SlideShare a Scribd company logo
Embracing Post-Privacy
  Optimism towards a future
where there is “Nothing to hide”



                Christian Heller / http://www.plomlompom.de
                                            December 29, 2008
                        25. Chaos Communication Congress
                                          bcc / Berlin, Germany
“cctv” by Subcircle (http://www.subcircle.co.uk/)
                     http://flickr.com/photos/8323834@N07/500970140/
License: Creative Commons 2.0 Attribution / http://creativecommons.org/licenses/by/2.0/deed.en
Overview
    pessimism: the end of privacy
●


    question: the meaning of privacy
●


    optimism: ideas for post-privacy dys... utopias
●


    reading recommendations
●


    discussion
●
“Secure Beneath the Watchful Eyes” by Kenneth Lu (http://subjunctive.net/klog/)
                         http://flickr.com/photos/toasty/2171185463/
License: Creative Commons 2.0 Attribution / http://creativecommons.org/licenses/by/2.0/deed.en
Privacy is doomed
    the privacy-eating monster
●


        growingly well-fed, ubiquitous, attractive, intelligent
    –

        once information is in, it cannot be removed again
    –

    the privacy-defending army
●


        laws ineffective; technology insecure
    –

        pre-MySpace generation getting old, disappearing
    –

    an uneven battle for the army
●


        cannot be won ultimately
    –

        can only be lost; easily
    –
“Privat” by Daniel Lobo (http://www.daquellamanera.org/)
                     http://flickr.com/photos/daquellamanera/311128375/
License: Creative Commons 2.0 Attribution / http://creativecommons.org/licenses/by/2.0/deed.en
What is the meaning of Privacy?
    self-determination
●


        make your own decisions about your life
    –

        freedom from interference by others
    –

    information control
●


        control what information flows from you to others
    –

        control what information flows to you from others
    –

    intimacy
●


        sharing of privacy
    –

        interpersonal trust, dependence
    –
“Tanzliedchen” by Hugo Bürkner, 1854
http://commons.wikimedia.org/wiki/File:Bürkner_Tanzliedchen.jpg
private             vs.             public
    house, backroom,             forum, parliament,
●                           ●

    home PC, head/brain          newspaper, Slashdot
    hidden                       visible
●                           ●


    secure from scrutiny         accountable to social
●                           ●

    of social norms              norms
    free individual?             controlled conformist?
●                           ●


    woman                        man
●                           ●


    isolated                     interconnected
●                           ●


    closet homosexuality         gay pride parade
●                           ●
“new tshirts” by Creative Commons (http://creativecommons.org/)
            http://flickr.com/photos/creativecommons/2294317099/in/photostream/
License: Creative Commons 2.0 Attribution / http://creativecommons.org/licenses/by/2.0/deed.en
Hiding vs. Sharing
    new information economy
●


        no zero-sum game
    –

        the more you give, the more you receive
    –

    more information better than less information
●


        market runs better with more information
    –

        information more valuable (to the owner) if shared
    –

    the Hive Mind
●


        growing with or without you
    –

        you gain more by participating than you lose
    –
“IMG_3483.JPG” by Drab Makyo (http://www.drab-makyo.com/)
                   http://flickr.com/photos/ranna/773419070/in/photostream/
License: Creative Commons 2.0 Attribution / http://creativecommons.org/licenses/by/2.0/deed.en
Redefining Normality
    diversity instead of conformism
●


        difference is good! difference is information!
    –

        personalization instead of “Gleichschaltung”
    –

    new normality: no normality
●


        no escape from ever-increasing diversity
    –

        forces tolerance increase
    –

    the googling employer?
●


        no untarnished candidates; emptiness suspicious
    –

        originality cannot yet be outsourced, automatized
    –
“Identity Thief as Paris” by David Goehring (http://flickr.com/photos/carbonnyc/)
                   http://flickr.com/photos/carbonnyc/57280104/in/photostream/
License: Creative Commons 2.0 Attribution / http://creativecommons.org/licenses/by/2.0/deed.en
Identity fluidity & volatility
    identity multiplicity
●


        one human can constitute many identities
    –

        one identity can be constituted by many humans
    –

    no static core identity anymore
●


        identity hyper-dynamism; 15 minutes of identity x
    –

        identity viruses may freely change their hosts
    –

    no more identity prison
●


        be what's fun to be, not what you supposedly “are”
    –

        the end of guilt
    –
“Restaurant Surveillance Sign” by Richard Smith (http://flickr.com/people/smith/)
                            http://flickr.com/photos/smith/55403952/
License: Creative Commons 2.0 Attribution / http://creativecommons.org/licenses/by/2.0/deed.en
Surveillance vs. Sousveillance
    equiveillance
●


        watching, documenting actions of police & co.
    –

        document yourself; Hasan Elahi alibi
    –

    transparency of force
●


        no secret watching; open the camera feeds!
    –

        more powerful → more transparency
    –

    freedom through total transparency?
●


        worst case scenario, “better than alternative”
    –

        still room for secrets of any kind?
    –
“WHAT ARE YOU LOOKING AT?” by nolifebeforecoffee
                         (http://www.nolifebeforecoffee.blogspot.com/)
                    http://flickr.com/photos/nolifebeforecoffee/124659356/
License: Creative Commons 2.0 Attribution / http://creativecommons.org/licenses/by/2.0/deed.en
Control vs. Trust
    lack of information: less freedom
●


        fear, suspicion, mistrust
    –

        need for control, deterrence
    –

        many strict, general laws; strong punishments
    –

    –

    abundance of information: more freedom
●


        trust
    –

        less need for strict control or deterrence
    –

        few, precise laws; easy punishments
    –
“Pyramid with the all-seeing eye on the back side of the US 1-Dollar bill”
   http://commons.wikimedia.org/wiki/File:Dollarnote_siegel_hq.jpg
Reading recommendations
    “Privacy” in: “Stanford Encyclopedia of
●

    Philosophy”, 2006
        http://plato.stanford.edu/entries/privacy/
    –

    “The Value of Privacy”, Beate Rössler, 1995
●


    “The Fall of Public Man”, Richard Sennett, 1977
●


    “Facebook and the Social Dynamics of
●

    Privacy”, James Grimmelmann, 2008
        http://works.bepress.com/james_grimmelmann/20/
    –

    “The Transparent Society”, David Brin, 1998
●

More Related Content

What's hot

Building Community with Social Media
Building Community with Social MediaBuilding Community with Social Media
Building Community with Social Media
Nick Westergaard
 
Graphic Facilitation for SIKM Presentation
Graphic Facilitation for SIKM PresentationGraphic Facilitation for SIKM Presentation
Graphic Facilitation for SIKM Presentation
Nancy Wright White
 
Drawing On Walls N Voice2008
Drawing On Walls N Voice2008Drawing On Walls N Voice2008
Drawing On Walls N Voice2008
Nancy Wright White
 
Why Radical Librarianship?
Why Radical Librarianship?Why Radical Librarianship?
Why Radical Librarianship?
CILIPScotland
 
Faster horses & slow elevators: where does innovation come from?
Faster horses & slow elevators: where does innovation come from?Faster horses & slow elevators: where does innovation come from?
Faster horses & slow elevators: where does innovation come from?
Franco Papeschi
 
Out in the Open Range
Out in the Open RangeOut in the Open Range
Out in the Open Range
Alan Levine
 
Building Sites Around Social Objects - Web 2.0 Expo SF 2009
Building Sites Around Social Objects - Web 2.0 Expo SF 2009Building Sites Around Social Objects - Web 2.0 Expo SF 2009
Building Sites Around Social Objects - Web 2.0 Expo SF 2009
Jyri Engeström
 
Digital Civil Rights (Bits of Freedom)
Digital Civil Rights (Bits of Freedom)Digital Civil Rights (Bits of Freedom)
Digital Civil Rights (Bits of Freedom)
Hans de Zwart
 

What's hot (8)

Building Community with Social Media
Building Community with Social MediaBuilding Community with Social Media
Building Community with Social Media
 
Graphic Facilitation for SIKM Presentation
Graphic Facilitation for SIKM PresentationGraphic Facilitation for SIKM Presentation
Graphic Facilitation for SIKM Presentation
 
Drawing On Walls N Voice2008
Drawing On Walls N Voice2008Drawing On Walls N Voice2008
Drawing On Walls N Voice2008
 
Why Radical Librarianship?
Why Radical Librarianship?Why Radical Librarianship?
Why Radical Librarianship?
 
Faster horses & slow elevators: where does innovation come from?
Faster horses & slow elevators: where does innovation come from?Faster horses & slow elevators: where does innovation come from?
Faster horses & slow elevators: where does innovation come from?
 
Out in the Open Range
Out in the Open RangeOut in the Open Range
Out in the Open Range
 
Building Sites Around Social Objects - Web 2.0 Expo SF 2009
Building Sites Around Social Objects - Web 2.0 Expo SF 2009Building Sites Around Social Objects - Web 2.0 Expo SF 2009
Building Sites Around Social Objects - Web 2.0 Expo SF 2009
 
Digital Civil Rights (Bits of Freedom)
Digital Civil Rights (Bits of Freedom)Digital Civil Rights (Bits of Freedom)
Digital Civil Rights (Bits of Freedom)
 

Viewers also liked

Killing (the Power of) Time. Archiving selves, cities, histories and universes.
Killing (the Power of) Time. Archiving selves, cities, histories and universes.Killing (the Power of) Time. Archiving selves, cities, histories and universes.
Killing (the Power of) Time. Archiving selves, cities, histories and universes.
Christian Heller
 
Nothing To Hide
Nothing To HideNothing To Hide
Nothing To Hide
Michael Melnick
 
Metodos contracetivos quimicos
Metodos contracetivos quimicosMetodos contracetivos quimicos
Metodos contracetivos quimicos
gracindabento
 

Viewers also liked (9)

Datenschutz Als Ideologie
Datenschutz Als IdeologieDatenschutz Als Ideologie
Datenschutz Als Ideologie
 
Killing (the Power of) Time. Archiving selves, cities, histories and universes.
Killing (the Power of) Time. Archiving selves, cities, histories and universes.Killing (the Power of) Time. Archiving selves, cities, histories and universes.
Killing (the Power of) Time. Archiving selves, cities, histories and universes.
 
Datenschutz Als Ideologie
Datenschutz Als IdeologieDatenschutz Als Ideologie
Datenschutz Als Ideologie
 
Datenschutz Als Ideologie
Datenschutz Als IdeologieDatenschutz Als Ideologie
Datenschutz Als Ideologie
 
Datenschutz Als Ideologie
Datenschutz Als IdeologieDatenschutz Als Ideologie
Datenschutz Als Ideologie
 
Datenschutz Als Ideologie
Datenschutz Als IdeologieDatenschutz Als Ideologie
Datenschutz Als Ideologie
 
Nothing To Hide
Nothing To HideNothing To Hide
Nothing To Hide
 
Datenschutz Als Ideologie
Datenschutz Als IdeologieDatenschutz Als Ideologie
Datenschutz Als Ideologie
 
Metodos contracetivos quimicos
Metodos contracetivos quimicosMetodos contracetivos quimicos
Metodos contracetivos quimicos
 

Similar to Embracing Postprivacy: Optimism towards a future where there is "Nothing to hide"

Five myths about the future of culture and the commons
Five myths about the future of culture and the commonsFive myths about the future of culture and the commons
Five myths about the future of culture and the commons
Mike Linksvayer
 
Identity Wars: the End of Human Society
Identity Wars: the End of Human SocietyIdentity Wars: the End of Human Society
Identity Wars: the End of Human Society
Christian Heller
 
Society vs Privacy: the impossible dilemma
Society vs Privacy: the impossible dilemma Society vs Privacy: the impossible dilemma
Society vs Privacy: the impossible dilemma
Mathias Klang
 
Privacy by Default - IA Summit 2017
Privacy by Default - IA Summit 2017Privacy by Default - IA Summit 2017
Privacy by Default - IA Summit 2017
Lutz Schmitt
 
"If you love your content, set it free" ?
"If you love your content, set it free" ?"If you love your content, set it free" ?
"If you love your content, set it free" ?
Mike Ellis
 
Drm and crypto
Drm and cryptoDrm and crypto
Drm and crypto
Theresa Lemieux
 
Cryptoanarchism
CryptoanarchismCryptoanarchism
Cryptoanarchism
q3XKFc5XR
 
The Digital Divide in the Post Snowden Era Presentation
The Digital Divide in the Post Snowden Era PresentationThe Digital Divide in the Post Snowden Era Presentation
The Digital Divide in the Post Snowden Era Presentation
MmIT - Multimedia Information Technology Group for CILIP
 
Drm and crypto
Drm and cryptoDrm and crypto
Drm and crypto
Theresa Lemieux
 
20130724 ted x-marc smith-digital health futures empowerment or coercion
20130724 ted x-marc smith-digital health futures empowerment or coercion20130724 ted x-marc smith-digital health futures empowerment or coercion
20130724 ted x-marc smith-digital health futures empowerment or coercion
Marc Smith
 
Future of Android ... And How To Stop It!
Future of Android ... And How To Stop It!Future of Android ... And How To Stop It!
Future of Android ... And How To Stop It!
Terence Eden
 
Legal Aspects Of New Media Quirk 2008
Legal Aspects Of New Media   Quirk   2008Legal Aspects Of New Media   Quirk   2008
Legal Aspects Of New Media Quirk 2008
Paul Jacobson
 
The digital divide in the post-Snowden era
The digital divide in the post-Snowden eraThe digital divide in the post-Snowden era
The digital divide in the post-Snowden era
Ian Clark
 
The Hacker Perspective
The Hacker PerspectiveThe Hacker Perspective
The Hacker Perspective
jjtay
 
Privacy in social media: so what?
Privacy in social media: so what?Privacy in social media: so what?
Privacy in social media: so what?
Mathias Klang
 
Social Secrets Workshop
Social Secrets WorkshopSocial Secrets Workshop
Social Secrets Workshop
annehelmond
 
Week 4: Social Media Ecologies
Week 4: Social Media EcologiesWeek 4: Social Media Ecologies
Week 4: Social Media Ecologies
Ray Brannon
 
Personal But Not Private
Personal But Not PrivatePersonal But Not Private
Personal But Not Private
Mathias Klang
 
Off the Grid: Is anonymity possible?
Off the Grid: Is anonymity possible?Off the Grid: Is anonymity possible?
Off the Grid: Is anonymity possible?
Mathias Klang
 
Exploring the Future: Quantified Self and Learning
Exploring the Future: Quantified Self and LearningExploring the Future: Quantified Self and Learning
Exploring the Future: Quantified Self and Learning
Hans de Zwart
 

Similar to Embracing Postprivacy: Optimism towards a future where there is "Nothing to hide" (20)

Five myths about the future of culture and the commons
Five myths about the future of culture and the commonsFive myths about the future of culture and the commons
Five myths about the future of culture and the commons
 
Identity Wars: the End of Human Society
Identity Wars: the End of Human SocietyIdentity Wars: the End of Human Society
Identity Wars: the End of Human Society
 
Society vs Privacy: the impossible dilemma
Society vs Privacy: the impossible dilemma Society vs Privacy: the impossible dilemma
Society vs Privacy: the impossible dilemma
 
Privacy by Default - IA Summit 2017
Privacy by Default - IA Summit 2017Privacy by Default - IA Summit 2017
Privacy by Default - IA Summit 2017
 
"If you love your content, set it free" ?
"If you love your content, set it free" ?"If you love your content, set it free" ?
"If you love your content, set it free" ?
 
Drm and crypto
Drm and cryptoDrm and crypto
Drm and crypto
 
Cryptoanarchism
CryptoanarchismCryptoanarchism
Cryptoanarchism
 
The Digital Divide in the Post Snowden Era Presentation
The Digital Divide in the Post Snowden Era PresentationThe Digital Divide in the Post Snowden Era Presentation
The Digital Divide in the Post Snowden Era Presentation
 
Drm and crypto
Drm and cryptoDrm and crypto
Drm and crypto
 
20130724 ted x-marc smith-digital health futures empowerment or coercion
20130724 ted x-marc smith-digital health futures empowerment or coercion20130724 ted x-marc smith-digital health futures empowerment or coercion
20130724 ted x-marc smith-digital health futures empowerment or coercion
 
Future of Android ... And How To Stop It!
Future of Android ... And How To Stop It!Future of Android ... And How To Stop It!
Future of Android ... And How To Stop It!
 
Legal Aspects Of New Media Quirk 2008
Legal Aspects Of New Media   Quirk   2008Legal Aspects Of New Media   Quirk   2008
Legal Aspects Of New Media Quirk 2008
 
The digital divide in the post-Snowden era
The digital divide in the post-Snowden eraThe digital divide in the post-Snowden era
The digital divide in the post-Snowden era
 
The Hacker Perspective
The Hacker PerspectiveThe Hacker Perspective
The Hacker Perspective
 
Privacy in social media: so what?
Privacy in social media: so what?Privacy in social media: so what?
Privacy in social media: so what?
 
Social Secrets Workshop
Social Secrets WorkshopSocial Secrets Workshop
Social Secrets Workshop
 
Week 4: Social Media Ecologies
Week 4: Social Media EcologiesWeek 4: Social Media Ecologies
Week 4: Social Media Ecologies
 
Personal But Not Private
Personal But Not PrivatePersonal But Not Private
Personal But Not Private
 
Off the Grid: Is anonymity possible?
Off the Grid: Is anonymity possible?Off the Grid: Is anonymity possible?
Off the Grid: Is anonymity possible?
 
Exploring the Future: Quantified Self and Learning
Exploring the Future: Quantified Self and LearningExploring the Future: Quantified Self and Learning
Exploring the Future: Quantified Self and Learning
 

More from Christian Heller

pie_beta
pie_betapie_beta
Was kommt nach der Privatheit?
Was kommt nach der Privatheit?Was kommt nach der Privatheit?
Was kommt nach der Privatheit?Christian Heller
 
Was da noch auf die Politik zugerollt kommt
Was da noch auf die Politik zugerollt kommtWas da noch auf die Politik zugerollt kommt
Was da noch auf die Politik zugerollt kommtChristian Heller
 
Das egoistische Mem
Das egoistische MemDas egoistische Mem
Das egoistische Mem
Christian Heller
 
Supercomputer Earth: The Future of Civilization (& Africa\'s part in it)
Supercomputer Earth: The Future of Civilization (& Africa\'s part in it)Supercomputer Earth: The Future of Civilization (& Africa\'s part in it)
Supercomputer Earth: The Future of Civilization (& Africa\'s part in it)
Christian Heller
 

More from Christian Heller (10)

pie_beta
pie_betapie_beta
pie_beta
 
roguelike_delta
roguelike_deltaroguelike_delta
roguelike_delta
 
Datenschutz Als Ideologie
Datenschutz Als IdeologieDatenschutz Als Ideologie
Datenschutz Als Ideologie
 
Datenschutz Als Ideologie
Datenschutz Als IdeologieDatenschutz Als Ideologie
Datenschutz Als Ideologie
 
Gestern Volk, morgen Netz
Gestern Volk, morgen NetzGestern Volk, morgen Netz
Gestern Volk, morgen Netz
 
Was kommt nach der Privatheit?
Was kommt nach der Privatheit?Was kommt nach der Privatheit?
Was kommt nach der Privatheit?
 
Mind Upload Cheat Codes
Mind Upload Cheat CodesMind Upload Cheat Codes
Mind Upload Cheat Codes
 
Was da noch auf die Politik zugerollt kommt
Was da noch auf die Politik zugerollt kommtWas da noch auf die Politik zugerollt kommt
Was da noch auf die Politik zugerollt kommt
 
Das egoistische Mem
Das egoistische MemDas egoistische Mem
Das egoistische Mem
 
Supercomputer Earth: The Future of Civilization (& Africa\'s part in it)
Supercomputer Earth: The Future of Civilization (& Africa\'s part in it)Supercomputer Earth: The Future of Civilization (& Africa\'s part in it)
Supercomputer Earth: The Future of Civilization (& Africa\'s part in it)
 

Recently uploaded

June Patch Tuesday
June Patch TuesdayJune Patch Tuesday
June Patch Tuesday
Ivanti
 
Digital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying AheadDigital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying Ahead
Wask
 
Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |
AstuteBusiness
 
9 CEO's who hit $100m ARR Share Their Top Growth Tactics Nathan Latka, Founde...
9 CEO's who hit $100m ARR Share Their Top Growth Tactics Nathan Latka, Founde...9 CEO's who hit $100m ARR Share Their Top Growth Tactics Nathan Latka, Founde...
9 CEO's who hit $100m ARR Share Their Top Growth Tactics Nathan Latka, Founde...
saastr
 
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
Alex Pruden
 
WeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation TechniquesWeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation Techniques
Postman
 
"Choosing proper type of scaling", Olena Syrota
"Choosing proper type of scaling", Olena Syrota"Choosing proper type of scaling", Olena Syrota
"Choosing proper type of scaling", Olena Syrota
Fwdays
 
The Microsoft 365 Migration Tutorial For Beginner.pptx
The Microsoft 365 Migration Tutorial For Beginner.pptxThe Microsoft 365 Migration Tutorial For Beginner.pptx
The Microsoft 365 Migration Tutorial For Beginner.pptx
operationspcvita
 
Y-Combinator seed pitch deck template PP
Y-Combinator seed pitch deck template PPY-Combinator seed pitch deck template PP
Y-Combinator seed pitch deck template PP
c5vrf27qcz
 
Dandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity serverDandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity server
Antonios Katsarakis
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
Pixlogix Infotech
 
Introduction of Cybersecurity with OSS at Code Europe 2024
Introduction of Cybersecurity with OSS  at Code Europe 2024Introduction of Cybersecurity with OSS  at Code Europe 2024
Introduction of Cybersecurity with OSS at Code Europe 2024
Hiroshi SHIBATA
 
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-EfficiencyFreshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
ScyllaDB
 
What is an RPA CoE? Session 1 – CoE Vision
What is an RPA CoE?  Session 1 – CoE VisionWhat is an RPA CoE?  Session 1 – CoE Vision
What is an RPA CoE? Session 1 – CoE Vision
DianaGray10
 
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectorsConnector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
DianaGray10
 
5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides
DanBrown980551
 
“How Axelera AI Uses Digital Compute-in-memory to Deliver Fast and Energy-eff...
“How Axelera AI Uses Digital Compute-in-memory to Deliver Fast and Energy-eff...“How Axelera AI Uses Digital Compute-in-memory to Deliver Fast and Energy-eff...
“How Axelera AI Uses Digital Compute-in-memory to Deliver Fast and Energy-eff...
Edge AI and Vision Alliance
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
panagenda
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
Zilliz
 
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
Jason Yip
 

Recently uploaded (20)

June Patch Tuesday
June Patch TuesdayJune Patch Tuesday
June Patch Tuesday
 
Digital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying AheadDigital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying Ahead
 
Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |
 
9 CEO's who hit $100m ARR Share Their Top Growth Tactics Nathan Latka, Founde...
9 CEO's who hit $100m ARR Share Their Top Growth Tactics Nathan Latka, Founde...9 CEO's who hit $100m ARR Share Their Top Growth Tactics Nathan Latka, Founde...
9 CEO's who hit $100m ARR Share Their Top Growth Tactics Nathan Latka, Founde...
 
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
 
WeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation TechniquesWeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation Techniques
 
"Choosing proper type of scaling", Olena Syrota
"Choosing proper type of scaling", Olena Syrota"Choosing proper type of scaling", Olena Syrota
"Choosing proper type of scaling", Olena Syrota
 
The Microsoft 365 Migration Tutorial For Beginner.pptx
The Microsoft 365 Migration Tutorial For Beginner.pptxThe Microsoft 365 Migration Tutorial For Beginner.pptx
The Microsoft 365 Migration Tutorial For Beginner.pptx
 
Y-Combinator seed pitch deck template PP
Y-Combinator seed pitch deck template PPY-Combinator seed pitch deck template PP
Y-Combinator seed pitch deck template PP
 
Dandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity serverDandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity server
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
 
Introduction of Cybersecurity with OSS at Code Europe 2024
Introduction of Cybersecurity with OSS  at Code Europe 2024Introduction of Cybersecurity with OSS  at Code Europe 2024
Introduction of Cybersecurity with OSS at Code Europe 2024
 
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-EfficiencyFreshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
 
What is an RPA CoE? Session 1 – CoE Vision
What is an RPA CoE?  Session 1 – CoE VisionWhat is an RPA CoE?  Session 1 – CoE Vision
What is an RPA CoE? Session 1 – CoE Vision
 
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectorsConnector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
 
5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides
 
“How Axelera AI Uses Digital Compute-in-memory to Deliver Fast and Energy-eff...
“How Axelera AI Uses Digital Compute-in-memory to Deliver Fast and Energy-eff...“How Axelera AI Uses Digital Compute-in-memory to Deliver Fast and Energy-eff...
“How Axelera AI Uses Digital Compute-in-memory to Deliver Fast and Energy-eff...
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
 
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
 

Embracing Postprivacy: Optimism towards a future where there is "Nothing to hide"

  • 1. Embracing Post-Privacy Optimism towards a future where there is “Nothing to hide” Christian Heller / http://www.plomlompom.de December 29, 2008 25. Chaos Communication Congress bcc / Berlin, Germany
  • 2. “cctv” by Subcircle (http://www.subcircle.co.uk/) http://flickr.com/photos/8323834@N07/500970140/ License: Creative Commons 2.0 Attribution / http://creativecommons.org/licenses/by/2.0/deed.en
  • 3. Overview pessimism: the end of privacy ● question: the meaning of privacy ● optimism: ideas for post-privacy dys... utopias ● reading recommendations ● discussion ●
  • 4. “Secure Beneath the Watchful Eyes” by Kenneth Lu (http://subjunctive.net/klog/) http://flickr.com/photos/toasty/2171185463/ License: Creative Commons 2.0 Attribution / http://creativecommons.org/licenses/by/2.0/deed.en
  • 5. Privacy is doomed the privacy-eating monster ● growingly well-fed, ubiquitous, attractive, intelligent – once information is in, it cannot be removed again – the privacy-defending army ● laws ineffective; technology insecure – pre-MySpace generation getting old, disappearing – an uneven battle for the army ● cannot be won ultimately – can only be lost; easily –
  • 6. “Privat” by Daniel Lobo (http://www.daquellamanera.org/) http://flickr.com/photos/daquellamanera/311128375/ License: Creative Commons 2.0 Attribution / http://creativecommons.org/licenses/by/2.0/deed.en
  • 7. What is the meaning of Privacy? self-determination ● make your own decisions about your life – freedom from interference by others – information control ● control what information flows from you to others – control what information flows to you from others – intimacy ● sharing of privacy – interpersonal trust, dependence –
  • 8. “Tanzliedchen” by Hugo Bürkner, 1854 http://commons.wikimedia.org/wiki/File:Bürkner_Tanzliedchen.jpg
  • 9. private vs. public house, backroom, forum, parliament, ● ● home PC, head/brain newspaper, Slashdot hidden visible ● ● secure from scrutiny accountable to social ● ● of social norms norms free individual? controlled conformist? ● ● woman man ● ● isolated interconnected ● ● closet homosexuality gay pride parade ● ●
  • 10. “new tshirts” by Creative Commons (http://creativecommons.org/) http://flickr.com/photos/creativecommons/2294317099/in/photostream/ License: Creative Commons 2.0 Attribution / http://creativecommons.org/licenses/by/2.0/deed.en
  • 11. Hiding vs. Sharing new information economy ● no zero-sum game – the more you give, the more you receive – more information better than less information ● market runs better with more information – information more valuable (to the owner) if shared – the Hive Mind ● growing with or without you – you gain more by participating than you lose –
  • 12. “IMG_3483.JPG” by Drab Makyo (http://www.drab-makyo.com/) http://flickr.com/photos/ranna/773419070/in/photostream/ License: Creative Commons 2.0 Attribution / http://creativecommons.org/licenses/by/2.0/deed.en
  • 13. Redefining Normality diversity instead of conformism ● difference is good! difference is information! – personalization instead of “Gleichschaltung” – new normality: no normality ● no escape from ever-increasing diversity – forces tolerance increase – the googling employer? ● no untarnished candidates; emptiness suspicious – originality cannot yet be outsourced, automatized –
  • 14. “Identity Thief as Paris” by David Goehring (http://flickr.com/photos/carbonnyc/) http://flickr.com/photos/carbonnyc/57280104/in/photostream/ License: Creative Commons 2.0 Attribution / http://creativecommons.org/licenses/by/2.0/deed.en
  • 15. Identity fluidity & volatility identity multiplicity ● one human can constitute many identities – one identity can be constituted by many humans – no static core identity anymore ● identity hyper-dynamism; 15 minutes of identity x – identity viruses may freely change their hosts – no more identity prison ● be what's fun to be, not what you supposedly “are” – the end of guilt –
  • 16. “Restaurant Surveillance Sign” by Richard Smith (http://flickr.com/people/smith/) http://flickr.com/photos/smith/55403952/ License: Creative Commons 2.0 Attribution / http://creativecommons.org/licenses/by/2.0/deed.en
  • 17. Surveillance vs. Sousveillance equiveillance ● watching, documenting actions of police & co. – document yourself; Hasan Elahi alibi – transparency of force ● no secret watching; open the camera feeds! – more powerful → more transparency – freedom through total transparency? ● worst case scenario, “better than alternative” – still room for secrets of any kind? –
  • 18. “WHAT ARE YOU LOOKING AT?” by nolifebeforecoffee (http://www.nolifebeforecoffee.blogspot.com/) http://flickr.com/photos/nolifebeforecoffee/124659356/ License: Creative Commons 2.0 Attribution / http://creativecommons.org/licenses/by/2.0/deed.en
  • 19. Control vs. Trust lack of information: less freedom ● fear, suspicion, mistrust – need for control, deterrence – many strict, general laws; strong punishments – – abundance of information: more freedom ● trust – less need for strict control or deterrence – few, precise laws; easy punishments –
  • 20. “Pyramid with the all-seeing eye on the back side of the US 1-Dollar bill” http://commons.wikimedia.org/wiki/File:Dollarnote_siegel_hq.jpg
  • 21. Reading recommendations “Privacy” in: “Stanford Encyclopedia of ● Philosophy”, 2006 http://plato.stanford.edu/entries/privacy/ – “The Value of Privacy”, Beate Rössler, 1995 ● “The Fall of Public Man”, Richard Sennett, 1977 ● “Facebook and the Social Dynamics of ● Privacy”, James Grimmelmann, 2008 http://works.bepress.com/james_grimmelmann/20/ – “The Transparent Society”, David Brin, 1998 ●