SlideShare a Scribd company logo
Privacy
as defense of own
information portfolio
why is worth,
why defense it.

Paolo Pedaletti: Paolo.Pedaletti@OpenLabs.it
Copyright (c) 2011 Paolo Pedaletti
Version 2013­01­09

“I have nothing
to hide”
Anonymous
(ignorant)
Paolo Pedaletti

Privacy as defense of own information portfolio

Index
Gratis..................................................................................................................................3
The Currency “Information”...............................................................................................3
gratis services.....................................................................................................................3
Privacy................................................................................................................................4
Remote control in physical world.......................................................................................4
Privacy violation.................................................................................................................5
All bad?..............................................................................................................................5
Conclusion..........................................................................................................................5
1

1 Creative Commons ­  Attribution­Share Alike 2.5 Generic
You are free:
• to Share — to copy, distribute and transmit the work 
• to Remix — to adapt the work 
Under the following conditions:
• Attribution — You must attribute the work in the manner specified by the author or licensor (but not 
in any way that suggests that they endorse you or your use of the work). 
• Share Alike — If you alter, transform, or build upon this work, you may distribute the resulting work 
only under the same or similar license to this one.

2/5
Paolo Pedaletti

Privacy as defense of own information portfolio

Gratis2
In the physical/material world
•
“gratis” means an unidirectional exchange of
◦ material  (apples gratis, trousers gratis, ...) or
◦ services (cinema gratis, ride gratis, …)
•
“by payment” imply the bidirectional exchange of money versus
◦ material (10€ for 10Kg of apple) or 
◦ services (hairdresser, accountant, …)
In the informative/digital world, services provided “gratis” are no more unidirectional 
services, because implied an exchange, not material neither monetary, but  informative.
In the digital world the economy can be based on the only exchange of information:
my email (history/content) exchanged with electronic mail service management (for 
example)

The Currency “Information”
In the information era, the currency IS our information (in the most of the cases not alone, 
but statistically aggregated).
Our data have different value in function on who knows and handle it.
The information value is not an absolute value, 
but is function of the capacity of using it at own advantage.
E=mc2 can be a nonsense sequence of symbols, or an equation to produce energy  and to 
earn money and power (a lot of energy, money and power).
Our passion for cruises can be no valuable  for our neighbor or our employer, but 
(aggregated) may be a valuable information for a shipowner that have to decide if to build 
a new cruise ship or not (and how big), and for a builder that have to decide where to build 
his next holiday village.

gratis services
These precious informations can be easily gained providing “gratis” reservation services or 
online maps. Final end­user will provide spontaneously (and often unconsciously) to the 
shipowner or to the builder the information necessary to decide what is the better thing to 
do. Or better... they will pay the intermediary that provide these services to the final users.
In this sense our information, the information that belong to us, that represent us (our 
taste, out behavior, our activities) “it's worth”.

2 I use the term “gratis” instead of “free” because in English free may be misunderstanding with “freedom” 
but here I want to mean “without fee”, “for no money”.

3/5
Paolo Pedaletti

Privacy as defense of own information portfolio

Privacy
For these reason

privacy is the care of our information portfolio

Not having care of own information in the digital (informative) world, (“I have nothing to 
hide”), equals  to walk around with an open portfolio that leak money on the street in the 
physical (material) world.
Who think that anyway has nothing to hide, has a very poor self­consideration of own 
importance as human being and thus poor self­regard.
In the digital even­more­connected world we are all rich, of information, because we are 
increasingly digitalizing Our Life:
•
our identity, with login and password
•
our activity, with the activity and history of our digital account or digital devices 
(computer or mobile phone)
All this digital information it's worth, because it represent us and (at least still now) human 
beings are worth.
It worth in aggregate manner together with other our similar (by geographic provenance, 
working activity, culinary taste, …) if “common mortals” or (more rarely) it's worth 
individually in case of VIP (from the political/social/economic/... point of view).

Remote control in physical world
Officially the increasing remote tracking of human being behavior (=network activity, video 
recording or mobile phone tracking) is justified  by a presumed contextual security 
increase. Unlikely this is not  automatically/inevitably true, because the solely 
registration/observation/track from remote of a criminal event or behavior does not avoid 
it neither guarantees the capture and punishment of the authors 3. In any case the victim 
suffer the damage.
It can be said that a wide/generic and public know remote monitoring can do deterrent, 
can prevent crimes, but this is not automatically true because someone could not care to be 
recorded (drunk, suicide, exhibitionist, …)
But overall, trying to resolve the security problem  only from the repression side without 
doing nothing from the prevention side is a tragic error.
I don't want the killer of my son/wife in jail, I want my son/wife alive and healthy.

3 Bruce Schneier: http://www.cnn.com/2010/OPINION/02/25/schneier.security.cameras
 
Sorridete 
 , siete filmati… e così poco sorvegliati
 

4/5
Paolo Pedaletti

Privacy as defense of own information portfolio

Privacy violation
At this point it should be clear that privacy violation in the digital or physical world 
correspond to theft: someone not unauthorized that access to our information (=life) to 
gain personal advantage (maybe without our knowledge).

All bad?
Short answer: no. 
Long answer: it depends. 
It depends on what? 
All Depends on how our information (information that concern to us) is used. 
If it's used for our benefit, it's not bad, otherwise yes.
Our welfare must be the unit of measure that permit to decide if our information is treated 
well or not.
We don't consider “privacy violation” the information that we give to our accountant 
regards our money, if he/she use it for our benefit.
We don't consider “privacy violation” the information that we give to police regards our 
actions, if they use it to find criminals.

Conclusion
It's not bad “per se” to share or permit that someone else can manage our information, but 
it must be clear that this kind of “leaking” of information must be (even, at least) to our 
advantage4.

Paolo Pedaletti 
Paolo.Pedaletti@OpenLabs.IT

4) CNN: In digital world, we trade privacy for convenience
5/5

More Related Content

Similar to Privacy as defence of own information portfolio

Powerful presentations handout
Powerful presentations handoutPowerful presentations handout
Powerful presentations handoutltresalu
 
Refresh the road ahead first 4 chapters
Refresh the road ahead first 4 chaptersRefresh the road ahead first 4 chapters
Refresh the road ahead first 4 chapters
- Michiel van Vliet -
 
Plooto - Next Generation Payment Processing Security
Plooto - Next Generation Payment Processing SecurityPlooto - Next Generation Payment Processing Security
Plooto - Next Generation Payment Processing Security
Plooto
 
Advanced ETL2 Pentaho
Advanced ETL2  Pentaho Advanced ETL2  Pentaho
Advanced ETL2 Pentaho Sunny U Okoro
 
Hewlp
HewlpHewlp
How Prepared is the Third Sector to Secure their Information - Final Year Pro...
How Prepared is the Third Sector to Secure their Information - Final Year Pro...How Prepared is the Third Sector to Secure their Information - Final Year Pro...
How Prepared is the Third Sector to Secure their Information - Final Year Pro...
Robert Stones
 
HP EnterpriseView v1.5 SAP BusinessObjects Installation Guide
HP EnterpriseView v1.5 SAP BusinessObjects Installation GuideHP EnterpriseView v1.5 SAP BusinessObjects Installation Guide
HP EnterpriseView v1.5 SAP BusinessObjects Installation Guide
Protect724gopi
 
SAP BusinessObjects Installation Guide
SAP BusinessObjects Installation GuideSAP BusinessObjects Installation Guide
SAP BusinessObjects Installation Guide
Protect724gopi
 
HP ArcSight EnterpriseView v1.6 SAP BusinessObjects Installation
HP ArcSight EnterpriseView v1.6 SAP BusinessObjects InstallationHP ArcSight EnterpriseView v1.6 SAP BusinessObjects Installation
HP ArcSight EnterpriseView v1.6 SAP BusinessObjects Installation
Protect724gopi
 
HP ArcSight EnterpriseView v1.6 SAP BusinessObjects Installation
HP ArcSight EnterpriseView v1.6 SAP BusinessObjects InstallationHP ArcSight EnterpriseView v1.6 SAP BusinessObjects Installation
HP ArcSight EnterpriseView v1.6 SAP BusinessObjects Installation
Protect724gopi
 
Informatica installation guide
Informatica installation guideInformatica installation guide
Informatica installation guidecbosepandian
 
Multi-device Multi-Role
Multi-device Multi-RoleMulti-device Multi-Role
Multi-device Multi-Role
Alex Young
 
PeopleNet Enterprise Network Security Solution
PeopleNet Enterprise Network Security SolutionPeopleNet Enterprise Network Security Solution
PeopleNet Enterprise Network Security Solution
PeopleNet Security Technologies Co., Ltd.
 
Whitepaper - The 5 I's of the CIO
Whitepaper - The 5 I's of the CIOWhitepaper - The 5 I's of the CIO
Whitepaper - The 5 I's of the CIOPeter Bricknell
 
Unsh daalgwar
Unsh daalgwarUnsh daalgwar
Unsh daalgwaruka0121
 
TOC training KeyCloak Redhat SSO core
TOC training KeyCloak Redhat SSO coreTOC training KeyCloak Redhat SSO core
TOC training KeyCloak Redhat SSO core
Pascal Flamand
 

Similar to Privacy as defence of own information portfolio (20)

Powerful presentations handout
Powerful presentations handoutPowerful presentations handout
Powerful presentations handout
 
SMISproject
SMISprojectSMISproject
SMISproject
 
Refresh the road ahead first 4 chapters
Refresh the road ahead first 4 chaptersRefresh the road ahead first 4 chapters
Refresh the road ahead first 4 chapters
 
Plooto - Next Generation Payment Processing Security
Plooto - Next Generation Payment Processing SecurityPlooto - Next Generation Payment Processing Security
Plooto - Next Generation Payment Processing Security
 
Advanced ETL2 Pentaho
Advanced ETL2  Pentaho Advanced ETL2  Pentaho
Advanced ETL2 Pentaho
 
Hewlp
HewlpHewlp
Hewlp
 
How Prepared is the Third Sector to Secure their Information - Final Year Pro...
How Prepared is the Third Sector to Secure their Information - Final Year Pro...How Prepared is the Third Sector to Secure their Information - Final Year Pro...
How Prepared is the Third Sector to Secure their Information - Final Year Pro...
 
perl_tk_tutorial
perl_tk_tutorialperl_tk_tutorial
perl_tk_tutorial
 
perl_tk_tutorial
perl_tk_tutorialperl_tk_tutorial
perl_tk_tutorial
 
HP EnterpriseView v1.5 SAP BusinessObjects Installation Guide
HP EnterpriseView v1.5 SAP BusinessObjects Installation GuideHP EnterpriseView v1.5 SAP BusinessObjects Installation Guide
HP EnterpriseView v1.5 SAP BusinessObjects Installation Guide
 
SAP BusinessObjects Installation Guide
SAP BusinessObjects Installation GuideSAP BusinessObjects Installation Guide
SAP BusinessObjects Installation Guide
 
HP ArcSight EnterpriseView v1.6 SAP BusinessObjects Installation
HP ArcSight EnterpriseView v1.6 SAP BusinessObjects InstallationHP ArcSight EnterpriseView v1.6 SAP BusinessObjects Installation
HP ArcSight EnterpriseView v1.6 SAP BusinessObjects Installation
 
HP ArcSight EnterpriseView v1.6 SAP BusinessObjects Installation
HP ArcSight EnterpriseView v1.6 SAP BusinessObjects InstallationHP ArcSight EnterpriseView v1.6 SAP BusinessObjects Installation
HP ArcSight EnterpriseView v1.6 SAP BusinessObjects Installation
 
Informatica installation guide
Informatica installation guideInformatica installation guide
Informatica installation guide
 
Multi-device Multi-Role
Multi-device Multi-RoleMulti-device Multi-Role
Multi-device Multi-Role
 
PeopleNet Enterprise Network Security Solution
PeopleNet Enterprise Network Security SolutionPeopleNet Enterprise Network Security Solution
PeopleNet Enterprise Network Security Solution
 
Whitepaper - The 5 I's of the CIO
Whitepaper - The 5 I's of the CIOWhitepaper - The 5 I's of the CIO
Whitepaper - The 5 I's of the CIO
 
Unsh daalgwar
Unsh daalgwarUnsh daalgwar
Unsh daalgwar
 
TOC training KeyCloak Redhat SSO core
TOC training KeyCloak Redhat SSO coreTOC training KeyCloak Redhat SSO core
TOC training KeyCloak Redhat SSO core
 
Hacking.pdf
Hacking.pdfHacking.pdf
Hacking.pdf
 

Recently uploaded

Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
sonjaschweigert1
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
Matthew Sinclair
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
DianaGray10
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems S.M.S.A.
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
Peter Spielvogel
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
Pierluigi Pugliese
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Nexer Digital
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
ThomasParaiso2
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 

Recently uploaded (20)

Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 

Privacy as defence of own information portfolio