SlideShare uma empresa Scribd logo
1 de 61
Online Privacy Technologies Dr. Lorrie Faith Cranor AT&T Labs-Research http://www.research.att.com/~lorrie/ NTIA Online Privacy Technologies Workshop
Why is Cathy concerned? Cathy March 1, 2000
How did Irving find this out?  ,[object Object],[object Object],[object Object],[object Object]
What do browsers chatter about? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
A typical HTTP request ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
What about cookies? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
YOU With cooperation from book store, ad  company can get  your name and  address from book order and link them to  your search Search engine Ad Search for medical information Book Store Ad Buy book Read cookie Set cookie
Web bugs ,[object Object],[object Object],[object Object],[object Object],[object Object]
Referer log problems ,[object Object],[object Object],[object Object],[object Object]
Low tech solutions ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Types of software tools ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Regulatory and self-regulatory framework Regulatory and self-regulatory framework Service User The Internet Secure channel P3P user agent Cookie cutter Anonymizing agent
Anonymizing proxy ,[object Object],[object Object],[object Object],[object Object],[object Object],Proxy Browser End Server Request Request Reply Reply
http://www.anonymizer.com
Pseudonymity tools quote.com nytimes.com expedia.com mfjh asef dsfdf Proxy Automatically generate user names, passwords, email addresses, etc. unique to each  web site you visit username
iPrivacy private shipping labels CUSTOMER PC Public Identity Private Identity John Doe iPrivacy ABCDEF 1 MAIN ST 1 dQg85xP26 Kansas City, KS Kansas City, KS 11122 11122 Doe@ isp .com [email_address] WEB FORM Name : iPrivacy ABCDEF Address: :  1 dQg85xP26 City : Kansas City State : KS Zip : 11122 Email :  ABCDEF @iPrivacy.com WEB e- Tailer Order Entry System Submit Credit Card  If Authorized Ship Product Shipping Subsystem Input Private Identity Decode Address PRINT LABEL iPrivacy ABCDEF 1 MAIN ST Kansas City, KS 11122
 
Incogno SafeZone The merchant offers Incogno SafeZone from its site Upon checkout, the buyer enters personal information into The Incogno SafeZone – a separate server.
Incogno SafeZone Incogno reinforces that the purchase is anonymous . The anonymous purchase is complete with no added software installation or setup for the buyer.
Privada ,[object Object],[object Object],[object Object],Patent-pending privacy management infrastructure
 
Mixes [Chaum81] Sender routes message randomly through network  of “Mixes”, using layered public-key encryption. Mix A Sender Destination Mix C Mix B B, k A C k B dest,msg k C C k B dest,msg k C dest,msg k C msg k X  = encrypted with public key of Mix X
Freedom by Zero-Knowledge
Freedom nyms Create multiple psuedonyms Surf without a nym Select a nym and surf
Crowds ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Crowds illustrated 1 2 6 3 5 4 3 5 1 6 2 4 Crowd members Web servers
Anonymous email ,[object Object],[object Object],[object Object],[object Object]
Encryption tools ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Disappearing, Inc.
Filters ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Identity management tools ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Persona Consumer fills out Persona with personal information Consumer can decide how each field is shared with online businesses and 3 rd  parties
PersonaValet ,[object Object],[object Object],Allows user to accept or  reject cookies while surfing Cookie Watcher tells users when cookies are being dropped P3P Viewer alerts user to site with valid P3P policy; allows comparison to user’s privacy settings Pop-up Menu
PrivacyBank.Com PrivacyBank bookmark
Infomediary example: PrivacyBank PrivacyBank bookmark
Platform for Privacy Preferences (P3P) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Using P3P on your Web site ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
The P3P vocabulary ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Transparency ,[object Object],[object Object],http://adforce.imgis.com/?adlink|2|68523|1|146|ADFORCE http://www.att.com/accessatt /
Microsoft/AT&T P3P browser helper object ,[object Object],[object Object]
Preference settings
 
When preferences are changed to Disallow profiling, the privacy check warns us that this site profiles visitors
IDcide Privacy Companion ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Searching for  a P3P policy No P3P policy found P3P policy is NOT acceptable P3P policy is acceptable IDcide P3P Icons
Double clicking on the P3P icon indicates where the site’s policy differs from the user’s preferences
YOUpowered Orby Privacy Plus ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Trust Meter
Orby cookie prompt
Orby preference setting menu
IBM P3P Policy Editor ,[object Object],[object Object],[object Object]
Sites can  list the types of data they collect And view the  corresponding P3P policy
Templates allow  sites to start with a pre-defined policy and customize it to meet their needs
PrivacyBot.com Allows webmasters to fill out an online questionnaire to automatically create a human-readable privacy policy and a P3P policy
YOUpowered Consumer Trust Policy Manager Wizard
Other tools ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
 
 
 
Tools work together ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Download these slides http://www.research.att.com/ ~lorrie/privacy/NTIA-0900.ppt

Mais conteúdo relacionado

Mais procurados

Algorithmic Web Spam detection - Matt Peters MozCon
Algorithmic Web Spam detection - Matt Peters MozConAlgorithmic Web Spam detection - Matt Peters MozCon
Algorithmic Web Spam detection - Matt Peters MozConmattthemathman
 
StartPad Countdown 2 - Startup Security: Hacking and Compliance in a Web 2.0 ...
StartPad Countdown 2 - Startup Security: Hacking and Compliance in a Web 2.0 ...StartPad Countdown 2 - Startup Security: Hacking and Compliance in a Web 2.0 ...
StartPad Countdown 2 - Startup Security: Hacking and Compliance in a Web 2.0 ...Start Pad
 
Protecting Yourself Online
Protecting Yourself OnlineProtecting Yourself Online
Protecting Yourself OnlineGary Wagnon
 
امتحان النت
امتحان النتامتحان النت
امتحان النتDina El Stohy
 
Tracking the Trackers tutorial at the Digital Methods Summer School 2013
Tracking the Trackers tutorial at the Digital Methods Summer School 2013Tracking the Trackers tutorial at the Digital Methods Summer School 2013
Tracking the Trackers tutorial at the Digital Methods Summer School 2013Digital Methods Initiative
 
Email and Internet Overview
Email and Internet OverviewEmail and Internet Overview
Email and Internet OverviewCraig Higham
 
Data privacy over internet
Data privacy over internetData privacy over internet
Data privacy over internetdevashishicai
 
O Leary2008 Ce Complete Chapter2
O Leary2008 Ce Complete Chapter2O Leary2008 Ce Complete Chapter2
O Leary2008 Ce Complete Chapter2lonetree
 
The Social Semantic Web and Linked Data
The Social Semantic Web and Linked DataThe Social Semantic Web and Linked Data
The Social Semantic Web and Linked DataAlexandre Passant
 
Web Browser ! Batra Computer Centre
Web Browser ! Batra Computer CentreWeb Browser ! Batra Computer Centre
Web Browser ! Batra Computer Centrejatin batra
 
CSRF_RSA_2008_Jeremiah_Grossman
CSRF_RSA_2008_Jeremiah_GrossmanCSRF_RSA_2008_Jeremiah_Grossman
CSRF_RSA_2008_Jeremiah_Grossmanguestdb261a
 
Advanced Information Gathering AKA Google Hacking
Advanced Information Gathering AKA Google HackingAdvanced Information Gathering AKA Google Hacking
Advanced Information Gathering AKA Google HackingGareth Davies
 
First Things First
First Things FirstFirst Things First
First Things Firstmayfieldsp
 
Web Browser ! Batra Computer Centre
Web Browser ! Batra Computer CentreWeb Browser ! Batra Computer Centre
Web Browser ! Batra Computer Centrejatin batra
 
The ultimate guide to the invisible web
The ultimate guide to the invisible webThe ultimate guide to the invisible web
The ultimate guide to the invisible webYKNIB O
 
How To Approach GDPR Preparation & Discovery
How To Approach GDPR Preparation & DiscoveryHow To Approach GDPR Preparation & Discovery
How To Approach GDPR Preparation & DiscoveryGabriella Davis
 

Mais procurados (19)

Algorithmic Web Spam detection - Matt Peters MozCon
Algorithmic Web Spam detection - Matt Peters MozConAlgorithmic Web Spam detection - Matt Peters MozCon
Algorithmic Web Spam detection - Matt Peters MozCon
 
StartPad Countdown 2 - Startup Security: Hacking and Compliance in a Web 2.0 ...
StartPad Countdown 2 - Startup Security: Hacking and Compliance in a Web 2.0 ...StartPad Countdown 2 - Startup Security: Hacking and Compliance in a Web 2.0 ...
StartPad Countdown 2 - Startup Security: Hacking and Compliance in a Web 2.0 ...
 
Phishing
PhishingPhishing
Phishing
 
Protecting Yourself Online
Protecting Yourself OnlineProtecting Yourself Online
Protecting Yourself Online
 
امتحان النت
امتحان النتامتحان النت
امتحان النت
 
Tracking the Trackers tutorial at the Digital Methods Summer School 2013
Tracking the Trackers tutorial at the Digital Methods Summer School 2013Tracking the Trackers tutorial at the Digital Methods Summer School 2013
Tracking the Trackers tutorial at the Digital Methods Summer School 2013
 
Email and Internet Overview
Email and Internet OverviewEmail and Internet Overview
Email and Internet Overview
 
Data privacy over internet
Data privacy over internetData privacy over internet
Data privacy over internet
 
O Leary2008 Ce Complete Chapter2
O Leary2008 Ce Complete Chapter2O Leary2008 Ce Complete Chapter2
O Leary2008 Ce Complete Chapter2
 
The Social Semantic Web and Linked Data
The Social Semantic Web and Linked DataThe Social Semantic Web and Linked Data
The Social Semantic Web and Linked Data
 
Web Browser ! Batra Computer Centre
Web Browser ! Batra Computer CentreWeb Browser ! Batra Computer Centre
Web Browser ! Batra Computer Centre
 
CSRF_RSA_2008_Jeremiah_Grossman
CSRF_RSA_2008_Jeremiah_GrossmanCSRF_RSA_2008_Jeremiah_Grossman
CSRF_RSA_2008_Jeremiah_Grossman
 
Advanced Information Gathering AKA Google Hacking
Advanced Information Gathering AKA Google HackingAdvanced Information Gathering AKA Google Hacking
Advanced Information Gathering AKA Google Hacking
 
First Things First
First Things FirstFirst Things First
First Things First
 
Web Browser ! Batra Computer Centre
Web Browser ! Batra Computer CentreWeb Browser ! Batra Computer Centre
Web Browser ! Batra Computer Centre
 
The ultimate guide to the invisible web
The ultimate guide to the invisible webThe ultimate guide to the invisible web
The ultimate guide to the invisible web
 
Social Media Security
Social Media SecuritySocial Media Security
Social Media Security
 
How To Approach GDPR Preparation & Discovery
How To Approach GDPR Preparation & DiscoveryHow To Approach GDPR Preparation & Discovery
How To Approach GDPR Preparation & Discovery
 
 

Semelhante a Online Privacy Technologies: Tools that Protect User Privacy and Anonymity

2008 10 21 Top Ten Tech Tools Agents E Xtension
2008 10 21 Top Ten Tech Tools Agents E Xtension2008 10 21 Top Ten Tech Tools Agents E Xtension
2008 10 21 Top Ten Tech Tools Agents E Xtensiondkp205
 
E-commerce Lab work
E-commerce Lab workE-commerce Lab work
E-commerce Lab workPragya Bisht
 
Research Project Ms
Research Project MsResearch Project Ms
Research Project Msmafer23
 
The Nitty Gritty of Affiliate Marketing Compliance
The Nitty Gritty of Affiliate Marketing ComplianceThe Nitty Gritty of Affiliate Marketing Compliance
The Nitty Gritty of Affiliate Marketing ComplianceAffiliate Summit
 
Brief description on Web technology
Brief description on Web technology Brief description on Web technology
Brief description on Web technology Rupanshi rawat
 
Network Basics & Internet
Network Basics & InternetNetwork Basics & Internet
Network Basics & InternetVNSGU
 
Internet research-1200691875464541-5
Internet research-1200691875464541-5Internet research-1200691875464541-5
Internet research-1200691875464541-5惠子 李
 
Internet research-1200691875464541-5
Internet research-1200691875464541-5Internet research-1200691875464541-5
Internet research-1200691875464541-5惠子 李
 
Open Id, O Auth And Webservices
Open Id, O Auth And WebservicesOpen Id, O Auth And Webservices
Open Id, O Auth And WebservicesMyles Eftos
 
Designing for privacy: 3 essential UX habits for product teams
Designing for privacy: 3 essential UX habits for product teamsDesigning for privacy: 3 essential UX habits for product teams
Designing for privacy: 3 essential UX habits for product teamsBlock Party
 
Christos_Beretas_Internet_Privacy_and_Myths_TE
Christos_Beretas_Internet_Privacy_and_Myths_TEChristos_Beretas_Internet_Privacy_and_Myths_TE
Christos_Beretas_Internet_Privacy_and_Myths_TEChristos Beretas
 
Decentralized Social Networking
Decentralized Social NetworkingDecentralized Social Networking
Decentralized Social NetworkingPascal Van Hecke
 
Ch04 Footprinting and Social Engineering
Ch04 Footprinting and Social EngineeringCh04 Footprinting and Social Engineering
Ch04 Footprinting and Social Engineeringphanleson
 
Identity Enabling Web Services
Identity Enabling Web ServicesIdentity Enabling Web Services
Identity Enabling Web ServicesAshish Jain
 
Online Brand Protection: Fighting Domain Name Typosquatting, Website Spoofing...
Online Brand Protection:Fighting Domain Name Typosquatting, Website Spoofing...Online Brand Protection:Fighting Domain Name Typosquatting, Website Spoofing...
Online Brand Protection: Fighting Domain Name Typosquatting, Website Spoofing...WhoisXML API
 

Semelhante a Online Privacy Technologies: Tools that Protect User Privacy and Anonymity (20)

Mid Term Exam
Mid Term ExamMid Term Exam
Mid Term Exam
 
2008 10 21 Top Ten Tech Tools Agents E Xtension
2008 10 21 Top Ten Tech Tools Agents E Xtension2008 10 21 Top Ten Tech Tools Agents E Xtension
2008 10 21 Top Ten Tech Tools Agents E Xtension
 
E-commerce Lab work
E-commerce Lab workE-commerce Lab work
E-commerce Lab work
 
Research Project Ms
Research Project MsResearch Project Ms
Research Project Ms
 
The Nitty Gritty of Affiliate Marketing Compliance
The Nitty Gritty of Affiliate Marketing ComplianceThe Nitty Gritty of Affiliate Marketing Compliance
The Nitty Gritty of Affiliate Marketing Compliance
 
The Internet
The InternetThe Internet
The Internet
 
Brief description on Web technology
Brief description on Web technology Brief description on Web technology
Brief description on Web technology
 
Network Basics & Internet
Network Basics & InternetNetwork Basics & Internet
Network Basics & Internet
 
Internet research-1200691875464541-5
Internet research-1200691875464541-5Internet research-1200691875464541-5
Internet research-1200691875464541-5
 
Internet research-1200691875464541-5
Internet research-1200691875464541-5Internet research-1200691875464541-5
Internet research-1200691875464541-5
 
Internet research
Internet researchInternet research
Internet research
 
Internet research for HRD Profession
Internet research for HRD ProfessionInternet research for HRD Profession
Internet research for HRD Profession
 
Open Id, O Auth And Webservices
Open Id, O Auth And WebservicesOpen Id, O Auth And Webservices
Open Id, O Auth And Webservices
 
Designing for privacy: 3 essential UX habits for product teams
Designing for privacy: 3 essential UX habits for product teamsDesigning for privacy: 3 essential UX habits for product teams
Designing for privacy: 3 essential UX habits for product teams
 
Christos_Beretas_Internet_Privacy_and_Myths_TE
Christos_Beretas_Internet_Privacy_and_Myths_TEChristos_Beretas_Internet_Privacy_and_Myths_TE
Christos_Beretas_Internet_Privacy_and_Myths_TE
 
Decentralized Social Networking
Decentralized Social NetworkingDecentralized Social Networking
Decentralized Social Networking
 
Cyber security
Cyber securityCyber security
Cyber security
 
Ch04 Footprinting and Social Engineering
Ch04 Footprinting and Social EngineeringCh04 Footprinting and Social Engineering
Ch04 Footprinting and Social Engineering
 
Identity Enabling Web Services
Identity Enabling Web ServicesIdentity Enabling Web Services
Identity Enabling Web Services
 
Online Brand Protection: Fighting Domain Name Typosquatting, Website Spoofing...
Online Brand Protection:Fighting Domain Name Typosquatting, Website Spoofing...Online Brand Protection:Fighting Domain Name Typosquatting, Website Spoofing...
Online Brand Protection: Fighting Domain Name Typosquatting, Website Spoofing...
 

Último

A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI AgeCprime
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfpanagenda
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Hiroshi SHIBATA
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Mark Goldstein
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfIngrid Airi González
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality AssuranceInflectra
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Alkin Tezuysal
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch TuesdayIvanti
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...AliaaTarek5
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfNeo4j
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...Wes McKinney
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesKari Kakkonen
 

Último (20)

A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI Age
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdf
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch Tuesday
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdf
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examples
 

Online Privacy Technologies: Tools that Protect User Privacy and Anonymity

  • 1. Online Privacy Technologies Dr. Lorrie Faith Cranor AT&T Labs-Research http://www.research.att.com/~lorrie/ NTIA Online Privacy Technologies Workshop
  • 2. Why is Cathy concerned? Cathy March 1, 2000
  • 3.
  • 4.
  • 5.
  • 6.
  • 7. YOU With cooperation from book store, ad company can get your name and address from book order and link them to your search Search engine Ad Search for medical information Book Store Ad Buy book Read cookie Set cookie
  • 8.
  • 9.
  • 10.
  • 11.
  • 12. Regulatory and self-regulatory framework Regulatory and self-regulatory framework Service User The Internet Secure channel P3P user agent Cookie cutter Anonymizing agent
  • 13.
  • 15. Pseudonymity tools quote.com nytimes.com expedia.com mfjh asef dsfdf Proxy Automatically generate user names, passwords, email addresses, etc. unique to each web site you visit username
  • 16. iPrivacy private shipping labels CUSTOMER PC Public Identity Private Identity John Doe iPrivacy ABCDEF 1 MAIN ST 1 dQg85xP26 Kansas City, KS Kansas City, KS 11122 11122 Doe@ isp .com [email_address] WEB FORM Name : iPrivacy ABCDEF Address: : 1 dQg85xP26 City : Kansas City State : KS Zip : 11122 Email : ABCDEF @iPrivacy.com WEB e- Tailer Order Entry System Submit Credit Card If Authorized Ship Product Shipping Subsystem Input Private Identity Decode Address PRINT LABEL iPrivacy ABCDEF 1 MAIN ST Kansas City, KS 11122
  • 17.  
  • 18. Incogno SafeZone The merchant offers Incogno SafeZone from its site Upon checkout, the buyer enters personal information into The Incogno SafeZone – a separate server.
  • 19. Incogno SafeZone Incogno reinforces that the purchase is anonymous . The anonymous purchase is complete with no added software installation or setup for the buyer.
  • 20.
  • 21.  
  • 22. Mixes [Chaum81] Sender routes message randomly through network of “Mixes”, using layered public-key encryption. Mix A Sender Destination Mix C Mix B B, k A C k B dest,msg k C C k B dest,msg k C dest,msg k C msg k X = encrypted with public key of Mix X
  • 24. Freedom nyms Create multiple psuedonyms Surf without a nym Select a nym and surf
  • 25.
  • 26. Crowds illustrated 1 2 6 3 5 4 3 5 1 6 2 4 Crowd members Web servers
  • 27.
  • 28.
  • 30.
  • 31.
  • 32. Persona Consumer fills out Persona with personal information Consumer can decide how each field is shared with online businesses and 3 rd parties
  • 33.
  • 35. Infomediary example: PrivacyBank PrivacyBank bookmark
  • 36.
  • 37.
  • 38.
  • 39.
  • 40.
  • 42.  
  • 43. When preferences are changed to Disallow profiling, the privacy check warns us that this site profiles visitors
  • 44.
  • 45. Searching for a P3P policy No P3P policy found P3P policy is NOT acceptable P3P policy is acceptable IDcide P3P Icons
  • 46. Double clicking on the P3P icon indicates where the site’s policy differs from the user’s preferences
  • 47.
  • 51.
  • 52. Sites can list the types of data they collect And view the corresponding P3P policy
  • 53. Templates allow sites to start with a pre-defined policy and customize it to meet their needs
  • 54. PrivacyBot.com Allows webmasters to fill out an online questionnaire to automatically create a human-readable privacy policy and a P3P policy
  • 55. YOUpowered Consumer Trust Policy Manager Wizard
  • 56.
  • 57.  
  • 58.  
  • 59.  
  • 60.
  • 61. Download these slides http://www.research.att.com/ ~lorrie/privacy/NTIA-0900.ppt

Notas do Editor

  1. Prepared by Lorrie Cranor <lorrie@research.att.com>
  2. Here is the window users use to configure their privacy preferences. Users cannot use this tool until they select a setting.
  3. When users visit a site that uses P3P, they can click on the privacy icon in their browser to “privacy check” the site. This brings up a window that explains any areas where a site’s policy conflicts with a user’s preferences. Users can also use this window to jump directly to a site’s privacy policy, as well as see whether the site has a privacy seal. The top window shown here is the privacy check for the Texas Tech University Health Center. It includes a warning because this site does not provide any access to the data they collect. The bottom window is for Microsoft. In this case there are no warnings because the policy does not conflict with user’s preferences. Microsoft has a seal from TRUSTe.
  4. After the user changes her preference settings, she sees a warning at the Microsoft site because the site may collect personally identifiable data for profiling.
  5. Here are the symbols a user sees when they use the P3P-enabled Idcide Privacy Companion prototype.
  6. Users can click on the P3P icon to find out where a site’s policy conflicts with their preferences.
  7. Orby includes a Trust meter that analyzes a site’s P3P policy and evaluates it on a number of factors and computes a rating. Users can click on the Trust Meter to see the various factors that went into a particular rating.
  8. Orby can also be configured to prompt users before accepting or receiving cookies. Users can enable and disable cookies on a site by site basis.
  9. The Orby includes a drop-down menu from which users can select one of four privacy levels that are used to control when cookies are sent or users are prompted about cookies.
  10. P3P policy generation is one of the services provided by PrivacyBot.com. PrivacyBot.com currently charges sites $30 to generate a human-readable policy and a P3P policy.