SlideShare a Scribd company logo
Post Privacy

What should we do after the fail of
            privacy?

          @PeterKraker
          #knowcenter
First off
• Fueled by previous discussions at #bcg10 and
  #websci11

• The core of the problem is NOT the
  information that you provide voluntarily

• This talk is intentionally provocative to start a
  discussion
Why privacy will fail
• All data that exist about us is stored digitally
• Digital data is fugitive (easy to copy, hard to
  protect)
• See: Wikileaks, Anonymous, various data
  scandals near you
• Information can be inferred from other
  sources (e.g. social graph)  jigsaw puzzle
  effect
Therefore
 Data protection is a lost cause (and
sometimes not even the solution)
 Voluntarily provided information is only the
tip of the iceberg
My prediction
• Not all data will be apparantly visible
• But almost all data will be somehow
  obtainable
• A grey market for personal data
• The important questions are not if or when
  privacy will fail, but what we should do when
  it happens
What will we do?
• What I DO NOT think will work:
  – Let‘s just wait and see, society will be better if we
    see that no one is whithout fail
• Concepts
  – Information accountability (Weitzner et al.)
  – What else?

More Related Content

Similar to Post privacy - What should we do after the fail of privacy?

privacy and security
privacy and securityprivacy and security
privacy and security
ronit_jadhav
 
Reinvent Yourself - Preso for Walnut St Labs SUMY 19-Aug-2014
Reinvent Yourself - Preso for Walnut St Labs SUMY 19-Aug-2014Reinvent Yourself - Preso for Walnut St Labs SUMY 19-Aug-2014
Reinvent Yourself - Preso for Walnut St Labs SUMY 19-Aug-2014
Andrew Schwabe
 
Corp Web Risks and Concerns
Corp Web Risks and ConcernsCorp Web Risks and Concerns
Corp Web Risks and Concerns
PINT Inc
 
Reining in the Data ITAG tech360 Penn State Great Valley 2015
Reining in the Data   ITAG tech360 Penn State Great Valley 2015 Reining in the Data   ITAG tech360 Penn State Great Valley 2015
Reining in the Data ITAG tech360 Penn State Great Valley 2015
Andrew Schwabe
 
Social Networking - An Ethical Hacker's View
Social Networking - An Ethical Hacker's ViewSocial Networking - An Ethical Hacker's View
Social Networking - An Ethical Hacker's View
Peter Wood
 
Internet Issues (How to Deal on Internet Security)
Internet Issues (How to Deal on Internet Security)Internet Issues (How to Deal on Internet Security)
Internet Issues (How to Deal on Internet Security)
Hannah Jane del Castillo
 
RW privacy-technology-outlook
RW privacy-technology-outlookRW privacy-technology-outlook
RW privacy-technology-outlook
racingsnake
 
Big Data, Security Intelligence, (And Why I Hate This Title)
Big Data, Security Intelligence, (And Why I Hate This Title) Big Data, Security Intelligence, (And Why I Hate This Title)
Big Data, Security Intelligence, (And Why I Hate This Title)
Coastal Pet Products, Inc.
 
Special Topics Day for Engineering Innovation Lecture on Cybersecurity
Special Topics Day for Engineering Innovation Lecture on CybersecuritySpecial Topics Day for Engineering Innovation Lecture on Cybersecurity
Special Topics Day for Engineering Innovation Lecture on Cybersecurity
Michael Rushanan
 
Rules on the road to netique
Rules on the road to netiqueRules on the road to netique
Rules on the road to netiqueC_Warrick
 
Technology in a global society presentation
Technology in a global society presentationTechnology in a global society presentation
Technology in a global society presentationdelmount
 
Privacy and libraries
Privacy and librariesPrivacy and libraries
Privacy and libraries
Dorothea Salo
 
Cybersecurity Strategies - time for the next generation
Cybersecurity Strategies - time for the next generationCybersecurity Strategies - time for the next generation
Cybersecurity Strategies - time for the next generation
Hinne Hettema
 
Business considerations for privacy and open data: how not to get caught out
Business considerations for privacy and open data: how not to get caught outBusiness considerations for privacy and open data: how not to get caught out
Business considerations for privacy and open data: how not to get caught out
theODI
 
Conference about Social Engineering (by Wh0s)
Conference about Social Engineering (by Wh0s)Conference about Social Engineering (by Wh0s)
Conference about Social Engineering (by Wh0s)
Marta Barrio Marcos
 
Infosecurity2013nl 131103184054-phpapp01
Infosecurity2013nl 131103184054-phpapp01Infosecurity2013nl 131103184054-phpapp01
Infosecurity2013nl 131103184054-phpapp01
Kenneth Carnesi, JD
 
Privacy is an Illusion and you’re all losers! - Cryptocow - Infosecurity 2013
Privacy is an Illusion and you’re all losers! - Cryptocow - Infosecurity 2013Privacy is an Illusion and you’re all losers! - Cryptocow - Infosecurity 2013
Privacy is an Illusion and you’re all losers! - Cryptocow - Infosecurity 2013
Cain Ransbottyn
 
2015: The year-ahead-in-cyber-security
2015: The year-ahead-in-cyber-security2015: The year-ahead-in-cyber-security
2015: The year-ahead-in-cyber-security
Stephen Cobb
 

Similar to Post privacy - What should we do after the fail of privacy? (20)

privacy and security
privacy and securityprivacy and security
privacy and security
 
Reinvent Yourself - Preso for Walnut St Labs SUMY 19-Aug-2014
Reinvent Yourself - Preso for Walnut St Labs SUMY 19-Aug-2014Reinvent Yourself - Preso for Walnut St Labs SUMY 19-Aug-2014
Reinvent Yourself - Preso for Walnut St Labs SUMY 19-Aug-2014
 
Corp Web Risks and Concerns
Corp Web Risks and ConcernsCorp Web Risks and Concerns
Corp Web Risks and Concerns
 
Reining in the Data ITAG tech360 Penn State Great Valley 2015
Reining in the Data   ITAG tech360 Penn State Great Valley 2015 Reining in the Data   ITAG tech360 Penn State Great Valley 2015
Reining in the Data ITAG tech360 Penn State Great Valley 2015
 
Social Networking - An Ethical Hacker's View
Social Networking - An Ethical Hacker's ViewSocial Networking - An Ethical Hacker's View
Social Networking - An Ethical Hacker's View
 
Internet Issues (How to Deal on Internet Security)
Internet Issues (How to Deal on Internet Security)Internet Issues (How to Deal on Internet Security)
Internet Issues (How to Deal on Internet Security)
 
RW privacy-technology-outlook
RW privacy-technology-outlookRW privacy-technology-outlook
RW privacy-technology-outlook
 
Big Data, Security Intelligence, (And Why I Hate This Title)
Big Data, Security Intelligence, (And Why I Hate This Title) Big Data, Security Intelligence, (And Why I Hate This Title)
Big Data, Security Intelligence, (And Why I Hate This Title)
 
Special Topics Day for Engineering Innovation Lecture on Cybersecurity
Special Topics Day for Engineering Innovation Lecture on CybersecuritySpecial Topics Day for Engineering Innovation Lecture on Cybersecurity
Special Topics Day for Engineering Innovation Lecture on Cybersecurity
 
Rules on the road to netique
Rules on the road to netiqueRules on the road to netique
Rules on the road to netique
 
Technology in a global society presentation
Technology in a global society presentationTechnology in a global society presentation
Technology in a global society presentation
 
Privacy and libraries
Privacy and librariesPrivacy and libraries
Privacy and libraries
 
Cybersecurity Strategies - time for the next generation
Cybersecurity Strategies - time for the next generationCybersecurity Strategies - time for the next generation
Cybersecurity Strategies - time for the next generation
 
Business considerations for privacy and open data: how not to get caught out
Business considerations for privacy and open data: how not to get caught outBusiness considerations for privacy and open data: how not to get caught out
Business considerations for privacy and open data: how not to get caught out
 
Social engineering
Social engineeringSocial engineering
Social engineering
 
Social Engineering
Social EngineeringSocial Engineering
Social Engineering
 
Conference about Social Engineering (by Wh0s)
Conference about Social Engineering (by Wh0s)Conference about Social Engineering (by Wh0s)
Conference about Social Engineering (by Wh0s)
 
Infosecurity2013nl 131103184054-phpapp01
Infosecurity2013nl 131103184054-phpapp01Infosecurity2013nl 131103184054-phpapp01
Infosecurity2013nl 131103184054-phpapp01
 
Privacy is an Illusion and you’re all losers! - Cryptocow - Infosecurity 2013
Privacy is an Illusion and you’re all losers! - Cryptocow - Infosecurity 2013Privacy is an Illusion and you’re all losers! - Cryptocow - Infosecurity 2013
Privacy is an Illusion and you’re all losers! - Cryptocow - Infosecurity 2013
 
2015: The year-ahead-in-cyber-security
2015: The year-ahead-in-cyber-security2015: The year-ahead-in-cyber-security
2015: The year-ahead-in-cyber-security
 

More from Open Knowledge Maps

Open Knowledge Maps
Open Knowledge MapsOpen Knowledge Maps
Open Knowledge Maps
Open Knowledge Maps
 
Academic SEO, or: How do I get my research to show up in search engines and d...
Academic SEO, or: How do I get my research to show up in search engines and d...Academic SEO, or: How do I get my research to show up in search engines and d...
Academic SEO, or: How do I get my research to show up in search engines and d...
Open Knowledge Maps
 
Open Science in Practice
Open Science in PracticeOpen Science in Practice
Open Science in Practice
Open Knowledge Maps
 
Open Knowledge Maps Overview & Business Model
Open Knowledge Maps Overview & Business ModelOpen Knowledge Maps Overview & Business Model
Open Knowledge Maps Overview & Business Model
Open Knowledge Maps
 
Changing The Way We Discover Research
Changing The Way We Discover ResearchChanging The Way We Discover Research
Changing The Way We Discover Research
Open Knowledge Maps
 
On Open Knowledge Maps, Aiming High & Integrity
On Open Knowledge Maps, Aiming High & IntegrityOn Open Knowledge Maps, Aiming High & Integrity
On Open Knowledge Maps, Aiming High & Integrity
Open Knowledge Maps
 
The Vienna Principles: A Vision for Scholarly Communication
The Vienna Principles: A Vision for Scholarly CommunicationThe Vienna Principles: A Vision for Scholarly Communication
The Vienna Principles: A Vision for Scholarly Communication
Open Knowledge Maps
 
Introduction to "Open Science - What's in it for me?"
Introduction to "Open Science - What's in it for me?"Introduction to "Open Science - What's in it for me?"
Introduction to "Open Science - What's in it for me?"
Open Knowledge Maps
 
Open Knowledge Maps - A Visual Interface to the World's Scientific Knowledge
Open Knowledge Maps - A Visual Interface to the World's Scientific KnowledgeOpen Knowledge Maps - A Visual Interface to the World's Scientific Knowledge
Open Knowledge Maps - A Visual Interface to the World's Scientific Knowledge
Open Knowledge Maps
 
Altmetrics & visualizations for discovery
Altmetrics & visualizations for discoveryAltmetrics & visualizations for discovery
Altmetrics & visualizations for discovery
Open Knowledge Maps
 
Open Knowledge Maps for the Wikiverse!
Open Knowledge Maps for the Wikiverse!Open Knowledge Maps for the Wikiverse!
Open Knowledge Maps for the Wikiverse!
Open Knowledge Maps
 
Open Knowledge Maps: A Visual Interface to the World's Scientific Knowledge
Open Knowledge Maps: A Visual Interface to the World's Scientific KnowledgeOpen Knowledge Maps: A Visual Interface to the World's Scientific Knowledge
Open Knowledge Maps: A Visual Interface to the World's Scientific Knowledge
Open Knowledge Maps
 
The Open Science Way to do Literature Research
The Open Science Way to do Literature ResearchThe Open Science Way to do Literature Research
The Open Science Way to do Literature Research
Open Knowledge Maps
 
Open Knowledge Maps, a visual interface to the world's scientific knowledge
Open Knowledge Maps, a visual interface to the world's scientific knowledgeOpen Knowledge Maps, a visual interface to the world's scientific knowledge
Open Knowledge Maps, a visual interface to the world's scientific knowledge
Open Knowledge Maps
 
Open Knowledge Maps Mozfest Demo
Open Knowledge Maps Mozfest DemoOpen Knowledge Maps Mozfest Demo
Open Knowledge Maps Mozfest Demo
Open Knowledge Maps
 
Open Science Lecture: Altmetrics
Open Science Lecture: AltmetricsOpen Science Lecture: Altmetrics
Open Science Lecture: Altmetrics
Open Knowledge Maps
 
Open Science in Practice
Open Science in PracticeOpen Science in Practice
Open Science in Practice
Open Knowledge Maps
 
The Student's and Researcher's Guide to Discovery: Exploring Scientific Field...
The Student's and Researcher's Guide to Discovery: Exploring Scientific Field...The Student's and Researcher's Guide to Discovery: Exploring Scientific Field...
The Student's and Researcher's Guide to Discovery: Exploring Scientific Field...
Open Knowledge Maps
 
Research data explored II: the Anatomy and Reception of figshare
Research data explored II: the Anatomy and Reception of figshareResearch data explored II: the Anatomy and Reception of figshare
Research data explored II: the Anatomy and Reception of figshare
Open Knowledge Maps
 
Exploring Coverage and Distribution of Scholarly Identifiers on the Web
Exploring Coverage and Distribution of Scholarly Identifiers on the WebExploring Coverage and Distribution of Scholarly Identifiers on the Web
Exploring Coverage and Distribution of Scholarly Identifiers on the Web
Open Knowledge Maps
 

More from Open Knowledge Maps (20)

Open Knowledge Maps
Open Knowledge MapsOpen Knowledge Maps
Open Knowledge Maps
 
Academic SEO, or: How do I get my research to show up in search engines and d...
Academic SEO, or: How do I get my research to show up in search engines and d...Academic SEO, or: How do I get my research to show up in search engines and d...
Academic SEO, or: How do I get my research to show up in search engines and d...
 
Open Science in Practice
Open Science in PracticeOpen Science in Practice
Open Science in Practice
 
Open Knowledge Maps Overview & Business Model
Open Knowledge Maps Overview & Business ModelOpen Knowledge Maps Overview & Business Model
Open Knowledge Maps Overview & Business Model
 
Changing The Way We Discover Research
Changing The Way We Discover ResearchChanging The Way We Discover Research
Changing The Way We Discover Research
 
On Open Knowledge Maps, Aiming High & Integrity
On Open Knowledge Maps, Aiming High & IntegrityOn Open Knowledge Maps, Aiming High & Integrity
On Open Knowledge Maps, Aiming High & Integrity
 
The Vienna Principles: A Vision for Scholarly Communication
The Vienna Principles: A Vision for Scholarly CommunicationThe Vienna Principles: A Vision for Scholarly Communication
The Vienna Principles: A Vision for Scholarly Communication
 
Introduction to "Open Science - What's in it for me?"
Introduction to "Open Science - What's in it for me?"Introduction to "Open Science - What's in it for me?"
Introduction to "Open Science - What's in it for me?"
 
Open Knowledge Maps - A Visual Interface to the World's Scientific Knowledge
Open Knowledge Maps - A Visual Interface to the World's Scientific KnowledgeOpen Knowledge Maps - A Visual Interface to the World's Scientific Knowledge
Open Knowledge Maps - A Visual Interface to the World's Scientific Knowledge
 
Altmetrics & visualizations for discovery
Altmetrics & visualizations for discoveryAltmetrics & visualizations for discovery
Altmetrics & visualizations for discovery
 
Open Knowledge Maps for the Wikiverse!
Open Knowledge Maps for the Wikiverse!Open Knowledge Maps for the Wikiverse!
Open Knowledge Maps for the Wikiverse!
 
Open Knowledge Maps: A Visual Interface to the World's Scientific Knowledge
Open Knowledge Maps: A Visual Interface to the World's Scientific KnowledgeOpen Knowledge Maps: A Visual Interface to the World's Scientific Knowledge
Open Knowledge Maps: A Visual Interface to the World's Scientific Knowledge
 
The Open Science Way to do Literature Research
The Open Science Way to do Literature ResearchThe Open Science Way to do Literature Research
The Open Science Way to do Literature Research
 
Open Knowledge Maps, a visual interface to the world's scientific knowledge
Open Knowledge Maps, a visual interface to the world's scientific knowledgeOpen Knowledge Maps, a visual interface to the world's scientific knowledge
Open Knowledge Maps, a visual interface to the world's scientific knowledge
 
Open Knowledge Maps Mozfest Demo
Open Knowledge Maps Mozfest DemoOpen Knowledge Maps Mozfest Demo
Open Knowledge Maps Mozfest Demo
 
Open Science Lecture: Altmetrics
Open Science Lecture: AltmetricsOpen Science Lecture: Altmetrics
Open Science Lecture: Altmetrics
 
Open Science in Practice
Open Science in PracticeOpen Science in Practice
Open Science in Practice
 
The Student's and Researcher's Guide to Discovery: Exploring Scientific Field...
The Student's and Researcher's Guide to Discovery: Exploring Scientific Field...The Student's and Researcher's Guide to Discovery: Exploring Scientific Field...
The Student's and Researcher's Guide to Discovery: Exploring Scientific Field...
 
Research data explored II: the Anatomy and Reception of figshare
Research data explored II: the Anatomy and Reception of figshareResearch data explored II: the Anatomy and Reception of figshare
Research data explored II: the Anatomy and Reception of figshare
 
Exploring Coverage and Distribution of Scholarly Identifiers on the Web
Exploring Coverage and Distribution of Scholarly Identifiers on the WebExploring Coverage and Distribution of Scholarly Identifiers on the Web
Exploring Coverage and Distribution of Scholarly Identifiers on the Web
 

Recently uploaded

Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Tobias Schneck
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
RTTS
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Ramesh Iyer
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Product School
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Frank van Harmelen
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Inflectra
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
Elena Simperl
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
Product School
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
Product School
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 

Recently uploaded (20)

Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 

Post privacy - What should we do after the fail of privacy?

  • 1. Post Privacy What should we do after the fail of privacy? @PeterKraker #knowcenter
  • 2. First off • Fueled by previous discussions at #bcg10 and #websci11 • The core of the problem is NOT the information that you provide voluntarily • This talk is intentionally provocative to start a discussion
  • 3. Why privacy will fail • All data that exist about us is stored digitally • Digital data is fugitive (easy to copy, hard to protect) • See: Wikileaks, Anonymous, various data scandals near you • Information can be inferred from other sources (e.g. social graph)  jigsaw puzzle effect
  • 4. Therefore  Data protection is a lost cause (and sometimes not even the solution)  Voluntarily provided information is only the tip of the iceberg
  • 5. My prediction • Not all data will be apparantly visible • But almost all data will be somehow obtainable • A grey market for personal data • The important questions are not if or when privacy will fail, but what we should do when it happens
  • 6. What will we do? • What I DO NOT think will work: – Let‘s just wait and see, society will be better if we see that no one is whithout fail • Concepts – Information accountability (Weitzner et al.) – What else?