SlideShare une entreprise Scribd logo
1  sur  20
Télécharger pour lire hors ligne
Who will control the
Next Billion? – A Case
of Chat Apps from Asia
(or Why I think it’s important to help improve data protection in East
Asia if you really care about personal data of the internet Next Billion)

@bact
Arthit Suriyawongkul
Thai Netizen Network

Silicon Valley, 4 March 2014
Lead to Summary
●

Mobile chat apps are now everywhere in East
and Southeast Asia
–
–

●

becomes a mobile identity – provides authentication service for 3rd party apps
mobile social network platform – built for mobile from day one (unlike Facebook)

These “chat apps” grow globally fast
–
–

●

manufacturing influence (bundled to mobile handsets)
“soft-power” cultural influence (K-Pop, J-Pop, Manga)

Data of the mobile Next Billion will be more
transmitted to/processed in East Asia
Summary
●

●

Data will no longer concentrated in US/Europe,
so should the attention of data protection too?
Human rights standards so vary in other parts of
the world and the protection may not cross-border
–

●

e.g. ASEAN Human Rights Declaration

Privacy/cyber-security laws of East Asian
jurisdictions will affect more people globally
–

your communication data and personal data could be one day regulated by Chinese law

–

through monetary and educational assistants, China and Japan already have influence
in SE Asia cyber-security policy
The Apps and
the Culture
All the Communications and Sharing
(Group) Chat, Voice/Video Call, Media/Location Sharing, GAMES, AUTHEN/IDENTITY
Plus Cute Characters (Stickers)

Where’s my sticker shop on ChatSecure and Cryptocat? :p
Asian People Love It
How Big They Are Now?
Chat App
WhatsApp

Country
of Origin
US

Number of
Users
400M

Line

Japan

300M
(50M in Japan)

WeChat

China

300M
(200M in China)

KakaoTalk

Korea

130M

ChatON

Korea

100M
Growth Trends
●

●

●

●

“Line, WeChat: Asian social networks move to
conquer Europe” – AFP (29 Sep 2013)
“How WeChat, Line plan to taken on Facebook,
Skype” – The Times of India (30 Sep 2013)
“Asian Messaging Apps WeChat and Line Challenge
Silicon Valley. China’s WeChat and Japan’s Line Are
Threatening the Global Growth of WhatsApp and
Facebook.” – The Wall Street Journal (9 Oct 2013)
… and the Facebook’s WhatsApp deal recently
Where is the Next Billion?
●

Mobile internet users in Africa, China, South
America, South Asia and Southeast Asia
The Control
Protections Across Borders
“We want LINE Corp. to be the the first line of
surveillance and send us any ‘suspicious’ activity
on their app.” – Technology Crime Suppression
Division, Royal Thai Police (2013)
LINE Corp. in Japan said there’s no official
request from Thai Police. Any request for personal
data should be done under Japanese law.
http://advocacy.globalvoicesonline.org/2013/08/19/thailand-wants-to-monitor-conversations-on-line-app/
http://www.telecomasia.net/content/naver-denies-collaborating-thai-govt
Violations Across Borders
●

●

●

●

●

Some Chinese keywords got
censored in LINE
Study from Citizen Lab found
regionally-based Keyword
Censorship in LINE
LINE in China operated by a
Chinese company
Censorship follows user,
go across borders
https://citizenlab.org/2013/11/asia-chats-investigating-regionally-ba
sed-keyword-censorship-line/
Assumption (That Not Goes)
Across Borders
●

LINE did no encryption on 2G/3G network

●

Metadata and entire conversations in plain text

●

●

With small changes in data request string, can
pull historical chat logs up to two months old.
Made a wrong assumption that the 2G/3G
network is already secure (in many countries, it’s
not)

●

http://www.telecomasia.net/blog/content/line-vulnerable-man-middle-attack

●

https://citizenlab.org/2013/11/asia-chats-analyzing-information-controls-privacy-asian-messaging-applications/
Who will control the Next Billion?
●

●

●

●

South Korea, Japan, China, and Taiwan are
exporters of popular IT apps and devices. These
countries have huge influence in Southeast Asia
and emerging markets.
Political, economical, and/or cultural.
LINE is based in Japan. A subsidiary of a South
Korean company. LINE China (“Lianwo”) is
operated by a Chinese licensee.
WeChat (“Weixin”) is based in China.
Japan/China Influences on
Cyberpolicy (tech/law) in SE Asia
●
●

●
●

●
●

Japan-ASEAN Information Security Policy Meeting
Japan-ASEAN Ministerial Policy Meeting on Cyber
Security Cooperation
ASEAN Smart Network Initiative
ASEAN-Japan Joint Information Security Awareness
Raising Initiatives
China-ASEAN Defence Ministers' Meeting
ASEAN-China Information Superhighway Working
Group
Asian values in your pocket
●

●

●

●

As these chat apps/social network are growing, more data
will be transmitted to, stored and processed in East Asia.
“Asian values” embedded in these countries’ information
laws will play more role in information freedom globally.
Often times, in these countries, companies
cooperate/collaborate with authority. No Transparency
Report. Communication protocol is not open. Everything is
behind the door.
Asian values? From Japan? From South Korea? From
China? From where?
What We Can Do?
Together, we can do more of this
EFF’s “Who's Doing What?” (Tech)

EFF’s “Who Has Your Back?” (Law)

and this...

?????
?????
?????

?????
?????
@bact
Arthit Suriyawongkul
Thai Netizen Network
arthit@thainetizen.org
●

Parts of this presentation was presented at
●

Regional Consultation on Freedom of Expression for Civil
Liberties in Asia (22 Nov 2013, Bangkok)

●

●

●

CNXP (6 Dec 2013, Chiang Mai)
FOSSASIA (1 Mar 2014, Phnom Penh)

Thanks for all the comments from those forums and social media.

Contenu connexe

En vedette

A survey on cyber law
A survey on cyber lawA survey on cyber law
A survey on cyber lawSantosh Panda
 
Global Cyber-Laws and E-Commerce & Strategic Implication for E-Commerce
Global Cyber-Laws and E-Commerce & Strategic Implication for E-CommerceGlobal Cyber-Laws and E-Commerce & Strategic Implication for E-Commerce
Global Cyber-Laws and E-Commerce & Strategic Implication for E-Commercewelcometofacebook
 
The cyber law regime in India
The cyber law regime in IndiaThe cyber law regime in India
The cyber law regime in IndiaShankey Gupta
 
Cybercrime Legislation in the Middle East
Cybercrime Legislation in the Middle EastCybercrime Legislation in the Middle East
Cybercrime Legislation in the Middle EastMohamed N. El-Guindy
 
Legal aspects of handling cyber frauds
Legal aspects of handling cyber fraudsLegal aspects of handling cyber frauds
Legal aspects of handling cyber fraudsSagar Rahurkar
 
Introduction to Cyber law (IT Act 2000)
Introduction to Cyber law (IT Act 2000)Introduction to Cyber law (IT Act 2000)
Introduction to Cyber law (IT Act 2000)Ambar Deo
 
Hacking - Cyber Crimes and Cyber Laws - Information Technology ACT 2000
Hacking - Cyber Crimes and Cyber Laws - Information Technology ACT 2000Hacking - Cyber Crimes and Cyber Laws - Information Technology ACT 2000
Hacking - Cyber Crimes and Cyber Laws - Information Technology ACT 2000Jyotindra Zaveri
 
cyber crime & cyber law
cyber crime & cyber lawcyber crime & cyber law
cyber crime & cyber lawhimanshumunjal
 
An Introduction to Cyber Law - I.T. Act 2000 (India)
An Introduction to Cyber Law - I.T. Act 2000 (India)An Introduction to Cyber Law - I.T. Act 2000 (India)
An Introduction to Cyber Law - I.T. Act 2000 (India)Chetan Bharadwaj
 
Information technology act 2000
Information technology act 2000Information technology act 2000
Information technology act 2000Akash Varaiya
 
Cybercrime.ppt
Cybercrime.pptCybercrime.ppt
Cybercrime.pptAeman Khan
 

En vedette (15)

A survey on cyber law
A survey on cyber lawA survey on cyber law
A survey on cyber law
 
Global Cyber-Laws and E-Commerce & Strategic Implication for E-Commerce
Global Cyber-Laws and E-Commerce & Strategic Implication for E-CommerceGlobal Cyber-Laws and E-Commerce & Strategic Implication for E-Commerce
Global Cyber-Laws and E-Commerce & Strategic Implication for E-Commerce
 
The cyber law regime in India
The cyber law regime in IndiaThe cyber law regime in India
The cyber law regime in India
 
Cybercrime Legislation in the Middle East
Cybercrime Legislation in the Middle EastCybercrime Legislation in the Middle East
Cybercrime Legislation in the Middle East
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Legal aspects of handling cyber frauds
Legal aspects of handling cyber fraudsLegal aspects of handling cyber frauds
Legal aspects of handling cyber frauds
 
Introduction to Cyber law (IT Act 2000)
Introduction to Cyber law (IT Act 2000)Introduction to Cyber law (IT Act 2000)
Introduction to Cyber law (IT Act 2000)
 
Intellectual property
Intellectual propertyIntellectual property
Intellectual property
 
Hacking - Cyber Crimes and Cyber Laws - Information Technology ACT 2000
Hacking - Cyber Crimes and Cyber Laws - Information Technology ACT 2000Hacking - Cyber Crimes and Cyber Laws - Information Technology ACT 2000
Hacking - Cyber Crimes and Cyber Laws - Information Technology ACT 2000
 
Cyber law-it-act-2000
Cyber law-it-act-2000Cyber law-it-act-2000
Cyber law-it-act-2000
 
Cyber Law
Cyber  LawCyber  Law
Cyber Law
 
cyber crime & cyber law
cyber crime & cyber lawcyber crime & cyber law
cyber crime & cyber law
 
An Introduction to Cyber Law - I.T. Act 2000 (India)
An Introduction to Cyber Law - I.T. Act 2000 (India)An Introduction to Cyber Law - I.T. Act 2000 (India)
An Introduction to Cyber Law - I.T. Act 2000 (India)
 
Information technology act 2000
Information technology act 2000Information technology act 2000
Information technology act 2000
 
Cybercrime.ppt
Cybercrime.pptCybercrime.ppt
Cybercrime.ppt
 

Similaire à Who will control the Next Billion? – A Case of Chat Apps from Asia (#RightsCon 2014)

Digital Innovations in Asia by Mark Inkster
Digital Innovations in Asia by Mark InksterDigital Innovations in Asia by Mark Inkster
Digital Innovations in Asia by Mark InksterThe Digital Insurer
 
China & Japan: Influencing our future
China & Japan: Influencing our futureChina & Japan: Influencing our future
China & Japan: Influencing our futureNigelG
 
Internet Society Update
Internet Society UpdateInternet Society Update
Internet Society UpdateAPNIC
 
ebusiness Strategy in Entrepreneurship 1: Pedro Eloy at SMECC - 20130806
ebusiness Strategy in Entrepreneurship 1: Pedro Eloy at SMECC - 20130806ebusiness Strategy in Entrepreneurship 1: Pedro Eloy at SMECC - 20130806
ebusiness Strategy in Entrepreneurship 1: Pedro Eloy at SMECC - 20130806smecchk
 
Sigit policy framework on public sector social media utilization- moving fo...
Sigit   policy framework on public sector social media utilization- moving fo...Sigit   policy framework on public sector social media utilization- moving fo...
Sigit policy framework on public sector social media utilization- moving fo...Sigit Puspito Wigati Jarot
 
Sigit policy framework on public sector social media utilization- moving fo...
Sigit   policy framework on public sector social media utilization- moving fo...Sigit   policy framework on public sector social media utilization- moving fo...
Sigit policy framework on public sector social media utilization- moving fo...Sigit Puspito Wigati Jarot
 
Mobile Southeast Asia Report 2012
Mobile Southeast Asia Report 2012Mobile Southeast Asia Report 2012
Mobile Southeast Asia Report 2012WiseKnow Thailand
 
2014 q2q3umeng insight_report_en
2014 q2q3umeng insight_report_en2014 q2q3umeng insight_report_en
2014 q2q3umeng insight_report_enUmeng
 
[2014 q2q3umeng insight] China’s Mobile Internet:Further Segmentation and Ver...
[2014 q2q3umeng insight] China’s Mobile Internet:Further Segmentation and Ver...[2014 q2q3umeng insight] China’s Mobile Internet:Further Segmentation and Ver...
[2014 q2q3umeng insight] China’s Mobile Internet:Further Segmentation and Ver...Umeng
 
Digital Asia – ASEAN in ascendence. Team Finland Future Watch Report, May 2016
Digital Asia – ASEAN in ascendence. Team Finland Future Watch Report, May 2016Digital Asia – ASEAN in ascendence. Team Finland Future Watch Report, May 2016
Digital Asia – ASEAN in ascendence. Team Finland Future Watch Report, May 2016Didar Kaitasalo
 
Digital Asia – ASEAN in ascendence. Team Finland Future Watch Report, May 2016
Digital Asia – ASEAN in ascendence. Team Finland Future Watch Report, May 2016Digital Asia – ASEAN in ascendence. Team Finland Future Watch Report, May 2016
Digital Asia – ASEAN in ascendence. Team Finland Future Watch Report, May 2016Team Finland Future Watch
 
Threading it all together – Q2 Tech Trends
Threading it all together – Q2 Tech TrendsThreading it all together – Q2 Tech Trends
Threading it all together – Q2 Tech TrendsKatie Harbath
 
The interpretation of the relationship among big data, IoT and smart city - C...
The interpretation of the relationship among big data, IoT and smart city - C...The interpretation of the relationship among big data, IoT and smart city - C...
The interpretation of the relationship among big data, IoT and smart city - C...Antenna Manufacturer Coco
 
Why tech-giants move their outsourcing operations to Vietnam- whitepaper
Why tech-giants move their outsourcing operations to Vietnam- whitepaperWhy tech-giants move their outsourcing operations to Vietnam- whitepaper
Why tech-giants move their outsourcing operations to Vietnam- whitepaperTMA Solutions
 
China Mobile Internet 2013 Overview (Umeng)
China Mobile Internet 2013 Overview (Umeng)China Mobile Internet 2013 Overview (Umeng)
China Mobile Internet 2013 Overview (Umeng)Hubery Zhou
 
2013 Umeng Insight Report
2013 Umeng Insight Report2013 Umeng Insight Report
2013 Umeng Insight ReportUmeng
 
Internet Governance & Digital Rights by Waihiga K. Muturi, Rtn..pdf
Internet Governance & Digital Rights by Waihiga K. Muturi, Rtn..pdfInternet Governance & Digital Rights by Waihiga K. Muturi, Rtn..pdf
Internet Governance & Digital Rights by Waihiga K. Muturi, Rtn..pdfWAIHIGA K.MUTURI
 
WeChat, the shape of the connected China
WeChat, the shape of the connected ChinaWeChat, the shape of the connected China
WeChat, the shape of the connected ChinaFabernovel
 

Similaire à Who will control the Next Billion? – A Case of Chat Apps from Asia (#RightsCon 2014) (20)

Digital Innovations in Asia by Mark Inkster
Digital Innovations in Asia by Mark InksterDigital Innovations in Asia by Mark Inkster
Digital Innovations in Asia by Mark Inkster
 
China & Japan: Influencing our future
China & Japan: Influencing our futureChina & Japan: Influencing our future
China & Japan: Influencing our future
 
Internet Society Update
Internet Society UpdateInternet Society Update
Internet Society Update
 
ebusiness Strategy in Entrepreneurship 1: Pedro Eloy at SMECC - 20130806
ebusiness Strategy in Entrepreneurship 1: Pedro Eloy at SMECC - 20130806ebusiness Strategy in Entrepreneurship 1: Pedro Eloy at SMECC - 20130806
ebusiness Strategy in Entrepreneurship 1: Pedro Eloy at SMECC - 20130806
 
Sigit policy framework on public sector social media utilization- moving fo...
Sigit   policy framework on public sector social media utilization- moving fo...Sigit   policy framework on public sector social media utilization- moving fo...
Sigit policy framework on public sector social media utilization- moving fo...
 
Sigit policy framework on public sector social media utilization- moving fo...
Sigit   policy framework on public sector social media utilization- moving fo...Sigit   policy framework on public sector social media utilization- moving fo...
Sigit policy framework on public sector social media utilization- moving fo...
 
Mobile Southeast Asia Report 2012
Mobile Southeast Asia Report 2012Mobile Southeast Asia Report 2012
Mobile Southeast Asia Report 2012
 
2014 q2q3umeng insight_report_en
2014 q2q3umeng insight_report_en2014 q2q3umeng insight_report_en
2014 q2q3umeng insight_report_en
 
[2014 q2q3umeng insight] China’s Mobile Internet:Further Segmentation and Ver...
[2014 q2q3umeng insight] China’s Mobile Internet:Further Segmentation and Ver...[2014 q2q3umeng insight] China’s Mobile Internet:Further Segmentation and Ver...
[2014 q2q3umeng insight] China’s Mobile Internet:Further Segmentation and Ver...
 
Going Mobile
Going MobileGoing Mobile
Going Mobile
 
Digital Asia – ASEAN in ascendence. Team Finland Future Watch Report, May 2016
Digital Asia – ASEAN in ascendence. Team Finland Future Watch Report, May 2016Digital Asia – ASEAN in ascendence. Team Finland Future Watch Report, May 2016
Digital Asia – ASEAN in ascendence. Team Finland Future Watch Report, May 2016
 
Digital Asia – ASEAN in ascendence. Team Finland Future Watch Report, May 2016
Digital Asia – ASEAN in ascendence. Team Finland Future Watch Report, May 2016Digital Asia – ASEAN in ascendence. Team Finland Future Watch Report, May 2016
Digital Asia – ASEAN in ascendence. Team Finland Future Watch Report, May 2016
 
Threading it all together – Q2 Tech Trends
Threading it all together – Q2 Tech TrendsThreading it all together – Q2 Tech Trends
Threading it all together – Q2 Tech Trends
 
The interpretation of the relationship among big data, IoT and smart city - C...
The interpretation of the relationship among big data, IoT and smart city - C...The interpretation of the relationship among big data, IoT and smart city - C...
The interpretation of the relationship among big data, IoT and smart city - C...
 
Why tech-giants move their outsourcing operations to Vietnam- whitepaper
Why tech-giants move their outsourcing operations to Vietnam- whitepaperWhy tech-giants move their outsourcing operations to Vietnam- whitepaper
Why tech-giants move their outsourcing operations to Vietnam- whitepaper
 
China Mobile Internet 2013 Overview (Umeng)
China Mobile Internet 2013 Overview (Umeng)China Mobile Internet 2013 Overview (Umeng)
China Mobile Internet 2013 Overview (Umeng)
 
2013 Umeng Insight Report
2013 Umeng Insight Report2013 Umeng Insight Report
2013 Umeng Insight Report
 
Internet Governance & Digital Rights by Waihiga K. Muturi, Rtn..pdf
Internet Governance & Digital Rights by Waihiga K. Muturi, Rtn..pdfInternet Governance & Digital Rights by Waihiga K. Muturi, Rtn..pdf
Internet Governance & Digital Rights by Waihiga K. Muturi, Rtn..pdf
 
Inside Tencent
Inside TencentInside Tencent
Inside Tencent
 
WeChat, the shape of the connected China
WeChat, the shape of the connected ChinaWeChat, the shape of the connected China
WeChat, the shape of the connected China
 

Plus de Arthit Suriyawongkul

Beyond retailer-consumer relationships
Beyond retailer-consumer relationshipsBeyond retailer-consumer relationships
Beyond retailer-consumer relationshipsArthit Suriyawongkul
 
ทุน ข้อมูล และสภาพแวดล้อม: เพื่อสนับสนุนการมีส่วนร่วมของประชาชนในการออกแบบแล...
 ทุน ข้อมูล และสภาพแวดล้อม: เพื่อสนับสนุนการมีส่วนร่วมของประชาชนในการออกแบบแล... ทุน ข้อมูล และสภาพแวดล้อม: เพื่อสนับสนุนการมีส่วนร่วมของประชาชนในการออกแบบแล...
ทุน ข้อมูล และสภาพแวดล้อม: เพื่อสนับสนุนการมีส่วนร่วมของประชาชนในการออกแบบแล...Arthit Suriyawongkul
 
กฎหมายเกี่ยวกับเนื้อหา โฆษณา และการตลาดออนไลน์ (ทำให้เพื่อนไปสอบ DAAT ไม่รู้จ...
กฎหมายเกี่ยวกับเนื้อหา โฆษณา และการตลาดออนไลน์ (ทำให้เพื่อนไปสอบ DAAT ไม่รู้จ...กฎหมายเกี่ยวกับเนื้อหา โฆษณา และการตลาดออนไลน์ (ทำให้เพื่อนไปสอบ DAAT ไม่รู้จ...
กฎหมายเกี่ยวกับเนื้อหา โฆษณา และการตลาดออนไลน์ (ทำให้เพื่อนไปสอบ DAAT ไม่รู้จ...Arthit Suriyawongkul
 
พ.ร.บ.คุ้มครอง
ข้อมูลส่วนบุคคล และสิทธิในความเป็นส่วนตัว
พ.ร.บ.คุ้มครอง
ข้อมูลส่วนบุคคล และสิทธิในความเป็นส่วนตัวพ.ร.บ.คุ้มครอง
ข้อมูลส่วนบุคคล และสิทธิในความเป็นส่วนตัว
พ.ร.บ.คุ้มครอง
ข้อมูลส่วนบุคคล และสิทธิในความเป็นส่วนตัวArthit Suriyawongkul
 
Rights-based Internet Governance: การอภิบาลอินเทอร์เน็ตโดยคิดจากสิทธิเป็นที่ตั้ง
Rights-based Internet Governance: การอภิบาลอินเทอร์เน็ตโดยคิดจากสิทธิเป็นที่ตั้งRights-based Internet Governance: การอภิบาลอินเทอร์เน็ตโดยคิดจากสิทธิเป็นที่ตั้ง
Rights-based Internet Governance: การอภิบาลอินเทอร์เน็ตโดยคิดจากสิทธิเป็นที่ตั้งArthit Suriyawongkul
 
ว่าด้วยสื่อสังคม
ว่าด้วยสื่อสังคมว่าด้วยสื่อสังคม
ว่าด้วยสื่อสังคมArthit Suriyawongkul
 
โดนอุ้มในโลกเสมือน
โดนอุ้มในโลกเสมือน โดนอุ้มในโลกเสมือน
โดนอุ้มในโลกเสมือน Arthit Suriyawongkul
 
คนทำงานและแรงงานในยุคดิจิทัล
คนทำงานและแรงงานในยุคดิจิทัลคนทำงานและแรงงานในยุคดิจิทัล
คนทำงานและแรงงานในยุคดิจิทัลArthit Suriyawongkul
 
Three-Layer Model for the Control of Online Content: A Study on Thailand
Three-Layer Model for the Control of Online Content: A Study on ThailandThree-Layer Model for the Control of Online Content: A Study on Thailand
Three-Layer Model for the Control of Online Content: A Study on ThailandArthit Suriyawongkul
 
Mapping Stakeholders, Decision-makers, and Implementers in Thailand’s Cyber P...
Mapping Stakeholders, Decision-makers, and Implementers in Thailand’s Cyber P...Mapping Stakeholders, Decision-makers, and Implementers in Thailand’s Cyber P...
Mapping Stakeholders, Decision-makers, and Implementers in Thailand’s Cyber P...Arthit Suriyawongkul
 
Data Protection
 in the Age of Big Data
Data Protection
 in the Age of Big DataData Protection
 in the Age of Big Data
Data Protection
 in the Age of Big DataArthit Suriyawongkul
 
Anonymity in the Digital Age #digitalcitizen16
Anonymity in the Digital Age #digitalcitizen16Anonymity in the Digital Age #digitalcitizen16
Anonymity in the Digital Age #digitalcitizen16Arthit Suriyawongkul
 
Information Laws in Mekong Countries
Information Laws in Mekong CountriesInformation Laws in Mekong Countries
Information Laws in Mekong CountriesArthit Suriyawongkul
 
แนะนำมูลนิธิเพื่ออินเทอร์เน็ตและวัฒนธรรมพลเมือง
แนะนำมูลนิธิเพื่ออินเทอร์เน็ตและวัฒนธรรมพลเมืองแนะนำมูลนิธิเพื่ออินเทอร์เน็ตและวัฒนธรรมพลเมือง
แนะนำมูลนิธิเพื่ออินเทอร์เน็ตและวัฒนธรรมพลเมืองArthit Suriyawongkul
 
การส่งเสริมการกำกับกันเอง
ในกิจการสื่อใหม่ยุคหลอมรวม
การส่งเสริมการกำกับกันเอง
ในกิจการสื่อใหม่ยุคหลอมรวมการส่งเสริมการกำกับกันเอง
ในกิจการสื่อใหม่ยุคหลอมรวม
การส่งเสริมการกำกับกันเอง
ในกิจการสื่อใหม่ยุคหลอมรวมArthit Suriyawongkul
 
Cybercrime and Cybersecurity Differences
Cybercrime and Cybersecurity DifferencesCybercrime and Cybersecurity Differences
Cybercrime and Cybersecurity DifferencesArthit Suriyawongkul
 
Development and Concerns over "Digital Economy" Bills in Thailand
Development and Concerns over "Digital Economy" Bills in ThailandDevelopment and Concerns over "Digital Economy" Bills in Thailand
Development and Concerns over "Digital Economy" Bills in ThailandArthit Suriyawongkul
 
The Junta Digital Agenda: 76 Days Later
The Junta Digital Agenda: 76 Days LaterThe Junta Digital Agenda: 76 Days Later
The Junta Digital Agenda: 76 Days LaterArthit Suriyawongkul
 
The state of Internet freedom after the coup in Thailand
The state of Internet freedom after the coup in ThailandThe state of Internet freedom after the coup in Thailand
The state of Internet freedom after the coup in ThailandArthit Suriyawongkul
 

Plus de Arthit Suriyawongkul (20)

Beyond retailer-consumer relationships
Beyond retailer-consumer relationshipsBeyond retailer-consumer relationships
Beyond retailer-consumer relationships
 
ทุน ข้อมูล และสภาพแวดล้อม: เพื่อสนับสนุนการมีส่วนร่วมของประชาชนในการออกแบบแล...
 ทุน ข้อมูล และสภาพแวดล้อม: เพื่อสนับสนุนการมีส่วนร่วมของประชาชนในการออกแบบแล... ทุน ข้อมูล และสภาพแวดล้อม: เพื่อสนับสนุนการมีส่วนร่วมของประชาชนในการออกแบบแล...
ทุน ข้อมูล และสภาพแวดล้อม: เพื่อสนับสนุนการมีส่วนร่วมของประชาชนในการออกแบบแล...
 
กฎหมายเกี่ยวกับเนื้อหา โฆษณา และการตลาดออนไลน์ (ทำให้เพื่อนไปสอบ DAAT ไม่รู้จ...
กฎหมายเกี่ยวกับเนื้อหา โฆษณา และการตลาดออนไลน์ (ทำให้เพื่อนไปสอบ DAAT ไม่รู้จ...กฎหมายเกี่ยวกับเนื้อหา โฆษณา และการตลาดออนไลน์ (ทำให้เพื่อนไปสอบ DAAT ไม่รู้จ...
กฎหมายเกี่ยวกับเนื้อหา โฆษณา และการตลาดออนไลน์ (ทำให้เพื่อนไปสอบ DAAT ไม่รู้จ...
 
พ.ร.บ.คุ้มครอง
ข้อมูลส่วนบุคคล และสิทธิในความเป็นส่วนตัว
พ.ร.บ.คุ้มครอง
ข้อมูลส่วนบุคคล และสิทธิในความเป็นส่วนตัวพ.ร.บ.คุ้มครอง
ข้อมูลส่วนบุคคล และสิทธิในความเป็นส่วนตัว
พ.ร.บ.คุ้มครอง
ข้อมูลส่วนบุคคล และสิทธิในความเป็นส่วนตัว
 
Rights-based Internet Governance: การอภิบาลอินเทอร์เน็ตโดยคิดจากสิทธิเป็นที่ตั้ง
Rights-based Internet Governance: การอภิบาลอินเทอร์เน็ตโดยคิดจากสิทธิเป็นที่ตั้งRights-based Internet Governance: การอภิบาลอินเทอร์เน็ตโดยคิดจากสิทธิเป็นที่ตั้ง
Rights-based Internet Governance: การอภิบาลอินเทอร์เน็ตโดยคิดจากสิทธิเป็นที่ตั้ง
 
ว่าด้วยสื่อสังคม
ว่าด้วยสื่อสังคมว่าด้วยสื่อสังคม
ว่าด้วยสื่อสังคม
 
โดนอุ้มในโลกเสมือน
โดนอุ้มในโลกเสมือน โดนอุ้มในโลกเสมือน
โดนอุ้มในโลกเสมือน
 
คนทำงานและแรงงานในยุคดิจิทัล
คนทำงานและแรงงานในยุคดิจิทัลคนทำงานและแรงงานในยุคดิจิทัล
คนทำงานและแรงงานในยุคดิจิทัล
 
Three-Layer Model for the Control of Online Content: A Study on Thailand
Three-Layer Model for the Control of Online Content: A Study on ThailandThree-Layer Model for the Control of Online Content: A Study on Thailand
Three-Layer Model for the Control of Online Content: A Study on Thailand
 
Mapping Stakeholders, Decision-makers, and Implementers in Thailand’s Cyber P...
Mapping Stakeholders, Decision-makers, and Implementers in Thailand’s Cyber P...Mapping Stakeholders, Decision-makers, and Implementers in Thailand’s Cyber P...
Mapping Stakeholders, Decision-makers, and Implementers in Thailand’s Cyber P...
 
Data Protection
 in the Age of Big Data
Data Protection
 in the Age of Big DataData Protection
 in the Age of Big Data
Data Protection
 in the Age of Big Data
 
Anonymity in the Digital Age #digitalcitizen16
Anonymity in the Digital Age #digitalcitizen16Anonymity in the Digital Age #digitalcitizen16
Anonymity in the Digital Age #digitalcitizen16
 
Information Laws in Mekong Countries
Information Laws in Mekong CountriesInformation Laws in Mekong Countries
Information Laws in Mekong Countries
 
แนะนำมูลนิธิเพื่ออินเทอร์เน็ตและวัฒนธรรมพลเมือง
แนะนำมูลนิธิเพื่ออินเทอร์เน็ตและวัฒนธรรมพลเมืองแนะนำมูลนิธิเพื่ออินเทอร์เน็ตและวัฒนธรรมพลเมือง
แนะนำมูลนิธิเพื่ออินเทอร์เน็ตและวัฒนธรรมพลเมือง
 
การส่งเสริมการกำกับกันเอง
ในกิจการสื่อใหม่ยุคหลอมรวม
การส่งเสริมการกำกับกันเอง
ในกิจการสื่อใหม่ยุคหลอมรวมการส่งเสริมการกำกับกันเอง
ในกิจการสื่อใหม่ยุคหลอมรวม
การส่งเสริมการกำกับกันเอง
ในกิจการสื่อใหม่ยุคหลอมรวม
 
Cybercrime and Cybersecurity Differences
Cybercrime and Cybersecurity DifferencesCybercrime and Cybersecurity Differences
Cybercrime and Cybersecurity Differences
 
Development and Concerns over "Digital Economy" Bills in Thailand
Development and Concerns over "Digital Economy" Bills in ThailandDevelopment and Concerns over "Digital Economy" Bills in Thailand
Development and Concerns over "Digital Economy" Bills in Thailand
 
Thailand on LINE
Thailand on LINEThailand on LINE
Thailand on LINE
 
The Junta Digital Agenda: 76 Days Later
The Junta Digital Agenda: 76 Days LaterThe Junta Digital Agenda: 76 Days Later
The Junta Digital Agenda: 76 Days Later
 
The state of Internet freedom after the coup in Thailand
The state of Internet freedom after the coup in ThailandThe state of Internet freedom after the coup in Thailand
The state of Internet freedom after the coup in Thailand
 

Dernier

Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demoHarshalMandlekar2
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rick Flair
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Visualising and forecasting stocks using Dash
Visualising and forecasting stocks using DashVisualising and forecasting stocks using Dash
Visualising and forecasting stocks using Dashnarutouzumaki53779
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxBkGupta21
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 

Dernier (20)

Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demo
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Visualising and forecasting stocks using Dash
Visualising and forecasting stocks using DashVisualising and forecasting stocks using Dash
Visualising and forecasting stocks using Dash
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptx
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 

Who will control the Next Billion? – A Case of Chat Apps from Asia (#RightsCon 2014)

  • 1. Who will control the Next Billion? – A Case of Chat Apps from Asia (or Why I think it’s important to help improve data protection in East Asia if you really care about personal data of the internet Next Billion) @bact Arthit Suriyawongkul Thai Netizen Network Silicon Valley, 4 March 2014
  • 2. Lead to Summary ● Mobile chat apps are now everywhere in East and Southeast Asia – – ● becomes a mobile identity – provides authentication service for 3rd party apps mobile social network platform – built for mobile from day one (unlike Facebook) These “chat apps” grow globally fast – – ● manufacturing influence (bundled to mobile handsets) “soft-power” cultural influence (K-Pop, J-Pop, Manga) Data of the mobile Next Billion will be more transmitted to/processed in East Asia
  • 3. Summary ● ● Data will no longer concentrated in US/Europe, so should the attention of data protection too? Human rights standards so vary in other parts of the world and the protection may not cross-border – ● e.g. ASEAN Human Rights Declaration Privacy/cyber-security laws of East Asian jurisdictions will affect more people globally – your communication data and personal data could be one day regulated by Chinese law – through monetary and educational assistants, China and Japan already have influence in SE Asia cyber-security policy
  • 5. All the Communications and Sharing (Group) Chat, Voice/Video Call, Media/Location Sharing, GAMES, AUTHEN/IDENTITY
  • 6. Plus Cute Characters (Stickers) Where’s my sticker shop on ChatSecure and Cryptocat? :p
  • 8. How Big They Are Now? Chat App WhatsApp Country of Origin US Number of Users 400M Line Japan 300M (50M in Japan) WeChat China 300M (200M in China) KakaoTalk Korea 130M ChatON Korea 100M
  • 9. Growth Trends ● ● ● ● “Line, WeChat: Asian social networks move to conquer Europe” – AFP (29 Sep 2013) “How WeChat, Line plan to taken on Facebook, Skype” – The Times of India (30 Sep 2013) “Asian Messaging Apps WeChat and Line Challenge Silicon Valley. China’s WeChat and Japan’s Line Are Threatening the Global Growth of WhatsApp and Facebook.” – The Wall Street Journal (9 Oct 2013) … and the Facebook’s WhatsApp deal recently
  • 10. Where is the Next Billion? ● Mobile internet users in Africa, China, South America, South Asia and Southeast Asia
  • 12. Protections Across Borders “We want LINE Corp. to be the the first line of surveillance and send us any ‘suspicious’ activity on their app.” – Technology Crime Suppression Division, Royal Thai Police (2013) LINE Corp. in Japan said there’s no official request from Thai Police. Any request for personal data should be done under Japanese law. http://advocacy.globalvoicesonline.org/2013/08/19/thailand-wants-to-monitor-conversations-on-line-app/ http://www.telecomasia.net/content/naver-denies-collaborating-thai-govt
  • 13. Violations Across Borders ● ● ● ● ● Some Chinese keywords got censored in LINE Study from Citizen Lab found regionally-based Keyword Censorship in LINE LINE in China operated by a Chinese company Censorship follows user, go across borders https://citizenlab.org/2013/11/asia-chats-investigating-regionally-ba sed-keyword-censorship-line/
  • 14. Assumption (That Not Goes) Across Borders ● LINE did no encryption on 2G/3G network ● Metadata and entire conversations in plain text ● ● With small changes in data request string, can pull historical chat logs up to two months old. Made a wrong assumption that the 2G/3G network is already secure (in many countries, it’s not) ● http://www.telecomasia.net/blog/content/line-vulnerable-man-middle-attack ● https://citizenlab.org/2013/11/asia-chats-analyzing-information-controls-privacy-asian-messaging-applications/
  • 15. Who will control the Next Billion? ● ● ● ● South Korea, Japan, China, and Taiwan are exporters of popular IT apps and devices. These countries have huge influence in Southeast Asia and emerging markets. Political, economical, and/or cultural. LINE is based in Japan. A subsidiary of a South Korean company. LINE China (“Lianwo”) is operated by a Chinese licensee. WeChat (“Weixin”) is based in China.
  • 16. Japan/China Influences on Cyberpolicy (tech/law) in SE Asia ● ● ● ● ● ● Japan-ASEAN Information Security Policy Meeting Japan-ASEAN Ministerial Policy Meeting on Cyber Security Cooperation ASEAN Smart Network Initiative ASEAN-Japan Joint Information Security Awareness Raising Initiatives China-ASEAN Defence Ministers' Meeting ASEAN-China Information Superhighway Working Group
  • 17. Asian values in your pocket ● ● ● ● As these chat apps/social network are growing, more data will be transmitted to, stored and processed in East Asia. “Asian values” embedded in these countries’ information laws will play more role in information freedom globally. Often times, in these countries, companies cooperate/collaborate with authority. No Transparency Report. Communication protocol is not open. Everything is behind the door. Asian values? From Japan? From South Korea? From China? From where?
  • 18. What We Can Do?
  • 19. Together, we can do more of this EFF’s “Who's Doing What?” (Tech) EFF’s “Who Has Your Back?” (Law) and this... ????? ????? ????? ????? ?????
  • 20. @bact Arthit Suriyawongkul Thai Netizen Network arthit@thainetizen.org ● Parts of this presentation was presented at ● Regional Consultation on Freedom of Expression for Civil Liberties in Asia (22 Nov 2013, Bangkok) ● ● ● CNXP (6 Dec 2013, Chiang Mai) FOSSASIA (1 Mar 2014, Phnom Penh) Thanks for all the comments from those forums and social media.