5. 3 lessons Privacy is in the details- how do you deal with
exceptions and false positives? Institutionalise privacy protection
In a high-trust environment, the more you speak about privacy
protection, the more nervous people get about privacy 5
6. But trust is rapidly eroding 6
7. And is actually worse in reality 7 Source:
http://www.theguardian.com/world/interactive/2013/jul/31/nsa-xkeyscore-program-full-presentation
10. Conspiracy theories natural 10 Source:
http://www.nbr.co.nz/article/dictators-guide-internet-how-balkanize-dirty-web-ck-143819
The Dictators Guide to the Internet: How to Balkanize the Dirty Web
Ian Apperley in the National Business Review
11. Major online service providers also under scrutiny 11
Source:
http://www.metafilter.com/95152/Userdriven-discontent#3256046
13. Mandatory notifications? 13 For major security breaches, a
good idea but...
14. 14 1. Anonymity online is a myth
15. 15 2. Take sensible steps Source:
http://mashable.com/2013/04/30/facebook-graph-search-privacy-infographic/
But accept people are human and very poor at risk evaluation
Excellent read: http://www.schneier.com/essay-155.html
16. 16 3. Consider if you are willing to pay for privacy.
Professionals and businesses should consider confidentiality and
legal risks. Source:
http://paranoia.dubfire.net/2011/11/two-honest-google-employees-our.html
17. 17 So, what am I doing? Source:
http://romanticactoftheday.blogspot.co.nz/2012/09/your-gold-plated-word.html
18. 1. Talking about the issues 18 Source:
http://internetganesha.wordpress.com/
19. 2. Becoming a cypherpunk 19 An activist advocating
widespread use of strong cryptography as a route to social and
political change Source: http://en.wikipedia.org/wiki/Cypherpunk
Source:
http://goldenageofgaia.com/2010/12/cypherpunk-the-origin-of-wikileaks/
20. 20 1x 1x 1 million x
21. Customers perspective 21 Dont be a low hanging victim Send
sealed letter, not postcard
22. Crypto for the masses Perceived need It has to just work No
compromise in functionality Real security requires end-to-end
encryption 22
24. Inspiration from the Bitcoin system Decentralised ledgers
connected by crypto- enforced contracts Peer-to-peer, irreversible
transactions 51% agreement = truth Very low costs, global scale
24
25. Takeaways Design systems and processes for a low or zero
trust environment. Customers can take more responsibility and
actions to protect their privacy. Cryptography is expected to be
increasingly used online routinely, just like drawing curtains in
the Panopticon. 25