Ce diaporama a bien été signalé.
Le téléchargement de votre SlideShare est en cours. ×

We're Being Owned: Why We Must Take Control of Our Online Identities

Publicité
Publicité
Publicité
Publicité
Publicité
Publicité
Publicité
Publicité
Publicité
Publicité
Publicité
Publicité
Chargement dans…3
×

Consultez-les par la suite

1 sur 13 Publicité

We're Being Owned: Why We Must Take Control of Our Online Identities

Télécharger pour lire hors ligne

Jim Flynn's TED Talk at TEDx Amherst 2019 about online identity and privacy. He discusses the dangers of letting private companies claim our identities and behavioral data, and then use that data to influence us in the service of some other party's economic or political interests.

Jim Flynn's TED Talk at TEDx Amherst 2019 about online identity and privacy. He discusses the dangers of letting private companies claim our identities and behavioral data, and then use that data to influence us in the service of some other party's economic or political interests.

Publicité
Publicité

Plus De Contenu Connexe

Plus récents (20)

Publicité

We're Being Owned: Why We Must Take Control of Our Online Identities

  1. 1. “We're Being Owned: Why We Must Take Control of Our Online Identities” By Jim Flynn https://www.youtube.com/watch?v=CddSSRNR7u0 https://jamespflynn.com https://www.tedxamherst.org April 7, 2019
  2. 2. KUWA “To be” in Swahili You must be a unique human.
  3. 3. ...a global, perpetual, nonrevocable and sublicensable license…
  4. 4. Contract Law
  5. 5. Attributes Behavior AI Make money selling predictions Your Digital Self Influence
  6. 6. Shown to 61M US Voters in 2010 Resulted in 238K additional votes From Bond, et al in Nature at https://www.nature.com/articles/nature11421
  7. 7. Buy a beer Driver’s License Photo, name, address, DOB, eye color, height, etc. Get on a lift Profile Photo, name, Address, DOB, etc. Your Digital Self Credit History Wellness Location
  8. 8. Buy a beer Cryptographic proof that you are over 21 Get on a ski lift Cryptographic proof that you have a pass There is no linkage between the proofs. Self-Sovereign Identity
  9. 9. Individual Sovereignty What’s disclosed How it’s used Right to delete it Right to move it
  10. 10. It’s inevitable. There’s too much money involved. Innovation! They consented!
  11. 11. See the video at: https://www.youtube.com/watch?v=CddSSRNR7u0

×