SlideShare a Scribd company logo
1 of 22
Download to read offline
a very brief history of privacy
in our data deluged world,

Sam Lessin @ drop.io
Voice Over (1/2):
1. hi, my name is sam lessin, and I am going to be speaking a bit about digital privacy - something i spend most of my days working
on in one way or another

2. for starters, what is privacy. people pre-pend the word in phrases like private thoughts, a private journal, private bedroom
exploits, or private plans to take over the world - but there are precious few good definitions of what the term actually means

3. The best way to describe privacy is as the limited transmission of information over time and/or between people. It is about moving
information from a trusted point A to a trusted point B without exposure.

4. why do we care about privacy? isn't it dead? -- we care because in all sorts of scenarios the value of information is inversely
related to how public it is. from corporate secrets, to gambling and the stock market, to even personal intimacy

5. fundamentally you are only as private as your weakest communicative link. the model for a private exchange is a one to one
discussion in the middle of nowhere. Output directly to Input. But the reality is that as we have made communication more efficient
we tend to rely on more intermediaries to communicate.

6. as with many things, one of the most interesting testing grounds for privacy is WAR. during war private information is extremely
valuable to all sides.... and you frequently have to use untrustworthy links in the communicative chain. The solution that evolved
quickly was 'security'

7. all security is breakable - it functions by changing the cost structure of information. You pay a cost to secure
your information(which is less expensive than the info transmitted is valuable)... the key is to make it expensive enough for the
enemy to break your security that it isn't worth it.

8. the reality is that outside of war, until very very recently most information was harmless/ mostly valueless on a mass scale- so
people were not very concerned about privacy. There simply was little to 'steal' from you information wise, so you didn't have to incur
much cost to protect your information.

9. three little familiar concepts, however, changed all that. the cost of and therefore volume of communication, information storage,
and compute power have changed the equation by making useless data useful and by making privacy measures much more expensive
on a relative basis.

10. these cost changes have drastically changed the amount of communication, the amount of communication that is saved, and the
ability to access that information. this is a HUGE deal
Voice Over (2/2):
11. people have been freaking out about this for a long time. Max Weber wrote about all these concepts and their impact
with regards to 'bureaucracy' and people have been updating the concepts all the way through Foucault's Power-Knowledge
in quot;Discipline and Punishquot;

12. interestingly, all this information and organization did allow for a new mechanism of non-secure 'privacy'. Simply trust
your privacy to them and the law. it is a felony to open mail

13. this worked relatively well, because even up through very recent history, little information was valuable and few people
were in a position to break trust.

14. Internet changes all that - all of a sudden lots of information was valuable at scale, and lots of people could touch it

15. institutions break down - laws don't work if you can't enforce them -- and with data flowing beyond boards and no
transparency into who has what = no enforcement

16. go military style? doesn't work - because security only works on cost differentials. Security isn't getting cheaper
faster than breaking security, information is getting more valuable for the bad guys and the good guys.

17. in fact, we are worse off than military information - value of which is very perishable - our data lasts forever - so if you
can't break today break tomorrow

18. this really really sucks for your kids - because 'public key' security is going to crumble with quantum computing - so
traditional security will melt.

19. so what should we do - future of privacy is about unwinding - decentralize, de-tag, destroy... you are also going to end
up with less 'privacy' - which is good, because you can sell your privacy for great stuff online

20. recap -
WTF is privacy?
the limited transmission of info…




                  between people
   over time
So What?
Only as private as your least
trusted link…


                             IO

                          I(OI)O


                   I(OI)(OI)(OI)(OI)O


           I(OI)(OI)(OI)(OI)(OI)(OI)(OI)(OI)O



     I(OI)(OI)(OI)(OI) (OI)(OI)(OI)(OI)(OI)(OI)(OI)(OI)O
OH CRAP, better use a code
Vi(1) – Cs(1)         Vi(2) – Cs(2)
                  >




          Security is based on
   Relative Values and Relative Costs
Ye’ old info = “mostly harmless”
Communication
Storage
Compute
All of Human History
volume



                                                   Network

                                                       Internet      Cuil
                                               Computer
                                                   Telephone       Googlie
                                               Morse code
                                                               Dog Pile
                                 Modern Bureaucracy
                                                             LOC
                                      type writer
                                                       Widner
                                    Calculus
                         Printing Press          Dewey Decimal
         Counting   Writing                Vatican
   Language
                                 Crazy Monks
                    Alexandria

                            ~years
Freaking out, moderate old school
OH CRAP (new school peacetime)
OH CRAP (1980s peacetime)
…then the intertubes

 value of your crap




                           all your crap is
                           valuable*!




                      ~years
Institutions can’t save you



    I(OI)(OI)(OI)(OI)(OI)(OI)(OI)(OI)O




                  ?
go military style? = fail




   Vi(1) – Cs(1)       Vi(2) – Cs(2)
                   >
Suckers
really sucks for your kids…
Future History: Back to Black



        1. decentralize

        2. de-tag

        3. destroy

        4. (give up)
DON’T PANIC, just be conscious

1. Privacy = limited transmission of info

2. Security = method for maintaining
privacy across un-trusted IO

3. Digital makes worthless crap valuable

4. Chill out, tread lightly


             http: //drop.io/swl
               twitter @lessin

More Related Content

Similar to New York September 2008 Ignite, Sam Lessin on Privacy

HES2011 - Raould Chiesa - Hackers Cybercriminals from Wargames to the Undergr...
HES2011 - Raould Chiesa - Hackers Cybercriminals from Wargames to the Undergr...HES2011 - Raould Chiesa - Hackers Cybercriminals from Wargames to the Undergr...
HES2011 - Raould Chiesa - Hackers Cybercriminals from Wargames to the Undergr...Hackito Ergo Sum
 
Infosecurity2013nl 131103184054-phpapp01
Infosecurity2013nl 131103184054-phpapp01Infosecurity2013nl 131103184054-phpapp01
Infosecurity2013nl 131103184054-phpapp01Kenneth Carnesi, JD
 
Privacy is an Illusion and you’re all losers! - Cryptocow - Infosecurity 2013
Privacy is an Illusion and you’re all losers! - Cryptocow - Infosecurity 2013Privacy is an Illusion and you’re all losers! - Cryptocow - Infosecurity 2013
Privacy is an Illusion and you’re all losers! - Cryptocow - Infosecurity 2013Cain Ransbottyn
 
OSDC 2014: Michael Renner - Secure encryption in a wiretapped future
OSDC 2014: Michael Renner - Secure encryption in a wiretapped futureOSDC 2014: Michael Renner - Secure encryption in a wiretapped future
OSDC 2014: Michael Renner - Secure encryption in a wiretapped futureNETWAYS
 
OSDC 2014: Michael Renner - Secure encryption in a wiretapped future
OSDC 2014: Michael Renner - Secure encryption in a wiretapped futureOSDC 2014: Michael Renner - Secure encryption in a wiretapped future
OSDC 2014: Michael Renner - Secure encryption in a wiretapped futureNETWAYS
 
Secure encryption in a wiretapped future
Secure encryption in a wiretapped futureSecure encryption in a wiretapped future
Secure encryption in a wiretapped futureMichael Renner
 
Next Night 5 Rob van Kranenburg
Next Night 5 Rob van KranenburgNext Night 5 Rob van Kranenburg
Next Night 5 Rob van Kranenburggenerationnext
 
How Spies Communicate – Mocomi.com
How Spies Communicate – Mocomi.comHow Spies Communicate – Mocomi.com
How Spies Communicate – Mocomi.comMocomi Kids
 
2600 v11 n2 (summer 1994)
2600 v11 n2 (summer 1994)2600 v11 n2 (summer 1994)
2600 v11 n2 (summer 1994)Felipe Prado
 
2600 v20 n3 (autumn 2003)
2600 v20 n3 (autumn 2003)2600 v20 n3 (autumn 2003)
2600 v20 n3 (autumn 2003)Felipe Prado
 
Raoul chiesa - Auditing the hacker mind - da wargames a underground economy
Raoul chiesa - Auditing the hacker mind - da wargames a underground economyRaoul chiesa - Auditing the hacker mind - da wargames a underground economy
Raoul chiesa - Auditing the hacker mind - da wargames a underground economyCRS4 Research Center in Sardinia
 
1 The Notion Information And Basic Types Of Information
1 The Notion Information And Basic Types Of Information1 The Notion Information And Basic Types Of Information
1 The Notion Information And Basic Types Of InformationAna Meskovska
 
2600 v16 n1 (spring 1999)
2600 v16 n1 (spring 1999)2600 v16 n1 (spring 1999)
2600 v16 n1 (spring 1999)Felipe Prado
 
Stories, Myth, and the Humane Network
Stories, Myth, and the Humane NetworkStories, Myth, and the Humane Network
Stories, Myth, and the Humane NetworkPeter Wang
 
Simon Harrison RWE - Chain of Things 010616 final
Simon Harrison RWE - Chain of Things 010616 finalSimon Harrison RWE - Chain of Things 010616 final
Simon Harrison RWE - Chain of Things 010616 finalSimon Harrison
 
2600 v08 n2 (summer 1991)
2600 v08 n2 (summer 1991)2600 v08 n2 (summer 1991)
2600 v08 n2 (summer 1991)Felipe Prado
 
Internet safety slides
Internet safety slidesInternet safety slides
Internet safety slidesEric Castro
 

Similar to New York September 2008 Ignite, Sam Lessin on Privacy (20)

HES2011 - Raould Chiesa - Hackers Cybercriminals from Wargames to the Undergr...
HES2011 - Raould Chiesa - Hackers Cybercriminals from Wargames to the Undergr...HES2011 - Raould Chiesa - Hackers Cybercriminals from Wargames to the Undergr...
HES2011 - Raould Chiesa - Hackers Cybercriminals from Wargames to the Undergr...
 
Infosecurity2013nl 131103184054-phpapp01
Infosecurity2013nl 131103184054-phpapp01Infosecurity2013nl 131103184054-phpapp01
Infosecurity2013nl 131103184054-phpapp01
 
Privacy is an Illusion and you’re all losers! - Cryptocow - Infosecurity 2013
Privacy is an Illusion and you’re all losers! - Cryptocow - Infosecurity 2013Privacy is an Illusion and you’re all losers! - Cryptocow - Infosecurity 2013
Privacy is an Illusion and you’re all losers! - Cryptocow - Infosecurity 2013
 
OSDC 2014: Michael Renner - Secure encryption in a wiretapped future
OSDC 2014: Michael Renner - Secure encryption in a wiretapped futureOSDC 2014: Michael Renner - Secure encryption in a wiretapped future
OSDC 2014: Michael Renner - Secure encryption in a wiretapped future
 
OSDC 2014: Michael Renner - Secure encryption in a wiretapped future
OSDC 2014: Michael Renner - Secure encryption in a wiretapped futureOSDC 2014: Michael Renner - Secure encryption in a wiretapped future
OSDC 2014: Michael Renner - Secure encryption in a wiretapped future
 
Secure encryption in a wiretapped future
Secure encryption in a wiretapped futureSecure encryption in a wiretapped future
Secure encryption in a wiretapped future
 
Next Night 5 Rob van Kranenburg
Next Night 5 Rob van KranenburgNext Night 5 Rob van Kranenburg
Next Night 5 Rob van Kranenburg
 
People the biggest cyber risk
People the biggest cyber riskPeople the biggest cyber risk
People the biggest cyber risk
 
How Spies Communicate – Mocomi.com
How Spies Communicate – Mocomi.comHow Spies Communicate – Mocomi.com
How Spies Communicate – Mocomi.com
 
2600 v11 n2 (summer 1994)
2600 v11 n2 (summer 1994)2600 v11 n2 (summer 1994)
2600 v11 n2 (summer 1994)
 
2600 v20 n3 (autumn 2003)
2600 v20 n3 (autumn 2003)2600 v20 n3 (autumn 2003)
2600 v20 n3 (autumn 2003)
 
nullcon 2010 - Underground Economy
nullcon 2010 - Underground Economynullcon 2010 - Underground Economy
nullcon 2010 - Underground Economy
 
Raoul chiesa - Auditing the hacker mind - da wargames a underground economy
Raoul chiesa - Auditing the hacker mind - da wargames a underground economyRaoul chiesa - Auditing the hacker mind - da wargames a underground economy
Raoul chiesa - Auditing the hacker mind - da wargames a underground economy
 
1 The Notion Information And Basic Types Of Information
1 The Notion Information And Basic Types Of Information1 The Notion Information And Basic Types Of Information
1 The Notion Information And Basic Types Of Information
 
2600 v16 n1 (spring 1999)
2600 v16 n1 (spring 1999)2600 v16 n1 (spring 1999)
2600 v16 n1 (spring 1999)
 
Stories, Myth, and the Humane Network
Stories, Myth, and the Humane NetworkStories, Myth, and the Humane Network
Stories, Myth, and the Humane Network
 
Simon Harrison RWE - Chain of Things 010616 final
Simon Harrison RWE - Chain of Things 010616 finalSimon Harrison RWE - Chain of Things 010616 final
Simon Harrison RWE - Chain of Things 010616 final
 
digital stega slides
digital stega slidesdigital stega slides
digital stega slides
 
2600 v08 n2 (summer 1991)
2600 v08 n2 (summer 1991)2600 v08 n2 (summer 1991)
2600 v08 n2 (summer 1991)
 
Internet safety slides
Internet safety slidesInternet safety slides
Internet safety slides
 

More from sam lessin

Bitcoin & Alt currencies, Feb 2014
Bitcoin & Alt currencies, Feb 2014Bitcoin & Alt currencies, Feb 2014
Bitcoin & Alt currencies, Feb 2014sam lessin
 
Drop.io at Amazon AWS NYC event
Drop.io at Amazon AWS NYC eventDrop.io at Amazon AWS NYC event
Drop.io at Amazon AWS NYC eventsam lessin
 
Drop.io at MEET Coworking
Drop.io at MEET CoworkingDrop.io at MEET Coworking
Drop.io at MEET Coworkingsam lessin
 
Digital Dumbo Stream Discussion
Digital Dumbo Stream DiscussionDigital Dumbo Stream Discussion
Digital Dumbo Stream Discussionsam lessin
 
Obama Implications, talk with Founder's Roundtable NYC
Obama Implications, talk with Founder's Roundtable NYCObama Implications, talk with Founder's Roundtable NYC
Obama Implications, talk with Founder's Roundtable NYCsam lessin
 
ACM ICPC Regional Finals Talk re: drop.io, privacy, entrepreneurship by sam l...
ACM ICPC Regional Finals Talk re: drop.io, privacy, entrepreneurship by sam l...ACM ICPC Regional Finals Talk re: drop.io, privacy, entrepreneurship by sam l...
ACM ICPC Regional Finals Talk re: drop.io, privacy, entrepreneurship by sam l...sam lessin
 
drop.io at Facebook Dev Austin Garage, SXSW
drop.io at Facebook Dev Austin Garage, SXSWdrop.io at Facebook Dev Austin Garage, SXSW
drop.io at Facebook Dev Austin Garage, SXSWsam lessin
 

More from sam lessin (8)

Bitcoin & Alt currencies, Feb 2014
Bitcoin & Alt currencies, Feb 2014Bitcoin & Alt currencies, Feb 2014
Bitcoin & Alt currencies, Feb 2014
 
Drop.io at Amazon AWS NYC event
Drop.io at Amazon AWS NYC eventDrop.io at Amazon AWS NYC event
Drop.io at Amazon AWS NYC event
 
Drop.io at MEET Coworking
Drop.io at MEET CoworkingDrop.io at MEET Coworking
Drop.io at MEET Coworking
 
Foo Thoughts
Foo ThoughtsFoo Thoughts
Foo Thoughts
 
Digital Dumbo Stream Discussion
Digital Dumbo Stream DiscussionDigital Dumbo Stream Discussion
Digital Dumbo Stream Discussion
 
Obama Implications, talk with Founder's Roundtable NYC
Obama Implications, talk with Founder's Roundtable NYCObama Implications, talk with Founder's Roundtable NYC
Obama Implications, talk with Founder's Roundtable NYC
 
ACM ICPC Regional Finals Talk re: drop.io, privacy, entrepreneurship by sam l...
ACM ICPC Regional Finals Talk re: drop.io, privacy, entrepreneurship by sam l...ACM ICPC Regional Finals Talk re: drop.io, privacy, entrepreneurship by sam l...
ACM ICPC Regional Finals Talk re: drop.io, privacy, entrepreneurship by sam l...
 
drop.io at Facebook Dev Austin Garage, SXSW
drop.io at Facebook Dev Austin Garage, SXSWdrop.io at Facebook Dev Austin Garage, SXSW
drop.io at Facebook Dev Austin Garage, SXSW
 

Recently uploaded

Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxBkGupta21
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 

Recently uploaded (20)

DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptx
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 

New York September 2008 Ignite, Sam Lessin on Privacy

  • 1. a very brief history of privacy in our data deluged world, Sam Lessin @ drop.io
  • 2. Voice Over (1/2): 1. hi, my name is sam lessin, and I am going to be speaking a bit about digital privacy - something i spend most of my days working on in one way or another 2. for starters, what is privacy. people pre-pend the word in phrases like private thoughts, a private journal, private bedroom exploits, or private plans to take over the world - but there are precious few good definitions of what the term actually means 3. The best way to describe privacy is as the limited transmission of information over time and/or between people. It is about moving information from a trusted point A to a trusted point B without exposure. 4. why do we care about privacy? isn't it dead? -- we care because in all sorts of scenarios the value of information is inversely related to how public it is. from corporate secrets, to gambling and the stock market, to even personal intimacy 5. fundamentally you are only as private as your weakest communicative link. the model for a private exchange is a one to one discussion in the middle of nowhere. Output directly to Input. But the reality is that as we have made communication more efficient we tend to rely on more intermediaries to communicate. 6. as with many things, one of the most interesting testing grounds for privacy is WAR. during war private information is extremely valuable to all sides.... and you frequently have to use untrustworthy links in the communicative chain. The solution that evolved quickly was 'security' 7. all security is breakable - it functions by changing the cost structure of information. You pay a cost to secure your information(which is less expensive than the info transmitted is valuable)... the key is to make it expensive enough for the enemy to break your security that it isn't worth it. 8. the reality is that outside of war, until very very recently most information was harmless/ mostly valueless on a mass scale- so people were not very concerned about privacy. There simply was little to 'steal' from you information wise, so you didn't have to incur much cost to protect your information. 9. three little familiar concepts, however, changed all that. the cost of and therefore volume of communication, information storage, and compute power have changed the equation by making useless data useful and by making privacy measures much more expensive on a relative basis. 10. these cost changes have drastically changed the amount of communication, the amount of communication that is saved, and the ability to access that information. this is a HUGE deal
  • 3. Voice Over (2/2): 11. people have been freaking out about this for a long time. Max Weber wrote about all these concepts and their impact with regards to 'bureaucracy' and people have been updating the concepts all the way through Foucault's Power-Knowledge in quot;Discipline and Punishquot; 12. interestingly, all this information and organization did allow for a new mechanism of non-secure 'privacy'. Simply trust your privacy to them and the law. it is a felony to open mail 13. this worked relatively well, because even up through very recent history, little information was valuable and few people were in a position to break trust. 14. Internet changes all that - all of a sudden lots of information was valuable at scale, and lots of people could touch it 15. institutions break down - laws don't work if you can't enforce them -- and with data flowing beyond boards and no transparency into who has what = no enforcement 16. go military style? doesn't work - because security only works on cost differentials. Security isn't getting cheaper faster than breaking security, information is getting more valuable for the bad guys and the good guys. 17. in fact, we are worse off than military information - value of which is very perishable - our data lasts forever - so if you can't break today break tomorrow 18. this really really sucks for your kids - because 'public key' security is going to crumble with quantum computing - so traditional security will melt. 19. so what should we do - future of privacy is about unwinding - decentralize, de-tag, destroy... you are also going to end up with less 'privacy' - which is good, because you can sell your privacy for great stuff online 20. recap -
  • 5. the limited transmission of info… between people over time
  • 7. Only as private as your least trusted link… IO I(OI)O I(OI)(OI)(OI)(OI)O I(OI)(OI)(OI)(OI)(OI)(OI)(OI)(OI)O I(OI)(OI)(OI)(OI) (OI)(OI)(OI)(OI)(OI)(OI)(OI)(OI)O
  • 8. OH CRAP, better use a code
  • 9. Vi(1) – Cs(1) Vi(2) – Cs(2) > Security is based on Relative Values and Relative Costs
  • 10. Ye’ old info = “mostly harmless”
  • 12. All of Human History volume Network Internet Cuil Computer Telephone Googlie Morse code Dog Pile Modern Bureaucracy LOC type writer Widner Calculus Printing Press Dewey Decimal Counting Writing Vatican Language Crazy Monks Alexandria ~years
  • 14. OH CRAP (new school peacetime)
  • 15. OH CRAP (1980s peacetime)
  • 16. …then the intertubes value of your crap all your crap is valuable*! ~years
  • 17. Institutions can’t save you I(OI)(OI)(OI)(OI)(OI)(OI)(OI)(OI)O ?
  • 18. go military style? = fail Vi(1) – Cs(1) Vi(2) – Cs(2) >
  • 20. really sucks for your kids…
  • 21. Future History: Back to Black 1. decentralize 2. de-tag 3. destroy 4. (give up)
  • 22. DON’T PANIC, just be conscious 1. Privacy = limited transmission of info 2. Security = method for maintaining privacy across un-trusted IO 3. Digital makes worthless crap valuable 4. Chill out, tread lightly http: //drop.io/swl twitter @lessin