Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

The Pandora Security Model

156 views

Published on

Data Driven Innovation Conference, Rome 24/02/2017

This talk is about the relationships and problems between digital identities and the data silos where we are storing all our digital life. I will go into deeper details about the Pandora Security model (a new model for dealing such problems), the need for a truly decentralised and persistent web and how to build a new digital tradition.

Discover more at http://blog.zigolab.it

Published in: Internet
  • Be the first to comment

  • Be the first to like this

The Pandora Security Model

  1. 1. 1 THEPANDORA
 SECURITYMODEL Alessandro Confetti 24-FEB-2017 Il vaso di Pandora, 2011 by Paride Cevolani
  2. 2. Whatis thepurpose ofasecurity model? 2Alessandro Confetti - The Pandora Security Model
  3. 3. 33 photo by S. DocChewbacca, CC BY-SA 2.0Alessandro Confetti - The Pandora Security Model THEOLDPIRATE
 SECURITYMODEL
  4. 4. Doweknow ourtreasure? 4Alessandro Confetti - The Pandora Security Model
  5. 5. Culture&Knowledge 5 the world of books WRITTEN TRADITION the power of hyperlinks DIGITAL TRADITION the magic of voice ORAL TRADITION Alessandro Confetti - The Pandora Security Model
  6. 6. DigitalTradition GOOD NEWS There never was in all of human history a more thriving and widespread production and consumption of culture and knowledge. BAD NEWS There never was in all of human history an easier way of destroying culture and knowledge: just cut a cable, or switch off the power 6Alessandro Confetti - The Pandora Security Model
  7. 7. The5ParadoxesofDigitalContent 7 1 centralized 
 data silos Available everywhere but stored in very few places 2 permanent & distributed web Easy to find only if it remains in the same place 3 metadata & semantic web Easy to search but hard to catalog 4 digital rights management Cheap to duplicate but costly to attribute 5 sw & hw obsolescence Storage & access are both encoded Alessandro Confetti - The Pandora Security Model
  8. 8. Pandora’sgoal PROTECT THE ACCESS AND PRESERVE BOTH THE CONTENTS AND THE LINKS 1st 8Alessandro Confetti - The Pandora Security Model
  9. 9. Howmany storagevaults? 9Alessandro Confetti - The Pandora Security Model
  10. 10. 1010 illustration by ecay THEFORTYTHIEVES STORAGEMODEL Alessandro Confetti - The Pandora Security Model
  11. 11. PandoraLinkedJars 11 1 3 2 4 SECRET Data to be destroyed 
 ofter our death PROTECTED Data we want to share with someone PRIVATE Data we don’t want 
 to share as long we are alive PUBLIC Data we want to share with everyone 3 FICTIONAL Data we want to share with everyone 3 ANONYMOUS Data we want to share with everyone but not be traced Alessandro Confetti The Pandora Security Model
  12. 12. Pandora’sgoal ONCE DATA IS MOVED FROM A LOWER LEVEL JAR, IT CAN’T GO BACK 2th 12Alessandro Confetti - The Pandora Security Model
  13. 13. UsefulLinks 13 Distributed and Permanent Web The Inventors of the Internet Are Trying to Build a Truly Permanent Web Decentralized Web Summit Evolving terminology with evolved technology: decentralized versus distributed Solid - Re-decentralizing the web p2p & distributed file system projects: IPFS, SWARM 01 02 03 04 05 Alessandro Confetti - The Pandora Security Model About the right to be forgotten European’s Commission factsheet Vint Cerf – A Web that Archives Itself 01 02
  14. 14. AuthenticationStrategies 14 i.e passwords, personal questions what you know i.e smartcards, tokens, keys, smartphones what you own i.e biometric info who you are Alessandro Confetti - The Pandora Security Model
  15. 15. Howmany digital identities? 15Alessandro Confetti - The Pandora Security Model
  16. 16. 1616 This image is a part of "Creation of Adam" by MichelangeloAlessandro Confetti - The Pandora Security Model THEMONOTHEISTIC DIGITALIDENTITY MODEL
  17. 17. Pandora’sgoal USE AT LEAST AS MANY IDENTITIES AS YOUR JARS 3rd 17Alessandro Confetti - The Pandora Security Model
  18. 18. MultipleLinkedIdentities 18 PRIVATE IDENTITIES SECRET IDENTITIES FICTIONAL IDENTITIES PUBLIC IDENTITIES HUMAN BEINGS PROTECTED IDENTITIES ANONYMOUS IDENTITIES A.I.(s) Alessandro Confetti - The Pandora Security Model
  19. 19. Pandora’sgoal ENCOURAGE MULTIPLE IDENTITIES 4nd 19Alessandro Confetti - The Pandora Security Model
  20. 20. UsefulLinks 20 Digital Identity for Indian Government’s Aadhaar project 
 see Wired or Harvard Business School articles for Italian Government’s initiatives see SPID and ANPR for China citizens’ rating system see Pagina99 article for blockchain Identity Management see NameCoin and OneName 01 02 03 04 Alessandro Confetti - The Pandora Security Model Copyrights Leaked European Commission Copyright Plans 
 Ignore the Public Interest Upload Filtering Mandate Would Shred 
 European Copyright Safe Harbor What the heck is ancillary copyright 
 and why do we call it the Link Tax? 01 02 03
  21. 21. What’s insidethejar? 21Alessandro Confetti - The Pandora Security Model
  22. 22. 2222 photo by Andy Moore, CC BY-NC-ND 2.0 THEVOGON CATALOGSYSTEM
  23. 23. The4WsTagsFolksonomy 23 Alessandro Confetti - The Pandora Security Model 01WHO 03WHERE 04WHEN . 02WHAT
  24. 24. Pandora’sgoal STORE CONTENT AND METADATA TOGETHER 5th 24Alessandro Confetti - The Pandora Security Model
  25. 25. UsefulLinks 25 Ontologies & Folksonomies Evolving Ontologies from Folksonomies: Tagging as a Complex System Ontology vs Folksonomy Five Ws MP3 & metadata: meet ID3 01 02 03 04 Alessandro Confetti - The Pandora Security Model
  26. 26. Isformat important? 26Alessandro Confetti - The Pandora Security Model
  27. 27. 2727 photo by Gareth James, CC BY-NC 2.0Alessandro Confetti - The Pandora Security Model THECAVEMAN CONTENTCREATOR PARADIGM
  28. 28. Pandora’sgoal ALWAYS KEEP THE FORMAT READABLE WITH THE AVAILABLE TOOLS 6th 28Alessandro Confetti - The Pandora Security Model
  29. 29. UsefulLinks 29 Digital Obsolescence & Preservation When Data Disappears The Battle Against Digital Obsolescence Blue Ribbon Task Force on Sustainable Digital Preservation and Access 01 02 03 Alessandro Confetti - The Pandora Security Model
  30. 30. ThePandoraSecurityModel Testbed 30 Content without metadata has no value; ontologies should not be imposed Content & Metadata Unreadable content has no value; Open formats and tools are essential Format is important stop complaining about the right to forget; fight for the right to be remembered Published data can’t be forgotten protect the access and preserve both the contents and the links Protect & Preserve encourage multiple identities
 but let them be classified; a.i. & bots need an identity Multiple Digital Identies link the storage to just one identity and classify it upon purpose One jar for each purpose Alessandro Confetti - The Pandora Security Model
  31. 31. FOLLOW ME ONALESSANDRO CONFETTI OSLO srl CTO alessandro.confetti@oslo.it READ ME ON my blog - imille.org - medium GET IN TOUCH alessandro.confetti@zigolab.it THANKYOU! The Pandora Security Model

×