SlideShare une entreprise Scribd logo
1  sur  38
Télécharger pour lire hors ligne
Contextual Identity:
Freedom to be
All Your Selves
Monica Chew, Sid Stamm
Mozilla
{mmc,sid}@mozilla.com
Contextual Identity
Be who you want, when you want
Multiple identities abound!
Josephine Baker
Colleen Lachowicz
Snoop Dogg (Snoop Lion)
All your identities in one big identity
"Having two identities for yourself is an
example of a lack of integrity."
- Mark Zuckerberg, The Facebook Effect
"If you have something that you don't want
anyone to know, maybe you shouldn't be doing
it in the first place."
- Eric Schmidt, interview on CNBC
All your identities in one big identity
source: www.facebook.com/help/112146705538576/
“Facebook is a community where
people use their real identities. We
require everyone to provide their
real names, so you always know
who you're connecting with. This
helps keep our community safe.”
Mr. Burns is not pleased
A real world example
Bobbi Duncan Taylor McCormick
Outed when the choir director added them to a
public Facebook group, Queer Chorus
Fuck you, Google
I use my private Gmail account to email my boyfriend and my mother.
There’s a BIG drop-off between them and my other “most frequent”
contacts.
You know who my third most frequent contact is?
My abusive ex-husband.
Which is why it’s SO EXCITING, Google, that you AUTOMATICALLY
allowed all my most frequent contacts access to my Reader, including all
the comments I’ve made on Reader items, usually shared with my
boyfriend, who I had NO REASON to hide my current location or
workplace from, and never did.
All your services in one big service
source: www.fugitivus.net/2010/02/11/fuck-you-google/
catalyst: Google Buzz/Reader/Contacts integration
Twitter Direct Messaging Failures
sources: twitter.com/dmfail, wikipedia.org/wiki/Weinergate
catalyst: typing '@' instead of 'd'
What's in our privacy toolbox?
● Cryptography [RSA, AES, Diffie-Hellman]
● Contextual integrity [Barth et al.]
● Access control [Bell, LaPadula]
● Anonymizers [Dingledine, Marlinspike]
● Blockers [AdBlockPlus, Disconnect.me]
Our tools are necessary but not sufficient.
Access control: state of the art?
Changes are hard to track
source: http://mattmckeon.com/facebook-privacy/
Changes are hard to track
source: http://mattmckeon.com/facebook-privacy/
Changes are hard to track
source: http://mattmckeon.com/facebook-privacy/
Changes are hard to track
source: http://mattmckeon.com/facebook-privacy/
Changes are hard to track
source: http://mattmckeon.com/facebook-privacy/
Changes are hard to track
source: http://mattmckeon.com/facebook-privacy/
Be who you want, when
you want
How do we get there?
Call to action
Study mental models
What makes up online identity?
sites you visit once
devices you own
devices you borrow
devices you lend
sites you never visit
sites you often visit
topics you like
Call to action
Study identity management techniques
Multiple browsers
Multiple devices
Multiple profiles
Alternate identities
Privacy mode
Challenge
People value community
Challenge
People want their data everywhere
Popemobiles make it hard to share
Think different.
Hey, W2SP.
● Obscurity can be enough
● Embarrassment reduction
● Troll avoidance
● Mistake recovery
Room for imperfect solutions
How can we make things better?
● Question our own notions of identity, privacy
and publicity
● Write software for how users are, not how
we wish them to be
Open questions
● How can we design privacy and sharing to
be less brittle, more flexible?
● How can we balance desire for spontaneous
interaction with the need for privacy?
Works in progress
● Blushproof [with David Keeler]
● Cookiemonster [with David Dahl]
● Behavioral segmentation [Mozilla UR]
Questions?

Contenu connexe

Tendances

Stalking in the Cyberspace
Stalking in the CyberspaceStalking in the Cyberspace
Stalking in the CyberspaceEmil Tan
 
Drinking from a Fire Hose
Drinking from a Fire HoseDrinking from a Fire Hose
Drinking from a Fire HoseAnne Adrian
 
Introduction to Social Media for Small Business
Introduction to Social Media for Small BusinessIntroduction to Social Media for Small Business
Introduction to Social Media for Small BusinessAnne Adrian
 
FILM 260 - Social Media: The Dangers of Over Sharing
FILM 260 - Social Media: The Dangers of Over Sharing FILM 260 - Social Media: The Dangers of Over Sharing
FILM 260 - Social Media: The Dangers of Over Sharing Emma Irwin
 
Untech10: Mobile Matters: What Association Leaders Need To Know
Untech10: Mobile Matters: What Association Leaders Need To KnowUntech10: Mobile Matters: What Association Leaders Need To Know
Untech10: Mobile Matters: What Association Leaders Need To KnowVanguard Technology
 
Social Networking: Past, Present & Future
Social Networking: Past, Present & FutureSocial Networking: Past, Present & Future
Social Networking: Past, Present & FutureMark Suster
 
Why Mobile Matters - ASAE Technology Conference
Why Mobile Matters - ASAE Technology ConferenceWhy Mobile Matters - ASAE Technology Conference
Why Mobile Matters - ASAE Technology ConferenceVanguard Technology
 
Connections Lost: The Damages of Textual Conversation and Multi-Communication
Connections Lost: The Damages of Textual Conversation and Multi-CommunicationConnections Lost: The Damages of Textual Conversation and Multi-Communication
Connections Lost: The Damages of Textual Conversation and Multi-CommunicationTatum Shiff
 
Social Media Beltwide Cotton
Social Media Beltwide CottonSocial Media Beltwide Cotton
Social Media Beltwide CottonAnne Adrian
 
Tracking Boba Fett's Invoice, or Hey, It Went Viral!
Tracking Boba Fett's Invoice, or Hey, It Went Viral!Tracking Boba Fett's Invoice, or Hey, It Went Viral!
Tracking Boba Fett's Invoice, or Hey, It Went Viral!Dan Wallace
 
Fear And Loathing in Social Media
Fear And Loathing in Social MediaFear And Loathing in Social Media
Fear And Loathing in Social MediaKate Trgovac
 
Storytelling & Social Media: Creating Social Buzz
Storytelling & Social Media: Creating Social Buzz Storytelling & Social Media: Creating Social Buzz
Storytelling & Social Media: Creating Social Buzz TechSoup
 
Introduction to Facebook and Twitter
Introduction to Facebook and TwitterIntroduction to Facebook and Twitter
Introduction to Facebook and TwitterAnne Adrian
 

Tendances (16)

Stalking in the Cyberspace
Stalking in the CyberspaceStalking in the Cyberspace
Stalking in the Cyberspace
 
Drinking from a Fire Hose
Drinking from a Fire HoseDrinking from a Fire Hose
Drinking from a Fire Hose
 
Engaging The Conversation
Engaging The ConversationEngaging The Conversation
Engaging The Conversation
 
Introduction to Social Media for Small Business
Introduction to Social Media for Small BusinessIntroduction to Social Media for Small Business
Introduction to Social Media for Small Business
 
FILM 260 - Social Media: The Dangers of Over Sharing
FILM 260 - Social Media: The Dangers of Over Sharing FILM 260 - Social Media: The Dangers of Over Sharing
FILM 260 - Social Media: The Dangers of Over Sharing
 
Untech10: Mobile Matters: What Association Leaders Need To Know
Untech10: Mobile Matters: What Association Leaders Need To KnowUntech10: Mobile Matters: What Association Leaders Need To Know
Untech10: Mobile Matters: What Association Leaders Need To Know
 
4-H volunteers final
4-H volunteers final4-H volunteers final
4-H volunteers final
 
Social Networking: Past, Present & Future
Social Networking: Past, Present & FutureSocial Networking: Past, Present & Future
Social Networking: Past, Present & Future
 
Social Media 101
Social Media 101Social Media 101
Social Media 101
 
Why Mobile Matters - ASAE Technology Conference
Why Mobile Matters - ASAE Technology ConferenceWhy Mobile Matters - ASAE Technology Conference
Why Mobile Matters - ASAE Technology Conference
 
Connections Lost: The Damages of Textual Conversation and Multi-Communication
Connections Lost: The Damages of Textual Conversation and Multi-CommunicationConnections Lost: The Damages of Textual Conversation and Multi-Communication
Connections Lost: The Damages of Textual Conversation and Multi-Communication
 
Social Media Beltwide Cotton
Social Media Beltwide CottonSocial Media Beltwide Cotton
Social Media Beltwide Cotton
 
Tracking Boba Fett's Invoice, or Hey, It Went Viral!
Tracking Boba Fett's Invoice, or Hey, It Went Viral!Tracking Boba Fett's Invoice, or Hey, It Went Viral!
Tracking Boba Fett's Invoice, or Hey, It Went Viral!
 
Fear And Loathing in Social Media
Fear And Loathing in Social MediaFear And Loathing in Social Media
Fear And Loathing in Social Media
 
Storytelling & Social Media: Creating Social Buzz
Storytelling & Social Media: Creating Social Buzz Storytelling & Social Media: Creating Social Buzz
Storytelling & Social Media: Creating Social Buzz
 
Introduction to Facebook and Twitter
Introduction to Facebook and TwitterIntroduction to Facebook and Twitter
Introduction to Facebook and Twitter
 

Similaire à Contextual Identity: Freedom to be All Your Selves

Security Dangers of Social Networking
Security Dangers of Social NetworkingSecurity Dangers of Social Networking
Security Dangers of Social NetworkingBillBrenner70
 
Social - Best habits to follow and pitfalls to avoid
Social - Best habits to follow and pitfalls to avoidSocial - Best habits to follow and pitfalls to avoid
Social - Best habits to follow and pitfalls to avoidVenkatarangan Thirumalai
 
Lis 768 Privacy Presentation
Lis 768 Privacy PresentationLis 768 Privacy Presentation
Lis 768 Privacy PresentationJulia Bryan-Diehl
 
Multimedia01
Multimedia01Multimedia01
Multimedia01Les Davy
 
Youth Communication and Privacy in the Social Media Age
Youth Communication and Privacy in the Social Media AgeYouth Communication and Privacy in the Social Media Age
Youth Communication and Privacy in the Social Media AgeNathan Wright
 
A Social Media Evolution Whats Next?
A Social Media Evolution   Whats Next?A Social Media Evolution   Whats Next?
A Social Media Evolution Whats Next?Jeffrey Stewart
 
A Social Media Evolution - Whats Next
A Social Media Evolution - Whats NextA Social Media Evolution - Whats Next
A Social Media Evolution - Whats NextSocial Media Bootcamp
 
IS 20090 Week 2 - Social Networks
IS 20090 Week 2 - Social NetworksIS 20090 Week 2 - Social Networks
IS 20090 Week 2 - Social Networksis20090
 
Social groups for awareness
Social groups for awarenessSocial groups for awareness
Social groups for awarenessKaran Veer Singh
 
Week 7: Privacy-rev2013
Week 7:  Privacy-rev2013Week 7:  Privacy-rev2013
Week 7: Privacy-rev2013Ray Brannon
 
Gez Daring - Building Online Communities
Gez Daring - Building Online CommunitiesGez Daring - Building Online Communities
Gez Daring - Building Online CommunitiesInBlackandWhite
 
Marketing Innovation Summit: Integrating Social Media into the Mix
Marketing Innovation Summit:  Integrating Social Media into the MixMarketing Innovation Summit:  Integrating Social Media into the Mix
Marketing Innovation Summit: Integrating Social Media into the MixJeffrey Stewart
 
Casott employee conference 2015
Casott employee conference 2015Casott employee conference 2015
Casott employee conference 2015Bernard Charlebois
 
Social Media Basics: Security Loopholes with Twitter & Other Social Media
Social Media Basics: Security Loopholes with Twitter & Other Social MediaSocial Media Basics: Security Loopholes with Twitter & Other Social Media
Social Media Basics: Security Loopholes with Twitter & Other Social MediaTyler Shields
 
Data privacy day - Ryan McNutt
Data privacy day - Ryan McNuttData privacy day - Ryan McNutt
Data privacy day - Ryan McNuttMcNutt
 
Effectiveness Vs Efficiency: Practical ways for dealing with Information Over...
Effectiveness Vs Efficiency: Practical ways for dealing with Information Over...Effectiveness Vs Efficiency: Practical ways for dealing with Information Over...
Effectiveness Vs Efficiency: Practical ways for dealing with Information Over...Adria Richards
 

Similaire à Contextual Identity: Freedom to be All Your Selves (20)

Security Dangers of Social Networking
Security Dangers of Social NetworkingSecurity Dangers of Social Networking
Security Dangers of Social Networking
 
Social - Best habits to follow and pitfalls to avoid
Social - Best habits to follow and pitfalls to avoidSocial - Best habits to follow and pitfalls to avoid
Social - Best habits to follow and pitfalls to avoid
 
Lis 768 Privacy Presentation
Lis 768 Privacy PresentationLis 768 Privacy Presentation
Lis 768 Privacy Presentation
 
Multimedia01
Multimedia01Multimedia01
Multimedia01
 
Youth Communication and Privacy in the Social Media Age
Youth Communication and Privacy in the Social Media AgeYouth Communication and Privacy in the Social Media Age
Youth Communication and Privacy in the Social Media Age
 
A Social Media Evolution Whats Next?
A Social Media Evolution   Whats Next?A Social Media Evolution   Whats Next?
A Social Media Evolution Whats Next?
 
A Social Media Evolution - Whats Next
A Social Media Evolution - Whats NextA Social Media Evolution - Whats Next
A Social Media Evolution - Whats Next
 
Grasping Social Patterns
Grasping Social PatternsGrasping Social Patterns
Grasping Social Patterns
 
IS 20090 Week 2 - Social Networks
IS 20090 Week 2 - Social NetworksIS 20090 Week 2 - Social Networks
IS 20090 Week 2 - Social Networks
 
Social groups for awareness
Social groups for awarenessSocial groups for awareness
Social groups for awareness
 
Week 7: Privacy-rev2013
Week 7:  Privacy-rev2013Week 7:  Privacy-rev2013
Week 7: Privacy-rev2013
 
Gez Daring - Building Online Communities
Gez Daring - Building Online CommunitiesGez Daring - Building Online Communities
Gez Daring - Building Online Communities
 
Marketing Innovation Summit: Integrating Social Media into the Mix
Marketing Innovation Summit:  Integrating Social Media into the MixMarketing Innovation Summit:  Integrating Social Media into the Mix
Marketing Innovation Summit: Integrating Social Media into the Mix
 
The FACEBOOK and TWITTER Phenomenon [9-28-2010]
The FACEBOOK and TWITTER Phenomenon [9-28-2010]The FACEBOOK and TWITTER Phenomenon [9-28-2010]
The FACEBOOK and TWITTER Phenomenon [9-28-2010]
 
Casott employee conference 2015
Casott employee conference 2015Casott employee conference 2015
Casott employee conference 2015
 
Social web for grannies
Social web for granniesSocial web for grannies
Social web for grannies
 
Web pp
Web ppWeb pp
Web pp
 
Social Media Basics: Security Loopholes with Twitter & Other Social Media
Social Media Basics: Security Loopholes with Twitter & Other Social MediaSocial Media Basics: Security Loopholes with Twitter & Other Social Media
Social Media Basics: Security Loopholes with Twitter & Other Social Media
 
Data privacy day - Ryan McNutt
Data privacy day - Ryan McNuttData privacy day - Ryan McNutt
Data privacy day - Ryan McNutt
 
Effectiveness Vs Efficiency: Practical ways for dealing with Information Over...
Effectiveness Vs Efficiency: Practical ways for dealing with Information Over...Effectiveness Vs Efficiency: Practical ways for dealing with Information Over...
Effectiveness Vs Efficiency: Practical ways for dealing with Information Over...
 

Dernier

Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGSujit Pal
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 

Dernier (20)

Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAG
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 

Contextual Identity: Freedom to be All Your Selves

  • 1. Contextual Identity: Freedom to be All Your Selves Monica Chew, Sid Stamm Mozilla {mmc,sid}@mozilla.com
  • 2. Contextual Identity Be who you want, when you want
  • 7. All your identities in one big identity "Having two identities for yourself is an example of a lack of integrity." - Mark Zuckerberg, The Facebook Effect "If you have something that you don't want anyone to know, maybe you shouldn't be doing it in the first place." - Eric Schmidt, interview on CNBC
  • 8. All your identities in one big identity source: www.facebook.com/help/112146705538576/ “Facebook is a community where people use their real identities. We require everyone to provide their real names, so you always know who you're connecting with. This helps keep our community safe.”
  • 9. Mr. Burns is not pleased
  • 10. A real world example Bobbi Duncan Taylor McCormick Outed when the choir director added them to a public Facebook group, Queer Chorus
  • 11. Fuck you, Google I use my private Gmail account to email my boyfriend and my mother. There’s a BIG drop-off between them and my other “most frequent” contacts. You know who my third most frequent contact is? My abusive ex-husband. Which is why it’s SO EXCITING, Google, that you AUTOMATICALLY allowed all my most frequent contacts access to my Reader, including all the comments I’ve made on Reader items, usually shared with my boyfriend, who I had NO REASON to hide my current location or workplace from, and never did. All your services in one big service source: www.fugitivus.net/2010/02/11/fuck-you-google/ catalyst: Google Buzz/Reader/Contacts integration
  • 12. Twitter Direct Messaging Failures sources: twitter.com/dmfail, wikipedia.org/wiki/Weinergate catalyst: typing '@' instead of 'd'
  • 13. What's in our privacy toolbox? ● Cryptography [RSA, AES, Diffie-Hellman] ● Contextual integrity [Barth et al.] ● Access control [Bell, LaPadula] ● Anonymizers [Dingledine, Marlinspike] ● Blockers [AdBlockPlus, Disconnect.me] Our tools are necessary but not sufficient.
  • 14. Access control: state of the art?
  • 15. Changes are hard to track source: http://mattmckeon.com/facebook-privacy/
  • 16. Changes are hard to track source: http://mattmckeon.com/facebook-privacy/
  • 17. Changes are hard to track source: http://mattmckeon.com/facebook-privacy/
  • 18. Changes are hard to track source: http://mattmckeon.com/facebook-privacy/
  • 19. Changes are hard to track source: http://mattmckeon.com/facebook-privacy/
  • 20. Changes are hard to track source: http://mattmckeon.com/facebook-privacy/
  • 21. Be who you want, when you want How do we get there?
  • 22. Call to action Study mental models
  • 23. What makes up online identity? sites you visit once devices you own devices you borrow devices you lend sites you never visit sites you often visit topics you like
  • 24. Call to action Study identity management techniques
  • 31. Challenge People want their data everywhere
  • 32. Popemobiles make it hard to share
  • 34. ● Obscurity can be enough ● Embarrassment reduction ● Troll avoidance ● Mistake recovery Room for imperfect solutions
  • 35. How can we make things better? ● Question our own notions of identity, privacy and publicity ● Write software for how users are, not how we wish them to be
  • 36. Open questions ● How can we design privacy and sharing to be less brittle, more flexible? ● How can we balance desire for spontaneous interaction with the need for privacy?
  • 37. Works in progress ● Blushproof [with David Keeler] ● Cookiemonster [with David Dahl] ● Behavioral segmentation [Mozilla UR]