SlideShare a Scribd company logo
Internet of Living Things:
Decentralized Identities
and Delegated Agency & Authorities:
June 3, 2015
Dr. John Henry Clippinger
ID3/MIT
© John Clippinger
Surreal New Data Ecologies
New Immersive Data Ecology
Data are not about but for:
• seeing - recognizing - doing
• influencing - learning - improving
• controlling - feedback -correction
1. We are inside looking out - not
outside looking in
2. Data are like water - essential
nutrient of Digital Ecosystem
Observers and actors are now
digital devices
Devices like People
Need to be:
• authenticated
• verified,
• permitted
• governed
Some devices will become
autonomous bots - that learn,
explore, access, control, create
1. https://www.youtube.com/watch?v=uj0v1BgzUdc
internet device immersion
1. sensors – smart dust
2. controllers
3. new infrastructure
4. new data commons
5. autonomous bots &
cars
BIG DATA & THE NEW POWER
DYNAMICS: FEED THE MACHINE
1. ACCURATE PERSONAL PREDICTION
Identify on actual identities (biological) and
attributes - income, gender, preferences. Knows
you better than you know yourself
2. MACHINE LEARNING- gets better and better -
smarter & smarter - “lives off of and grows in
predictive powers with data
Digital Assets Are Source of
Sovereignty & Power
Who Controls My Assets?
• Vaults are digital
• Transfer is digital
• Control over military Assets
Whom can I Trust ?
Drones With License ID Beacons
How do you
Control
autonomous
Devices
That Express
Your agency
And their
Own?
Digital Assets & Currencies
New Immersive Data Asset Ecologies for:
1. Capturing,
2. Discovering
3. Certifying
4. Securing
5. Securitizing
6. Syndicating
Autonomous exchange of digital assets
NEW CLASS OF ASSET:
“NOUMENAL” – QUANTUM ?
1. BITCOIN IS A DEMAND BACKED ASSET
THAT CAN BE TRADED AS ANY OTHER
PHYSICAL ASSET
2. Non material asset whose value is determined
by the extent it is in demand
3. Other assets – could be valued in terms of their
level of use or entropy - Dispersion
LEDGER X – REGULATED BY THE
U.S.COMMODITIES TRADING
COMMISSION
the next generation of “phones”
Sentient Devices - “spy phone” vs. “my phone”
55
It sees you and your “friends”,
listens to you, monitors your health,
Reads Your Emotions
movements, interactions, activities,
and tirelessly
learns to know you better -
for yourself and others:
Google Now
Google Glasses
Amazon Phone
PrimeSense
Qualcomm Chips
Emotient
Affectiva
Internet of Watching Things
Gateways in the
home?
Who is Watching
Whom?
Who controls the
Data?
Who Monetizes the
Data?
What are the Terms
of Service
Agreements?
12
Warnings About Augmentation
50 Years Ago:
1. “The more the data
banks record about
each one of us, the less
we exist.”
2. “We shape our tools
and afterwards our
tools shape us.”
3. “Augmentation
leads to
amputation”
Marshall McLuhan
What might happen
when you “loose
your brain” to
Google’s Brain &
Google Now -
“augmentation =
amputation”
mbies ?
?
???
Many Expressions of Selves
1. Totemic
2. Emanations -
Spirits
3. Gods
4. Avatars
5. Personas -
Credentials
Traditional Solutions to Identity & Authority
: Hierarchical & Static
Hindu Caste System
Medieval Chain of Being
Patriarchal Lineages
Traditional Artifacts of
Identities & Access
GLOBAL REGULATION ATTEMPTING TO
ADAPT
• user control over
personal data
• consumer data bill of
rights
• mobility of data
• privacy by design
• transparency and
accountability
• self-determination
Who Are the New Authorities?
Who now tells you who
you are?
1. Facebook
2. Google
3. Governments
4. Banks
Data Regulations Based Upon
Obsolete Mindsets & Practices
1.Do not collect = do not see
2.Opt out = digital pariah
3.Notification and consent = denial
of service attack
4.Do not track = do not know-learn
5.Do not share = digital ghetto
6.Harms and Duties come with the
use of the specific use of the data
and chain of custody
Locus of Control of Identity
A. Individual –Atomic
Libertarian “Free” Fixed -
Person Identity –
transactional –
B. Group - Collective Fixed -
Imposed – Clan – State -
Religion -Corporate
C. Conjoint Identities
Mutually Constructed &
Evolving - Relational
A BC
The Atomic Self-Made Man
1. Nature – Social Darwinism
2. Private – Property rights
3. Competition - Transaction
4. Freedom & Free Markets
5. Winner Takes All
6. Individual Agency
7. Personal Code of Honor
8. Closed Loop of Self
Collective – Social Person
1. Nurture – Social Design –
Collective Identity &
Purpose
2. Group Over Individual
3. Top Down “Rational”
Planning - Rule
4. Variation = Discord
5. Compliance – Conformity
6. Closed Loop of Group
Mutually Defining Joint Identities
1. Nurture & Nature
2. Artisan – Relational- Sharing -
Economy
3. Participation – Sharing
4. Embedded – Not Separate
5. Decentralized – Emergent -
self-ordering – Peer to Peer
Economy
6. Open loop
7. Open Source
Identities & Norms for Devices
Security
Safety
Resilience
Recoverability
Interoperability
Governance
Trust
Transparency
Accountability
Digital Common Law
“and the rule adapts itself to the new
reasons which have been found for it,
and enters into a new career. The old
form receives a new content, and in time
even this form modifies itself to fit the
meaning which it has received
Oliver Wendell Holmes Jr., The Common Law - Early Forms of
Liability
Who or What Has the Authority to
Govern Identities ?
Does it have to be a
who?
Unresolved Governance Dilemmas
Who Guards the Guards ?
1. Can there be a method of
oversight that itself is not
subject to collusion and
corruption?
2. Can there be incorruptible
self -correcting and self-
attesting oversight?
Decentralized Autonomous Authorities (DAA)
1. Etherium
2. Factom
3. Eris
4. Counterparty
5. Smart Contracts
Windhover Principles
1. Self-Sovereign Identity and Control of Personal Data
Individuals and groups should have control of their digital personal identities and personal data
2. Transparent Enforcement and Effective Lite Governance
Enhancing / improving personal privacy while allowing for effective governance and accommodation of legitimate
auditing and enforcement needs
3. Insuring Trust and Privacy
An effective identity system continuously furthers trust, security, accountability and privacy
4. Open Source Collaboration
An inclusive open source methodology to build systems that embody these Principles
30
Decentralized Identities
on The Blockchain
1. New ID Cards with
multiple ways of asserting
and approving identities
and credentials
2. Who asserts and who
absorbs or underwrites
the risk
FROM HIERARCHY AND
STATIC TO DECENTRALIZED
AND DYNAMIC
PASSCARD
SHOCARD
MYCARD
Rule of law & Self-Executing
Contracts
Can there be rule of law
when Justice is blind and is
trustless and autonomous ?
Is Justice – Trustless?
Autonomous Governance Technologies ?
• Governance without governments
• Authorization without authorities
• Regulation without regulators
• Adjudication and sanctions without
lawyers and judges
• Polis without politicians
• Auditing without auditors
Legal Agency & Self Hood for Devices
and Digital Organizations
1. How much of our agency should we delegate to
autonomous devices – authorities?
2. How do we revoke the powers and agency of a
device?
3. When will it be beyond us to know?
4. Must There Be a “kill switch” ?
5. Who – What - Can Pull the Switch - When? “Just what
do you think you're doing, Dave? Dave, .”.
Questions
clipman@mit.edu
www.idcubed.org

More Related Content

What's hot

4. florence dupre new usagesprivacy legal framework fd
4. florence dupre new usagesprivacy legal framework fd4. florence dupre new usagesprivacy legal framework fd
4. florence dupre new usagesprivacy legal framework fdGlobalForum
 
Societal and ethical issues of digitization
Societal and ethical issues of digitizationSocietal and ethical issues of digitization
Societal and ethical issues of digitization
eraser Juan José Calderón
 
Ethical issues in Digital Identity
Ethical issues in Digital Identity Ethical issues in Digital Identity
Ethical issues in Digital Identity Digital-identity
 
Ethical issues and social issues related to systems upload
Ethical issues and social issues related to systems uploadEthical issues and social issues related to systems upload
Ethical issues and social issues related to systems upload
waiforchi Wagiteerhh
 
Ethics and Data
Ethics and DataEthics and Data
Ethics and Data
Catherine D'Ignazio
 

What's hot (6)

4. florence dupre new usagesprivacy legal framework fd
4. florence dupre new usagesprivacy legal framework fd4. florence dupre new usagesprivacy legal framework fd
4. florence dupre new usagesprivacy legal framework fd
 
Societal and ethical issues of digitization
Societal and ethical issues of digitizationSocietal and ethical issues of digitization
Societal and ethical issues of digitization
 
Ethical issues in Digital Identity
Ethical issues in Digital Identity Ethical issues in Digital Identity
Ethical issues in Digital Identity
 
Ethical issues and social issues related to systems upload
Ethical issues and social issues related to systems uploadEthical issues and social issues related to systems upload
Ethical issues and social issues related to systems upload
 
Ethics and Data
Ethics and DataEthics and Data
Ethics and Data
 
Internet of Things TCLG Oct 23 2014
Internet of Things TCLG Oct 23 2014Internet of Things TCLG Oct 23 2014
Internet of Things TCLG Oct 23 2014
 

Similar to John Clippinger - Internet of Living Things

Module 5 - Legislation - Online
Module 5 - Legislation - OnlineModule 5 - Legislation - Online
Module 5 - Legislation - Online
caniceconsulting
 
Lessons in privacy engineering from a nation scale identity system - connect id
Lessons in privacy engineering from a nation scale identity system - connect idLessons in privacy engineering from a nation scale identity system - connect id
Lessons in privacy engineering from a nation scale identity system - connect id
David Kelts, CIPT
 
Ethics and Big Data
Ethics and Big Data Ethics and Big Data
Ethical Dimension and understanding Ethical Foundation of IT
Ethical Dimension and understanding Ethical Foundation of ITEthical Dimension and understanding Ethical Foundation of IT
Ethical Dimension and understanding Ethical Foundation of IT
Dr. Rosemarie Sibbaluca-Guirre
 
Iot privacy vs convenience
Iot privacy vs  convenienceIot privacy vs  convenience
Iot privacy vs convenience
Don Lovett
 
Ethical And Social Issues in MIS - Management Information System
Ethical And Social Issues in MIS - Management Information SystemEthical And Social Issues in MIS - Management Information System
Ethical And Social Issues in MIS - Management Information System
FaHaD .H. NooR
 
Employee Monitoring DiscussionKindly discuss in 100 words wh
Employee Monitoring DiscussionKindly discuss in 100 words whEmployee Monitoring DiscussionKindly discuss in 100 words wh
Employee Monitoring DiscussionKindly discuss in 100 words wh
TanaMaeskm
 
Malcolm Crompton I I S Frocomm Web 2 O In Govt 24 June 2009
Malcolm  Crompton  I I S  Frocomm  Web 2 O In  Govt  24  June 2009Malcolm  Crompton  I I S  Frocomm  Web 2 O In  Govt  24  June 2009
Malcolm Crompton I I S Frocomm Web 2 O In Govt 24 June 2009
Frocomm Australia
 
IoT & Big Data - A privacy-oriented view of the future
IoT & Big Data - A privacy-oriented view of the futureIoT & Big Data - A privacy-oriented view of the future
IoT & Big Data - A privacy-oriented view of the future
Facundo Mauricio
 
A Case for Expectation Informed Design - Full
A Case for Expectation Informed Design - FullA Case for Expectation Informed Design - Full
A Case for Expectation Informed Design - Full
gloriakt
 
BYOD: Beating IT's Kobayashi Maru
BYOD: Beating IT's Kobayashi MaruBYOD: Beating IT's Kobayashi Maru
BYOD: Beating IT's Kobayashi Maru
Michele Chubirka
 
E commerce
E commerce E commerce
E commerce
DrSelvamohanaK
 
A Case for Expectation Informed Design
A Case for Expectation Informed DesignA Case for Expectation Informed Design
A Case for Expectation Informed Design
gloriakt
 
Smart Data Module 5 d drive_legislation
Smart Data Module 5 d drive_legislationSmart Data Module 5 d drive_legislation
Smart Data Module 5 d drive_legislation
caniceconsulting
 
Privacy & the Internet: An Overview of Key Issues
Privacy & the Internet: An Overview of Key IssuesPrivacy & the Internet: An Overview of Key Issues
Privacy & the Internet: An Overview of Key Issues
Adam Thierer
 
Forging Self-Sovereign Identity in the Age of the Blockchain - Christopher Al...
Forging Self-Sovereign Identity in the Age of the Blockchain - Christopher Al...Forging Self-Sovereign Identity in the Age of the Blockchain - Christopher Al...
Forging Self-Sovereign Identity in the Age of the Blockchain - Christopher Al...
Christopher Allen
 
Big Data and the Future of Money 2014
Big Data and the Future of Money 2014Big Data and the Future of Money 2014
Big Data and the Future of Money 2014
Daniel Austin
 
3 - Social Media and Enterprise
3 - Social Media and Enterprise3 - Social Media and Enterprise
3 - Social Media and Enterprise
Raymond Gao
 
Consumers' and Citizens' Privacy
Consumers' and Citizens' Privacy  Consumers' and Citizens' Privacy
Consumers' and Citizens' Privacy
Carolina Rossini
 
Malcolm Crompton, IIS Partners Irish Future Internet Forum - Socioeconomics
Malcolm Crompton, IIS Partners Irish Future Internet Forum - SocioeconomicsMalcolm Crompton, IIS Partners Irish Future Internet Forum - Socioeconomics
Malcolm Crompton, IIS Partners Irish Future Internet Forum - Socioeconomics
Irish Future Internet Forum
 

Similar to John Clippinger - Internet of Living Things (20)

Module 5 - Legislation - Online
Module 5 - Legislation - OnlineModule 5 - Legislation - Online
Module 5 - Legislation - Online
 
Lessons in privacy engineering from a nation scale identity system - connect id
Lessons in privacy engineering from a nation scale identity system - connect idLessons in privacy engineering from a nation scale identity system - connect id
Lessons in privacy engineering from a nation scale identity system - connect id
 
Ethics and Big Data
Ethics and Big Data Ethics and Big Data
Ethics and Big Data
 
Ethical Dimension and understanding Ethical Foundation of IT
Ethical Dimension and understanding Ethical Foundation of ITEthical Dimension and understanding Ethical Foundation of IT
Ethical Dimension and understanding Ethical Foundation of IT
 
Iot privacy vs convenience
Iot privacy vs  convenienceIot privacy vs  convenience
Iot privacy vs convenience
 
Ethical And Social Issues in MIS - Management Information System
Ethical And Social Issues in MIS - Management Information SystemEthical And Social Issues in MIS - Management Information System
Ethical And Social Issues in MIS - Management Information System
 
Employee Monitoring DiscussionKindly discuss in 100 words wh
Employee Monitoring DiscussionKindly discuss in 100 words whEmployee Monitoring DiscussionKindly discuss in 100 words wh
Employee Monitoring DiscussionKindly discuss in 100 words wh
 
Malcolm Crompton I I S Frocomm Web 2 O In Govt 24 June 2009
Malcolm  Crompton  I I S  Frocomm  Web 2 O In  Govt  24  June 2009Malcolm  Crompton  I I S  Frocomm  Web 2 O In  Govt  24  June 2009
Malcolm Crompton I I S Frocomm Web 2 O In Govt 24 June 2009
 
IoT & Big Data - A privacy-oriented view of the future
IoT & Big Data - A privacy-oriented view of the futureIoT & Big Data - A privacy-oriented view of the future
IoT & Big Data - A privacy-oriented view of the future
 
A Case for Expectation Informed Design - Full
A Case for Expectation Informed Design - FullA Case for Expectation Informed Design - Full
A Case for Expectation Informed Design - Full
 
BYOD: Beating IT's Kobayashi Maru
BYOD: Beating IT's Kobayashi MaruBYOD: Beating IT's Kobayashi Maru
BYOD: Beating IT's Kobayashi Maru
 
E commerce
E commerce E commerce
E commerce
 
A Case for Expectation Informed Design
A Case for Expectation Informed DesignA Case for Expectation Informed Design
A Case for Expectation Informed Design
 
Smart Data Module 5 d drive_legislation
Smart Data Module 5 d drive_legislationSmart Data Module 5 d drive_legislation
Smart Data Module 5 d drive_legislation
 
Privacy & the Internet: An Overview of Key Issues
Privacy & the Internet: An Overview of Key IssuesPrivacy & the Internet: An Overview of Key Issues
Privacy & the Internet: An Overview of Key Issues
 
Forging Self-Sovereign Identity in the Age of the Blockchain - Christopher Al...
Forging Self-Sovereign Identity in the Age of the Blockchain - Christopher Al...Forging Self-Sovereign Identity in the Age of the Blockchain - Christopher Al...
Forging Self-Sovereign Identity in the Age of the Blockchain - Christopher Al...
 
Big Data and the Future of Money 2014
Big Data and the Future of Money 2014Big Data and the Future of Money 2014
Big Data and the Future of Money 2014
 
3 - Social Media and Enterprise
3 - Social Media and Enterprise3 - Social Media and Enterprise
3 - Social Media and Enterprise
 
Consumers' and Citizens' Privacy
Consumers' and Citizens' Privacy  Consumers' and Citizens' Privacy
Consumers' and Citizens' Privacy
 
Malcolm Crompton, IIS Partners Irish Future Internet Forum - Socioeconomics
Malcolm Crompton, IIS Partners Irish Future Internet Forum - SocioeconomicsMalcolm Crompton, IIS Partners Irish Future Internet Forum - Socioeconomics
Malcolm Crompton, IIS Partners Irish Future Internet Forum - Socioeconomics
 

More from MassTLC

MassIntelligence 2018: Intelligent Connected Cities
MassIntelligence 2018: Intelligent Connected CitiesMassIntelligence 2018: Intelligent Connected Cities
MassIntelligence 2018: Intelligent Connected Cities
MassTLC
 
MassIntelligence 2018: How to Rapidly Prototype an AI Solution
MassIntelligence 2018: How to Rapidly Prototype an AI SolutionMassIntelligence 2018: How to Rapidly Prototype an AI Solution
MassIntelligence 2018: How to Rapidly Prototype an AI Solution
MassTLC
 
MassIntelligence 2018: Connecting the Nation's Top Fishing Port
MassIntelligence 2018: Connecting the Nation's Top Fishing PortMassIntelligence 2018: Connecting the Nation's Top Fishing Port
MassIntelligence 2018: Connecting the Nation's Top Fishing Port
MassTLC
 
MassIntelligence 2018: Transportation & Mobility, Alex Wyglinski
MassIntelligence 2018: Transportation & Mobility, Alex WyglinskiMassIntelligence 2018: Transportation & Mobility, Alex Wyglinski
MassIntelligence 2018: Transportation & Mobility, Alex Wyglinski
MassTLC
 
Andres Corrada-Emmanuel - Ground Truth Problems in Business
Andres Corrada-Emmanuel - Ground Truth Problems in BusinessAndres Corrada-Emmanuel - Ground Truth Problems in Business
Andres Corrada-Emmanuel - Ground Truth Problems in Business
MassTLC
 
MassTLC product launch campaign strategies, Jason Baudreau, NetBrain
MassTLC product launch campaign strategies, Jason Baudreau, NetBrainMassTLC product launch campaign strategies, Jason Baudreau, NetBrain
MassTLC product launch campaign strategies, Jason Baudreau, NetBrain
MassTLC
 
MassTLC product launch campaign strategies, ben austin, Carbon Black
MassTLC product launch campaign strategies, ben austin, Carbon BlackMassTLC product launch campaign strategies, ben austin, Carbon Black
MassTLC product launch campaign strategies, ben austin, Carbon Black
MassTLC
 
Forget about A.G.I. Let's Build Useable Ai Tools!
Forget about A.G.I. Let's Build Useable Ai Tools!Forget about A.G.I. Let's Build Useable Ai Tools!
Forget about A.G.I. Let's Build Useable Ai Tools!
MassTLC
 
Cloud Edge Computing: Beyond the Data Center
Cloud Edge Computing: Beyond the Data CenterCloud Edge Computing: Beyond the Data Center
Cloud Edge Computing: Beyond the Data Center
MassTLC
 
Old Company - New Technology, Elixir @ the MBTA
Old Company - New Technology, Elixir @ the MBTAOld Company - New Technology, Elixir @ the MBTA
Old Company - New Technology, Elixir @ the MBTA
MassTLC
 
Lisa seacat deluca io t robotics presentation
Lisa seacat deluca io t robotics presentationLisa seacat deluca io t robotics presentation
Lisa seacat deluca io t robotics presentation
MassTLC
 
Smart cities thinking outside the box
Smart cities thinking outside the boxSmart cities thinking outside the box
Smart cities thinking outside the box
MassTLC
 
Lily lim data privacy ownership and ethics
Lily lim data privacy ownership and ethicsLily lim data privacy ownership and ethics
Lily lim data privacy ownership and ethics
MassTLC
 
Abbas bagasra smart ag
Abbas bagasra smart agAbbas bagasra smart ag
Abbas bagasra smart ag
MassTLC
 
Ben goodman cybersecurity in the iiot
Ben goodman cybersecurity in the iiotBen goodman cybersecurity in the iiot
Ben goodman cybersecurity in the iiot
MassTLC
 
MassTLC Opening Slides and Simulation Session
MassTLC Opening Slides and Simulation SessionMassTLC Opening Slides and Simulation Session
MassTLC Opening Slides and Simulation Session
MassTLC
 
Tom Hopcroft: State of the Tech Economy Key Findings
Tom Hopcroft: State of the Tech Economy Key FindingsTom Hopcroft: State of the Tech Economy Key Findings
Tom Hopcroft: State of the Tech Economy Key Findings
MassTLC
 
Michael Goodman: The State of the State Economy
Michael Goodman: The State of the State EconomyMichael Goodman: The State of the State Economy
Michael Goodman: The State of the State Economy
MassTLC
 
MassTLC summit_amacleod_predictiveanalytics
MassTLC summit_amacleod_predictiveanalyticsMassTLC summit_amacleod_predictiveanalytics
MassTLC summit_amacleod_predictiveanalytics
MassTLC
 
Brainshark mass tlc brand revitalizaion_final for distribution
Brainshark mass tlc brand revitalizaion_final for distributionBrainshark mass tlc brand revitalizaion_final for distribution
Brainshark mass tlc brand revitalizaion_final for distribution
MassTLC
 

More from MassTLC (20)

MassIntelligence 2018: Intelligent Connected Cities
MassIntelligence 2018: Intelligent Connected CitiesMassIntelligence 2018: Intelligent Connected Cities
MassIntelligence 2018: Intelligent Connected Cities
 
MassIntelligence 2018: How to Rapidly Prototype an AI Solution
MassIntelligence 2018: How to Rapidly Prototype an AI SolutionMassIntelligence 2018: How to Rapidly Prototype an AI Solution
MassIntelligence 2018: How to Rapidly Prototype an AI Solution
 
MassIntelligence 2018: Connecting the Nation's Top Fishing Port
MassIntelligence 2018: Connecting the Nation's Top Fishing PortMassIntelligence 2018: Connecting the Nation's Top Fishing Port
MassIntelligence 2018: Connecting the Nation's Top Fishing Port
 
MassIntelligence 2018: Transportation & Mobility, Alex Wyglinski
MassIntelligence 2018: Transportation & Mobility, Alex WyglinskiMassIntelligence 2018: Transportation & Mobility, Alex Wyglinski
MassIntelligence 2018: Transportation & Mobility, Alex Wyglinski
 
Andres Corrada-Emmanuel - Ground Truth Problems in Business
Andres Corrada-Emmanuel - Ground Truth Problems in BusinessAndres Corrada-Emmanuel - Ground Truth Problems in Business
Andres Corrada-Emmanuel - Ground Truth Problems in Business
 
MassTLC product launch campaign strategies, Jason Baudreau, NetBrain
MassTLC product launch campaign strategies, Jason Baudreau, NetBrainMassTLC product launch campaign strategies, Jason Baudreau, NetBrain
MassTLC product launch campaign strategies, Jason Baudreau, NetBrain
 
MassTLC product launch campaign strategies, ben austin, Carbon Black
MassTLC product launch campaign strategies, ben austin, Carbon BlackMassTLC product launch campaign strategies, ben austin, Carbon Black
MassTLC product launch campaign strategies, ben austin, Carbon Black
 
Forget about A.G.I. Let's Build Useable Ai Tools!
Forget about A.G.I. Let's Build Useable Ai Tools!Forget about A.G.I. Let's Build Useable Ai Tools!
Forget about A.G.I. Let's Build Useable Ai Tools!
 
Cloud Edge Computing: Beyond the Data Center
Cloud Edge Computing: Beyond the Data CenterCloud Edge Computing: Beyond the Data Center
Cloud Edge Computing: Beyond the Data Center
 
Old Company - New Technology, Elixir @ the MBTA
Old Company - New Technology, Elixir @ the MBTAOld Company - New Technology, Elixir @ the MBTA
Old Company - New Technology, Elixir @ the MBTA
 
Lisa seacat deluca io t robotics presentation
Lisa seacat deluca io t robotics presentationLisa seacat deluca io t robotics presentation
Lisa seacat deluca io t robotics presentation
 
Smart cities thinking outside the box
Smart cities thinking outside the boxSmart cities thinking outside the box
Smart cities thinking outside the box
 
Lily lim data privacy ownership and ethics
Lily lim data privacy ownership and ethicsLily lim data privacy ownership and ethics
Lily lim data privacy ownership and ethics
 
Abbas bagasra smart ag
Abbas bagasra smart agAbbas bagasra smart ag
Abbas bagasra smart ag
 
Ben goodman cybersecurity in the iiot
Ben goodman cybersecurity in the iiotBen goodman cybersecurity in the iiot
Ben goodman cybersecurity in the iiot
 
MassTLC Opening Slides and Simulation Session
MassTLC Opening Slides and Simulation SessionMassTLC Opening Slides and Simulation Session
MassTLC Opening Slides and Simulation Session
 
Tom Hopcroft: State of the Tech Economy Key Findings
Tom Hopcroft: State of the Tech Economy Key FindingsTom Hopcroft: State of the Tech Economy Key Findings
Tom Hopcroft: State of the Tech Economy Key Findings
 
Michael Goodman: The State of the State Economy
Michael Goodman: The State of the State EconomyMichael Goodman: The State of the State Economy
Michael Goodman: The State of the State Economy
 
MassTLC summit_amacleod_predictiveanalytics
MassTLC summit_amacleod_predictiveanalyticsMassTLC summit_amacleod_predictiveanalytics
MassTLC summit_amacleod_predictiveanalytics
 
Brainshark mass tlc brand revitalizaion_final for distribution
Brainshark mass tlc brand revitalizaion_final for distributionBrainshark mass tlc brand revitalizaion_final for distribution
Brainshark mass tlc brand revitalizaion_final for distribution
 

Recently uploaded

FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
James Anderson
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
Ralf Eggert
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
UiPath Community Day Dubai: AI at Work..
UiPath Community Day Dubai: AI at Work..UiPath Community Day Dubai: AI at Work..
UiPath Community Day Dubai: AI at Work..
UiPathCommunity
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Nexer Digital
 
Assure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyesAssure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
sonjaschweigert1
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 

Recently uploaded (20)

FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
UiPath Community Day Dubai: AI at Work..
UiPath Community Day Dubai: AI at Work..UiPath Community Day Dubai: AI at Work..
UiPath Community Day Dubai: AI at Work..
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
 
Assure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyesAssure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyes
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 

John Clippinger - Internet of Living Things

  • 1. Internet of Living Things: Decentralized Identities and Delegated Agency & Authorities: June 3, 2015 Dr. John Henry Clippinger ID3/MIT © John Clippinger
  • 2. Surreal New Data Ecologies
  • 3. New Immersive Data Ecology Data are not about but for: • seeing - recognizing - doing • influencing - learning - improving • controlling - feedback -correction 1. We are inside looking out - not outside looking in 2. Data are like water - essential nutrient of Digital Ecosystem Observers and actors are now digital devices
  • 4. Devices like People Need to be: • authenticated • verified, • permitted • governed Some devices will become autonomous bots - that learn, explore, access, control, create 1. https://www.youtube.com/watch?v=uj0v1BgzUdc
  • 5. internet device immersion 1. sensors – smart dust 2. controllers 3. new infrastructure 4. new data commons 5. autonomous bots & cars
  • 6. BIG DATA & THE NEW POWER DYNAMICS: FEED THE MACHINE 1. ACCURATE PERSONAL PREDICTION Identify on actual identities (biological) and attributes - income, gender, preferences. Knows you better than you know yourself 2. MACHINE LEARNING- gets better and better - smarter & smarter - “lives off of and grows in predictive powers with data
  • 7. Digital Assets Are Source of Sovereignty & Power Who Controls My Assets? • Vaults are digital • Transfer is digital • Control over military Assets Whom can I Trust ?
  • 8. Drones With License ID Beacons How do you Control autonomous Devices That Express Your agency And their Own?
  • 9. Digital Assets & Currencies New Immersive Data Asset Ecologies for: 1. Capturing, 2. Discovering 3. Certifying 4. Securing 5. Securitizing 6. Syndicating Autonomous exchange of digital assets
  • 10. NEW CLASS OF ASSET: “NOUMENAL” – QUANTUM ? 1. BITCOIN IS A DEMAND BACKED ASSET THAT CAN BE TRADED AS ANY OTHER PHYSICAL ASSET 2. Non material asset whose value is determined by the extent it is in demand 3. Other assets – could be valued in terms of their level of use or entropy - Dispersion LEDGER X – REGULATED BY THE U.S.COMMODITIES TRADING COMMISSION
  • 11. the next generation of “phones” Sentient Devices - “spy phone” vs. “my phone” 55 It sees you and your “friends”, listens to you, monitors your health, Reads Your Emotions movements, interactions, activities, and tirelessly learns to know you better - for yourself and others: Google Now Google Glasses Amazon Phone PrimeSense Qualcomm Chips Emotient Affectiva
  • 12. Internet of Watching Things Gateways in the home? Who is Watching Whom? Who controls the Data? Who Monetizes the Data? What are the Terms of Service Agreements? 12
  • 13. Warnings About Augmentation 50 Years Ago: 1. “The more the data banks record about each one of us, the less we exist.” 2. “We shape our tools and afterwards our tools shape us.” 3. “Augmentation leads to amputation” Marshall McLuhan
  • 14. What might happen when you “loose your brain” to Google’s Brain & Google Now - “augmentation = amputation” mbies ? ? ???
  • 15. Many Expressions of Selves 1. Totemic 2. Emanations - Spirits 3. Gods 4. Avatars 5. Personas - Credentials
  • 16. Traditional Solutions to Identity & Authority : Hierarchical & Static Hindu Caste System Medieval Chain of Being Patriarchal Lineages
  • 18. GLOBAL REGULATION ATTEMPTING TO ADAPT • user control over personal data • consumer data bill of rights • mobility of data • privacy by design • transparency and accountability • self-determination
  • 19. Who Are the New Authorities? Who now tells you who you are? 1. Facebook 2. Google 3. Governments 4. Banks
  • 20. Data Regulations Based Upon Obsolete Mindsets & Practices 1.Do not collect = do not see 2.Opt out = digital pariah 3.Notification and consent = denial of service attack 4.Do not track = do not know-learn 5.Do not share = digital ghetto 6.Harms and Duties come with the use of the specific use of the data and chain of custody
  • 21. Locus of Control of Identity A. Individual –Atomic Libertarian “Free” Fixed - Person Identity – transactional – B. Group - Collective Fixed - Imposed – Clan – State - Religion -Corporate C. Conjoint Identities Mutually Constructed & Evolving - Relational A BC
  • 22. The Atomic Self-Made Man 1. Nature – Social Darwinism 2. Private – Property rights 3. Competition - Transaction 4. Freedom & Free Markets 5. Winner Takes All 6. Individual Agency 7. Personal Code of Honor 8. Closed Loop of Self
  • 23. Collective – Social Person 1. Nurture – Social Design – Collective Identity & Purpose 2. Group Over Individual 3. Top Down “Rational” Planning - Rule 4. Variation = Discord 5. Compliance – Conformity 6. Closed Loop of Group
  • 24. Mutually Defining Joint Identities 1. Nurture & Nature 2. Artisan – Relational- Sharing - Economy 3. Participation – Sharing 4. Embedded – Not Separate 5. Decentralized – Emergent - self-ordering – Peer to Peer Economy 6. Open loop 7. Open Source
  • 25. Identities & Norms for Devices Security Safety Resilience Recoverability Interoperability Governance Trust Transparency Accountability
  • 26. Digital Common Law “and the rule adapts itself to the new reasons which have been found for it, and enters into a new career. The old form receives a new content, and in time even this form modifies itself to fit the meaning which it has received Oliver Wendell Holmes Jr., The Common Law - Early Forms of Liability
  • 27. Who or What Has the Authority to Govern Identities ? Does it have to be a who?
  • 28. Unresolved Governance Dilemmas Who Guards the Guards ? 1. Can there be a method of oversight that itself is not subject to collusion and corruption? 2. Can there be incorruptible self -correcting and self- attesting oversight?
  • 29. Decentralized Autonomous Authorities (DAA) 1. Etherium 2. Factom 3. Eris 4. Counterparty 5. Smart Contracts
  • 30. Windhover Principles 1. Self-Sovereign Identity and Control of Personal Data Individuals and groups should have control of their digital personal identities and personal data 2. Transparent Enforcement and Effective Lite Governance Enhancing / improving personal privacy while allowing for effective governance and accommodation of legitimate auditing and enforcement needs 3. Insuring Trust and Privacy An effective identity system continuously furthers trust, security, accountability and privacy 4. Open Source Collaboration An inclusive open source methodology to build systems that embody these Principles 30
  • 31. Decentralized Identities on The Blockchain 1. New ID Cards with multiple ways of asserting and approving identities and credentials 2. Who asserts and who absorbs or underwrites the risk FROM HIERARCHY AND STATIC TO DECENTRALIZED AND DYNAMIC PASSCARD SHOCARD MYCARD
  • 32. Rule of law & Self-Executing Contracts Can there be rule of law when Justice is blind and is trustless and autonomous ? Is Justice – Trustless?
  • 33. Autonomous Governance Technologies ? • Governance without governments • Authorization without authorities • Regulation without regulators • Adjudication and sanctions without lawyers and judges • Polis without politicians • Auditing without auditors
  • 34. Legal Agency & Self Hood for Devices and Digital Organizations 1. How much of our agency should we delegate to autonomous devices – authorities? 2. How do we revoke the powers and agency of a device? 3. When will it be beyond us to know? 4. Must There Be a “kill switch” ? 5. Who – What - Can Pull the Switch - When? “Just what do you think you're doing, Dave? Dave, .”.

Editor's Notes

  1. Opabinia