[Click here if you’d like some
privacy]
The Quantum Thief:
Negotiating privacy in the
hyper-connected world
Andres Guadamuz
University of Sussex
Did you think I was going to
skip this slide?
Always on-surveillance is
coming
Wearable computing
Capture all those cute
moments as they happen
The Internet is for porn
Resistance is futile
Despair
Here, have a drink...
... and a kitten
The Quantum Thief
by Hannu Rajaniemi
What do you do when
EVERYTHING can be recorded?
Privacy protocols
Exomemory: public collective
memory, everyone can access
Gevulot: “Border”, protocol
that allows everyon...
Proposal 1: Open privacy
standards
Proposal 2: Design all tech
devices with built-in gevulot
Concluding
[This recording will now end]
Upcoming SlideShare
Loading in …5
×

The Quantum Thief: Negotiating privacy in the hyper-connected world

1,104 views

Published on

Presented at Gikii, September 17, 2013.

Published in: Technology, News & Politics
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
1,104
On SlideShare
0
From Embeds
0
Number of Embeds
15
Actions
Shares
0
Downloads
3
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

The Quantum Thief: Negotiating privacy in the hyper-connected world

  1. 1. [Click here if you’d like some privacy]
  2. 2. The Quantum Thief: Negotiating privacy in the hyper-connected world Andres Guadamuz University of Sussex
  3. 3. Did you think I was going to skip this slide?
  4. 4. Always on-surveillance is coming
  5. 5. Wearable computing
  6. 6. Capture all those cute moments as they happen
  7. 7. The Internet is for porn
  8. 8. Resistance is futile
  9. 9. Despair
  10. 10. Here, have a drink...
  11. 11. ... and a kitten
  12. 12. The Quantum Thief by Hannu Rajaniemi
  13. 13. What do you do when EVERYTHING can be recorded?
  14. 14. Privacy protocols Exomemory: public collective memory, everyone can access Gevulot: “Border”, protocol that allows everyone to set their desired level of privacy. Agora: Public spaces where no gevulot works
  15. 15. Proposal 1: Open privacy standards
  16. 16. Proposal 2: Design all tech devices with built-in gevulot
  17. 17. Concluding
  18. 18. [This recording will now end]

×