SlideShare a Scribd company logo
Contextual Identity:
Freedom to be
All Your Selves
Monica Chew, Sid Stamm
Mozilla
{mmc,sid}@mozilla.com
Contextual Identity
Be who you want, when you want
Multiple identities abound!
Josephine Baker
Colleen Lachowicz
Snoop Dogg (Snoop Lion)
All your identities in one big identity
"Having two identities for yourself is an
example of a lack of integrity."
- Mark Zuckerberg, The Facebook Effect
"If you have something that you don't want
anyone to know, maybe you shouldn't be doing
it in the first place."
- Eric Schmidt, interview on CNBC
All your identities in one big identity
source: www.facebook.com/help/112146705538576/
“Facebook is a community where
people use their real identities. We
require everyone to provide their
real names, so you always know
who you're connecting with. This
helps keep our community safe.”
Mr. Burns is not pleased
A real world example
Bobbi Duncan Taylor McCormick
Outed when the choir director added them to a
public Facebook group, Queer Chorus
Fuck you, Google
I use my private Gmail account to email my boyfriend and my mother.
There’s a BIG drop-off between them and my other “most frequent”
contacts.
You know who my third most frequent contact is?
My abusive ex-husband.
Which is why it’s SO EXCITING, Google, that you AUTOMATICALLY
allowed all my most frequent contacts access to my Reader, including all
the comments I’ve made on Reader items, usually shared with my
boyfriend, who I had NO REASON to hide my current location or
workplace from, and never did.
All your services in one big service
source: www.fugitivus.net/2010/02/11/fuck-you-google/
catalyst: Google Buzz/Reader/Contacts integration
Twitter Direct Messaging Failures
sources: twitter.com/dmfail, wikipedia.org/wiki/Weinergate
catalyst: typing '@' instead of 'd'
What's in our privacy toolbox?
● Cryptography [RSA, AES, Diffie-Hellman]
● Contextual integrity [Barth et al.]
● Access control [Bell, LaPadula]
● Anonymizers [Dingledine, Marlinspike]
● Blockers [AdBlockPlus, Disconnect.me]
Our tools are necessary but not sufficient.
Access control: state of the art?
Changes are hard to track
source: http://mattmckeon.com/facebook-privacy/
Changes are hard to track
source: http://mattmckeon.com/facebook-privacy/
Changes are hard to track
source: http://mattmckeon.com/facebook-privacy/
Changes are hard to track
source: http://mattmckeon.com/facebook-privacy/
Changes are hard to track
source: http://mattmckeon.com/facebook-privacy/
Changes are hard to track
source: http://mattmckeon.com/facebook-privacy/
Be who you want, when
you want
How do we get there?
Call to action
Study mental models
What makes up online identity?
sites you visit once
devices you own
devices you borrow
devices you lend
sites you never visit
sites you often visit
topics you like
Call to action
Study identity management techniques
Multiple browsers
Multiple devices
Multiple profiles
Alternate identities
Privacy mode
Challenge
People value community
Challenge
People want their data everywhere
Popemobiles make it hard to share
Think different.
Hey, W2SP.
● Obscurity can be enough
● Embarrassment reduction
● Troll avoidance
● Mistake recovery
Room for imperfect solutions
How can we make things better?
● Question our own notions of identity, privacy
and publicity
● Write software for how users are, not how
we wish them to be
Open questions
● How can we design privacy and sharing to
be less brittle, more flexible?
● How can we balance desire for spontaneous
interaction with the need for privacy?
Works in progress
● Blushproof [with David Keeler]
● Cookiemonster [with David Dahl]
● Behavioral segmentation [Mozilla UR]
Questions?

More Related Content

What's hot

Stalking in the Cyberspace
Stalking in the CyberspaceStalking in the Cyberspace
Stalking in the Cyberspace
Emil Tan
 
Drinking from a Fire Hose
Drinking from a Fire HoseDrinking from a Fire Hose
Drinking from a Fire Hose
Anne Adrian
 
Engaging The Conversation
Engaging The ConversationEngaging The Conversation
Introduction to Social Media for Small Business
Introduction to Social Media for Small BusinessIntroduction to Social Media for Small Business
Introduction to Social Media for Small Business
Anne Adrian
 
FILM 260 - Social Media: The Dangers of Over Sharing
FILM 260 - Social Media: The Dangers of Over Sharing FILM 260 - Social Media: The Dangers of Over Sharing
FILM 260 - Social Media: The Dangers of Over Sharing
Emma Irwin
 
Untech10: Mobile Matters: What Association Leaders Need To Know
Untech10: Mobile Matters: What Association Leaders Need To KnowUntech10: Mobile Matters: What Association Leaders Need To Know
Untech10: Mobile Matters: What Association Leaders Need To Know
Vanguard Technology
 
4-H volunteers final
4-H volunteers final4-H volunteers final
Social Networking: Past, Present & Future
Social Networking: Past, Present & FutureSocial Networking: Past, Present & Future
Social Networking: Past, Present & Future
Mark Suster
 
Social Media 101
Social Media 101Social Media 101
Social Media 101
Martin Muñoz
 
Why Mobile Matters - ASAE Technology Conference
Why Mobile Matters - ASAE Technology ConferenceWhy Mobile Matters - ASAE Technology Conference
Why Mobile Matters - ASAE Technology Conference
Vanguard Technology
 
Connections Lost: The Damages of Textual Conversation and Multi-Communication
Connections Lost: The Damages of Textual Conversation and Multi-CommunicationConnections Lost: The Damages of Textual Conversation and Multi-Communication
Connections Lost: The Damages of Textual Conversation and Multi-Communication
Tatum Shiff
 
Social Media Beltwide Cotton
Social Media Beltwide CottonSocial Media Beltwide Cotton
Social Media Beltwide Cotton
Anne Adrian
 
Tracking Boba Fett's Invoice, or Hey, It Went Viral!
Tracking Boba Fett's Invoice, or Hey, It Went Viral!Tracking Boba Fett's Invoice, or Hey, It Went Viral!
Tracking Boba Fett's Invoice, or Hey, It Went Viral!
Dan Wallace
 
Fear And Loathing in Social Media
Fear And Loathing in Social MediaFear And Loathing in Social Media
Fear And Loathing in Social Media
Kate Trgovac
 
Storytelling & Social Media: Creating Social Buzz
Storytelling & Social Media: Creating Social Buzz Storytelling & Social Media: Creating Social Buzz
Storytelling & Social Media: Creating Social Buzz
TechSoup
 
Introduction to Facebook and Twitter
Introduction to Facebook and TwitterIntroduction to Facebook and Twitter
Introduction to Facebook and Twitter
Anne Adrian
 

What's hot (16)

Stalking in the Cyberspace
Stalking in the CyberspaceStalking in the Cyberspace
Stalking in the Cyberspace
 
Drinking from a Fire Hose
Drinking from a Fire HoseDrinking from a Fire Hose
Drinking from a Fire Hose
 
Engaging The Conversation
Engaging The ConversationEngaging The Conversation
Engaging The Conversation
 
Introduction to Social Media for Small Business
Introduction to Social Media for Small BusinessIntroduction to Social Media for Small Business
Introduction to Social Media for Small Business
 
FILM 260 - Social Media: The Dangers of Over Sharing
FILM 260 - Social Media: The Dangers of Over Sharing FILM 260 - Social Media: The Dangers of Over Sharing
FILM 260 - Social Media: The Dangers of Over Sharing
 
Untech10: Mobile Matters: What Association Leaders Need To Know
Untech10: Mobile Matters: What Association Leaders Need To KnowUntech10: Mobile Matters: What Association Leaders Need To Know
Untech10: Mobile Matters: What Association Leaders Need To Know
 
4-H volunteers final
4-H volunteers final4-H volunteers final
4-H volunteers final
 
Social Networking: Past, Present & Future
Social Networking: Past, Present & FutureSocial Networking: Past, Present & Future
Social Networking: Past, Present & Future
 
Social Media 101
Social Media 101Social Media 101
Social Media 101
 
Why Mobile Matters - ASAE Technology Conference
Why Mobile Matters - ASAE Technology ConferenceWhy Mobile Matters - ASAE Technology Conference
Why Mobile Matters - ASAE Technology Conference
 
Connections Lost: The Damages of Textual Conversation and Multi-Communication
Connections Lost: The Damages of Textual Conversation and Multi-CommunicationConnections Lost: The Damages of Textual Conversation and Multi-Communication
Connections Lost: The Damages of Textual Conversation and Multi-Communication
 
Social Media Beltwide Cotton
Social Media Beltwide CottonSocial Media Beltwide Cotton
Social Media Beltwide Cotton
 
Tracking Boba Fett's Invoice, or Hey, It Went Viral!
Tracking Boba Fett's Invoice, or Hey, It Went Viral!Tracking Boba Fett's Invoice, or Hey, It Went Viral!
Tracking Boba Fett's Invoice, or Hey, It Went Viral!
 
Fear And Loathing in Social Media
Fear And Loathing in Social MediaFear And Loathing in Social Media
Fear And Loathing in Social Media
 
Storytelling & Social Media: Creating Social Buzz
Storytelling & Social Media: Creating Social Buzz Storytelling & Social Media: Creating Social Buzz
Storytelling & Social Media: Creating Social Buzz
 
Introduction to Facebook and Twitter
Introduction to Facebook and TwitterIntroduction to Facebook and Twitter
Introduction to Facebook and Twitter
 

Similar to Contextual identity w2sp

Security Dangers of Social Networking
Security Dangers of Social NetworkingSecurity Dangers of Social Networking
Security Dangers of Social Networking
BillBrenner70
 
Social - Best habits to follow and pitfalls to avoid
Social - Best habits to follow and pitfalls to avoidSocial - Best habits to follow and pitfalls to avoid
Social - Best habits to follow and pitfalls to avoid
Venkatarangan Thirumalai
 
Lis 768 Privacy Presentation
Lis 768 Privacy PresentationLis 768 Privacy Presentation
Lis 768 Privacy Presentation
Julia Bryan-Diehl
 
Multimedia01
Multimedia01Multimedia01
Multimedia01
Les Davy
 
Youth Communication and Privacy in the Social Media Age
Youth Communication and Privacy in the Social Media AgeYouth Communication and Privacy in the Social Media Age
Youth Communication and Privacy in the Social Media Age
Nathan Wright
 
A Social Media Evolution - Whats Next
A Social Media Evolution - Whats NextA Social Media Evolution - Whats Next
A Social Media Evolution - Whats Next
Social Media Bootcamp
 
A Social Media Evolution Whats Next?
A Social Media Evolution   Whats Next?A Social Media Evolution   Whats Next?
A Social Media Evolution Whats Next?
Jeffrey Stewart
 
Grasping Social Patterns
Grasping Social PatternsGrasping Social Patterns
Grasping Social Patterns
Christian Crumlish
 
IS 20090 Week 2 - Social Networks
IS 20090 Week 2 - Social NetworksIS 20090 Week 2 - Social Networks
IS 20090 Week 2 - Social Networks
is20090
 
Social groups for awareness
Social groups for awarenessSocial groups for awareness
Social groups for awareness
Karan Veer Singh
 
Week 7: Privacy-rev2013
Week 7:  Privacy-rev2013Week 7:  Privacy-rev2013
Week 7: Privacy-rev2013
Ray Brannon
 
Gez Daring - Building Online Communities
Gez Daring - Building Online CommunitiesGez Daring - Building Online Communities
Gez Daring - Building Online Communities
InBlackandWhite
 
Marketing Innovation Summit: Integrating Social Media into the Mix
Marketing Innovation Summit:  Integrating Social Media into the MixMarketing Innovation Summit:  Integrating Social Media into the Mix
Marketing Innovation Summit: Integrating Social Media into the Mix
Jeffrey Stewart
 
The FACEBOOK and TWITTER Phenomenon [9-28-2010]
The FACEBOOK and TWITTER Phenomenon [9-28-2010]The FACEBOOK and TWITTER Phenomenon [9-28-2010]
The FACEBOOK and TWITTER Phenomenon [9-28-2010]
CLARENCE APOSTOL, CHRMP, CHRM, CIRS, IADT
 
Casott employee conference 2015
Casott employee conference 2015Casott employee conference 2015
Casott employee conference 2015
Bernard Charlebois
 
Social web for grannies
Social web for granniesSocial web for grannies
Social web for grannies
Martin Hatchuel
 
Web pp
Web ppWeb pp
Social Media Basics: Security Loopholes with Twitter & Other Social Media
Social Media Basics: Security Loopholes with Twitter & Other Social MediaSocial Media Basics: Security Loopholes with Twitter & Other Social Media
Social Media Basics: Security Loopholes with Twitter & Other Social Media
Tyler Shields
 
Data privacy day - Ryan McNutt
Data privacy day - Ryan McNuttData privacy day - Ryan McNutt
Data privacy day - Ryan McNutt
McNutt
 
Effectiveness Vs Efficiency: Practical ways for dealing with Information Over...
Effectiveness Vs Efficiency: Practical ways for dealing with Information Over...Effectiveness Vs Efficiency: Practical ways for dealing with Information Over...
Effectiveness Vs Efficiency: Practical ways for dealing with Information Over...
Adria Richards
 

Similar to Contextual identity w2sp (20)

Security Dangers of Social Networking
Security Dangers of Social NetworkingSecurity Dangers of Social Networking
Security Dangers of Social Networking
 
Social - Best habits to follow and pitfalls to avoid
Social - Best habits to follow and pitfalls to avoidSocial - Best habits to follow and pitfalls to avoid
Social - Best habits to follow and pitfalls to avoid
 
Lis 768 Privacy Presentation
Lis 768 Privacy PresentationLis 768 Privacy Presentation
Lis 768 Privacy Presentation
 
Multimedia01
Multimedia01Multimedia01
Multimedia01
 
Youth Communication and Privacy in the Social Media Age
Youth Communication and Privacy in the Social Media AgeYouth Communication and Privacy in the Social Media Age
Youth Communication and Privacy in the Social Media Age
 
A Social Media Evolution - Whats Next
A Social Media Evolution - Whats NextA Social Media Evolution - Whats Next
A Social Media Evolution - Whats Next
 
A Social Media Evolution Whats Next?
A Social Media Evolution   Whats Next?A Social Media Evolution   Whats Next?
A Social Media Evolution Whats Next?
 
Grasping Social Patterns
Grasping Social PatternsGrasping Social Patterns
Grasping Social Patterns
 
IS 20090 Week 2 - Social Networks
IS 20090 Week 2 - Social NetworksIS 20090 Week 2 - Social Networks
IS 20090 Week 2 - Social Networks
 
Social groups for awareness
Social groups for awarenessSocial groups for awareness
Social groups for awareness
 
Week 7: Privacy-rev2013
Week 7:  Privacy-rev2013Week 7:  Privacy-rev2013
Week 7: Privacy-rev2013
 
Gez Daring - Building Online Communities
Gez Daring - Building Online CommunitiesGez Daring - Building Online Communities
Gez Daring - Building Online Communities
 
Marketing Innovation Summit: Integrating Social Media into the Mix
Marketing Innovation Summit:  Integrating Social Media into the MixMarketing Innovation Summit:  Integrating Social Media into the Mix
Marketing Innovation Summit: Integrating Social Media into the Mix
 
The FACEBOOK and TWITTER Phenomenon [9-28-2010]
The FACEBOOK and TWITTER Phenomenon [9-28-2010]The FACEBOOK and TWITTER Phenomenon [9-28-2010]
The FACEBOOK and TWITTER Phenomenon [9-28-2010]
 
Casott employee conference 2015
Casott employee conference 2015Casott employee conference 2015
Casott employee conference 2015
 
Social web for grannies
Social web for granniesSocial web for grannies
Social web for grannies
 
Web pp
Web ppWeb pp
Web pp
 
Social Media Basics: Security Loopholes with Twitter & Other Social Media
Social Media Basics: Security Loopholes with Twitter & Other Social MediaSocial Media Basics: Security Loopholes with Twitter & Other Social Media
Social Media Basics: Security Loopholes with Twitter & Other Social Media
 
Data privacy day - Ryan McNutt
Data privacy day - Ryan McNuttData privacy day - Ryan McNutt
Data privacy day - Ryan McNutt
 
Effectiveness Vs Efficiency: Practical ways for dealing with Information Over...
Effectiveness Vs Efficiency: Practical ways for dealing with Information Over...Effectiveness Vs Efficiency: Practical ways for dealing with Information Over...
Effectiveness Vs Efficiency: Practical ways for dealing with Information Over...
 

Recently uploaded

Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
Zilliz
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
DianaGray10
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
innovationoecd
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
Kumud Singh
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
panagenda
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
Zilliz
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
panagenda
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
Neo4j
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
Neo4j
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
DianaGray10
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
SOFTTECHHUB
 
Infrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI modelsInfrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI models
Zilliz
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
Matthew Sinclair
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Speck&Tech
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
Tomaz Bratanic
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 

Recently uploaded (20)

Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
 
Infrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI modelsInfrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI models
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 

Contextual identity w2sp

  • 1. Contextual Identity: Freedom to be All Your Selves Monica Chew, Sid Stamm Mozilla {mmc,sid}@mozilla.com
  • 2. Contextual Identity Be who you want, when you want
  • 7. All your identities in one big identity "Having two identities for yourself is an example of a lack of integrity." - Mark Zuckerberg, The Facebook Effect "If you have something that you don't want anyone to know, maybe you shouldn't be doing it in the first place." - Eric Schmidt, interview on CNBC
  • 8. All your identities in one big identity source: www.facebook.com/help/112146705538576/ “Facebook is a community where people use their real identities. We require everyone to provide their real names, so you always know who you're connecting with. This helps keep our community safe.”
  • 9. Mr. Burns is not pleased
  • 10. A real world example Bobbi Duncan Taylor McCormick Outed when the choir director added them to a public Facebook group, Queer Chorus
  • 11. Fuck you, Google I use my private Gmail account to email my boyfriend and my mother. There’s a BIG drop-off between them and my other “most frequent” contacts. You know who my third most frequent contact is? My abusive ex-husband. Which is why it’s SO EXCITING, Google, that you AUTOMATICALLY allowed all my most frequent contacts access to my Reader, including all the comments I’ve made on Reader items, usually shared with my boyfriend, who I had NO REASON to hide my current location or workplace from, and never did. All your services in one big service source: www.fugitivus.net/2010/02/11/fuck-you-google/ catalyst: Google Buzz/Reader/Contacts integration
  • 12. Twitter Direct Messaging Failures sources: twitter.com/dmfail, wikipedia.org/wiki/Weinergate catalyst: typing '@' instead of 'd'
  • 13. What's in our privacy toolbox? ● Cryptography [RSA, AES, Diffie-Hellman] ● Contextual integrity [Barth et al.] ● Access control [Bell, LaPadula] ● Anonymizers [Dingledine, Marlinspike] ● Blockers [AdBlockPlus, Disconnect.me] Our tools are necessary but not sufficient.
  • 14. Access control: state of the art?
  • 15. Changes are hard to track source: http://mattmckeon.com/facebook-privacy/
  • 16. Changes are hard to track source: http://mattmckeon.com/facebook-privacy/
  • 17. Changes are hard to track source: http://mattmckeon.com/facebook-privacy/
  • 18. Changes are hard to track source: http://mattmckeon.com/facebook-privacy/
  • 19. Changes are hard to track source: http://mattmckeon.com/facebook-privacy/
  • 20. Changes are hard to track source: http://mattmckeon.com/facebook-privacy/
  • 21. Be who you want, when you want How do we get there?
  • 22. Call to action Study mental models
  • 23. What makes up online identity? sites you visit once devices you own devices you borrow devices you lend sites you never visit sites you often visit topics you like
  • 24. Call to action Study identity management techniques
  • 31. Challenge People want their data everywhere
  • 32. Popemobiles make it hard to share
  • 34. ● Obscurity can be enough ● Embarrassment reduction ● Troll avoidance ● Mistake recovery Room for imperfect solutions
  • 35. How can we make things better? ● Question our own notions of identity, privacy and publicity ● Write software for how users are, not how we wish them to be
  • 36. Open questions ● How can we design privacy and sharing to be less brittle, more flexible? ● How can we balance desire for spontaneous interaction with the need for privacy?
  • 37. Works in progress ● Blushproof [with David Keeler] ● Cookiemonster [with David Dahl] ● Behavioral segmentation [Mozilla UR]