SlideShare a Scribd company logo
1 of 22
Download to read offline
a very brief history of privacy
in our data deluged world,

Sam Lessin @ drop.io
Voice Over (1/2):
1. hi, my name is sam lessin, and I am going to be speaking a bit about digital privacy - something i spend most of my days working
on in one way or another

2. for starters, what is privacy. people pre-pend the word in phrases like private thoughts, a private journal, private bedroom
exploits, or private plans to take over the world - but there are precious few good definitions of what the term actually means

3. The best way to describe privacy is as the limited transmission of information over time and/or between people. It is about moving
information from a trusted point A to a trusted point B without exposure.

4. why do we care about privacy? isn't it dead? -- we care because in all sorts of scenarios the value of information is inversely
related to how public it is. from corporate secrets, to gambling and the stock market, to even personal intimacy

5. fundamentally you are only as private as your weakest communicative link. the model for a private exchange is a one to one
discussion in the middle of nowhere. Output directly to Input. But the reality is that as we have made communication more efficient
we tend to rely on more intermediaries to communicate.

6. as with many things, one of the most interesting testing grounds for privacy is WAR. during war private information is extremely
valuable to all sides.... and you frequently have to use untrustworthy links in the communicative chain. The solution that evolved
quickly was 'security'

7. all security is breakable - it functions by changing the cost structure of information. You pay a cost to secure
your information(which is less expensive than the info transmitted is valuable)... the key is to make it expensive enough for the
enemy to break your security that it isn't worth it.

8. the reality is that outside of war, until very very recently most information was harmless/ mostly valueless on a mass scale- so
people were not very concerned about privacy. There simply was little to 'steal' from you information wise, so you didn't have to incur
much cost to protect your information.

9. three little familiar concepts, however, changed all that. the cost of and therefore volume of communication, information storage,
and compute power have changed the equation by making useless data useful and by making privacy measures much more expensive
on a relative basis.

10. these cost changes have drastically changed the amount of communication, the amount of communication that is saved, and the
ability to access that information. this is a HUGE deal
Voice Over (2/2):
11. people have been freaking out about this for a long time. Max Weber wrote about all these concepts and their impact
with regards to 'bureaucracy' and people have been updating the concepts all the way through Foucault's Power-Knowledge
in quot;Discipline and Punishquot;

12. interestingly, all this information and organization did allow for a new mechanism of non-secure 'privacy'. Simply trust
your privacy to them and the law. it is a felony to open mail

13. this worked relatively well, because even up through very recent history, little information was valuable and few people
were in a position to break trust.

14. Internet changes all that - all of a sudden lots of information was valuable at scale, and lots of people could touch it

15. institutions break down - laws don't work if you can't enforce them -- and with data flowing beyond boards and no
transparency into who has what = no enforcement

16. go military style? doesn't work - because security only works on cost differentials. Security isn't getting cheaper
faster than breaking security, information is getting more valuable for the bad guys and the good guys.

17. in fact, we are worse off than military information - value of which is very perishable - our data lasts forever - so if you
can't break today break tomorrow

18. this really really sucks for your kids - because 'public key' security is going to crumble with quantum computing - so
traditional security will melt.

19. so what should we do - future of privacy is about unwinding - decentralize, de-tag, destroy... you are also going to end
up with less 'privacy' - which is good, because you can sell your privacy for great stuff online

20. recap -
WTF is privacy?
the limited transmission of info…




                  between people
   over time
So What?
Only as private as your least
trusted link…


                             IO

                          I(OI)O


                   I(OI)(OI)(OI)(OI)O


           I(OI)(OI)(OI)(OI)(OI)(OI)(OI)(OI)O



     I(OI)(OI)(OI)(OI) (OI)(OI)(OI)(OI)(OI)(OI)(OI)(OI)O
OH CRAP, better use a code
Vi(1) – Cs(1)         Vi(2) – Cs(2)
                  >




          Security is based on
   Relative Values and Relative Costs
Ye’ old info = “mostly harmless”
Communication
Storage
Compute
All of Human History
volume



                                                   Network

                                                       Internet      Cuil
                                               Computer
                                                   Telephone       Googlie
                                               Morse code
                                                               Dog Pile
                                 Modern Bureaucracy
                                                             LOC
                                      type writer
                                                       Widner
                                    Calculus
                         Printing Press          Dewey Decimal
         Counting   Writing                Vatican
   Language
                                 Crazy Monks
                    Alexandria

                            ~years
Freaking out, moderate old school
OH CRAP (new school peacetime)
OH CRAP (1980s peacetime)
…then the intertubes

 value of your crap




                           all your crap is
                           valuable*!




                      ~years
Institutions can’t save you



    I(OI)(OI)(OI)(OI)(OI)(OI)(OI)(OI)O




                  ?
go military style? = fail




   Vi(1) – Cs(1)       Vi(2) – Cs(2)
                   >
Suckers
really sucks for your kids…
Future History: Back to Black



        1. decentralize

        2. de-tag

        3. destroy

        4. (give up)
DON’T PANIC, just be conscious

1. Privacy = limited transmission of info

2. Security = method for maintaining
privacy across un-trusted IO

3. Digital makes worthless crap valuable

4. Chill out, tread lightly


             http: //drop.io/swl
               twitter @lessin

More Related Content

Similar to New York September 2008 Ignite, Sam Lessin on Privacy

HES2011 - Raould Chiesa - Hackers Cybercriminals from Wargames to the Undergr...
HES2011 - Raould Chiesa - Hackers Cybercriminals from Wargames to the Undergr...HES2011 - Raould Chiesa - Hackers Cybercriminals from Wargames to the Undergr...
HES2011 - Raould Chiesa - Hackers Cybercriminals from Wargames to the Undergr...Hackito Ergo Sum
 
Infosecurity2013nl 131103184054-phpapp01
Infosecurity2013nl 131103184054-phpapp01Infosecurity2013nl 131103184054-phpapp01
Infosecurity2013nl 131103184054-phpapp01Kenneth Carnesi, JD
 
Privacy is an Illusion and you’re all losers! - Cryptocow - Infosecurity 2013
Privacy is an Illusion and you’re all losers! - Cryptocow - Infosecurity 2013Privacy is an Illusion and you’re all losers! - Cryptocow - Infosecurity 2013
Privacy is an Illusion and you’re all losers! - Cryptocow - Infosecurity 2013Cain Ransbottyn
 
OSDC 2014: Michael Renner - Secure encryption in a wiretapped future
OSDC 2014: Michael Renner - Secure encryption in a wiretapped futureOSDC 2014: Michael Renner - Secure encryption in a wiretapped future
OSDC 2014: Michael Renner - Secure encryption in a wiretapped futureNETWAYS
 
OSDC 2014: Michael Renner - Secure encryption in a wiretapped future
OSDC 2014: Michael Renner - Secure encryption in a wiretapped futureOSDC 2014: Michael Renner - Secure encryption in a wiretapped future
OSDC 2014: Michael Renner - Secure encryption in a wiretapped futureNETWAYS
 
Secure encryption in a wiretapped future
Secure encryption in a wiretapped futureSecure encryption in a wiretapped future
Secure encryption in a wiretapped futureMichael Renner
 
Next Night 5 Rob van Kranenburg
Next Night 5 Rob van KranenburgNext Night 5 Rob van Kranenburg
Next Night 5 Rob van Kranenburggenerationnext
 
How Spies Communicate – Mocomi.com
How Spies Communicate – Mocomi.comHow Spies Communicate – Mocomi.com
How Spies Communicate – Mocomi.comMocomi Kids
 
2600 v11 n2 (summer 1994)
2600 v11 n2 (summer 1994)2600 v11 n2 (summer 1994)
2600 v11 n2 (summer 1994)Felipe Prado
 
2600 v20 n3 (autumn 2003)
2600 v20 n3 (autumn 2003)2600 v20 n3 (autumn 2003)
2600 v20 n3 (autumn 2003)Felipe Prado
 
Raoul chiesa - Auditing the hacker mind - da wargames a underground economy
Raoul chiesa - Auditing the hacker mind - da wargames a underground economyRaoul chiesa - Auditing the hacker mind - da wargames a underground economy
Raoul chiesa - Auditing the hacker mind - da wargames a underground economyCRS4 Research Center in Sardinia
 
1 The Notion Information And Basic Types Of Information
1 The Notion Information And Basic Types Of Information1 The Notion Information And Basic Types Of Information
1 The Notion Information And Basic Types Of InformationAna Meskovska
 
2600 v16 n1 (spring 1999)
2600 v16 n1 (spring 1999)2600 v16 n1 (spring 1999)
2600 v16 n1 (spring 1999)Felipe Prado
 
Stories, Myth, and the Humane Network
Stories, Myth, and the Humane NetworkStories, Myth, and the Humane Network
Stories, Myth, and the Humane NetworkPeter Wang
 
Simon Harrison RWE - Chain of Things 010616 final
Simon Harrison RWE - Chain of Things 010616 finalSimon Harrison RWE - Chain of Things 010616 final
Simon Harrison RWE - Chain of Things 010616 finalSimon Harrison
 
2600 v08 n2 (summer 1991)
2600 v08 n2 (summer 1991)2600 v08 n2 (summer 1991)
2600 v08 n2 (summer 1991)Felipe Prado
 
Internet safety slides
Internet safety slidesInternet safety slides
Internet safety slidesEric Castro
 

Similar to New York September 2008 Ignite, Sam Lessin on Privacy (20)

HES2011 - Raould Chiesa - Hackers Cybercriminals from Wargames to the Undergr...
HES2011 - Raould Chiesa - Hackers Cybercriminals from Wargames to the Undergr...HES2011 - Raould Chiesa - Hackers Cybercriminals from Wargames to the Undergr...
HES2011 - Raould Chiesa - Hackers Cybercriminals from Wargames to the Undergr...
 
Infosecurity2013nl 131103184054-phpapp01
Infosecurity2013nl 131103184054-phpapp01Infosecurity2013nl 131103184054-phpapp01
Infosecurity2013nl 131103184054-phpapp01
 
Privacy is an Illusion and you’re all losers! - Cryptocow - Infosecurity 2013
Privacy is an Illusion and you’re all losers! - Cryptocow - Infosecurity 2013Privacy is an Illusion and you’re all losers! - Cryptocow - Infosecurity 2013
Privacy is an Illusion and you’re all losers! - Cryptocow - Infosecurity 2013
 
OSDC 2014: Michael Renner - Secure encryption in a wiretapped future
OSDC 2014: Michael Renner - Secure encryption in a wiretapped futureOSDC 2014: Michael Renner - Secure encryption in a wiretapped future
OSDC 2014: Michael Renner - Secure encryption in a wiretapped future
 
OSDC 2014: Michael Renner - Secure encryption in a wiretapped future
OSDC 2014: Michael Renner - Secure encryption in a wiretapped futureOSDC 2014: Michael Renner - Secure encryption in a wiretapped future
OSDC 2014: Michael Renner - Secure encryption in a wiretapped future
 
Secure encryption in a wiretapped future
Secure encryption in a wiretapped futureSecure encryption in a wiretapped future
Secure encryption in a wiretapped future
 
Next Night 5 Rob van Kranenburg
Next Night 5 Rob van KranenburgNext Night 5 Rob van Kranenburg
Next Night 5 Rob van Kranenburg
 
People the biggest cyber risk
People the biggest cyber riskPeople the biggest cyber risk
People the biggest cyber risk
 
How Spies Communicate – Mocomi.com
How Spies Communicate – Mocomi.comHow Spies Communicate – Mocomi.com
How Spies Communicate – Mocomi.com
 
2600 v11 n2 (summer 1994)
2600 v11 n2 (summer 1994)2600 v11 n2 (summer 1994)
2600 v11 n2 (summer 1994)
 
2600 v20 n3 (autumn 2003)
2600 v20 n3 (autumn 2003)2600 v20 n3 (autumn 2003)
2600 v20 n3 (autumn 2003)
 
nullcon 2010 - Underground Economy
nullcon 2010 - Underground Economynullcon 2010 - Underground Economy
nullcon 2010 - Underground Economy
 
Raoul chiesa - Auditing the hacker mind - da wargames a underground economy
Raoul chiesa - Auditing the hacker mind - da wargames a underground economyRaoul chiesa - Auditing the hacker mind - da wargames a underground economy
Raoul chiesa - Auditing the hacker mind - da wargames a underground economy
 
1 The Notion Information And Basic Types Of Information
1 The Notion Information And Basic Types Of Information1 The Notion Information And Basic Types Of Information
1 The Notion Information And Basic Types Of Information
 
2600 v16 n1 (spring 1999)
2600 v16 n1 (spring 1999)2600 v16 n1 (spring 1999)
2600 v16 n1 (spring 1999)
 
Stories, Myth, and the Humane Network
Stories, Myth, and the Humane NetworkStories, Myth, and the Humane Network
Stories, Myth, and the Humane Network
 
Simon Harrison RWE - Chain of Things 010616 final
Simon Harrison RWE - Chain of Things 010616 finalSimon Harrison RWE - Chain of Things 010616 final
Simon Harrison RWE - Chain of Things 010616 final
 
digital stega slides
digital stega slidesdigital stega slides
digital stega slides
 
2600 v08 n2 (summer 1991)
2600 v08 n2 (summer 1991)2600 v08 n2 (summer 1991)
2600 v08 n2 (summer 1991)
 
Internet safety slides
Internet safety slidesInternet safety slides
Internet safety slides
 

More from sam lessin

Bitcoin & Alt currencies, Feb 2014
Bitcoin & Alt currencies, Feb 2014Bitcoin & Alt currencies, Feb 2014
Bitcoin & Alt currencies, Feb 2014sam lessin
 
Drop.io at Amazon AWS NYC event
Drop.io at Amazon AWS NYC eventDrop.io at Amazon AWS NYC event
Drop.io at Amazon AWS NYC eventsam lessin
 
Drop.io at MEET Coworking
Drop.io at MEET CoworkingDrop.io at MEET Coworking
Drop.io at MEET Coworkingsam lessin
 
Digital Dumbo Stream Discussion
Digital Dumbo Stream DiscussionDigital Dumbo Stream Discussion
Digital Dumbo Stream Discussionsam lessin
 
Obama Implications, talk with Founder's Roundtable NYC
Obama Implications, talk with Founder's Roundtable NYCObama Implications, talk with Founder's Roundtable NYC
Obama Implications, talk with Founder's Roundtable NYCsam lessin
 
ACM ICPC Regional Finals Talk re: drop.io, privacy, entrepreneurship by sam l...
ACM ICPC Regional Finals Talk re: drop.io, privacy, entrepreneurship by sam l...ACM ICPC Regional Finals Talk re: drop.io, privacy, entrepreneurship by sam l...
ACM ICPC Regional Finals Talk re: drop.io, privacy, entrepreneurship by sam l...sam lessin
 
drop.io at Facebook Dev Austin Garage, SXSW
drop.io at Facebook Dev Austin Garage, SXSWdrop.io at Facebook Dev Austin Garage, SXSW
drop.io at Facebook Dev Austin Garage, SXSWsam lessin
 

More from sam lessin (8)

Bitcoin & Alt currencies, Feb 2014
Bitcoin & Alt currencies, Feb 2014Bitcoin & Alt currencies, Feb 2014
Bitcoin & Alt currencies, Feb 2014
 
Drop.io at Amazon AWS NYC event
Drop.io at Amazon AWS NYC eventDrop.io at Amazon AWS NYC event
Drop.io at Amazon AWS NYC event
 
Drop.io at MEET Coworking
Drop.io at MEET CoworkingDrop.io at MEET Coworking
Drop.io at MEET Coworking
 
Foo Thoughts
Foo ThoughtsFoo Thoughts
Foo Thoughts
 
Digital Dumbo Stream Discussion
Digital Dumbo Stream DiscussionDigital Dumbo Stream Discussion
Digital Dumbo Stream Discussion
 
Obama Implications, talk with Founder's Roundtable NYC
Obama Implications, talk with Founder's Roundtable NYCObama Implications, talk with Founder's Roundtable NYC
Obama Implications, talk with Founder's Roundtable NYC
 
ACM ICPC Regional Finals Talk re: drop.io, privacy, entrepreneurship by sam l...
ACM ICPC Regional Finals Talk re: drop.io, privacy, entrepreneurship by sam l...ACM ICPC Regional Finals Talk re: drop.io, privacy, entrepreneurship by sam l...
ACM ICPC Regional Finals Talk re: drop.io, privacy, entrepreneurship by sam l...
 
drop.io at Facebook Dev Austin Garage, SXSW
drop.io at Facebook Dev Austin Garage, SXSWdrop.io at Facebook Dev Austin Garage, SXSW
drop.io at Facebook Dev Austin Garage, SXSW
 

Recently uploaded

FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 

Recently uploaded (20)

FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 

New York September 2008 Ignite, Sam Lessin on Privacy

  • 1. a very brief history of privacy in our data deluged world, Sam Lessin @ drop.io
  • 2. Voice Over (1/2): 1. hi, my name is sam lessin, and I am going to be speaking a bit about digital privacy - something i spend most of my days working on in one way or another 2. for starters, what is privacy. people pre-pend the word in phrases like private thoughts, a private journal, private bedroom exploits, or private plans to take over the world - but there are precious few good definitions of what the term actually means 3. The best way to describe privacy is as the limited transmission of information over time and/or between people. It is about moving information from a trusted point A to a trusted point B without exposure. 4. why do we care about privacy? isn't it dead? -- we care because in all sorts of scenarios the value of information is inversely related to how public it is. from corporate secrets, to gambling and the stock market, to even personal intimacy 5. fundamentally you are only as private as your weakest communicative link. the model for a private exchange is a one to one discussion in the middle of nowhere. Output directly to Input. But the reality is that as we have made communication more efficient we tend to rely on more intermediaries to communicate. 6. as with many things, one of the most interesting testing grounds for privacy is WAR. during war private information is extremely valuable to all sides.... and you frequently have to use untrustworthy links in the communicative chain. The solution that evolved quickly was 'security' 7. all security is breakable - it functions by changing the cost structure of information. You pay a cost to secure your information(which is less expensive than the info transmitted is valuable)... the key is to make it expensive enough for the enemy to break your security that it isn't worth it. 8. the reality is that outside of war, until very very recently most information was harmless/ mostly valueless on a mass scale- so people were not very concerned about privacy. There simply was little to 'steal' from you information wise, so you didn't have to incur much cost to protect your information. 9. three little familiar concepts, however, changed all that. the cost of and therefore volume of communication, information storage, and compute power have changed the equation by making useless data useful and by making privacy measures much more expensive on a relative basis. 10. these cost changes have drastically changed the amount of communication, the amount of communication that is saved, and the ability to access that information. this is a HUGE deal
  • 3. Voice Over (2/2): 11. people have been freaking out about this for a long time. Max Weber wrote about all these concepts and their impact with regards to 'bureaucracy' and people have been updating the concepts all the way through Foucault's Power-Knowledge in quot;Discipline and Punishquot; 12. interestingly, all this information and organization did allow for a new mechanism of non-secure 'privacy'. Simply trust your privacy to them and the law. it is a felony to open mail 13. this worked relatively well, because even up through very recent history, little information was valuable and few people were in a position to break trust. 14. Internet changes all that - all of a sudden lots of information was valuable at scale, and lots of people could touch it 15. institutions break down - laws don't work if you can't enforce them -- and with data flowing beyond boards and no transparency into who has what = no enforcement 16. go military style? doesn't work - because security only works on cost differentials. Security isn't getting cheaper faster than breaking security, information is getting more valuable for the bad guys and the good guys. 17. in fact, we are worse off than military information - value of which is very perishable - our data lasts forever - so if you can't break today break tomorrow 18. this really really sucks for your kids - because 'public key' security is going to crumble with quantum computing - so traditional security will melt. 19. so what should we do - future of privacy is about unwinding - decentralize, de-tag, destroy... you are also going to end up with less 'privacy' - which is good, because you can sell your privacy for great stuff online 20. recap -
  • 5. the limited transmission of info… between people over time
  • 7. Only as private as your least trusted link… IO I(OI)O I(OI)(OI)(OI)(OI)O I(OI)(OI)(OI)(OI)(OI)(OI)(OI)(OI)O I(OI)(OI)(OI)(OI) (OI)(OI)(OI)(OI)(OI)(OI)(OI)(OI)O
  • 8. OH CRAP, better use a code
  • 9. Vi(1) – Cs(1) Vi(2) – Cs(2) > Security is based on Relative Values and Relative Costs
  • 10. Ye’ old info = “mostly harmless”
  • 12. All of Human History volume Network Internet Cuil Computer Telephone Googlie Morse code Dog Pile Modern Bureaucracy LOC type writer Widner Calculus Printing Press Dewey Decimal Counting Writing Vatican Language Crazy Monks Alexandria ~years
  • 14. OH CRAP (new school peacetime)
  • 15. OH CRAP (1980s peacetime)
  • 16. …then the intertubes value of your crap all your crap is valuable*! ~years
  • 17. Institutions can’t save you I(OI)(OI)(OI)(OI)(OI)(OI)(OI)(OI)O ?
  • 18. go military style? = fail Vi(1) – Cs(1) Vi(2) – Cs(2) >
  • 20. really sucks for your kids…
  • 21. Future History: Back to Black 1. decentralize 2. de-tag 3. destroy 4. (give up)
  • 22. DON’T PANIC, just be conscious 1. Privacy = limited transmission of info 2. Security = method for maintaining privacy across un-trusted IO 3. Digital makes worthless crap valuable 4. Chill out, tread lightly http: //drop.io/swl twitter @lessin