"The value of privacy, is that it enables us to go public!"
Never before in our networked societies has the subject of personal privacy protection been so hotly debated. And never have so many methods been employed to capture and use personal data. And never have so many that published so much about themselves online...
Paradox? Lack of awareness? Hypocrisy? Or emergence of a new way to defend and exercise our freedom, which we protect only in order to better project ourselves towards others, to the world?
This book offers new keys to understanding the relationship between computer science, freedom, privacy and identity. It proposes to replace a defensive approach to identity and privacy with a strategic approach. The aim is to share powerful technology, and equip individuals to the same degree as the services and organizations that want to learn more about them.
The book explores new avenues, new tools, sometimes new rights, to grant privacy its true value: the ability to choose and control one’s public life.
3. But our privacy regulations date from when they weren't Structured data Scattered grains of information Collected by visible, identified sources Ubiquitous sources (icl. things; others; ourselves…) Produced in an organized and conscious manner Byproducts of almost all human activities Stored in well-known locations Distributed and replicated Yesterday Today
6. It's called the "Privacy Paradox" Google Trends: "Privacy" … But a paradox in whose eyes?
7. In fact, people seem to know what they're doing… Differentiation Shared "decency"
8. … It's just that they're motivated by several things "Me" Reaching out , connecting, showing off, marketing myself Control over my visibility, presence, reputation… Convenience , simplicity, savings, personalization… Self-identity building * individuals, vendors, institutions, communities… Analysis, evaluation Others *
14. … (Forgetting is what memory does all the time)… Transience: the fading or loss of details over time Absent-mindedness: distractedness built into the sensing technologies Blocking: the random impossibility to answer specific queries Misattribution: the specific misrecording of part of an event, but not the whole event Suggestibility: the plausible rescripting certain events after a particular time Bias: re-writing all events based on pattern recognition to create a record that is consistent and plausible but subtly different ‘ Outlines of a world coming into existence’: Pervasive computing and the ethics of forgetting Martin Dodge, Rob Kitchin "Rather than focus on the prescriptive needs for privacy protections, we envisage necessary processes of forgetting (…) that should be in-built into the system ensuring a sufficient degree of imperfection, loss and error" Loss-Based Error-Based