SlideShare a Scribd company logo
1
Returning to Online Privacy?
Dr. David Hyland-Wood
david@hyland-wood.org
5 November 2019
The people held the government,
but they did not hold the power.
“
”
When the missionaries came to Africa,
they had the Bible and we had the land.
They said “let us close our eyes and
pray.” When we opened them, we had
the Bible, and they had the land.
More Privacy
Less Privacy
MoreAnonymity
LessAnonymity
Anatomy of a Verifiable Credential
Verifiable Credential
Issuer Signature
ClaimsClaimsClaims
Credential Identifier
Credential MetadataCredential MetadataCredential Metadata
17
Verifiable Credentials Ecosystem
18
Issuer
(Website)
Government, Employer,
etc.
Verifier
(Website)
Company, Bank, etc.
Holder
(Digital Wallet /
Personal Data Store)
Citizen, Employee, etc.
Issue
Credentials
Present
Profiles
W3C Verifiable Credentials
19
The mission of the W3C Verifiable Claims Working Group:
Express credentials on the Web in a way that is
cryptographically secure, privacy respecting, and
automatically verifiable.
The laws of mathematics are very
commendable, but the only law that
applies in Australia is the law of Australia.“
The Web’s Identifier Problem
21
To date, every identifier you use online
does not belong to you; it belongs to
someone else.
This results in problems related to cost, data
portability, data privacy, and data security.
Why is this a problem?
22
500 Million guests
412 Million users
145 Million users
110 Million shoppers
3,000 Million users
Web Identifiers Today
23
Domain Name System
(Identifiers are leased to individuals)
Issuer
(Website)
Government, Employer,
etc.
Verifier
(Website)
Company, Bank, etc.
Holder
(Digital Wallet /
Personal Data Store)
Citizen, Employee, etc.
Issue
Credentials
Present
Profiles
What is missing?
24
Many portable identifiers for any person, organisation,
or thing that does not depend on a centralised
authority, are protected by cryptography, and enable
privacy and data portability.
Decentralised Identifiers
25
A new type of globally resolvable,
cryptographically-verifiable identifier, registered
directly on a distributed ledger or blockchain
What does a DID look like?
26
did:example:123456789abcdefghijk
Schem
e
DID
Method
DID Method Specific String
did:v1:nym:DwkYwcoyUXHNkpj3whn4DgXB4fcg9gj95vKxYN2apkZD
Example:
DIDs Resolve to DID Documents
27
{
"@context": "https://w3id.org/veres-one/v1",
"id": "did:v1:nym:DwkYwcoyUXHNkpj3whn4DgXB4fcg9gj95vKxYN2apkZD",
"authentication": [{
"type": "Ed25519SignatureAuthentication2018",
"publicKey": [{
"id": "did:v1:test:nym:DwkYwcoyUXHNkpj3whn4DgXB4fcg9gj95vKxYN2apkZD#authn-key-1",
"type": "Ed25519VerificationKey2018",
"owner": "did:v1:nym:DwkYwcoyUXHNkpj3whn4DgXB4fcg9gj95vKxYN2apkZD",
"publicKeyBase58": "DwkYwcoyUXHNkpj3whn4DgXB4fcg9gj95vKxYN2apkZD"
}]
}],
"service": [{
"type": "ExampleMessagingService",
"serviceEndpoint": ”https://example.com/services/messages”
}],
… more DID-specific information here …
}
1. Authentication Mechanisms
3. Service Discovery
2. Public Key Material
Decentralized Identifiers
28
Decentralized Identifiers
(Identifiers are owned by individuals)
Blockchains / DHTs
(Decentralized Ledger)
Veres One, Sovrin, Bitcoin, Ethereum, etc.
Issuer
(Website)
Government, Employer,
etc.
Verifier
(Website)
Company, Bank, etc.
Holder
(Digital Wallet /
Personal Data Store)
Citizen, Employee, etc.
Issue
Credentials
Present
Profiles
29
© 2018 Tim Whyatt
(David) Wheeler’s Law
All problems in computer science can be solved by
another level of indirection, but that will usually
(David) Wheeler’s Law
All problems in computer science can be solved by
another level of indirection, but that will usually
create another problem.
http://w3id.org/people/prototypo/talks/uq20191105
Acknowledgments
34
● Vintage 1984 movie poster modified from a version by Flikr user “book radio”, CC-BY-2.0 license,
https://www.flickr.com/photos/bookdio/14164592302
● Photo of the bombing of La Moneda (Chilean presidential palace) on 11 Sep 1973 by Biblioteca del Congreso Nacional, CC-BY-3.0-CL
license, https://commons.wikimedia.org/w/index.php?curid=16325488
● Photo of Salvador Allende, CC-BY-3.0-CL license, https://commons.wikimedia.org/wiki/File:Salvador_Allende_1952.JPG
● Salvador Allende quote from United States Congress, House Committee on Foreign Affairs (1789-1975), “Hearings, Reports and Prints of
the House Committee on Foreign Affairs”, U.S. Government Printing Office, 1975, pp 585
● Project Cybersyn operations room photo by Source, fair use due to historical significance (low resolution) for educational purposes,
https://en.wikipedia.org/w/index.php?curid=12937653,
https://en.wikipedia.org/wiki/Project_Cybersyn#/media/File:Cybersyn_control_room.jpg
● Nuremburg Laws illustration German Government (“Entwurf Willi Hackenberger”, “Copyright by Reichsausschuß für
Volksgesundheitsdienst”, government agency apparently part of the Reichs- und Preußisches Ministerium des Innern), in the public domain,
https://commons.wikimedia.org/wiki/File:Nuremberg_laws_Racial_Chart.jpg
● Photo of birth and death records in a family bible by Chuck Coker, CC BY-ND 2.0 license,
https://www.flickr.com/photos/caveman_92223/3288595909
● IDC projections from IDC White Paper, The Digitization of the World - From Edge to Core, Doc# US44413318, November 2018,
https://www.seagate.com/www-content/our-story/trends/files/idc-seagate-dataage-whitepaper.pdf
Acknowledgments
35
● Illustration of “Saltbush Bill's Second Fight” by Frank Mahony, The Antipodean, Public Domain,
https://commons.wikimedia.org/w/index.php?curid=37814122
● Illustration of Henry Lawson’s The Team by an unknown artist, The Australian Town and Country Journal, Public
Domain, https://en.wikipedia.org/wiki/The_Teams#/media/File:The_Teams_-_illo.png
● Brisbane City Hall photo by Tanya Dedyukhina, CC-BY-3.0 license,
https://commons.wikimedia.org/wiki/File:Brisbane_City_Hall_-_panoramio.jpg
● Photo of Desmond Tutu provided by Lavinia Browne under the public domain,
https://commons.wikimedia.org/wiki/File:Archbishop-Tutu-medium.jpg
● Desmond Tutu quote from Steven Gish, Desmond Tutu: A Biography, 2004, pp. 101 (although potentially
originally attributable to Rolf Hochhuth, The Deputy, a Christian tragedy, Grove Press, 1964, pp. 144)
● Credit cards photograph by Nick Youngson, CC BY-SA 3.0 license, http://www.picserver.org/c/credit-cards26.html
● Wiretap meme courtesy of Reddit user benjaminikuta, February 2018
● Privacy vs. Anonymity chart used by many, but possibly originally by Adam Ludwin, 20 January 2015,
https://coincenter.org/entry/how-anonymous-is-bitcoin
Copyright and Trademark Attribution
36
Corporate logos used in this presentation are the registered trademarks of their
respective companies.
Logos are used for educational purposes only under fair use provisions of
copyright law. The lowest resolution visible to the audience was used.

More Related Content

What's hot

Towards the decentralisation of personal data through blockchains and linked ...
Towards the decentralisation of personal data through blockchains and linked ...Towards the decentralisation of personal data through blockchains and linked ...
Towards the decentralisation of personal data through blockchains and linked ...
John Domingue
 
Future of AI: Blockchain and Deep Learning
Future of AI: Blockchain and Deep LearningFuture of AI: Blockchain and Deep Learning
Future of AI: Blockchain and Deep Learning
Melanie Swan
 
UKSG webinar: Blockchain in research and education with Martin Hamilton, Jisc
UKSG webinar: Blockchain in research and education with Martin Hamilton, JiscUKSG webinar: Blockchain in research and education with Martin Hamilton, Jisc
UKSG webinar: Blockchain in research and education with Martin Hamilton, Jisc
UKSG: connecting the knowledge community
 
Blockchain Smartnetworks: Bitcoin and Blockchain Explained
Blockchain Smartnetworks: Bitcoin and Blockchain ExplainedBlockchain Smartnetworks: Bitcoin and Blockchain Explained
Blockchain Smartnetworks: Bitcoin and Blockchain Explained
Melanie Swan
 
Bitcoin Blockchains on Twitter timelines: A Social Media analysis of cryptocu...
Bitcoin Blockchains on Twitter timelines: A Social Media analysis of cryptocu...Bitcoin Blockchains on Twitter timelines: A Social Media analysis of cryptocu...
Bitcoin Blockchains on Twitter timelines: A Social Media analysis of cryptocu...
Alexia Maddox
 
MERRILL LYNCH PLOTS BITCOIN’S PATH TO GLOBAL LEGITIMACY
MERRILL LYNCH PLOTS BITCOIN’S PATH TO GLOBAL LEGITIMACYMERRILL LYNCH PLOTS BITCOIN’S PATH TO GLOBAL LEGITIMACY
MERRILL LYNCH PLOTS BITCOIN’S PATH TO GLOBAL LEGITIMACY
Steven Rhyner
 
COVID-19 Antibody Test+Vaccination Certificates: There's an app for that
COVID-19 Antibody Test+Vaccination Certificates: There's an app for thatCOVID-19 Antibody Test+Vaccination Certificates: There's an app for that
COVID-19 Antibody Test+Vaccination Certificates: There's an app for that
meisenstadt
 
Master of Sheets: A Tale of Compromised Cloud Documents
Master of Sheets: A Tale of Compromised Cloud DocumentsMaster of Sheets: A Tale of Compromised Cloud Documents
Master of Sheets: A Tale of Compromised Cloud Documents
Jeremiah Onaolapo
 
Blockchain Economics
Blockchain EconomicsBlockchain Economics
Blockchain Economics
Melanie Swan
 
Blockchain Singularities
Blockchain SingularitiesBlockchain Singularities
Blockchain Singularities
Melanie Swan
 
GOLDMAN SACHS: BLOCKCHAIN IS READY FOR CENTRE STAGE
GOLDMAN SACHS: BLOCKCHAIN IS READY FOR CENTRE STAGEGOLDMAN SACHS: BLOCKCHAIN IS READY FOR CENTRE STAGE
GOLDMAN SACHS: BLOCKCHAIN IS READY FOR CENTRE STAGE
Steven Rhyner
 
Blockchain Landscape Report 2019
Blockchain Landscape Report 2019Blockchain Landscape Report 2019
Blockchain Landscape Report 2019
[x]cube LABS
 
Supply Chain Management using Blockchain
Supply Chain Management using BlockchainSupply Chain Management using Blockchain
Supply Chain Management using Blockchain
Yugn27
 
Overview of blockchain technology and architecture
Overview of blockchain technology and   architectureOverview of blockchain technology and   architecture
Overview of blockchain technology and architecture
EY
 
Blockchain Smartnetworks
Blockchain Smartnetworks Blockchain Smartnetworks
Blockchain Smartnetworks
Melanie Swan
 
Blockchain for Executives, Entrepreneurs and Investors
Blockchain for Executives, Entrepreneurs and InvestorsBlockchain for Executives, Entrepreneurs and Investors
Blockchain for Executives, Entrepreneurs and Investors
Fenbushi Capital
 
Web tracking and privacy law
Web tracking and privacy lawWeb tracking and privacy law
Web tracking and privacy law
Joe Mornin
 
Blockchain and Beyond
Blockchain and BeyondBlockchain and Beyond
Blockchain and Beyond
ijtsrd
 
Blockchain v Cryptocurrency: Talk for BridgeSF
Blockchain v Cryptocurrency: Talk for BridgeSF Blockchain v Cryptocurrency: Talk for BridgeSF
Blockchain v Cryptocurrency: Talk for BridgeSF
Kaliya "Identity Woman" Young
 
Social Media Copyright Management using Semantic Web and Blockchain
Social Media Copyright Management  using Semantic Web and BlockchainSocial Media Copyright Management  using Semantic Web and Blockchain
Social Media Copyright Management using Semantic Web and Blockchain
Roberto García
 

What's hot (20)

Towards the decentralisation of personal data through blockchains and linked ...
Towards the decentralisation of personal data through blockchains and linked ...Towards the decentralisation of personal data through blockchains and linked ...
Towards the decentralisation of personal data through blockchains and linked ...
 
Future of AI: Blockchain and Deep Learning
Future of AI: Blockchain and Deep LearningFuture of AI: Blockchain and Deep Learning
Future of AI: Blockchain and Deep Learning
 
UKSG webinar: Blockchain in research and education with Martin Hamilton, Jisc
UKSG webinar: Blockchain in research and education with Martin Hamilton, JiscUKSG webinar: Blockchain in research and education with Martin Hamilton, Jisc
UKSG webinar: Blockchain in research and education with Martin Hamilton, Jisc
 
Blockchain Smartnetworks: Bitcoin and Blockchain Explained
Blockchain Smartnetworks: Bitcoin and Blockchain ExplainedBlockchain Smartnetworks: Bitcoin and Blockchain Explained
Blockchain Smartnetworks: Bitcoin and Blockchain Explained
 
Bitcoin Blockchains on Twitter timelines: A Social Media analysis of cryptocu...
Bitcoin Blockchains on Twitter timelines: A Social Media analysis of cryptocu...Bitcoin Blockchains on Twitter timelines: A Social Media analysis of cryptocu...
Bitcoin Blockchains on Twitter timelines: A Social Media analysis of cryptocu...
 
MERRILL LYNCH PLOTS BITCOIN’S PATH TO GLOBAL LEGITIMACY
MERRILL LYNCH PLOTS BITCOIN’S PATH TO GLOBAL LEGITIMACYMERRILL LYNCH PLOTS BITCOIN’S PATH TO GLOBAL LEGITIMACY
MERRILL LYNCH PLOTS BITCOIN’S PATH TO GLOBAL LEGITIMACY
 
COVID-19 Antibody Test+Vaccination Certificates: There's an app for that
COVID-19 Antibody Test+Vaccination Certificates: There's an app for thatCOVID-19 Antibody Test+Vaccination Certificates: There's an app for that
COVID-19 Antibody Test+Vaccination Certificates: There's an app for that
 
Master of Sheets: A Tale of Compromised Cloud Documents
Master of Sheets: A Tale of Compromised Cloud DocumentsMaster of Sheets: A Tale of Compromised Cloud Documents
Master of Sheets: A Tale of Compromised Cloud Documents
 
Blockchain Economics
Blockchain EconomicsBlockchain Economics
Blockchain Economics
 
Blockchain Singularities
Blockchain SingularitiesBlockchain Singularities
Blockchain Singularities
 
GOLDMAN SACHS: BLOCKCHAIN IS READY FOR CENTRE STAGE
GOLDMAN SACHS: BLOCKCHAIN IS READY FOR CENTRE STAGEGOLDMAN SACHS: BLOCKCHAIN IS READY FOR CENTRE STAGE
GOLDMAN SACHS: BLOCKCHAIN IS READY FOR CENTRE STAGE
 
Blockchain Landscape Report 2019
Blockchain Landscape Report 2019Blockchain Landscape Report 2019
Blockchain Landscape Report 2019
 
Supply Chain Management using Blockchain
Supply Chain Management using BlockchainSupply Chain Management using Blockchain
Supply Chain Management using Blockchain
 
Overview of blockchain technology and architecture
Overview of blockchain technology and   architectureOverview of blockchain technology and   architecture
Overview of blockchain technology and architecture
 
Blockchain Smartnetworks
Blockchain Smartnetworks Blockchain Smartnetworks
Blockchain Smartnetworks
 
Blockchain for Executives, Entrepreneurs and Investors
Blockchain for Executives, Entrepreneurs and InvestorsBlockchain for Executives, Entrepreneurs and Investors
Blockchain for Executives, Entrepreneurs and Investors
 
Web tracking and privacy law
Web tracking and privacy lawWeb tracking and privacy law
Web tracking and privacy law
 
Blockchain and Beyond
Blockchain and BeyondBlockchain and Beyond
Blockchain and Beyond
 
Blockchain v Cryptocurrency: Talk for BridgeSF
Blockchain v Cryptocurrency: Talk for BridgeSF Blockchain v Cryptocurrency: Talk for BridgeSF
Blockchain v Cryptocurrency: Talk for BridgeSF
 
Social Media Copyright Management using Semantic Web and Blockchain
Social Media Copyright Management  using Semantic Web and BlockchainSocial Media Copyright Management  using Semantic Web and Blockchain
Social Media Copyright Management using Semantic Web and Blockchain
 

Similar to Returning to Online Privacy?

Privacy in the Smart City
Privacy in the Smart CityPrivacy in the Smart City
Privacy in the Smart City
David Wood
 
Masterclass on the DID Universal Resolver
Masterclass on the DID Universal ResolverMasterclass on the DID Universal Resolver
Masterclass on the DID Universal Resolver
Markus Sabadello
 
San Francisco Isaca Fall Security Conference G32 Wiki Leaks Social Media &amp...
San Francisco Isaca Fall Security Conference G32 Wiki Leaks Social Media &amp...San Francisco Isaca Fall Security Conference G32 Wiki Leaks Social Media &amp...
San Francisco Isaca Fall Security Conference G32 Wiki Leaks Social Media &amp...Pw Carey
 
San Francisco Isaca Fall Security Conference G32 Wiki Leaks Social Media &amp...
San Francisco Isaca Fall Security Conference G32 Wiki Leaks Social Media &amp...San Francisco Isaca Fall Security Conference G32 Wiki Leaks Social Media &amp...
San Francisco Isaca Fall Security Conference G32 Wiki Leaks Social Media &amp...
Pw Carey
 
G32 Wiki Leaks Social Media & Whistleblowers The Future Of It Auditing A ...
G32 Wiki Leaks Social Media & Whistleblowers The Future Of It Auditing A ...G32 Wiki Leaks Social Media & Whistleblowers The Future Of It Auditing A ...
G32 Wiki Leaks Social Media & Whistleblowers The Future Of It Auditing A ...
Pw Carey
 
Science B.0 Blockchain, Cryptoeconomics and autonomous agents
Science B.0 Blockchain, Cryptoeconomics and autonomous agentsScience B.0 Blockchain, Cryptoeconomics and autonomous agents
Science B.0 Blockchain, Cryptoeconomics and autonomous agents
Soenke Bartling
 
Blockchain for Land Records and Real Estate
Blockchain for Land Records and Real EstateBlockchain for Land Records and Real Estate
Blockchain for Land Records and Real Estate
John Mirkovic
 
ODI 2015 06 opentech - Gavin Starks
ODI 2015 06 opentech - Gavin StarksODI 2015 06 opentech - Gavin Starks
ODI 2015 06 opentech - Gavin Starks
theODI
 
Verifiable Credentials in Self-Sovereign Identity (SSI)
Verifiable Credentials in Self-Sovereign Identity (SSI)Verifiable Credentials in Self-Sovereign Identity (SSI)
Verifiable Credentials in Self-Sovereign Identity (SSI)
Evernym
 
Blockchain for Business: What, How, Why & USE CASES
Blockchain for Business: What, How, Why & USE CASESBlockchain for Business: What, How, Why & USE CASES
Blockchain for Business: What, How, Why & USE CASES
michaelmcgowan27
 
What Should The Public Sector Demand Jerry Fishenden 15.05.2009
What Should The Public Sector Demand   Jerry Fishenden 15.05.2009What Should The Public Sector Demand   Jerry Fishenden 15.05.2009
What Should The Public Sector Demand Jerry Fishenden 15.05.2009
Jerry Fishenden
 
net1.digital - Bitcoin & Blockchain Intro - Network-based money
net1.digital - Bitcoin & Blockchain Intro - Network-based moneynet1.digital - Bitcoin & Blockchain Intro - Network-based money
net1.digital - Bitcoin & Blockchain Intro - Network-based money
Boris K. A. Reinhard
 
The Blockchain: Introduction and Implications
The Blockchain: Introduction and ImplicationsThe Blockchain: Introduction and Implications
The Blockchain: Introduction and Implications
Michael Lesniak
 
Data Con LA 2018 - From the Panama Papers by Mark Quinsland
Data Con LA 2018 - From the Panama Papers by Mark QuinslandData Con LA 2018 - From the Panama Papers by Mark Quinsland
Data Con LA 2018 - From the Panama Papers by Mark Quinsland
Data Con LA
 
Open Source Insight: Big Data Breaches, Costly Cyberattacks, Vuln Detection f...
Open Source Insight: Big Data Breaches, Costly Cyberattacks, Vuln Detection f...Open Source Insight: Big Data Breaches, Costly Cyberattacks, Vuln Detection f...
Open Source Insight: Big Data Breaches, Costly Cyberattacks, Vuln Detection f...
Black Duck by Synopsys
 
Self-Sovereign Identity for the Decentralized Web Summit
Self-Sovereign Identity for the Decentralized Web SummitSelf-Sovereign Identity for the Decentralized Web Summit
Self-Sovereign Identity for the Decentralized Web Summit
Kaliya "Identity Woman" Young
 
Iot privacy vs convenience
Iot privacy vs  convenienceIot privacy vs  convenience
Iot privacy vs convenience
Don Lovett
 
Privacy Concerns related to Verifiable Claims
Privacy Concerns related to Verifiable ClaimsPrivacy Concerns related to Verifiable Claims
Privacy Concerns related to Verifiable Claims
David Wood
 
DID Resolution: Given a DID how do I retrieve its document? – Markus Sabadello
DID Resolution: Given a DID how do I retrieve its document? – Markus SabadelloDID Resolution: Given a DID how do I retrieve its document? – Markus Sabadello
DID Resolution: Given a DID how do I retrieve its document? – Markus Sabadello
SSIMeetup
 
ChapterEthics and Privacy3c03EthicsandPrivacy.ind.docx
 ChapterEthics and Privacy3c03EthicsandPrivacy.ind.docx ChapterEthics and Privacy3c03EthicsandPrivacy.ind.docx
ChapterEthics and Privacy3c03EthicsandPrivacy.ind.docx
arnit1
 

Similar to Returning to Online Privacy? (20)

Privacy in the Smart City
Privacy in the Smart CityPrivacy in the Smart City
Privacy in the Smart City
 
Masterclass on the DID Universal Resolver
Masterclass on the DID Universal ResolverMasterclass on the DID Universal Resolver
Masterclass on the DID Universal Resolver
 
San Francisco Isaca Fall Security Conference G32 Wiki Leaks Social Media &amp...
San Francisco Isaca Fall Security Conference G32 Wiki Leaks Social Media &amp...San Francisco Isaca Fall Security Conference G32 Wiki Leaks Social Media &amp...
San Francisco Isaca Fall Security Conference G32 Wiki Leaks Social Media &amp...
 
San Francisco Isaca Fall Security Conference G32 Wiki Leaks Social Media &amp...
San Francisco Isaca Fall Security Conference G32 Wiki Leaks Social Media &amp...San Francisco Isaca Fall Security Conference G32 Wiki Leaks Social Media &amp...
San Francisco Isaca Fall Security Conference G32 Wiki Leaks Social Media &amp...
 
G32 Wiki Leaks Social Media & Whistleblowers The Future Of It Auditing A ...
G32 Wiki Leaks Social Media & Whistleblowers The Future Of It Auditing A ...G32 Wiki Leaks Social Media & Whistleblowers The Future Of It Auditing A ...
G32 Wiki Leaks Social Media & Whistleblowers The Future Of It Auditing A ...
 
Science B.0 Blockchain, Cryptoeconomics and autonomous agents
Science B.0 Blockchain, Cryptoeconomics and autonomous agentsScience B.0 Blockchain, Cryptoeconomics and autonomous agents
Science B.0 Blockchain, Cryptoeconomics and autonomous agents
 
Blockchain for Land Records and Real Estate
Blockchain for Land Records and Real EstateBlockchain for Land Records and Real Estate
Blockchain for Land Records and Real Estate
 
ODI 2015 06 opentech - Gavin Starks
ODI 2015 06 opentech - Gavin StarksODI 2015 06 opentech - Gavin Starks
ODI 2015 06 opentech - Gavin Starks
 
Verifiable Credentials in Self-Sovereign Identity (SSI)
Verifiable Credentials in Self-Sovereign Identity (SSI)Verifiable Credentials in Self-Sovereign Identity (SSI)
Verifiable Credentials in Self-Sovereign Identity (SSI)
 
Blockchain for Business: What, How, Why & USE CASES
Blockchain for Business: What, How, Why & USE CASESBlockchain for Business: What, How, Why & USE CASES
Blockchain for Business: What, How, Why & USE CASES
 
What Should The Public Sector Demand Jerry Fishenden 15.05.2009
What Should The Public Sector Demand   Jerry Fishenden 15.05.2009What Should The Public Sector Demand   Jerry Fishenden 15.05.2009
What Should The Public Sector Demand Jerry Fishenden 15.05.2009
 
net1.digital - Bitcoin & Blockchain Intro - Network-based money
net1.digital - Bitcoin & Blockchain Intro - Network-based moneynet1.digital - Bitcoin & Blockchain Intro - Network-based money
net1.digital - Bitcoin & Blockchain Intro - Network-based money
 
The Blockchain: Introduction and Implications
The Blockchain: Introduction and ImplicationsThe Blockchain: Introduction and Implications
The Blockchain: Introduction and Implications
 
Data Con LA 2018 - From the Panama Papers by Mark Quinsland
Data Con LA 2018 - From the Panama Papers by Mark QuinslandData Con LA 2018 - From the Panama Papers by Mark Quinsland
Data Con LA 2018 - From the Panama Papers by Mark Quinsland
 
Open Source Insight: Big Data Breaches, Costly Cyberattacks, Vuln Detection f...
Open Source Insight: Big Data Breaches, Costly Cyberattacks, Vuln Detection f...Open Source Insight: Big Data Breaches, Costly Cyberattacks, Vuln Detection f...
Open Source Insight: Big Data Breaches, Costly Cyberattacks, Vuln Detection f...
 
Self-Sovereign Identity for the Decentralized Web Summit
Self-Sovereign Identity for the Decentralized Web SummitSelf-Sovereign Identity for the Decentralized Web Summit
Self-Sovereign Identity for the Decentralized Web Summit
 
Iot privacy vs convenience
Iot privacy vs  convenienceIot privacy vs  convenience
Iot privacy vs convenience
 
Privacy Concerns related to Verifiable Claims
Privacy Concerns related to Verifiable ClaimsPrivacy Concerns related to Verifiable Claims
Privacy Concerns related to Verifiable Claims
 
DID Resolution: Given a DID how do I retrieve its document? – Markus Sabadello
DID Resolution: Given a DID how do I retrieve its document? – Markus SabadelloDID Resolution: Given a DID how do I retrieve its document? – Markus Sabadello
DID Resolution: Given a DID how do I retrieve its document? – Markus Sabadello
 
ChapterEthics and Privacy3c03EthicsandPrivacy.ind.docx
 ChapterEthics and Privacy3c03EthicsandPrivacy.ind.docx ChapterEthics and Privacy3c03EthicsandPrivacy.ind.docx
ChapterEthics and Privacy3c03EthicsandPrivacy.ind.docx
 

More from David Wood

Internet of Things (IoT) two-factor authentication using blockchain
Internet of Things (IoT) two-factor authentication using blockchainInternet of Things (IoT) two-factor authentication using blockchain
Internet of Things (IoT) two-factor authentication using blockchain
David Wood
 
Methods for Securing Spacecraft Tasking and Control via an Enterprise Ethereu...
Methods for Securing Spacecraft Tasking and Control via an Enterprise Ethereu...Methods for Securing Spacecraft Tasking and Control via an Enterprise Ethereu...
Methods for Securing Spacecraft Tasking and Control via an Enterprise Ethereu...
David Wood
 
BlockSW 2019 Keynote
BlockSW 2019 KeynoteBlockSW 2019 Keynote
BlockSW 2019 Keynote
David Wood
 
Controlling Complexities in Software Development
Controlling Complexities in Software DevelopmentControlling Complexities in Software Development
Controlling Complexities in Software Development
David Wood
 
Implementing the Verifiable Claims data model
Implementing the Verifiable Claims data modelImplementing the Verifiable Claims data model
Implementing the Verifiable Claims data model
David Wood
 
So You Wanna be a Startup CTO 20170301
So You Wanna be a Startup CTO 20170301So You Wanna be a Startup CTO 20170301
So You Wanna be a Startup CTO 20170301
David Wood
 
Functional manipulations of large data graphs 20160601
Functional manipulations of large data graphs 20160601Functional manipulations of large data graphs 20160601
Functional manipulations of large data graphs 20160601
David Wood
 
When Metaphors Kill
When Metaphors KillWhen Metaphors Kill
When Metaphors Kill
David Wood
 
Secularism in Australia
Secularism in AustraliaSecularism in Australia
Secularism in Australia
David Wood
 
Meditations on Writing in Paradoxes, Oxymorons, and Pleonasms
Meditations on Writing in Paradoxes, Oxymorons, and PleonasmsMeditations on Writing in Paradoxes, Oxymorons, and Pleonasms
Meditations on Writing in Paradoxes, Oxymorons, and PleonasmsDavid Wood
 
Building a writer's platform with social media
Building a writer's platform with social mediaBuilding a writer's platform with social media
Building a writer's platform with social media
David Wood
 
Summary of the Hero's Journey
Summary of the Hero's JourneySummary of the Hero's Journey
Summary of the Hero's Journey
David Wood
 
Open by Default
Open by DefaultOpen by Default
Open by Default
David Wood
 
Lod Then, Now and Next 20110926
Lod Then, Now and Next 20110926Lod Then, Now and Next 20110926
Lod Then, Now and Next 20110926David Wood
 
Linked Data ROI 20110426
Linked Data ROI 20110426Linked Data ROI 20110426
Linked Data ROI 20110426
David Wood
 
Introduction to Linked Data: RDF Vocabularies
Introduction to Linked Data: RDF VocabulariesIntroduction to Linked Data: RDF Vocabularies
Introduction to Linked Data: RDF VocabulariesDavid Wood
 
Introduction to Linked Data: RDF Vocabularies
Introduction to Linked Data: RDF VocabulariesIntroduction to Linked Data: RDF Vocabularies
Introduction to Linked Data: RDF VocabulariesDavid Wood
 
Introduction to Linked Data: RDF Vocabularies
Introduction to Linked Data: RDF VocabulariesIntroduction to Linked Data: RDF Vocabularies
Introduction to Linked Data: RDF VocabulariesDavid Wood
 
Intro to Linked Data: SPARQL
Intro to Linked Data: SPARQLIntro to Linked Data: SPARQL
Intro to Linked Data: SPARQLDavid Wood
 
Intro to Linked Data: Data Modeling
Intro to Linked Data: Data ModelingIntro to Linked Data: Data Modeling
Intro to Linked Data: Data ModelingDavid Wood
 

More from David Wood (20)

Internet of Things (IoT) two-factor authentication using blockchain
Internet of Things (IoT) two-factor authentication using blockchainInternet of Things (IoT) two-factor authentication using blockchain
Internet of Things (IoT) two-factor authentication using blockchain
 
Methods for Securing Spacecraft Tasking and Control via an Enterprise Ethereu...
Methods for Securing Spacecraft Tasking and Control via an Enterprise Ethereu...Methods for Securing Spacecraft Tasking and Control via an Enterprise Ethereu...
Methods for Securing Spacecraft Tasking and Control via an Enterprise Ethereu...
 
BlockSW 2019 Keynote
BlockSW 2019 KeynoteBlockSW 2019 Keynote
BlockSW 2019 Keynote
 
Controlling Complexities in Software Development
Controlling Complexities in Software DevelopmentControlling Complexities in Software Development
Controlling Complexities in Software Development
 
Implementing the Verifiable Claims data model
Implementing the Verifiable Claims data modelImplementing the Verifiable Claims data model
Implementing the Verifiable Claims data model
 
So You Wanna be a Startup CTO 20170301
So You Wanna be a Startup CTO 20170301So You Wanna be a Startup CTO 20170301
So You Wanna be a Startup CTO 20170301
 
Functional manipulations of large data graphs 20160601
Functional manipulations of large data graphs 20160601Functional manipulations of large data graphs 20160601
Functional manipulations of large data graphs 20160601
 
When Metaphors Kill
When Metaphors KillWhen Metaphors Kill
When Metaphors Kill
 
Secularism in Australia
Secularism in AustraliaSecularism in Australia
Secularism in Australia
 
Meditations on Writing in Paradoxes, Oxymorons, and Pleonasms
Meditations on Writing in Paradoxes, Oxymorons, and PleonasmsMeditations on Writing in Paradoxes, Oxymorons, and Pleonasms
Meditations on Writing in Paradoxes, Oxymorons, and Pleonasms
 
Building a writer's platform with social media
Building a writer's platform with social mediaBuilding a writer's platform with social media
Building a writer's platform with social media
 
Summary of the Hero's Journey
Summary of the Hero's JourneySummary of the Hero's Journey
Summary of the Hero's Journey
 
Open by Default
Open by DefaultOpen by Default
Open by Default
 
Lod Then, Now and Next 20110926
Lod Then, Now and Next 20110926Lod Then, Now and Next 20110926
Lod Then, Now and Next 20110926
 
Linked Data ROI 20110426
Linked Data ROI 20110426Linked Data ROI 20110426
Linked Data ROI 20110426
 
Introduction to Linked Data: RDF Vocabularies
Introduction to Linked Data: RDF VocabulariesIntroduction to Linked Data: RDF Vocabularies
Introduction to Linked Data: RDF Vocabularies
 
Introduction to Linked Data: RDF Vocabularies
Introduction to Linked Data: RDF VocabulariesIntroduction to Linked Data: RDF Vocabularies
Introduction to Linked Data: RDF Vocabularies
 
Introduction to Linked Data: RDF Vocabularies
Introduction to Linked Data: RDF VocabulariesIntroduction to Linked Data: RDF Vocabularies
Introduction to Linked Data: RDF Vocabularies
 
Intro to Linked Data: SPARQL
Intro to Linked Data: SPARQLIntro to Linked Data: SPARQL
Intro to Linked Data: SPARQL
 
Intro to Linked Data: Data Modeling
Intro to Linked Data: Data ModelingIntro to Linked Data: Data Modeling
Intro to Linked Data: Data Modeling
 

Recently uploaded

Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
TechSoup
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
Celine George
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
Vikramjit Singh
 
Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic Imperative
Peter Windle
 
Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345
beazzy04
 
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th SemesterGuidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Atul Kumar Singh
 
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXXPhrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
MIRIAMSALINAS13
 
The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
Vivekanand Anglo Vedic Academy
 
Instructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxInstructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptx
Jheel Barad
 
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
Nguyen Thanh Tu Collection
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
TechSoup
 
678020731-Sumas-y-Restas-Para-Colorear.pdf
678020731-Sumas-y-Restas-Para-Colorear.pdf678020731-Sumas-y-Restas-Para-Colorear.pdf
678020731-Sumas-y-Restas-Para-Colorear.pdf
CarlosHernanMontoyab2
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
Mohd Adib Abd Muin, Senior Lecturer at Universiti Utara Malaysia
 
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdfAdversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Po-Chuan Chen
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
Atul Kumar Singh
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
JosvitaDsouza2
 
Palestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptxPalestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptx
RaedMohamed3
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
camakaiclarkmusic
 
The geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideasThe geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideas
GeoBlogs
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
Balvir Singh
 

Recently uploaded (20)

Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
 
Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic Imperative
 
Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345
 
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th SemesterGuidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th Semester
 
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXXPhrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
 
The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
 
Instructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxInstructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptx
 
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
 
678020731-Sumas-y-Restas-Para-Colorear.pdf
678020731-Sumas-y-Restas-Para-Colorear.pdf678020731-Sumas-y-Restas-Para-Colorear.pdf
678020731-Sumas-y-Restas-Para-Colorear.pdf
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
 
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdfAdversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
 
Palestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptxPalestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptx
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
 
The geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideasThe geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideas
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
 

Returning to Online Privacy?

  • 1. 1 Returning to Online Privacy? Dr. David Hyland-Wood david@hyland-wood.org 5 November 2019
  • 2.
  • 3. The people held the government, but they did not hold the power. “
  • 4.
  • 5.
  • 6.
  • 7.
  • 8. ” When the missionaries came to Africa, they had the Bible and we had the land. They said “let us close our eyes and pray.” When we opened them, we had the Bible, and they had the land.
  • 9.
  • 10.
  • 11.
  • 12.
  • 14.
  • 15. Anatomy of a Verifiable Credential Verifiable Credential Issuer Signature ClaimsClaimsClaims Credential Identifier Credential MetadataCredential MetadataCredential Metadata 17
  • 16. Verifiable Credentials Ecosystem 18 Issuer (Website) Government, Employer, etc. Verifier (Website) Company, Bank, etc. Holder (Digital Wallet / Personal Data Store) Citizen, Employee, etc. Issue Credentials Present Profiles
  • 17. W3C Verifiable Credentials 19 The mission of the W3C Verifiable Claims Working Group: Express credentials on the Web in a way that is cryptographically secure, privacy respecting, and automatically verifiable.
  • 18. The laws of mathematics are very commendable, but the only law that applies in Australia is the law of Australia.“
  • 19. The Web’s Identifier Problem 21 To date, every identifier you use online does not belong to you; it belongs to someone else. This results in problems related to cost, data portability, data privacy, and data security.
  • 20. Why is this a problem? 22 500 Million guests 412 Million users 145 Million users 110 Million shoppers 3,000 Million users
  • 21. Web Identifiers Today 23 Domain Name System (Identifiers are leased to individuals) Issuer (Website) Government, Employer, etc. Verifier (Website) Company, Bank, etc. Holder (Digital Wallet / Personal Data Store) Citizen, Employee, etc. Issue Credentials Present Profiles
  • 22. What is missing? 24 Many portable identifiers for any person, organisation, or thing that does not depend on a centralised authority, are protected by cryptography, and enable privacy and data portability.
  • 23. Decentralised Identifiers 25 A new type of globally resolvable, cryptographically-verifiable identifier, registered directly on a distributed ledger or blockchain
  • 24. What does a DID look like? 26 did:example:123456789abcdefghijk Schem e DID Method DID Method Specific String did:v1:nym:DwkYwcoyUXHNkpj3whn4DgXB4fcg9gj95vKxYN2apkZD Example:
  • 25. DIDs Resolve to DID Documents 27 { "@context": "https://w3id.org/veres-one/v1", "id": "did:v1:nym:DwkYwcoyUXHNkpj3whn4DgXB4fcg9gj95vKxYN2apkZD", "authentication": [{ "type": "Ed25519SignatureAuthentication2018", "publicKey": [{ "id": "did:v1:test:nym:DwkYwcoyUXHNkpj3whn4DgXB4fcg9gj95vKxYN2apkZD#authn-key-1", "type": "Ed25519VerificationKey2018", "owner": "did:v1:nym:DwkYwcoyUXHNkpj3whn4DgXB4fcg9gj95vKxYN2apkZD", "publicKeyBase58": "DwkYwcoyUXHNkpj3whn4DgXB4fcg9gj95vKxYN2apkZD" }] }], "service": [{ "type": "ExampleMessagingService", "serviceEndpoint": ”https://example.com/services/messages” }], … more DID-specific information here … } 1. Authentication Mechanisms 3. Service Discovery 2. Public Key Material
  • 26. Decentralized Identifiers 28 Decentralized Identifiers (Identifiers are owned by individuals) Blockchains / DHTs (Decentralized Ledger) Veres One, Sovrin, Bitcoin, Ethereum, etc. Issuer (Website) Government, Employer, etc. Verifier (Website) Company, Bank, etc. Holder (Digital Wallet / Personal Data Store) Citizen, Employee, etc. Issue Credentials Present Profiles
  • 27. 29
  • 28. © 2018 Tim Whyatt
  • 29. (David) Wheeler’s Law All problems in computer science can be solved by another level of indirection, but that will usually
  • 30. (David) Wheeler’s Law All problems in computer science can be solved by another level of indirection, but that will usually create another problem.
  • 32. Acknowledgments 34 ● Vintage 1984 movie poster modified from a version by Flikr user “book radio”, CC-BY-2.0 license, https://www.flickr.com/photos/bookdio/14164592302 ● Photo of the bombing of La Moneda (Chilean presidential palace) on 11 Sep 1973 by Biblioteca del Congreso Nacional, CC-BY-3.0-CL license, https://commons.wikimedia.org/w/index.php?curid=16325488 ● Photo of Salvador Allende, CC-BY-3.0-CL license, https://commons.wikimedia.org/wiki/File:Salvador_Allende_1952.JPG ● Salvador Allende quote from United States Congress, House Committee on Foreign Affairs (1789-1975), “Hearings, Reports and Prints of the House Committee on Foreign Affairs”, U.S. Government Printing Office, 1975, pp 585 ● Project Cybersyn operations room photo by Source, fair use due to historical significance (low resolution) for educational purposes, https://en.wikipedia.org/w/index.php?curid=12937653, https://en.wikipedia.org/wiki/Project_Cybersyn#/media/File:Cybersyn_control_room.jpg ● Nuremburg Laws illustration German Government (“Entwurf Willi Hackenberger”, “Copyright by Reichsausschuß für Volksgesundheitsdienst”, government agency apparently part of the Reichs- und Preußisches Ministerium des Innern), in the public domain, https://commons.wikimedia.org/wiki/File:Nuremberg_laws_Racial_Chart.jpg ● Photo of birth and death records in a family bible by Chuck Coker, CC BY-ND 2.0 license, https://www.flickr.com/photos/caveman_92223/3288595909 ● IDC projections from IDC White Paper, The Digitization of the World - From Edge to Core, Doc# US44413318, November 2018, https://www.seagate.com/www-content/our-story/trends/files/idc-seagate-dataage-whitepaper.pdf
  • 33. Acknowledgments 35 ● Illustration of “Saltbush Bill's Second Fight” by Frank Mahony, The Antipodean, Public Domain, https://commons.wikimedia.org/w/index.php?curid=37814122 ● Illustration of Henry Lawson’s The Team by an unknown artist, The Australian Town and Country Journal, Public Domain, https://en.wikipedia.org/wiki/The_Teams#/media/File:The_Teams_-_illo.png ● Brisbane City Hall photo by Tanya Dedyukhina, CC-BY-3.0 license, https://commons.wikimedia.org/wiki/File:Brisbane_City_Hall_-_panoramio.jpg ● Photo of Desmond Tutu provided by Lavinia Browne under the public domain, https://commons.wikimedia.org/wiki/File:Archbishop-Tutu-medium.jpg ● Desmond Tutu quote from Steven Gish, Desmond Tutu: A Biography, 2004, pp. 101 (although potentially originally attributable to Rolf Hochhuth, The Deputy, a Christian tragedy, Grove Press, 1964, pp. 144) ● Credit cards photograph by Nick Youngson, CC BY-SA 3.0 license, http://www.picserver.org/c/credit-cards26.html ● Wiretap meme courtesy of Reddit user benjaminikuta, February 2018 ● Privacy vs. Anonymity chart used by many, but possibly originally by Adam Ludwin, 20 January 2015, https://coincenter.org/entry/how-anonymous-is-bitcoin
  • 34. Copyright and Trademark Attribution 36 Corporate logos used in this presentation are the registered trademarks of their respective companies. Logos are used for educational purposes only under fair use provisions of copyright law. The lowest resolution visible to the audience was used.

Editor's Notes

  1. On the 11th of September, warplanes bombed the presidential mansion. Within five hours, the president committed suicide in his office as Army troops supporting the coup stormed the building. The oldest and most apparently stable democracy in its region was toppled by its own federal police and military. This was no simple power grab. The culprits were well known: A deadly combination of foreign interference in elections, including from a superpower’s intelligence agencies, and the raw greed of those controlling access to rich mineral deposits combined to create an atmosphere of political bifurcation. Right wing parties controlled the legislature while the left controlled the executive. The date was the 11th of September 1973. The place was La Moneda the presidential palace of Santiago, Chile.
  2. The president was Salvador Allende, a physician and the first Marxist ever elected to lead a democratic country. In the three years that followed, the government of dictator General Augusto Pinochet imprisoned 130,000 people in country where 50% of the GDP was controlled by only 300,000. What, I hear you ask, does this have to do with libraries? Everything, it turns out, because it has to do with data and how we choose to use it in our societies. Librarians, and a few philosophers, have been the only ones asking questions about data, its organisation, its long term storage and the ethics of its access for many centuries. This has been true across many forms of government since Aristotle first organised his books in a hierarchy and Callimachus of Cyrenae expanded that system in the Pinakes.
  3. Allende’s government had spent three years attempting to remove foreign control of the key mining industries, especially copper. They did that by nationalising those industries, and attempting to run them from the government. This is not the bridge of the original Star Trek series; it is the operations room of Project Cybersyn, the government control centre of the new economy. Cybersyn collected an unprecedented amount of data from 500 factories via a network of telex machines. Data was collected on individual workers, such as when they did or not show up for work, as well as production schedules. Data from Cybersyn was used to organise relief supplies coming into Santiago during a truckers strike. The breaking of that strike would be used to justify the following year’s coup. NB: Cybersyn is a portmanteau of the words "cybernetics" and "synergy".
  4. It was not the first time in history data collection was used to facilitate a coup or the brutal crackdown that followed. The Nazi Party used census data first collected in 1840s Prussia to perpetrate the Holocaust. A question regarding household religion was added to the census nearly a century before it was used by Nazi eugenicists under the Nuremberg Laws to determine who was allowed to marry, who could be permitted to have children, and finally who was sent to concentration camps for enslavement and execution.
  5. The amount of data involved was tiny: How many people in a house, their ages and gender, what was the family religion? By 1970s Chile, when did they show up for work? It was not much more than the birth and death listings most often kept in a family Bible. NB: My own father’s birthday was originally written in such a document, and eventually transferred to county records. But my grandmother was off by a year. It was easy to happen after ten children and while running a family farm, but it was a source of frustration to my father when he went to enlist in World War II, or to acquire his retirement benefits.
  6. These basic forms of data collection were the common experience of Australia’s current culture’s formative years. It wasn’t that long ago.
  7. We don’t think about how quickly this has changed. The Brisbane City Hall was built, mostly by hand, just two generations after Patterson and Lawson wrote their most well-known works. Elsewhere, countries were already creating skyscrapers that would require the marriage of people and increasingly capable machinery to build. NB: Within the living memory of my parents Brisbane City Hall, started 1920, finished 1930 Empire State Building, started 1930, finished 1931 Last year I watched a house across the street from me being built in St. Lucia by only two men - and some very capable remote controlled robots. Our machines have moved well beyond their ability to help us physically. They are now helping us create, manipulate, distribute and communicate information.
  8. As our populations grew, it was our Governments who would act as trusted third parties for transactions that would prove situational identity, e.g. library card, door pass, drivers license. These are all done in advance for later use. They help us navigate a world full of strangers with whom we must interact.
  9. But those abilities come with a warning label. Power and greed can change a society very, very quickly.
  10. We are now in a period of time when the data we both produce and collect for use is growing at an unprecedented rate. Our machines are also creating data for us and about us. 2013 was the first year Internet traffic was created majority by machines. Human Internet traffic has been in the minority ever since. Our data is also (disproportionally) moving out of our hands. We are giving this data to others to hold for us, and often for it to be used to advertise to us, sell to us, manipulate our behaviours, and sometimes to control our behaviours.
  11. Our new sources of data come predominately from corporations, not from governments. In most cases, it comes from our actions as we move through our digital world. Our credit cards are joined by loyalty cards, such as Fly Buys, Velocity, coffee cards, etc. These are all opportunities to give data about your life and your habits to someone. The key to collecting information is to develop systems where users willingly provide it. Facebook and other social networks followed the card companies in this business model. Google performs 2.3M searches per minute, and considers 200 factors to arrive at each search result. That is a staggering amount of data about our personal lives. It is, in short, the greatest tool for authoritarianism ever produced.
  12. We are even inviting these systems into our personal lives, sometimes in very intimate ways. We have learned this year that Google, Apple and others have been able to distinguish when home users of these technologies have been sleeping, eating, working, and having sex. Of course, they also know when you are home and when you are not. You might think this is hardly mainstream, but last year Fortune magazine reported “32% of the country already owns a smart speaker and another 16% plan on getting one this holiday season.” Children, and their habits, are now often tracked from birth.
  13. Starting in 2016, China’s Social Credit System is actively implementing a system based on strong knowledge of identity and reputation to decide who is more valuable for work, housing, social mobility, and travel. What kind of society do we want? The Social Credit System has been called, in headlines, a privacy invasion, state innovation, a way to restore trust in society, an Orwellian degree of control. Which is it? Well, all of them, of course.
  14. What are we to do? Should we go “all in” as China has (and India might), defer entirely to corporations like the U.S., legislate privacy like the E.U.? We do have hints of other options if we analyse what we mean by privacy. The Bitcoin and Ethereum blockchains have shown us it is possible to conduct anonymous transactions in plain sight.
  15. The W3C, the organisation that brought you the Web and ensured it was built to be accessed by all of humanity, has taken up this challenge. However reluctantly.
  16. Let’s have a quick look at a credential. They all have similar characteristics.
  17. We get our credentials from somewhere (e.g. Government, Facebook), they are stored somewhere, and used to prove who we are (and what we should have access to).
  18. Cryptographically secure… could be a problem at the moment.
  19. This is a problem because we cannot trust the people currently doing it for us. Marriot: 2018 Equifax: 2017 AFF: 2016 Ebay: 2014 Yahoo: 2013 Target: 2013 Australia 2019 (Jan only!): Nova Entertainment Victorian Public Servants Hawthorn Football Club Big W Early Warning Network Marriott (again) and Starwood Hotels NSW Department of Planning and Environment First National Real Estate Fisheries Queensland Collection #1 Optus SkoolBag My Health Records Facebook
  20. The companies working to implement verifiable credentials generally wish to offer you a service, for a fee. There are currently 13, including some of the big ones, who have committed to an implementation of the upcoming standard.
  21. We have yet to determine how blockchain-based monetary systems, distributed identifiers, or similar technologies will impact our societies. Of particular note is our involvement with law enforcement. Sometimes the only thing that protects us is the aphorism that “real data is dirty”. The data others hold about us is not always accurate, nor timely. However, it is getting more so on a daily basis. It is time to protect ourselves by design.
  22. This suggestion is simply another level of indirection. So, a caveat. David Wheeler: First PhD in CS (Cambridge, 1951) and inventor of the subroutine.
  23. Wheeler is most often misquoted by leaving off the end of his sentence. It is wise to take heed.
  24. Slides are available here.