5. 3 lessons
• Privacy is in the details- how do you deal with
exceptions and false positives?
• Institutionalise privacy protection
• In a high-trust environment, the more you
speak about privacy protection, the more
nervous people get about privacy
5
10. Conspiracy theories natural
10
Source: http://www.nbr.co.nz/article/dictators-guide-internet-how-balkanize-dirty-web-ck-143819
The Dictator’s Guide to the Internet: How to Balkanize the Dirty Web
Ian Apperley in the National Business Review
11. Major online service providers
also under scrutiny
11
Source: http://www.metafilter.com/95152/Userdriven-discontent#3256046
15. 15
2. Take sensible steps
Source: http://mashable.com/2013/04/30/facebook-graph-search-privacy-infographic/
But accept people are human and very
poor at risk evaluation
Excellent read: http://www.schneier.com/essay-155.html
16. 16
3. Consider if you are willing to pay for
privacy. Professionals and businesses
should consider confidentiality and
legal risks.
Source: http://paranoia.dubfire.net/2011/11/two-honest-google-employees-our.html
17. 17
So, what am I doing?
Source: http://romanticactoftheday.blogspot.co.nz/2012/09/your-gold-plated-word.html
18. 1. Talking about the issues
18
Source: http://internetganesha.wordpress.com/
19. 2. Becoming a cypherpunk
19
“An activist advocating widespread use
of strong cryptography as a route to
social and political change”
Source: http://en.wikipedia.org/wiki/Cypherpunk
Source: http://goldenageofgaia.com/2010/12/cypherpunk-the-origin-of-wikileaks/
24. Inspiration from the Bitcoin system
• Decentralised ledgers connected by crypto-
enforced contracts
• Peer-to-peer, irreversible transactions
• 51% agreement = “truth”
• Very low costs, global scale
24
25. Takeaways
• Design systems and processes for a low or
zero trust environment.
• Customers can take more responsibility and
actions to protect their privacy.
• Cryptography is expected to be increasingly
used online routinely, just like drawing
curtains in the Panopticon.
25