SlideShare une entreprise Scribd logo
1  sur  65
Télécharger pour lire hors ligne
An Analysis of the Online Identity Battleground

                                            aestetix
                                         Shmoocon 2013

Monday, February 18, 13
Do you... Google?




Monday, February 18, 13
... wait, wtf?




Monday, February 18, 13
Thesis Statements



    ✤    Identity is multifaceted (“prismatic”)

    ✤    There is no such thing as a “real” name

    ✤    Imposing a singular identity is not only harmful, it doesn’t work




Monday, February 18, 13
What is NSTIC?

    ✤    National Strategy for Trusted Identities in Cyberspace (NSTIC)

    ✤    Created by Obama Administration to address current challenges in
         digital identity (passwords, identity theft, etc)

    ✤    Update from the February 2013 Plenary




Monday, February 18, 13
What is NSTIC?




Monday, February 18, 13
What is NSTIC?




Monday, February 18, 13
Myth #1



    Only pedophiles, criminals, and cyber-
    bullies do not want to use their legal
    names online!

    What is this “nym” thing?



                          http://mythbustersresults.com/photos/adam-savage-mythbusters.jpg
Monday, February 18, 13
What is a “nym”?




Monday, February 18, 13
What is a “nym”?




             ✤    Identity is not the same thing as a name

             ✤    Name: a label or symbol that is used to identify a person,
                  thing, or concept within a given context


Monday, February 18, 13
Various Nom de Plumes

     ✤   Publius

     ✤   J.K. Rowling

     ✤   Nicholas Bourbaki

     ✤   Ian Donald Calvin Euclid Zappa

     ✤   Richard Bachman, Deep Throat, Voltaire,
         George Eliot, the Bronte Sisters...


Monday, February 18, 13
Various Nom de Plumes




Monday, February 18, 13
What is a “nym”?

    Is identity internal or external?
     ✤   Self image (“id, ego and superego”)

     ✤   Reputation and the Citizen Kane style construct

     ✤   “The only thing worse than being talked about
         is not being talked about.” --Oscar Wilde




                            http://en.wikipedia.org/wiki/Citizen_Kane
Monday, February 18, 13
Why do names matter?


       ✤    Valerie Plaine

       ✤    Witness Protection Program

       ✤    AOL and Netflix databases




Monday, February 18, 13
What are social networks?


             ✤    A “social network” is a force that brings people or their
                  personas together on a regular basis.

             ✤    A “friend” is a person that you would choose to be in contact
                  with.

             ✤    An “institution” is a custom, practice, relationship, or
                  significant behavior pattern within a social network.



Monday, February 18, 13
Defining “identity”

    ✤    Carl Jung:

          ✤    Rational or
                “Conscious”

          ✤    Emotional or
                “Unconscious”




Monday, February 18, 13
Bringing Identity Online

    ✤    aestetix’s Method (draft spec):




Monday, February 18, 13
So what’s a “nym”?

             ✤    Pseudonym - a name that might not found on or linkable to
                  any previously mentioned documents

             ✤    Polynym - a name consisting of multiple words or symbols

             ✤    Mononym - a name consisting of one word or symbol

             ✤    Autonym - a name bestowed upon oneself

             ✤    Anonym - a name representing anonymity



Monday, February 18, 13
Why not “real” name?

             ✤    Negative implications

             ✤    Lack of agency

             ✤    Easily substituted with
                  better alternatives

             ✤    Where does this concept come from, anyways?


                          http://www.shescribes.com/2011/07/i-cant-believe-its-not-butter-toast-tweet-100-giveaway.html




Monday, February 18, 13
What are social networks?

             ✤    Joseph Campbell: right hand
                  path, left hand path, and the
                  Hero’s Journey

             ✤    General Petraeus

             ✤    Why do hacker handles matter?




Monday, February 18, 13
Establishing Identity Online



    ✤    Zooko’s Triangle




                            http://www.skyhunter.com/marcs/petnames/IntroPetNames.html



Monday, February 18, 13
Myth #2



    We can stop cyber-bullying by forcing
    people to use their legal names

    People who do not use their legal
    names do not contribute positively to
    discussions



                          http://mythbustersresults.com/photos/adam-savage-mythbusters.jpg
Monday, February 18, 13
Do Names Matter?




Monday, February 18, 13
Do Names Matter?




Monday, February 18, 13
Do Names Matter?




               http://en.wikipedia.org/wiki/Phineas_Gage   http://circularabsurdity.blogspot.com/2010/11/my-steampunk-art.html

Monday, February 18, 13
Do Names Matter?

    ✤    Case Study:
         TechCrunch




Monday, February 18, 13
Do Names Matter?

    ✤    Case Study:
         TechCrunch




Monday, February 18, 13
Do Names Matter?

    ✤    Case Study:
         TechCrunch




Monday, February 18, 13
Do Names Matter?

    ✤    Case Study: Disqus, 60+ million users (Jan 10, 2012)




                               http://disqus.com/research/pseudonyms/
Monday, February 18, 13
Do Names Matter?

    ✤    Case Study: Disqus, 60+ million users (Jan 10, 2012)




                               http://disqus.com/research/pseudonyms/
Monday, February 18, 13
Total Lack of Names
    ✤    Social Number (launched Dec 2012)




Monday, February 18, 13
Total Lack of Names
    ✤    Social Number (launched Dec 2012)




Monday, February 18, 13
Total Lack of Names
    ✤    Social Number (launched Dec 2012)




Monday, February 18, 13
Myth #3




    We cannot trust anyone who does not
    use their legal name online




Monday, February 18, 13
Trust and Reputation




                          https://twitter.com/AntDeRosa/status/292796075348197376

Monday, February 18, 13
Trust and Reputation




Monday, February 18, 13
Trust and Reputation




Monday, February 18, 13
Trust and Reputation
    ✤    “Klout” scores




                          http://www.socialbrite.org/2010/07/22/klout-measure-your-twitter-influence/

Monday, February 18, 13
Trust and Transparency

             ✤    What does transparency mean?

             ✤    Is there such a thing as full transparency?

             ✤    Who decides how transparent we get to be?

             ✤    Active versus Passive communication of personal
                  information




Monday, February 18, 13
Myth #4




    We can trust online “identity
    providers” like Google and Facebook




Monday, February 18, 13
Does Identity Matter?

        Eric Schmidt, Executive Chairman at Google:
    ✤    “The only way to manage this is true transparency and no
         anonymity. In a world of asynchronous threats, it is too
         dangerous for there not to be some way to identify you. We
         need a [verified] name service for people. Governments will
         demand it.” (Techonomy, August 2010)

    ✤    “If you have something that you don't want anyone to know,
         maybe you shouldn't be doing it in the first place."(CNBC
         Interview, December 2009)



Monday, February 18, 13
Does Identity Matter?
       Mark Zuckerberg, CEO at Facebook:

   ✤    “The days of you having a different image for
        your work friends or co-workers and for the
        other people you know are probably coming to
        an end pretty quickly.
        Having two identities for yourself is an
        example of a lack of integrity.” (Interview,
        October 2011)




                          http://allinio.com/2012/12/holiday-carol-good-king-zuckerberg/


Monday, February 18, 13
Does Identity Matter?
       Chris “moot” Poole, Founder of 4chan

   ✤    “The portrait of identity online is often painted
        in black and white. Who you are online is who
        you are offline.
        “Human identity doesn't work like that online
        or offline. It's not 'who you share with,' it's 'who
        you share as.’ Identity is prismatic.” (Web 2.0)




                    http://www.hollywood.com/news/New_Yogi_Bear_Poster_Reveals_His_Darkest_Secret/7082914


Monday, February 18, 13
Recap of 2011


    ✤    My G+ account was suspended

    ✤    Confusion over “common name”

    ✤    Request for government issued ID

    ✤    Questions about ID != common name

    ✤    Account suddenly reinstated


                          http://www.tumblr.com/tagged/nym%20wars
Monday, February 18, 13
Recap of 2011




Monday, February 18, 13
I Wasn’t Alone!




Monday, February 18, 13
Where are we now?


    ✤    Updates to the Google+ policy (as of 10/27/2012):

          ✤    Limiting name changes (3 every 2 years)

          ✤    Names appeal (includes “significant following”)

          ✤    Nicknames policy




Monday, February 18, 13
Where are we now?

   ✤    Google’s idea of “pseudonyms”:




Monday, February 18, 13
Where are we now?

    ✤    Google patent #8271894 (granted Sep 18, 2012)




Monday, February 18, 13
Where are we now?




Monday, February 18, 13
Where are we now?




Monday, February 18, 13
Where are we now?




Monday, February 18, 13
Bringing Identity Online

    ✤    Google’s Method:




Monday, February 18, 13
Where are we now?
    ✤   “Snitchgate” (September 2012)




Monday, February 18, 13
Where are we now?
    ✤    Instagram Fiasco (Jan 22, 2013)




                     http://news.cnet.com/8301-1023_3-57565293-93/instagram-account-crackdown-alarms-members-who-think-theyve-been-hacked/

Monday, February 18, 13
Where are we now?
    ✤    Instagram Fiasco




Monday, February 18, 13
Where are we now?
    ✤    Instagram Fiasco




Monday, February 18, 13
Where are we now?

    ✤    Questions for thought:

          ✤    Who are Google and Facebook trying to
               “impress”?

          ✤    Who else might have access to this data?

          ✤    Why would Chewbacca, an 8-foot-tall Wookie,
               want to live on Endor with a bunch of 2-foot-
               tall Ewoks? Is that his real name?

                               https://en.wikipedia.org/wiki/File:0330chewbacca.jpg

Monday, February 18, 13
Myth #5




    We are currently fixing this
    through legislation.




Monday, February 18, 13
Legal issues?


          ✤    South Korea Real Name Verification Law (2003-2012)

                ✤   Required Resident Registration Number to be used for
                    verification to improve “quality”

                ✤   Repealed in 2012 after Korea Communications Commission
                    found a 0.9% change

                ✤   Follow-up study by Carnegie-Mellon



Monday, February 18, 13
Legal issues?

    ✤    Strengthening Network Internet Protection (China)

          ✤    Passed on 28 December 2012

                ✤     Section VI: Network service providers that handle website
                      access services for users, handle fixed telephone, mobile
                      telephone and other surfing formalities, or provide information
                      publication services to users, shall, when concluding agreements
                      with users or affirming the provision of service, require users to
                      provide real identity information.

                http://chinacopyrightandmedia.wordpress.com/2012/12/28/national-peoples-congress-standing-committee-decision-concerning-strengthening-network-information-protection/



Monday, February 18, 13
Legal issues?

    ✤    California Proposition 35 (passed Nov 6, 2012)

    ✤    Californians Against Sexual Exploitation (“CASE”)

          ✤    Section 290.014 (b): If any person who is required to register
               pursuant to the Act adds or changes his or her account with an
               Internet service provider or adds or changes an Internet
               identifier, the person shall send written notice of the addition or
               change to the law enforcement agency or agencies with which he
               or she is currently registered within 24 hours. ...”

    ✤    EFF filed lawsuit, injunction granted as of Jan 11, 2013

Monday, February 18, 13
Legal issues?

    ✤    German Telemedia Act (passed 26 February 2007)

          ✤    Section 13 (6): “The service provider must enable the use of
               telemedia and payment for them to occur anonymously or via a
               pseudonym where this is technically possible and reasonable. The
               recipient of the service is to be informed about this possibility.”




                  http://www.cgerli.org/fileadmin/user_upload/interne_Dokumente/Legislation/Telemedia_Act__TMA_.pdf

Monday, February 18, 13
Moving Forward
    ✤    Join NymRights! (www.nymrights.org)

    ✤    Anyone can be an IDESG/NSTIC member!




Monday, February 18, 13
Questions?

             ✤    @aestetix




Monday, February 18, 13

Contenu connexe

Similaire à Shmoocon - Beyond Nymwars

Democratizing Educational Technology
Democratizing Educational TechnologyDemocratizing Educational Technology
Democratizing Educational TechnologyAri Najarian
 
Galapag.us thesis presentation
Galapag.us thesis presentationGalapag.us thesis presentation
Galapag.us thesis presentationBen Turner
 
Identity Management in Social Media
Identity Management in Social MediaIdentity Management in Social Media
Identity Management in Social MediaLaura Visconti
 
What Matters Now. Part 2
What Matters Now. Part 2What Matters Now. Part 2
What Matters Now. Part 2Dean Shareski
 
Chic Geek YYC March 2013 Presentation
Chic Geek YYC March 2013 PresentationChic Geek YYC March 2013 Presentation
Chic Geek YYC March 2013 PresentationVictoria MacLean
 
Parenting the App Generation
Parenting the App GenerationParenting the App Generation
Parenting the App Generationmetzy
 
Kicking impostor syndrome in the head
Kicking impostor syndrome in the headKicking impostor syndrome in the head
Kicking impostor syndrome in the headdreamwidth
 
Pragmatic Designer's Guide to Identity on the Web
Pragmatic Designer's Guide to Identity on the WebPragmatic Designer's Guide to Identity on the Web
Pragmatic Designer's Guide to Identity on the WebJamie Reffell
 
Pettinger israel ignite_slideshow
Pettinger israel ignite_slideshowPettinger israel ignite_slideshow
Pettinger israel ignite_slideshowIsrael Pettinger
 
Infopresse montreal feb 6 big data
Infopresse montreal feb 6   big dataInfopresse montreal feb 6   big data
Infopresse montreal feb 6 big dataAlistair Croll
 
Digital Citizenship Symposium - Slide Compilation
Digital Citizenship Symposium - Slide CompilationDigital Citizenship Symposium - Slide Compilation
Digital Citizenship Symposium - Slide CompilationAlec Couros
 
Legal Aspects Of New Media Quirk 2008
Legal Aspects Of New Media   Quirk   2008Legal Aspects Of New Media   Quirk   2008
Legal Aspects Of New Media Quirk 2008Paul Jacobson
 
Thriving In The 21st Century: Speaking the Language of the Digital Native
Thriving In The 21st Century: Speaking the Language of the Digital NativeThriving In The 21st Century: Speaking the Language of the Digital Native
Thriving In The 21st Century: Speaking the Language of the Digital NativeGlenn Wiebe
 
SoLoMo: SOcial LOcal MObile April 2013
SoLoMo: SOcial LOcal MObile April 2013SoLoMo: SOcial LOcal MObile April 2013
SoLoMo: SOcial LOcal MObile April 2013Kathleen Heuer
 
Wikis, Blogs, and Tweets, Oh My!: Creating Avenues for Student Participation ...
Wikis, Blogs, and Tweets, Oh My!: Creating Avenues for Student Participation ...Wikis, Blogs, and Tweets, Oh My!: Creating Avenues for Student Participation ...
Wikis, Blogs, and Tweets, Oh My!: Creating Avenues for Student Participation ...CSU, Chico
 

Similaire à Shmoocon - Beyond Nymwars (20)

Good IA Every Day
Good IA Every DayGood IA Every Day
Good IA Every Day
 
Democratizing Educational Technology
Democratizing Educational TechnologyDemocratizing Educational Technology
Democratizing Educational Technology
 
Galapag.us thesis presentation
Galapag.us thesis presentationGalapag.us thesis presentation
Galapag.us thesis presentation
 
Identity Management in Social Media
Identity Management in Social MediaIdentity Management in Social Media
Identity Management in Social Media
 
What Matters Now. Part 2
What Matters Now. Part 2What Matters Now. Part 2
What Matters Now. Part 2
 
Chic Geek YYC March 2013 Presentation
Chic Geek YYC March 2013 PresentationChic Geek YYC March 2013 Presentation
Chic Geek YYC March 2013 Presentation
 
Parenting the App Generation
Parenting the App GenerationParenting the App Generation
Parenting the App Generation
 
Gloucester
GloucesterGloucester
Gloucester
 
Kicking impostor syndrome in the head
Kicking impostor syndrome in the headKicking impostor syndrome in the head
Kicking impostor syndrome in the head
 
Pragmatic Designer's Guide to Identity on the Web
Pragmatic Designer's Guide to Identity on the WebPragmatic Designer's Guide to Identity on the Web
Pragmatic Designer's Guide to Identity on the Web
 
Safer internet day 2011
Safer internet day 2011Safer internet day 2011
Safer internet day 2011
 
Safer internet day 2011
Safer internet day 2011Safer internet day 2011
Safer internet day 2011
 
Pettinger israel ignite_slideshow
Pettinger israel ignite_slideshowPettinger israel ignite_slideshow
Pettinger israel ignite_slideshow
 
Infopresse montreal feb 6 big data
Infopresse montreal feb 6   big dataInfopresse montreal feb 6   big data
Infopresse montreal feb 6 big data
 
Birth of hashtag
Birth of hashtagBirth of hashtag
Birth of hashtag
 
Digital Citizenship Symposium - Slide Compilation
Digital Citizenship Symposium - Slide CompilationDigital Citizenship Symposium - Slide Compilation
Digital Citizenship Symposium - Slide Compilation
 
Legal Aspects Of New Media Quirk 2008
Legal Aspects Of New Media   Quirk   2008Legal Aspects Of New Media   Quirk   2008
Legal Aspects Of New Media Quirk 2008
 
Thriving In The 21st Century: Speaking the Language of the Digital Native
Thriving In The 21st Century: Speaking the Language of the Digital NativeThriving In The 21st Century: Speaking the Language of the Digital Native
Thriving In The 21st Century: Speaking the Language of the Digital Native
 
SoLoMo: SOcial LOcal MObile April 2013
SoLoMo: SOcial LOcal MObile April 2013SoLoMo: SOcial LOcal MObile April 2013
SoLoMo: SOcial LOcal MObile April 2013
 
Wikis, Blogs, and Tweets, Oh My!: Creating Avenues for Student Participation ...
Wikis, Blogs, and Tweets, Oh My!: Creating Avenues for Student Participation ...Wikis, Blogs, and Tweets, Oh My!: Creating Avenues for Student Participation ...
Wikis, Blogs, and Tweets, Oh My!: Creating Avenues for Student Participation ...
 

Dernier

Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 

Dernier (20)

Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 

Shmoocon - Beyond Nymwars

  • 1. An Analysis of the Online Identity Battleground aestetix Shmoocon 2013 Monday, February 18, 13
  • 2. Do you... Google? Monday, February 18, 13
  • 3. ... wait, wtf? Monday, February 18, 13
  • 4. Thesis Statements ✤ Identity is multifaceted (“prismatic”) ✤ There is no such thing as a “real” name ✤ Imposing a singular identity is not only harmful, it doesn’t work Monday, February 18, 13
  • 5. What is NSTIC? ✤ National Strategy for Trusted Identities in Cyberspace (NSTIC) ✤ Created by Obama Administration to address current challenges in digital identity (passwords, identity theft, etc) ✤ Update from the February 2013 Plenary Monday, February 18, 13
  • 6. What is NSTIC? Monday, February 18, 13
  • 7. What is NSTIC? Monday, February 18, 13
  • 8. Myth #1 Only pedophiles, criminals, and cyber- bullies do not want to use their legal names online! What is this “nym” thing? http://mythbustersresults.com/photos/adam-savage-mythbusters.jpg Monday, February 18, 13
  • 9. What is a “nym”? Monday, February 18, 13
  • 10. What is a “nym”? ✤ Identity is not the same thing as a name ✤ Name: a label or symbol that is used to identify a person, thing, or concept within a given context Monday, February 18, 13
  • 11. Various Nom de Plumes ✤ Publius ✤ J.K. Rowling ✤ Nicholas Bourbaki ✤ Ian Donald Calvin Euclid Zappa ✤ Richard Bachman, Deep Throat, Voltaire, George Eliot, the Bronte Sisters... Monday, February 18, 13
  • 12. Various Nom de Plumes Monday, February 18, 13
  • 13. What is a “nym”? Is identity internal or external? ✤ Self image (“id, ego and superego”) ✤ Reputation and the Citizen Kane style construct ✤ “The only thing worse than being talked about is not being talked about.” --Oscar Wilde http://en.wikipedia.org/wiki/Citizen_Kane Monday, February 18, 13
  • 14. Why do names matter? ✤ Valerie Plaine ✤ Witness Protection Program ✤ AOL and Netflix databases Monday, February 18, 13
  • 15. What are social networks? ✤ A “social network” is a force that brings people or their personas together on a regular basis. ✤ A “friend” is a person that you would choose to be in contact with. ✤ An “institution” is a custom, practice, relationship, or significant behavior pattern within a social network. Monday, February 18, 13
  • 16. Defining “identity” ✤ Carl Jung: ✤ Rational or “Conscious” ✤ Emotional or “Unconscious” Monday, February 18, 13
  • 17. Bringing Identity Online ✤ aestetix’s Method (draft spec): Monday, February 18, 13
  • 18. So what’s a “nym”? ✤ Pseudonym - a name that might not found on or linkable to any previously mentioned documents ✤ Polynym - a name consisting of multiple words or symbols ✤ Mononym - a name consisting of one word or symbol ✤ Autonym - a name bestowed upon oneself ✤ Anonym - a name representing anonymity Monday, February 18, 13
  • 19. Why not “real” name? ✤ Negative implications ✤ Lack of agency ✤ Easily substituted with better alternatives ✤ Where does this concept come from, anyways? http://www.shescribes.com/2011/07/i-cant-believe-its-not-butter-toast-tweet-100-giveaway.html Monday, February 18, 13
  • 20. What are social networks? ✤ Joseph Campbell: right hand path, left hand path, and the Hero’s Journey ✤ General Petraeus ✤ Why do hacker handles matter? Monday, February 18, 13
  • 21. Establishing Identity Online ✤ Zooko’s Triangle http://www.skyhunter.com/marcs/petnames/IntroPetNames.html Monday, February 18, 13
  • 22. Myth #2 We can stop cyber-bullying by forcing people to use their legal names People who do not use their legal names do not contribute positively to discussions http://mythbustersresults.com/photos/adam-savage-mythbusters.jpg Monday, February 18, 13
  • 23. Do Names Matter? Monday, February 18, 13
  • 24. Do Names Matter? Monday, February 18, 13
  • 25. Do Names Matter? http://en.wikipedia.org/wiki/Phineas_Gage http://circularabsurdity.blogspot.com/2010/11/my-steampunk-art.html Monday, February 18, 13
  • 26. Do Names Matter? ✤ Case Study: TechCrunch Monday, February 18, 13
  • 27. Do Names Matter? ✤ Case Study: TechCrunch Monday, February 18, 13
  • 28. Do Names Matter? ✤ Case Study: TechCrunch Monday, February 18, 13
  • 29. Do Names Matter? ✤ Case Study: Disqus, 60+ million users (Jan 10, 2012) http://disqus.com/research/pseudonyms/ Monday, February 18, 13
  • 30. Do Names Matter? ✤ Case Study: Disqus, 60+ million users (Jan 10, 2012) http://disqus.com/research/pseudonyms/ Monday, February 18, 13
  • 31. Total Lack of Names ✤ Social Number (launched Dec 2012) Monday, February 18, 13
  • 32. Total Lack of Names ✤ Social Number (launched Dec 2012) Monday, February 18, 13
  • 33. Total Lack of Names ✤ Social Number (launched Dec 2012) Monday, February 18, 13
  • 34. Myth #3 We cannot trust anyone who does not use their legal name online Monday, February 18, 13
  • 35. Trust and Reputation https://twitter.com/AntDeRosa/status/292796075348197376 Monday, February 18, 13
  • 36. Trust and Reputation Monday, February 18, 13
  • 37. Trust and Reputation Monday, February 18, 13
  • 38. Trust and Reputation ✤ “Klout” scores http://www.socialbrite.org/2010/07/22/klout-measure-your-twitter-influence/ Monday, February 18, 13
  • 39. Trust and Transparency ✤ What does transparency mean? ✤ Is there such a thing as full transparency? ✤ Who decides how transparent we get to be? ✤ Active versus Passive communication of personal information Monday, February 18, 13
  • 40. Myth #4 We can trust online “identity providers” like Google and Facebook Monday, February 18, 13
  • 41. Does Identity Matter? Eric Schmidt, Executive Chairman at Google: ✤ “The only way to manage this is true transparency and no anonymity. In a world of asynchronous threats, it is too dangerous for there not to be some way to identify you. We need a [verified] name service for people. Governments will demand it.” (Techonomy, August 2010) ✤ “If you have something that you don't want anyone to know, maybe you shouldn't be doing it in the first place."(CNBC Interview, December 2009) Monday, February 18, 13
  • 42. Does Identity Matter? Mark Zuckerberg, CEO at Facebook: ✤ “The days of you having a different image for your work friends or co-workers and for the other people you know are probably coming to an end pretty quickly. Having two identities for yourself is an example of a lack of integrity.” (Interview, October 2011) http://allinio.com/2012/12/holiday-carol-good-king-zuckerberg/ Monday, February 18, 13
  • 43. Does Identity Matter? Chris “moot” Poole, Founder of 4chan ✤ “The portrait of identity online is often painted in black and white. Who you are online is who you are offline. “Human identity doesn't work like that online or offline. It's not 'who you share with,' it's 'who you share as.’ Identity is prismatic.” (Web 2.0) http://www.hollywood.com/news/New_Yogi_Bear_Poster_Reveals_His_Darkest_Secret/7082914 Monday, February 18, 13
  • 44. Recap of 2011 ✤ My G+ account was suspended ✤ Confusion over “common name” ✤ Request for government issued ID ✤ Questions about ID != common name ✤ Account suddenly reinstated http://www.tumblr.com/tagged/nym%20wars Monday, February 18, 13
  • 45. Recap of 2011 Monday, February 18, 13
  • 46. I Wasn’t Alone! Monday, February 18, 13
  • 47. Where are we now? ✤ Updates to the Google+ policy (as of 10/27/2012): ✤ Limiting name changes (3 every 2 years) ✤ Names appeal (includes “significant following”) ✤ Nicknames policy Monday, February 18, 13
  • 48. Where are we now? ✤ Google’s idea of “pseudonyms”: Monday, February 18, 13
  • 49. Where are we now? ✤ Google patent #8271894 (granted Sep 18, 2012) Monday, February 18, 13
  • 50. Where are we now? Monday, February 18, 13
  • 51. Where are we now? Monday, February 18, 13
  • 52. Where are we now? Monday, February 18, 13
  • 53. Bringing Identity Online ✤ Google’s Method: Monday, February 18, 13
  • 54. Where are we now? ✤ “Snitchgate” (September 2012) Monday, February 18, 13
  • 55. Where are we now? ✤ Instagram Fiasco (Jan 22, 2013) http://news.cnet.com/8301-1023_3-57565293-93/instagram-account-crackdown-alarms-members-who-think-theyve-been-hacked/ Monday, February 18, 13
  • 56. Where are we now? ✤ Instagram Fiasco Monday, February 18, 13
  • 57. Where are we now? ✤ Instagram Fiasco Monday, February 18, 13
  • 58. Where are we now? ✤ Questions for thought: ✤ Who are Google and Facebook trying to “impress”? ✤ Who else might have access to this data? ✤ Why would Chewbacca, an 8-foot-tall Wookie, want to live on Endor with a bunch of 2-foot- tall Ewoks? Is that his real name? https://en.wikipedia.org/wiki/File:0330chewbacca.jpg Monday, February 18, 13
  • 59. Myth #5 We are currently fixing this through legislation. Monday, February 18, 13
  • 60. Legal issues? ✤ South Korea Real Name Verification Law (2003-2012) ✤ Required Resident Registration Number to be used for verification to improve “quality” ✤ Repealed in 2012 after Korea Communications Commission found a 0.9% change ✤ Follow-up study by Carnegie-Mellon Monday, February 18, 13
  • 61. Legal issues? ✤ Strengthening Network Internet Protection (China) ✤ Passed on 28 December 2012 ✤ Section VI: Network service providers that handle website access services for users, handle fixed telephone, mobile telephone and other surfing formalities, or provide information publication services to users, shall, when concluding agreements with users or affirming the provision of service, require users to provide real identity information. http://chinacopyrightandmedia.wordpress.com/2012/12/28/national-peoples-congress-standing-committee-decision-concerning-strengthening-network-information-protection/ Monday, February 18, 13
  • 62. Legal issues? ✤ California Proposition 35 (passed Nov 6, 2012) ✤ Californians Against Sexual Exploitation (“CASE”) ✤ Section 290.014 (b): If any person who is required to register pursuant to the Act adds or changes his or her account with an Internet service provider or adds or changes an Internet identifier, the person shall send written notice of the addition or change to the law enforcement agency or agencies with which he or she is currently registered within 24 hours. ...” ✤ EFF filed lawsuit, injunction granted as of Jan 11, 2013 Monday, February 18, 13
  • 63. Legal issues? ✤ German Telemedia Act (passed 26 February 2007) ✤ Section 13 (6): “The service provider must enable the use of telemedia and payment for them to occur anonymously or via a pseudonym where this is technically possible and reasonable. The recipient of the service is to be informed about this possibility.” http://www.cgerli.org/fileadmin/user_upload/interne_Dokumente/Legislation/Telemedia_Act__TMA_.pdf Monday, February 18, 13
  • 64. Moving Forward ✤ Join NymRights! (www.nymrights.org) ✤ Anyone can be an IDESG/NSTIC member! Monday, February 18, 13
  • 65. Questions? ✤ @aestetix Monday, February 18, 13