frauds
Legal aspects of handling cyber fraudsLegal aspects of handling cyber frauds
Legal aspects of handling cyber frauds
Sagar Rahurkar
 
Introduction to Cyber law (IT Act 2000)
Introduction to Cyber law (IT Act 2000)Introduction to Cyber law (IT Act 2000)
Introduction to Cyber law (IT Act 2000)
Ambar Deo
 
Intellectual property
Intellectual propertyIntellectual property
Intellectual property
gitam university( anjali)
 
Hacking - Cyber Crimes and Cyber Laws - Information Technology ACT 2000
Hacking - Cyber Crimes and Cyber Laws - Information Technology ACT 2000Hacking - Cyber Crimes and Cyber Laws - Information Technology ACT 2000
Hacking - Cyber Crimes and Cyber Laws - Information Technology ACT 2000
Jyotindra Zaveri
 
Cyber law-it-act-2000
Cyber law-it-act-2000Cyber law-it-act-2000
Cyber law-it-act-2000
Mayuresh Patil
 
Cyber Law
Cyber  LawCyber  Law
Cyber Law
fariez91
 
cyber crime & cyber law
cyber crime & cyber lawcyber crime & cyber law
cyber crime & cyber law
himanshumunjal
 
An Introduction to Cyber Law - I.T. Act 2000 (India)
An Introduction to Cyber Law - I.T. Act 2000 (India)An Introduction to Cyber Law - I.T. Act 2000 (India)
An Introduction to Cyber Law - I.T. Act 2000 (India)
Chetan Bharadwaj
 
Information technology act 2000
Information technology act 2000Information technology act 2000
Information technology act 2000
Akash Varaiya
 
Cybercrime.ppt
Cybercrime.pptCybercrime.ppt
Cybercrime.ppt
Aeman Khan
 

Viewers also liked (15)

A survey on cyber law
A survey on cyber lawA survey on cyber law
A survey on cyber law
 
Global Cyber-Laws and E-Commerce & Strategic Implication for E-Commerce
Global Cyber-Laws and E-Commerce & Strategic Implication for E-CommerceGlobal Cyber-Laws and E-Commerce & Strategic Implication for E-Commerce
Global Cyber-Laws and E-Commerce & Strategic Implication for E-Commerce
 
The cyber law regime in India
The cyber law regime in IndiaThe cyber law regime in India
The cyber law regime in India
 
Cybercrime Legislation in the Middle East
Cybercrime Legislation in the Middle EastCybercrime Legislation in the Middle East
Cybercrime Legislation in the Middle East
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Legal aspects of handling cyber frauds
Legal aspects of handling cyber fraudsLegal aspects of handling cyber frauds
Legal aspects of handling cyber frauds
 
Introduction to Cyber law (IT Act 2000)
Introduction to Cyber law (IT Act 2000)Introduction to Cyber law (IT Act 2000)
Introduction to Cyber law (IT Act 2000)
 
Intellectual property
Intellectual propertyIntellectual property
Intellectual property
 
Hacking - Cyber Crimes and Cyber Laws - Information Technology ACT 2000
Hacking - Cyber Crimes and Cyber Laws - Information Technology ACT 2000Hacking - Cyber Crimes and Cyber Laws - Information Technology ACT 2000
Hacking - Cyber Crimes and Cyber Laws - Information Technology ACT 2000
 
Cyber law-it-act-2000
Cyber law-it-act-2000Cyber law-it-act-2000
Cyber law-it-act-2000
 
Cyber Law
Cyber  LawCyber  Law
Cyber Law
 
cyber crime & cyber law
cyber crime & cyber lawcyber crime & cyber law
cyber crime & cyber law
 
An Introduction to Cyber Law - I.T. Act 2000 (India)
An Introduction to Cyber Law - I.T. Act 2000 (India)An Introduction to Cyber Law - I.T. Act 2000 (India)
An Introduction to Cyber Law - I.T. Act 2000 (India)
 
Information technology act 2000
Information technology act 2000Information technology act 2000
Information technology act 2000
 
Cybercrime.ppt
Cybercrime.pptCybercrime.ppt
Cybercrime.ppt
 

Similar to Who will control the Next Billion? – A Case of Chat Apps from Asia (#RightsCon 2014)

Digital Innovations in Asia by Mark Inkster
Digital Innovations in Asia by Mark InksterDigital Innovations in Asia by Mark Inkster
Digital Innovations in Asia by Mark Inkster
The Digital Insurer
 
China & Japan: Influencing our future
China & Japan: Influencing our futureChina & Japan: Influencing our future
China & Japan: Influencing our future
NigelG
 
Internet Society Update
Internet Society UpdateInternet Society Update
Internet Society Update
APNIC
 
ebusiness Strategy in Entrepreneurship 1: Pedro Eloy at SMECC - 20130806
ebusiness Strategy in Entrepreneurship 1: Pedro Eloy at SMECC - 20130806ebusiness Strategy in Entrepreneurship 1: Pedro Eloy at SMECC - 20130806
ebusiness Strategy in Entrepreneurship 1: Pedro Eloy at SMECC - 20130806
smecchk
 
Sigit policy framework on public sector social media utilization- moving fo...
Sigit   policy framework on public sector social media utilization- moving fo...Sigit   policy framework on public sector social media utilization- moving fo...
Sigit policy framework on public sector social media utilization- moving fo...
Sigit Puspito Wigati Jarot
 
Sigit policy framework on public sector social media utilization- moving fo...
Sigit   policy framework on public sector social media utilization- moving fo...Sigit   policy framework on public sector social media utilization- moving fo...
Sigit policy framework on public sector social media utilization- moving fo...
Sigit Puspito Wigati Jarot
 
Mobile Southeast Asia Report 2012
Mobile Southeast Asia Report 2012Mobile Southeast Asia Report 2012
Mobile Southeast Asia Report 2012
WiseKnow Thailand
 
[2014 q2q3umeng insight] China’s Mobile Internet:Further Segmentation and Ver...
[2014 q2q3umeng insight] China’s Mobile Internet:Further Segmentation and Ver...[2014 q2q3umeng insight] China’s Mobile Internet:Further Segmentation and Ver...
[2014 q2q3umeng insight] China’s Mobile Internet:Further Segmentation and Ver...
Umeng
 
2014 q2q3umeng insight_report_en
2014 q2q3umeng insight_report_en2014 q2q3umeng insight_report_en
2014 q2q3umeng insight_report_en
Umeng
 
Going Mobile
Going MobileGoing Mobile
Going Mobile
David Fletcher
 
Digital Asia – ASEAN in ascendence. Team Finland Future Watch Report, May 2016
Digital Asia – ASEAN in ascendence. Team Finland Future Watch Report, May 2016Digital Asia – ASEAN in ascendence. Team Finland Future Watch Report, May 2016
Digital Asia – ASEAN in ascendence. Team Finland Future Watch Report, May 2016
Didar Kaitasalo
 
Digital Asia – ASEAN in ascendence. Team Finland Future Watch Report, May 2016
Digital Asia – ASEAN in ascendence. Team Finland Future Watch Report, May 2016Digital Asia – ASEAN in ascendence. Team Finland Future Watch Report, May 2016
Digital Asia – ASEAN in ascendence. Team Finland Future Watch Report, May 2016
Team Finland Future Watch
 
Threading it all together – Q2 Tech Trends
Threading it all together – Q2 Tech TrendsThreading it all together – Q2 Tech Trends
Threading it all together – Q2 Tech Trends
Katie Harbath
 
The interpretation of the relationship among big data, IoT and smart city - C...
The interpretation of the relationship among big data, IoT and smart city - C...The interpretation of the relationship among big data, IoT and smart city - C...
The interpretation of the relationship among big data, IoT and smart city - C...
Antenna Manufacturer Coco
 
Why tech-giants move their outsourcing operations to Vietnam- whitepaper
Why tech-giants move their outsourcing operations to Vietnam- whitepaperWhy tech-giants move their outsourcing operations to Vietnam- whitepaper
Why tech-giants move their outsourcing operations to Vietnam- whitepaper
TMA Solutions
 
2013 Umeng Insight Report
2013 Umeng Insight Report2013 Umeng Insight Report
2013 Umeng Insight Report
Umeng
 
China Mobile Internet 2013 Overview (Umeng)
China Mobile Internet 2013 Overview (Umeng)China Mobile Internet 2013 Overview (Umeng)
China Mobile Internet 2013 Overview (Umeng)
Hubery Zhou
 
Internet Governance & Digital Rights by Waihiga K. Muturi, Rtn..pdf
Internet Governance & Digital Rights by Waihiga K. Muturi, Rtn..pdfInternet Governance & Digital Rights by Waihiga K. Muturi, Rtn..pdf
Internet Governance & Digital Rights by Waihiga K. Muturi, Rtn..pdf
WAIHIGA K.MUTURI
 
Inside Tencent
Inside TencentInside Tencent
Inside Tencent
Benjamin Joffe
 
WeChat, the shape of the connected China
WeChat, the shape of the connected ChinaWeChat, the shape of the connected China
WeChat, the shape of the connected China
Fabernovel
 

Similar to Who will control the Next Billion? – A Case of Chat Apps from Asia (#RightsCon 2014) (20)

Digital Innovations in Asia by Mark Inkster
Digital Innovations in Asia by Mark InksterDigital Innovations in Asia by Mark Inkster
Digital Innovations in Asia by Mark Inkster
 
China & Japan: Influencing our future
China & Japan: Influencing our futureChina & Japan: Influencing our future
China & Japan: Influencing our future
 
Internet Society Update
Internet Society UpdateInternet Society Update
Internet Society Update
 
ebusiness Strategy in Entrepreneurship 1: Pedro Eloy at SMECC - 20130806
ebusiness Strategy in Entrepreneurship 1: Pedro Eloy at SMECC - 20130806ebusiness Strategy in Entrepreneurship 1: Pedro Eloy at SMECC - 20130806
ebusiness Strategy in Entrepreneurship 1: Pedro Eloy at SMECC - 20130806
 
Sigit policy framework on public sector social media utilization- moving fo...
Sigit   policy framework on public sector social media utilization- moving fo...Sigit   policy framework on public sector social media utilization- moving fo...
Sigit policy framework on public sector social media utilization- moving fo...
 
Sigit policy framework on public sector social media utilization- moving fo...
Sigit   policy framework on public sector social media utilization- moving fo...Sigit   policy framework on public sector social media utilization- moving fo...
Sigit policy framework on public sector social media utilization- moving fo...
 
Mobile Southeast Asia Report 2012
Mobile Southeast Asia Report 2012Mobile Southeast Asia Report 2012
Mobile Southeast Asia Report 2012
 
[2014 q2q3umeng insight] China’s Mobile Internet:Further Segmentation and Ver...
[2014 q2q3umeng insight] China’s Mobile Internet:Further Segmentation and Ver...[2014 q2q3umeng insight] China’s Mobile Internet:Further Segmentation and Ver...
[2014 q2q3umeng insight] China’s Mobile Internet:Further Segmentation and Ver...
 
2014 q2q3umeng insight_report_en
2014 q2q3umeng insight_report_en2014 q2q3umeng insight_report_en
2014 q2q3umeng insight_report_en
 
Going Mobile
Going MobileGoing Mobile
Going Mobile
 
Digital Asia – ASEAN in ascendence. Team Finland Future Watch Report, May 2016
Digital Asia – ASEAN in ascendence. Team Finland Future Watch Report, May 2016Digital Asia – ASEAN in ascendence. Team Finland Future Watch Report, May 2016
Digital Asia – ASEAN in ascendence. Team Finland Future Watch Report, May 2016
 
Digital Asia – ASEAN in ascendence. Team Finland Future Watch Report, May 2016
Digital Asia – ASEAN in ascendence. Team Finland Future Watch Report, May 2016Digital Asia – ASEAN in ascendence. Team Finland Future Watch Report, May 2016
Digital Asia – ASEAN in ascendence. Team Finland Future Watch Report, May 2016
 
Threading it all together – Q2 Tech Trends
Threading it all together – Q2 Tech TrendsThreading it all together – Q2 Tech Trends
Threading it all together – Q2 Tech Trends
 
The interpretation of the relationship among big data, IoT and smart city - C...
The interpretation of the relationship among big data, IoT and smart city - C...The interpretation of the relationship among big data, IoT and smart city - C...
The interpretation of the relationship among big data, IoT and smart city - C...
 
Why tech-giants move their outsourcing operations to Vietnam- whitepaper
Why tech-giants move their outsourcing operations to Vietnam- whitepaperWhy tech-giants move their outsourcing operations to Vietnam- whitepaper
Why tech-giants move their outsourcing operations to Vietnam- whitepaper
 
2013 Umeng Insight Report
2013 Umeng Insight Report2013 Umeng Insight Report
2013 Umeng Insight Report
 
China Mobile Internet 2013 Overview (Umeng)
China Mobile Internet 2013 Overview (Umeng)China Mobile Internet 2013 Overview (Umeng)
China Mobile Internet 2013 Overview (Umeng)
 
Internet Governance & Digital Rights by Waihiga K. Muturi, Rtn..pdf
Internet Governance & Digital Rights by Waihiga K. Muturi, Rtn..pdfInternet Governance & Digital Rights by Waihiga K. Muturi, Rtn..pdf
Internet Governance & Digital Rights by Waihiga K. Muturi, Rtn..pdf
 
Inside Tencent
Inside TencentInside Tencent
Inside Tencent
 
WeChat, the shape of the connected China
WeChat, the shape of the connected ChinaWeChat, the shape of the connected China
WeChat, the shape of the connected China
 

More from Arthit Suriyawongkul

Beyond retailer-consumer relationships
Beyond retailer-consumer relationshipsBeyond retailer-consumer relationships
Beyond retailer-consumer relationships
Arthit Suriyawongkul
 
ทุน ข้อมูล และสภาพแวดล้อม: เพื่อสนับสนุนการมีส่วนร่วมของประชาชนในการออกแบบแล...
 ทุน ข้อมูล และสภาพแวดล้อม: เพื่อสนับสนุนการมีส่วนร่วมของประชาชนในการออกแบบแล... ทุน ข้อมูล และสภาพแวดล้อม: เพื่อสนับสนุนการมีส่วนร่วมของประชาชนในการออกแบบแล...
ทุน ข้อมูล และสภาพแวดล้อม: เพื่อสนับสนุนการมีส่วนร่วมของประชาชนในการออกแบบแล...
Arthit Suriyawongkul
 
กฎหมายเกี่ยวกับเนื้อหา โฆษณา และการตลาดออนไลน์ (ทำให้เพื่อนไปสอบ DAAT ไม่รู้จ...
กฎหมายเกี่ยวกับเนื้อหา โฆษณา และการตลาดออนไลน์ (ทำให้เพื่อนไปสอบ DAAT ไม่รู้จ...กฎหมายเกี่ยวกับเนื้อหา โฆษณา และการตลาดออนไลน์ (ทำให้เพื่อนไปสอบ DAAT ไม่รู้จ...
กฎหมายเกี่ยวกับเนื้อหา โฆษณา และการตลาดออนไลน์ (ทำให้เพื่อนไปสอบ DAAT ไม่รู้จ...
Arthit Suriyawongkul
 
พ.ร.บ.คุ้มครอง
ข้อมูลส่วนบุคคล และสิทธิในความเป็นส่วนตัว
พ.ร.บ.คุ้มครอง
ข้อมูลส่วนบุคคล และสิทธิในความเป็นส่วนตัวพ.ร.บ.คุ้มครอง
ข้อมูลส่วนบุคคล และสิทธิในความเป็นส่วนตัว
พ.ร.บ.คุ้มครอง
ข้อมูลส่วนบุคคล และสิทธิในความเป็นส่วนตัว
Arthit Suriyawongkul
 
Rights-based Internet Governance: การอภิบาลอินเทอร์เน็ตโดยคิดจากสิทธิเป็นที่ตั้ง
Rights-based Internet Governance: การอภิบาลอินเทอร์เน็ตโดยคิดจากสิทธิเป็นที่ตั้งRights-based Internet Governance: การอภิบาลอินเทอร์เน็ตโดยคิดจากสิทธิเป็นที่ตั้ง
Rights-based Internet Governance: การอภิบาลอินเทอร์เน็ตโดยคิดจากสิทธิเป็นที่ตั้ง
Arthit Suriyawongkul
 
ว่าด้วยสื่อสังคม
ว่าด้วยสื่อสังคมว่าด้วยสื่อสังคม
ว่าด้วยสื่อสังคม
Arthit Suriyawongkul
 
โดนอุ้มในโลกเสมือน
โดนอุ้มในโลกเสมือน โดนอุ้มในโลกเสมือน
โดนอุ้มในโลกเสมือน
Arthit Suriyawongkul
 
คนทำงานและแรงงานในยุคดิจิทัล
คนทำงานและแรงงานในยุคดิจิทัลคนทำงานและแรงงานในยุคดิจิทัล
คนทำงานและแรงงานในยุคดิจิทัล
Arthit Suriyawongkul
 
Three-Layer Model for the Control of Online Content: A Study on Thailand
Three-Layer Model for the Control of Online Content: A Study on ThailandThree-Layer Model for the Control of Online Content: A Study on Thailand
Three-Layer Model for the Control of Online Content: A Study on Thailand
Arthit Suriyawongkul
 
Mapping Stakeholders, Decision-makers, and Implementers in Thailand’s Cyber P...
Mapping Stakeholders, Decision-makers, and Implementers in Thailand’s Cyber P...Mapping Stakeholders, Decision-makers, and Implementers in Thailand’s Cyber P...
Mapping Stakeholders, Decision-makers, and Implementers in Thailand’s Cyber P...
Arthit Suriyawongkul
 
Data Protection
 in the Age of Big Data
Data Protection
 in the Age of Big DataData Protection
 in the Age of Big Data
Data Protection
 in the Age of Big Data
Arthit Suriyawongkul
 
Anonymity in the Digital Age #digitalcitizen16
Anonymity in the Digital Age #digitalcitizen16Anonymity in the Digital Age #digitalcitizen16
Anonymity in the Digital Age #digitalcitizen16
Arthit Suriyawongkul
 
Information Laws in Mekong Countries
Information Laws in Mekong CountriesInformation Laws in Mekong Countries
Information Laws in Mekong Countries
Arthit Suriyawongkul
 
แนะนำมูลนิธิเพื่ออินเทอร์เน็ตและวัฒนธรรมพลเมือง
แนะนำมูลนิธิเพื่ออินเทอร์เน็ตและวัฒนธรรมพลเมืองแนะนำมูลนิธิเพื่ออินเทอร์เน็ตและวัฒนธรรมพลเมือง
แนะนำมูลนิธิเพื่ออินเทอร์เน็ตและวัฒนธรรมพลเมือง
Arthit Suriyawongkul
 
การส่งเสริมการกำกับกันเอง
ในกิจการสื่อใหม่ยุคหลอมรวม
การส่งเสริมการกำกับกันเอง
ในกิจการสื่อใหม่ยุคหลอมรวมการส่งเสริมการกำกับกันเอง
ในกิจการสื่อใหม่ยุคหลอมรวม
การส่งเสริมการกำกับกันเอง
ในกิจการสื่อใหม่ยุคหลอมรวม
Arthit Suriyawongkul
 
Cybercrime and Cybersecurity Differences
Cybercrime and Cybersecurity DifferencesCybercrime and Cybersecurity Differences
Cybercrime and Cybersecurity Differences
Arthit Suriyawongkul
 
Development and Concerns over "Digital Economy" Bills in Thailand
Development and Concerns over "Digital Economy" Bills in ThailandDevelopment and Concerns over "Digital Economy" Bills in Thailand
Development and Concerns over "Digital Economy" Bills in Thailand
Arthit Suriyawongkul
 
Thailand on LINE
Thailand on LINEThailand on LINE
Thailand on LINE
Arthit Suriyawongkul
 
The Junta Digital Agenda: 76 Days Later
The Junta Digital Agenda: 76 Days LaterThe Junta Digital Agenda: 76 Days Later
The Junta Digital Agenda: 76 Days Later
Arthit Suriyawongkul
 
The state of Internet freedom after the coup in Thailand
The state of Internet freedom after the coup in ThailandThe state of Internet freedom after the coup in Thailand
The state of Internet freedom after the coup in Thailand
Arthit Suriyawongkul
 

More from Arthit Suriyawongkul (20)

Beyond retailer-consumer relationships
Beyond retailer-consumer relationshipsBeyond retailer-consumer relationships
Beyond retailer-consumer relationships
 
ทุน ข้อมูล และสภาพแวดล้อม: เพื่อสนับสนุนการมีส่วนร่วมของประชาชนในการออกแบบแล...
 ทุน ข้อมูล และสภาพแวดล้อม: เพื่อสนับสนุนการมีส่วนร่วมของประชาชนในการออกแบบแล... ทุน ข้อมูล และสภาพแวดล้อม: เพื่อสนับสนุนการมีส่วนร่วมของประชาชนในการออกแบบแล...
ทุน ข้อมูล และสภาพแวดล้อม: เพื่อสนับสนุนการมีส่วนร่วมของประชาชนในการออกแบบแล...
 
กฎหมายเกี่ยวกับเนื้อหา โฆษณา และการตลาดออนไลน์ (ทำให้เพื่อนไปสอบ DAAT ไม่รู้จ...
กฎหมายเกี่ยวกับเนื้อหา โฆษณา และการตลาดออนไลน์ (ทำให้เพื่อนไปสอบ DAAT ไม่รู้จ...กฎหมายเกี่ยวกับเนื้อหา โฆษณา และการตลาดออนไลน์ (ทำให้เพื่อนไปสอบ DAAT ไม่รู้จ...
กฎหมายเกี่ยวกับเนื้อหา โฆษณา และการตลาดออนไลน์ (ทำให้เพื่อนไปสอบ DAAT ไม่รู้จ...
 
พ.ร.บ.คุ้มครอง
ข้อมูลส่วนบุคคล และสิทธิในความเป็นส่วนตัว
พ.ร.บ.คุ้มครอง
ข้อมูลส่วนบุคคล และสิทธิในความเป็นส่วนตัวพ.ร.บ.คุ้มครอง
ข้อมูลส่วนบุคคล และสิทธิในความเป็นส่วนตัว
พ.ร.บ.คุ้มครอง
ข้อมูลส่วนบุคคล และสิทธิในความเป็นส่วนตัว
 
Rights-based Internet Governance: การอภิบาลอินเทอร์เน็ตโดยคิดจากสิทธิเป็นที่ตั้ง
Rights-based Internet Governance: การอภิบาลอินเทอร์เน็ตโดยคิดจากสิทธิเป็นที่ตั้งRights-based Internet Governance: การอภิบาลอินเทอร์เน็ตโดยคิดจากสิทธิเป็นที่ตั้ง
Rights-based Internet Governance: การอภิบาลอินเทอร์เน็ตโดยคิดจากสิทธิเป็นที่ตั้ง
 
ว่าด้วยสื่อสังคม
ว่าด้วยสื่อสังคมว่าด้วยสื่อสังคม
ว่าด้วยสื่อสังคม
 
โดนอุ้มในโลกเสมือน
โดนอุ้มในโลกเสมือน โดนอุ้มในโลกเสมือน
โดนอุ้มในโลกเสมือน
 
คนทำงานและแรงงานในยุคดิจิทัล
คนทำงานและแรงงานในยุคดิจิทัลคนทำงานและแรงงานในยุคดิจิทัล
คนทำงานและแรงงานในยุคดิจิทัล
 
Three-Layer Model for the Control of Online Content: A Study on Thailand
Three-Layer Model for the Control of Online Content: A Study on ThailandThree-Layer Model for the Control of Online Content: A Study on Thailand
Three-Layer Model for the Control of Online Content: A Study on Thailand
 
Mapping Stakeholders, Decision-makers, and Implementers in Thailand’s Cyber P...
Mapping Stakeholders, Decision-makers, and Implementers in Thailand’s Cyber P...Mapping Stakeholders, Decision-makers, and Implementers in Thailand’s Cyber P...
Mapping Stakeholders, Decision-makers, and Implementers in Thailand’s Cyber P...
 
Data Protection
 in the Age of Big Data
Data Protection
 in the Age of Big DataData Protection
 in the Age of Big Data
Data Protection
 in the Age of Big Data
 
Anonymity in the Digital Age #digitalcitizen16
Anonymity in the Digital Age #digitalcitizen16Anonymity in the Digital Age #digitalcitizen16
Anonymity in the Digital Age #digitalcitizen16
 
Information Laws in Mekong Countries
Information Laws in Mekong CountriesInformation Laws in Mekong Countries
Information Laws in Mekong Countries
 
แนะนำมูลนิธิเพื่ออินเทอร์เน็ตและวัฒนธรรมพลเมือง
แนะนำมูลนิธิเพื่ออินเทอร์เน็ตและวัฒนธรรมพลเมืองแนะนำมูลนิธิเพื่ออินเทอร์เน็ตและวัฒนธรรมพลเมือง
แนะนำมูลนิธิเพื่ออินเทอร์เน็ตและวัฒนธรรมพลเมือง
 
การส่งเสริมการกำกับกันเอง
ในกิจการสื่อใหม่ยุคหลอมรวม
การส่งเสริมการกำกับกันเอง
ในกิจการสื่อใหม่ยุคหลอมรวมการส่งเสริมการกำกับกันเอง
ในกิจการสื่อใหม่ยุคหลอมรวม
การส่งเสริมการกำกับกันเอง
ในกิจการสื่อใหม่ยุคหลอมรวม
 
Cybercrime and Cybersecurity Differences
Cybercrime and Cybersecurity DifferencesCybercrime and Cybersecurity Differences
Cybercrime and Cybersecurity Differences
 
Development and Concerns over "Digital Economy" Bills in Thailand
Development and Concerns over "Digital Economy" Bills in ThailandDevelopment and Concerns over "Digital Economy" Bills in Thailand
Development and Concerns over "Digital Economy" Bills in Thailand
 
Thailand on LINE
Thailand on LINEThailand on LINE
Thailand on LINE
 
The Junta Digital Agenda: 76 Days Later
The Junta Digital Agenda: 76 Days LaterThe Junta Digital Agenda: 76 Days Later
The Junta Digital Agenda: 76 Days Later
 
The state of Internet freedom after the coup in Thailand
The state of Internet freedom after the coup in ThailandThe state of Internet freedom after the coup in Thailand
The state of Internet freedom after the coup in Thailand
 

Recently uploaded

Nordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptxNordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptx
MichaelKnudsen27
 
Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |
AstuteBusiness
 
Digital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe
Digital Banking in the Cloud: How Citizens Bank Unlocked Their MainframeDigital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe
Digital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe
Precisely
 
leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...
leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...
leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...
alexjohnson7307
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
tolgahangng
 
Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)
Jakub Marek
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
Pixlogix Infotech
 
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
saastr
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Tosin Akinosho
 
June Patch Tuesday
June Patch TuesdayJune Patch Tuesday
June Patch Tuesday
Ivanti
 
System Design Case Study: Building a Scalable E-Commerce Platform - Hiike
System Design Case Study: Building a Scalable E-Commerce Platform - HiikeSystem Design Case Study: Building a Scalable E-Commerce Platform - Hiike
System Design Case Study: Building a Scalable E-Commerce Platform - Hiike
Hiike
 
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing InstancesEnergy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Alpen-Adria-Universität
 
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
Edge AI and Vision Alliance
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
Zilliz
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
shyamraj55
 
A Comprehensive Guide to DeFi Development Services in 2024
A Comprehensive Guide to DeFi Development Services in 2024A Comprehensive Guide to DeFi Development Services in 2024
A Comprehensive Guide to DeFi Development Services in 2024
Intelisync
 
Skybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoptionSkybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoption
Tatiana Kojar
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
innovationoecd
 
Digital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying AheadDigital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying Ahead
Wask
 
Fueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte WebinarFueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte Webinar
Zilliz
 

Recently uploaded (20)

Nordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptxNordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptx
 
Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |
 
Digital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe
Digital Banking in the Cloud: How Citizens Bank Unlocked Their MainframeDigital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe
Digital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe
 
leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...
leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...
leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
 
Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
 
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
 
June Patch Tuesday
June Patch TuesdayJune Patch Tuesday
June Patch Tuesday
 
System Design Case Study: Building a Scalable E-Commerce Platform - Hiike
System Design Case Study: Building a Scalable E-Commerce Platform - HiikeSystem Design Case Study: Building a Scalable E-Commerce Platform - Hiike
System Design Case Study: Building a Scalable E-Commerce Platform - Hiike
 
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing InstancesEnergy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
 
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
 
A Comprehensive Guide to DeFi Development Services in 2024
A Comprehensive Guide to DeFi Development Services in 2024A Comprehensive Guide to DeFi Development Services in 2024
A Comprehensive Guide to DeFi Development Services in 2024
 
Skybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoptionSkybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoption
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
 
Digital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying AheadDigital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying Ahead
 
Fueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte WebinarFueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte Webinar
 

Who will control the Next Billion? – A Case of Chat Apps from Asia (#RightsCon 2014)

  • 1. Who will control the Next Billion? – A Case of Chat Apps from Asia (or Why I think it’s important to help improve data protection in East Asia if you really care about personal data of the internet Next Billion) @bact Arthit Suriyawongkul Thai Netizen Network Silicon Valley, 4 March 2014
  • 2. Lead to Summary ● Mobile chat apps are now everywhere in East and Southeast Asia – – ● becomes a mobile identity – provides authentication service for 3rd party apps mobile social network platform – built for mobile from day one (unlike Facebook) These “chat apps” grow globally fast – – ● manufacturing influence (bundled to mobile handsets) “soft-power” cultural influence (K-Pop, J-Pop, Manga) Data of the mobile Next Billion will be more transmitted to/processed in East Asia
  • 3. Summary ● ● Data will no longer concentrated in US/Europe, so should the attention of data protection too? Human rights standards so vary in other parts of the world and the protection may not cross-border – ● e.g. ASEAN Human Rights Declaration Privacy/cyber-security laws of East Asian jurisdictions will affect more people globally – your communication data and personal data could be one day regulated by Chinese law – through monetary and educational assistants, China and Japan already have influence in SE Asia cyber-security policy
  • 5. All the Communications and Sharing (Group) Chat, Voice/Video Call, Media/Location Sharing, GAMES, AUTHEN/IDENTITY
  • 6. Plus Cute Characters (Stickers) Where’s my sticker shop on ChatSecure and Cryptocat? :p
  • 8. How Big They Are Now? Chat App WhatsApp Country of Origin US Number of Users 400M Line Japan 300M (50M in Japan) WeChat China 300M (200M in China) KakaoTalk Korea 130M ChatON Korea 100M
  • 9. Growth Trends ● ● ● ● “Line, WeChat: Asian social networks move to conquer Europe” – AFP (29 Sep 2013) “How WeChat, Line plan to taken on Facebook, Skype” – The Times of India (30 Sep 2013) “Asian Messaging Apps WeChat and Line Challenge Silicon Valley. China’s WeChat and Japan’s Line Are Threatening the Global Growth of WhatsApp and Facebook.” – The Wall Street Journal (9 Oct 2013) … and the Facebook’s WhatsApp deal recently
  • 10. Where is the Next Billion? ● Mobile internet users in Africa, China, South America, South Asia and Southeast Asia
  • 12. Protections Across Borders “We want LINE Corp. to be the the first line of surveillance and send us any ‘suspicious’ activity on their app.” – Technology Crime Suppression Division, Royal Thai Police (2013) LINE Corp. in Japan said there’s no official request from Thai Police. Any request for personal data should be done under Japanese law. http://advocacy.globalvoicesonline.org/2013/08/19/thailand-wants-to-monitor-conversations-on-line-app/ http://www.telecomasia.net/content/naver-denies-collaborating-thai-govt
  • 13. Violations Across Borders ● ● ● ● ● Some Chinese keywords got censored in LINE Study from Citizen Lab found regionally-based Keyword Censorship in LINE LINE in China operated by a Chinese company Censorship follows user, go across borders https://citizenlab.org/2013/11/asia-chats-investigating-regionally-ba sed-keyword-censorship-line/
  • 14. Assumption (That Not Goes) Across Borders ● LINE did no encryption on 2G/3G network ● Metadata and entire conversations in plain text ● ● With small changes in data request string, can pull historical chat logs up to two months old. Made a wrong assumption that the 2G/3G network is already secure (in many countries, it’s not) ● http://www.telecomasia.net/blog/content/line-vulnerable-man-middle-attack ● https://citizenlab.org/2013/11/asia-chats-analyzing-information-controls-privacy-asian-messaging-applications/
  • 15. Who will control the Next Billion? ● ● ● ● South Korea, Japan, China, and Taiwan are exporters of popular IT apps and devices. These countries have huge influence in Southeast Asia and emerging markets. Political, economical, and/or cultural. LINE is based in Japan. A subsidiary of a South Korean company. LINE China (“Lianwo”) is operated by a Chinese licensee. WeChat (“Weixin”) is based in China.
  • 16. Japan/China Influences on Cyberpolicy (tech/law) in SE Asia ● ● ● ● ● ● Japan-ASEAN Information Security Policy Meeting Japan-ASEAN Ministerial Policy Meeting on Cyber Security Cooperation ASEAN Smart Network Initiative ASEAN-Japan Joint Information Security Awareness Raising Initiatives China-ASEAN Defence Ministers' Meeting ASEAN-China Information Superhighway Working Group
  • 17. Asian values in your pocket ● ● ● ● As these chat apps/social network are growing, more data will be transmitted to, stored and processed in East Asia. “Asian values” embedded in these countries’ information laws will play more role in information freedom globally. Often times, in these countries, companies cooperate/collaborate with authority. No Transparency Report. Communication protocol is not open. Everything is behind the door. Asian values? From Japan? From South Korea? From China? From where?
  • 18. What We Can Do?
  • 19. Together, we can do more of this EFF’s “Who's Doing What?” (Tech) EFF’s “Who Has Your Back?” (Law) and this... ????? ????? ????? ????? ?????
  • 20. @bact Arthit Suriyawongkul Thai Netizen Network arthit@thainetizen.org ● Parts of this presentation was presented at ● Regional Consultation on Freedom of Expression for Civil Liberties in Asia (22 Nov 2013, Bangkok) ● ● ● CNXP (6 Dec 2013, Chiang Mai) FOSSASIA (1 Mar 2014, Phnom Penh) Thanks for all the comments from those forums and social media.