SlideShare a Scribd company logo
1 of 46
Why Names Matter:
How Online Identity is Deļ¬ning the Future of the Internet



               aestetix, SXSW
Do you... Google?
ā€œThankyouthankyouthankyou...ā€

Actual discussions on privacy issues

They listen to feedback! (gender privacy controls)

Better interface and usability than Facebook

Itā€™s so pretty!
... wait, wtf?
What *is* identity?
Does anyone know?
Deļ¬ning ā€œidentityā€



Identity is not the same thing as a name

Name: a label that is used to identify a person,
thing, or concept within a given context
Deļ¬ning ā€œidentityā€
Examples of context:
 Within a set group (con-goers, coworkers, staff)

 A particular location (Long Beach, Oakland, Berlin)

 A speciļ¬c time (ā€œmorningā€, 9PM, ā€œlast weekā€)

 An interest (ā€œJoe likes baseballā€)
Deļ¬ning ā€œidentityā€
Is identity internal or external?
 Self image (ā€œid, ego and superegoā€)

 Reputation and the Citizen Kane style construct

 ā€œThe only thing worse than being talked about is
 not being talked about.ā€ --Oscar Wilde
Deļ¬ning ā€œidentityā€
Conclusions about identity?
 The meaning of ā€œidentityā€ is so complex that
 neither Shakespeare nor Gandhi can deļ¬ne it.

 Identity, by its very nature, is multifaceted. Since
 identity is context dependent, no person has one
 single identity.
Different types of names
Birth (certiļ¬cate) name or given name

Legal name or ā€œwalletā€ name (thanks, Skud)

Government issued ID (DL, Passport, SSN)

Student ID, Employee ID, Credit card

Account information (medical records, various
bills, etc)
Different types of names
Pseudonym (Nom de Plume) - a name that is not
found on any previously mentioned documents

  May not be linkable to a document

Polynym - a name consisting of multiple words

Mononym - a name consisting of one word

Anonym - a name representing anonymity
Historical Nom de Plumes
Publius

Emperor Norton I

Nicholas Bourbaki

Richard Bachman,
Voltaire, Bronte Sisters, etc
Why do names matter?
Penn Jilletteā€™s MLK twitter mishap
Why do names matter?
Penn Jilletteā€™s MLK twitter mishap
Why do names matter?
WikiLeaks

  Content versus source

Porn WikiLeaks

AOL and Netļ¬‚ix databases

Wikipedia ā€œEssjayā€ controversy
What are social networks?
Examples of social networks:
 book groups             corporations

 knitting circles        events

 unions                  courtrooms

 a hobby or preference   a cause

 a village or town       a family
What are social networks?
A ā€œsocial networkā€ is a force that brings people or
their personas together on a regular basis.

A ā€œfriendā€ is a person that you would choose to be
in contact with.

Social networks help solve namespace collisions
What are social networks?


Intrapersonal versus interpersonal communication

(Dr. Robin) Dunbarā€™s Number (1992)

Dr. Cameron Marlowā€™s Facebook study (2009)

        HTTP://RICHARD-WILSON.BLOGSPOT.COM/2012/02/HEDGE-FUND-SOCIAL-NETWORKS.HTML
What are social networks?


Why do hacker handles
matter?

Joseph Campbell - right
hand and left hand path
Bringing Identity Online

Nissan.com

Whitehouse.com

Cybersquatting
Establishing Identity Online

HTTP Headers: referer, access times, URL
accessed, request sequence, frequency of access,
response headers

Using HTTP versus HTTPS

Are IP addresses enough? EFF says no.

How can a website conļ¬rm that you are you?
Social Effects on Privacy

What does transparency mean?

Is there such a thing as full transparency?

Who decides how transparent we get to be?

Active versus Passive communication of personal
information
Privacy-Promoting Tech

Using Tor

Selective logging

Privacy and sharing settings on websites

Remailers (Hail Eris)
Problems with Identity

Sockpuppets

ā€œAnonymous Cowardā€

Cyber-stalking

DDoS attacks (Anonymous, etc)
Does Identity Matter?
Eric Schmidt, Executive Chairman at Google:
  ā€œThe only way to manage this is true transparency and no
  anonymity. In a world of asynchronous threats, it is too
  dangerous for there not to be some way to identify you. We
  need a [veriļ¬ed] name service for people. Governments will
  demand it.ā€ (Techonomy, August 2010)

  ā€œIf you have something that you don't want anyone to know,
  maybe you shouldn't be doing it in the ļ¬rst place."(CNBC
  Interview, December 2009)
Does Identity Matter?
Mark Zuckerberg, CEO at Facebook:


 ā€œThe days of you having a different image for your work
 friends or co-workers and for the other people you know are
 probably coming to an end pretty quickly. Having two
 identities for yourself is an example of a lack of
 integrity.ā€ (Interview, October 2011)
Does Identity Matter?
Chris ā€œmootā€ Poole, Founder of 4chan

  ā€œThe portrait of identity online is often painted in
  black and white. Who you are online is who you
  are ofļ¬‚ine.
  ā€œHuman identity doesn't work like that online or
  ofļ¬‚ine. It's not 'who you share with,' it's 'who you
  share as.ā€™ Identity is prismatic.ā€ (Web 2.0)
Online Social Networks

Facebook - synchronous friend requests

Twitter - asynchronous following (unless protected)

Blog platforms - asynchronous (RSS feeds)

Google Plus - asynchronous circles

Diaspora - asynchronous, decentralized
ā€œWho Has Your Backā€ (EFF)




   https://whohasyourback.eff.org
Facebook Policies



From Facebookā€™s ā€œterms of serviceā€

  ā€œreal namesā€ is not deļ¬ned, seems case by case
Google Original ā€œReal Namesā€

The original policy from Community Standards:
  ā€œ13. Display Name:
  To help ļ¬ght spam and prevent fake proļ¬les, use the
  name your friends, family or co-workers usually call you.
  For example, if your full legal name is Charles Jones Jr.
  but you normally use Chuck Jones or Junior Jones, either
  of those would be acceptable.
Law and Order
ā€œ[Chief Justice] John Marshall has made his decision; now
let him enforce it!ā€ --President Andrew Jackson

  Both Facebook and Google Plus have a real
  names policy

  Letā€™s see how Google enforces theirs!
Appeal Process
July 23, 2011 - Filled out the appeal form

July 25, 2011 - ā€œNeilā€ from the Google plus
support team contacts me to initiate process, I
reply

July 26, 2011 - ā€œNeilā€ ļ¬rst tells me ā€œAestetixā€ is not
a ā€œcommon nameā€, asks me to conļ¬rm it is my
common name, I reply conļ¬rming it is
Appeal Process

July 27, 2011 - I get an email saying they ā€œneed a
government issued ID to conļ¬rm my name is
ā€˜Aesteixā€™.ā€

I reply to this to conļ¬rm they deļ¬ne a ā€œcommon
nameā€ exclusively as the name on a government
issued ID. I also ask what their policy for handling
government IDs is.
Appeal Process
July 28, 2011 - ā€œYour common name does not
have to be the name on your ID. ... I need to get
the name off your ID to conļ¬rm that your name is
aestetix.ā€

My reply: ā€œSo if the name is the only thing you
need, can you use the information I provided in my
appeal to make the same judgement? I'm
confused as to why it must be a "government
issued ID.ā€
Appeal Process

ā€œThank you for contacting us with regard to the name
you want to use with your Google Proļ¬le. After further
review, we have determined that your name is within our
Community Standards policy. Thank you for your patience
while we reviewed your proļ¬le name. I will trust it is your
real name. Most users just try to explain that it is the
pseudonym that they have always used.ā€
Appeal Process

ā€œThank you for contacting us with regard to the name you
want to use with your Google Proļ¬le. After further review,
we have determined that your name is within our
Community Standards policy. Thank you for your
patience while we reviewed your proļ¬le name. I will trust it
is your real name. Most users just try to explain that it is
the pseudonym that they have always used.ā€
Appeal Process

ā€œThank you for contacting us with regard to the name you
want to use with your Google Proļ¬le. After further review,
we have determined that your name is within our
Community Standards policy. Thank you for your
patience while we reviewed your proļ¬le name. I will
trust it is your real name. Most users just try to explain
that it is the pseudonym that they have always used.ā€
This shit again?
Iā€™m Not Alone!
Iā€™m Not Alone!
Lessons learned

Google doesnā€™t know what a ā€œcommon nameā€ is

Google is demanding sensitive information without
any security procedures or policies in place

If you know someone at Google, youā€™ll be ļ¬ne

Google doesnā€™t have a clue what ā€œidentityā€ means.
Closing Remarks
Steps in the right direction:

  Wikitrust.net

  Hypothes.is

  Diaspora (RIP IlyaZ)
Closing Remarks
Explore decentralized systems

All current solutions fail in some way

There is no such thing as a ā€œreal nameā€

Join or support efforts like Diaspora, Hypothesis,
Wikitrust, etc
Questions?
@aestetix

More Related Content

Similar to Slides for talk

CISummit 2013: Ron Burt, The Social Origins of Your Reputation: The Social Ps...
CISummit 2013: Ron Burt, The Social Origins of Your Reputation: The Social Ps...CISummit 2013: Ron Burt, The Social Origins of Your Reputation: The Social Ps...
CISummit 2013: Ron Burt, The Social Origins of Your Reputation: The Social Ps...
Steven Wardell
Ā 
Media and representation in rec
Media and representation in recMedia and representation in rec
Media and representation in rec
Mary Kearney
Ā 
Essay Writing Blogs
Essay Writing BlogsEssay Writing Blogs
Essay Writing Blogs
Janet Luebke
Ā 
2013 i was a paid internet shill
2013 i was a paid internet shill2013 i was a paid internet shill
2013 i was a paid internet shill
lovebotthe3rd
Ā 

Similar to Slides for talk (20)

CISummit 2013: Ron Burt, The Social Origins of Your Reputation: The Social Ps...
CISummit 2013: Ron Burt, The Social Origins of Your Reputation: The Social Ps...CISummit 2013: Ron Burt, The Social Origins of Your Reputation: The Social Ps...
CISummit 2013: Ron Burt, The Social Origins of Your Reputation: The Social Ps...
Ā 
Networking; past present and future; and the importance of personality
Networking; past present and future; and the importance of personalityNetworking; past present and future; and the importance of personality
Networking; past present and future; and the importance of personality
Ā 
Research Paper Example - Outline And Free Samples
Research Paper Example - Outline And Free SamplesResearch Paper Example - Outline And Free Samples
Research Paper Example - Outline And Free Samples
Ā 
Seminar 2 social networks
Seminar 2 social networksSeminar 2 social networks
Seminar 2 social networks
Ā 
How To Write A Good Discursive Essay Hand
How To Write A Good Discursive Essay  HandHow To Write A Good Discursive Essay  Hand
How To Write A Good Discursive Essay Hand
Ā 
Media and representation in rec
Media and representation in recMedia and representation in rec
Media and representation in rec
Ā 
Printable Polar Bear Journal Page Wild Bear Stationery
Printable Polar Bear Journal Page Wild Bear StationeryPrintable Polar Bear Journal Page Wild Bear Stationery
Printable Polar Bear Journal Page Wild Bear Stationery
Ā 
Business Paper Essay On Attachment Theory
Business Paper Essay On Attachment TheoryBusiness Paper Essay On Attachment Theory
Business Paper Essay On Attachment Theory
Ā 
Persuasive Techniques Teaching Writing, Writing
Persuasive Techniques Teaching Writing, WritingPersuasive Techniques Teaching Writing, Writing
Persuasive Techniques Teaching Writing, Writing
Ā 
Essay Writing Blogs
Essay Writing BlogsEssay Writing Blogs
Essay Writing Blogs
Ā 
Argumentative Essay Cause And Effect Essays
Argumentative Essay Cause And Effect EssaysArgumentative Essay Cause And Effect Essays
Argumentative Essay Cause And Effect Essays
Ā 
Easy Sat Essay Topics
Easy Sat Essay TopicsEasy Sat Essay Topics
Easy Sat Essay Topics
Ā 
Essay On Social Identity
Essay On Social IdentityEssay On Social Identity
Essay On Social Identity
Ā 
Social Networking for People Over Thirty
Social Networking for People Over ThirtySocial Networking for People Over Thirty
Social Networking for People Over Thirty
Ā 
Best Essay Writing Service Review
Best Essay Writing Service ReviewBest Essay Writing Service Review
Best Essay Writing Service Review
Ā 
2013 i was a paid internet shill
2013 i was a paid internet shill2013 i was a paid internet shill
2013 i was a paid internet shill
Ā 
Analytical Essay Help
Analytical Essay HelpAnalytical Essay Help
Analytical Essay Help
Ā 
September 24 (73X)
September 24 (73X)September 24 (73X)
September 24 (73X)
Ā 
Essay 1 - TACN3 - Write A 300 Word Essay On The Foll
Essay 1 - TACN3 - Write A 300 Word Essay On The FollEssay 1 - TACN3 - Write A 300 Word Essay On The Foll
Essay 1 - TACN3 - Write A 300 Word Essay On The Foll
Ā 
DIGITAL-SELFWHO-AM-I-IN-THE-CYBERWORLD.pptxfinal.pptx
DIGITAL-SELFWHO-AM-I-IN-THE-CYBERWORLD.pptxfinal.pptxDIGITAL-SELFWHO-AM-I-IN-THE-CYBERWORLD.pptxfinal.pptx
DIGITAL-SELFWHO-AM-I-IN-THE-CYBERWORLD.pptxfinal.pptx
Ā 

Recently uploaded

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
Ā 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
Enterprise Knowledge
Ā 

Recently uploaded (20)

08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
Ā 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
Ā 
šŸ¬ The future of MySQL is Postgres šŸ˜
šŸ¬  The future of MySQL is Postgres   šŸ˜šŸ¬  The future of MySQL is Postgres   šŸ˜
šŸ¬ The future of MySQL is Postgres šŸ˜
Ā 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
Ā 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
Ā 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
Ā 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Ā 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
Ā 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
Ā 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
Ā 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
Ā 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
Ā 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
Ā 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
Ā 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
Ā 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
Ā 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
Ā 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
Ā 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
Ā 
Scaling API-first ā€“ The story of a global engineering organization
Scaling API-first ā€“ The story of a global engineering organizationScaling API-first ā€“ The story of a global engineering organization
Scaling API-first ā€“ The story of a global engineering organization
Ā 

Slides for talk

  • 1. Why Names Matter: How Online Identity is Deļ¬ning the Future of the Internet aestetix, SXSW
  • 3. ā€œThankyouthankyouthankyou...ā€ Actual discussions on privacy issues They listen to feedback! (gender privacy controls) Better interface and usability than Facebook Itā€™s so pretty!
  • 7. Deļ¬ning ā€œidentityā€ Identity is not the same thing as a name Name: a label that is used to identify a person, thing, or concept within a given context
  • 8. Deļ¬ning ā€œidentityā€ Examples of context: Within a set group (con-goers, coworkers, staff) A particular location (Long Beach, Oakland, Berlin) A speciļ¬c time (ā€œmorningā€, 9PM, ā€œlast weekā€) An interest (ā€œJoe likes baseballā€)
  • 9. Deļ¬ning ā€œidentityā€ Is identity internal or external? Self image (ā€œid, ego and superegoā€) Reputation and the Citizen Kane style construct ā€œThe only thing worse than being talked about is not being talked about.ā€ --Oscar Wilde
  • 10. Deļ¬ning ā€œidentityā€ Conclusions about identity? The meaning of ā€œidentityā€ is so complex that neither Shakespeare nor Gandhi can deļ¬ne it. Identity, by its very nature, is multifaceted. Since identity is context dependent, no person has one single identity.
  • 11. Different types of names Birth (certiļ¬cate) name or given name Legal name or ā€œwalletā€ name (thanks, Skud) Government issued ID (DL, Passport, SSN) Student ID, Employee ID, Credit card Account information (medical records, various bills, etc)
  • 12. Different types of names Pseudonym (Nom de Plume) - a name that is not found on any previously mentioned documents May not be linkable to a document Polynym - a name consisting of multiple words Mononym - a name consisting of one word Anonym - a name representing anonymity
  • 13. Historical Nom de Plumes Publius Emperor Norton I Nicholas Bourbaki Richard Bachman, Voltaire, Bronte Sisters, etc
  • 14. Why do names matter? Penn Jilletteā€™s MLK twitter mishap
  • 15. Why do names matter? Penn Jilletteā€™s MLK twitter mishap
  • 16. Why do names matter? WikiLeaks Content versus source Porn WikiLeaks AOL and Netļ¬‚ix databases Wikipedia ā€œEssjayā€ controversy
  • 17. What are social networks? Examples of social networks: book groups corporations knitting circles events unions courtrooms a hobby or preference a cause a village or town a family
  • 18. What are social networks? A ā€œsocial networkā€ is a force that brings people or their personas together on a regular basis. A ā€œfriendā€ is a person that you would choose to be in contact with. Social networks help solve namespace collisions
  • 19. What are social networks? Intrapersonal versus interpersonal communication (Dr. Robin) Dunbarā€™s Number (1992) Dr. Cameron Marlowā€™s Facebook study (2009) HTTP://RICHARD-WILSON.BLOGSPOT.COM/2012/02/HEDGE-FUND-SOCIAL-NETWORKS.HTML
  • 20. What are social networks? Why do hacker handles matter? Joseph Campbell - right hand and left hand path
  • 22. Establishing Identity Online HTTP Headers: referer, access times, URL accessed, request sequence, frequency of access, response headers Using HTTP versus HTTPS Are IP addresses enough? EFF says no. How can a website conļ¬rm that you are you?
  • 23. Social Effects on Privacy What does transparency mean? Is there such a thing as full transparency? Who decides how transparent we get to be? Active versus Passive communication of personal information
  • 24. Privacy-Promoting Tech Using Tor Selective logging Privacy and sharing settings on websites Remailers (Hail Eris)
  • 25. Problems with Identity Sockpuppets ā€œAnonymous Cowardā€ Cyber-stalking DDoS attacks (Anonymous, etc)
  • 26. Does Identity Matter? Eric Schmidt, Executive Chairman at Google: ā€œThe only way to manage this is true transparency and no anonymity. In a world of asynchronous threats, it is too dangerous for there not to be some way to identify you. We need a [veriļ¬ed] name service for people. Governments will demand it.ā€ (Techonomy, August 2010) ā€œIf you have something that you don't want anyone to know, maybe you shouldn't be doing it in the ļ¬rst place."(CNBC Interview, December 2009)
  • 27. Does Identity Matter? Mark Zuckerberg, CEO at Facebook: ā€œThe days of you having a different image for your work friends or co-workers and for the other people you know are probably coming to an end pretty quickly. Having two identities for yourself is an example of a lack of integrity.ā€ (Interview, October 2011)
  • 28. Does Identity Matter? Chris ā€œmootā€ Poole, Founder of 4chan ā€œThe portrait of identity online is often painted in black and white. Who you are online is who you are ofļ¬‚ine. ā€œHuman identity doesn't work like that online or ofļ¬‚ine. It's not 'who you share with,' it's 'who you share as.ā€™ Identity is prismatic.ā€ (Web 2.0)
  • 29. Online Social Networks Facebook - synchronous friend requests Twitter - asynchronous following (unless protected) Blog platforms - asynchronous (RSS feeds) Google Plus - asynchronous circles Diaspora - asynchronous, decentralized
  • 30. ā€œWho Has Your Backā€ (EFF) https://whohasyourback.eff.org
  • 31. Facebook Policies From Facebookā€™s ā€œterms of serviceā€ ā€œreal namesā€ is not deļ¬ned, seems case by case
  • 32. Google Original ā€œReal Namesā€ The original policy from Community Standards: ā€œ13. Display Name: To help ļ¬ght spam and prevent fake proļ¬les, use the name your friends, family or co-workers usually call you. For example, if your full legal name is Charles Jones Jr. but you normally use Chuck Jones or Junior Jones, either of those would be acceptable.
  • 33. Law and Order ā€œ[Chief Justice] John Marshall has made his decision; now let him enforce it!ā€ --President Andrew Jackson Both Facebook and Google Plus have a real names policy Letā€™s see how Google enforces theirs!
  • 34. Appeal Process July 23, 2011 - Filled out the appeal form July 25, 2011 - ā€œNeilā€ from the Google plus support team contacts me to initiate process, I reply July 26, 2011 - ā€œNeilā€ ļ¬rst tells me ā€œAestetixā€ is not a ā€œcommon nameā€, asks me to conļ¬rm it is my common name, I reply conļ¬rming it is
  • 35. Appeal Process July 27, 2011 - I get an email saying they ā€œneed a government issued ID to conļ¬rm my name is ā€˜Aesteixā€™.ā€ I reply to this to conļ¬rm they deļ¬ne a ā€œcommon nameā€ exclusively as the name on a government issued ID. I also ask what their policy for handling government IDs is.
  • 36. Appeal Process July 28, 2011 - ā€œYour common name does not have to be the name on your ID. ... I need to get the name off your ID to conļ¬rm that your name is aestetix.ā€ My reply: ā€œSo if the name is the only thing you need, can you use the information I provided in my appeal to make the same judgement? I'm confused as to why it must be a "government issued ID.ā€
  • 37. Appeal Process ā€œThank you for contacting us with regard to the name you want to use with your Google Proļ¬le. After further review, we have determined that your name is within our Community Standards policy. Thank you for your patience while we reviewed your proļ¬le name. I will trust it is your real name. Most users just try to explain that it is the pseudonym that they have always used.ā€
  • 38. Appeal Process ā€œThank you for contacting us with regard to the name you want to use with your Google Proļ¬le. After further review, we have determined that your name is within our Community Standards policy. Thank you for your patience while we reviewed your proļ¬le name. I will trust it is your real name. Most users just try to explain that it is the pseudonym that they have always used.ā€
  • 39. Appeal Process ā€œThank you for contacting us with regard to the name you want to use with your Google Proļ¬le. After further review, we have determined that your name is within our Community Standards policy. Thank you for your patience while we reviewed your proļ¬le name. I will trust it is your real name. Most users just try to explain that it is the pseudonym that they have always used.ā€
  • 43. Lessons learned Google doesnā€™t know what a ā€œcommon nameā€ is Google is demanding sensitive information without any security procedures or policies in place If you know someone at Google, youā€™ll be ļ¬ne Google doesnā€™t have a clue what ā€œidentityā€ means.
  • 44. Closing Remarks Steps in the right direction: Wikitrust.net Hypothes.is Diaspora (RIP IlyaZ)
  • 45. Closing Remarks Explore decentralized systems All current solutions fail in some way There is no such thing as a ā€œreal nameā€ Join or support efforts like Diaspora, Hypothesis, Wikitrust, etc

Editor's Notes

  1. \n
  2. \n
  3. \n
  4. \n
  5. \n
  6. \n
  7. \n
  8. \n
  9. \n
  10. \n
  11. \n
  12. \n
  13. \n
  14. \n
  15. \n
  16. \n
  17. \n
  18. \n
  19. Thus an average man—one with 120 friends—generally responds to the postings of only seven of those friends by leaving comments on the posting individual’s photos, status messages or “wall”. An average woman is slightly more sociable, responding to ten. When it comes to two-way communication such as e-mails or chats, the average man interacts with only four people and the average woman with six. Among those Facebook users with 500 friends, these numbers are somewhat higher, but not hugely so. Men leave comments for 17 friends, women for 26. Men communicate with ten, women with 16.\n
  20. \n
  21. \n
  22. \n
  23. \n
  24. \n
  25. \n
  26. \n
  27. \n
  28. \n
  29. \n
  30. \n
  31. \n
  32. \n
  33. \n
  34. \n
  35. \n
  36. \n
  37. \n
  38. \n
  39. \n
  40. \n
  41. \n
  42. \n
  43. \n
  44. \n
  45. \n
  46. \n