This document presents the Pandora Security Model, which aims to protect access to and preserve digital content and links over time. It discusses topics like distributed storage, multiple digital identities, open formats, and classification of private, public, and other content. The model proposes linking one storage jar and digital identity to each purpose or level of privacy, to encourage protection, access, and remembrance of published digital works.
5. Culture&Knowledge
5
the world of books
WRITTEN TRADITION
the power of hyperlinks
DIGITAL TRADITION
the magic of voice
ORAL TRADITION
Alessandro Confetti - The Pandora Security Model
6. DigitalTradition
GOOD NEWS
There never was in all of human history
a more thriving and widespread
production and consumption
of culture and knowledge.
BAD NEWS
There never was in all of human history
an easier way of destroying
culture and knowledge:
just cut a cable, or switch off the power
6Alessandro Confetti - The Pandora Security Model
7. The5ParadoxesofDigitalContent
7
1
centralized
data silos
Available
everywhere
but stored
in very few
places
2
permanent &
distributed web
Easy to find
only if
it remains
in the same
place
3
metadata &
semantic web
Easy to
search
but hard
to catalog
4
digital rights
management
Cheap to
duplicate
but costly
to attribute
5
sw & hw
obsolescence
Storage
& access
are both
encoded
Alessandro Confetti - The Pandora Security Model
8. Pandora’sgoal
PROTECT THE ACCESS AND PRESERVE BOTH THE CONTENTS AND THE LINKS
1st
8Alessandro Confetti - The Pandora Security Model
11. PandoraLinkedJars
11
1 3
2 4
SECRET
Data to be destroyed
ofter our death
PROTECTED
Data we want
to share
with someone
PRIVATE
Data we don’t want
to share as long
we are alive
PUBLIC
Data we want
to share
with everyone
3
FICTIONAL
Data we want
to share
with everyone
3
ANONYMOUS
Data we want
to share with everyone
but not be traced
Alessandro Confetti The Pandora Security Model
12. Pandora’sgoal
ONCE DATA IS MOVED FROM A LOWER LEVEL JAR, IT CAN’T GO BACK
2th
12Alessandro Confetti - The Pandora Security Model
13. UsefulLinks
13
Distributed and Permanent Web
The Inventors of the Internet Are Trying to Build a Truly Permanent Web
Decentralized Web Summit
Evolving terminology with evolved technology: decentralized
versus distributed
Solid - Re-decentralizing the web
p2p & distributed file system projects: IPFS, SWARM
01
02
03
04
05
Alessandro Confetti - The Pandora Security Model
About the right to be forgotten
European’s Commission factsheet
Vint Cerf – A Web that Archives Itself
01
02
16. 1616
This image is a part of "Creation of Adam" by MichelangeloAlessandro Confetti - The Pandora Security Model
THEMONOTHEISTIC
DIGITALIDENTITY
MODEL
17. Pandora’sgoal
USE AT LEAST AS MANY IDENTITIES AS YOUR JARS
3rd
17Alessandro Confetti - The Pandora Security Model
20. UsefulLinks
20
Digital Identity
for Indian Government’s Aadhaar project
see Wired or Harvard Business School articles
for Italian Government’s initiatives see SPID and ANPR
for China citizens’ rating system see Pagina99 article
for blockchain Identity Management
see NameCoin and OneName
01
02
03
04
Alessandro Confetti - The Pandora Security Model
Copyrights
Leaked European Commission Copyright Plans
Ignore the Public Interest
Upload Filtering Mandate Would Shred
European Copyright Safe Harbor
What the heck is ancillary copyright
and why do we call it the Link Tax?
01
02
03
25. UsefulLinks
25
Ontologies & Folksonomies
Evolving Ontologies from Folksonomies: Tagging as a Complex System
Ontology vs Folksonomy
Five Ws
MP3 & metadata: meet ID3
01
02
03
04
Alessandro Confetti - The Pandora Security Model
27. 2727
photo by Gareth James, CC BY-NC 2.0Alessandro Confetti - The Pandora Security Model
THECAVEMAN
CONTENTCREATOR
PARADIGM
28. Pandora’sgoal
ALWAYS KEEP THE FORMAT READABLE WITH THE AVAILABLE TOOLS
6th
28Alessandro Confetti - The Pandora Security Model
29. UsefulLinks
29
Digital Obsolescence & Preservation
When Data Disappears
The Battle Against Digital Obsolescence
Blue Ribbon Task Force on Sustainable Digital Preservation and Access
01
02
03
Alessandro Confetti - The Pandora Security Model
30. ThePandoraSecurityModel
Testbed
30
Content without metadata has no value;
ontologies should not be imposed
Content & Metadata
Unreadable content has no value;
Open formats and tools are essential
Format is important
stop complaining about the right to forget;
fight for the right to be remembered
Published data can’t be forgotten
protect the access
and preserve both
the contents and the links
Protect & Preserve
encourage multiple identities
but let them be classified;
a.i. & bots need an identity
Multiple Digital Identies
link the storage
to just one identity
and classify it upon purpose
One jar for each purpose
Alessandro Confetti - The Pandora Security Model
31. FOLLOW ME ONALESSANDRO CONFETTI
OSLO srl CTO
alessandro.confetti@oslo.it
READ ME ON
my blog - imille.org - medium
GET IN TOUCH
alessandro.confetti@zigolab.it
THANKYOU!
The Pandora Security Model