SlideShare uma empresa Scribd logo
1 de 21
Baixar para ler offline
Embracing Post-Privacy
  Optimism towards a future
where there is “Nothing to hide”



                Christian Heller / http://www.plomlompom.de
                                            December 29, 2008
                        25. Chaos Communication Congress
                                          bcc / Berlin, Germany
“cctv” by Subcircle (http://www.subcircle.co.uk/)
                     http://flickr.com/photos/8323834@N07/500970140/
License: Creative Commons 2.0 Attribution / http://creativecommons.org/licenses/by/2.0/deed.en
Overview
    pessimism: the end of privacy
●


    question: the meaning of privacy
●


    optimism: ideas for post-privacy dys... utopias
●


    reading recommendations
●


    discussion
●
“Secure Beneath the Watchful Eyes” by Kenneth Lu (http://subjunctive.net/klog/)
                         http://flickr.com/photos/toasty/2171185463/
License: Creative Commons 2.0 Attribution / http://creativecommons.org/licenses/by/2.0/deed.en
Privacy is doomed
    the privacy-eating monster
●


        growingly well-fed, ubiquitous, attractive, intelligent
    –

        once information is in, it cannot be removed again
    –

    the privacy-defending army
●


        laws ineffective; technology insecure
    –

        pre-MySpace generation getting old, disappearing
    –

    an uneven battle for the army
●


        cannot be won ultimately
    –

        can only be lost; easily
    –
“Privat” by Daniel Lobo (http://www.daquellamanera.org/)
                     http://flickr.com/photos/daquellamanera/311128375/
License: Creative Commons 2.0 Attribution / http://creativecommons.org/licenses/by/2.0/deed.en
What is the meaning of Privacy?
    self-determination
●


        make your own decisions about your life
    –

        freedom from interference by others
    –

    information control
●


        control what information flows from you to others
    –

        control what information flows to you from others
    –

    intimacy
●


        sharing of privacy
    –

        interpersonal trust, dependence
    –
“Tanzliedchen” by Hugo Bürkner, 1854
http://commons.wikimedia.org/wiki/File:Bürkner_Tanzliedchen.jpg
private             vs.             public
    house, backroom,             forum, parliament,
●                           ●

    home PC, head/brain          newspaper, Slashdot
    hidden                       visible
●                           ●


    secure from scrutiny         accountable to social
●                           ●

    of social norms              norms
    free individual?             controlled conformist?
●                           ●


    woman                        man
●                           ●


    isolated                     interconnected
●                           ●


    closet homosexuality         gay pride parade
●                           ●
“new tshirts” by Creative Commons (http://creativecommons.org/)
            http://flickr.com/photos/creativecommons/2294317099/in/photostream/
License: Creative Commons 2.0 Attribution / http://creativecommons.org/licenses/by/2.0/deed.en
Hiding vs. Sharing
    new information economy
●


        no zero-sum game
    –

        the more you give, the more you receive
    –

    more information better than less information
●


        market runs better with more information
    –

        information more valuable (to the owner) if shared
    –

    the Hive Mind
●


        growing with or without you
    –

        you gain more by participating than you lose
    –
“IMG_3483.JPG” by Drab Makyo (http://www.drab-makyo.com/)
                   http://flickr.com/photos/ranna/773419070/in/photostream/
License: Creative Commons 2.0 Attribution / http://creativecommons.org/licenses/by/2.0/deed.en
Redefining Normality
    diversity instead of conformism
●


        difference is good! difference is information!
    –

        personalization instead of “Gleichschaltung”
    –

    new normality: no normality
●


        no escape from ever-increasing diversity
    –

        forces tolerance increase
    –

    the googling employer?
●


        no untarnished candidates; emptiness suspicious
    –

        originality cannot yet be outsourced, automatized
    –
“Identity Thief as Paris” by David Goehring (http://flickr.com/photos/carbonnyc/)
                   http://flickr.com/photos/carbonnyc/57280104/in/photostream/
License: Creative Commons 2.0 Attribution / http://creativecommons.org/licenses/by/2.0/deed.en
Identity fluidity & volatility
    identity multiplicity
●


        one human can constitute many identities
    –

        one identity can be constituted by many humans
    –

    no static core identity anymore
●


        identity hyper-dynamism; 15 minutes of identity x
    –

        identity viruses may freely change their hosts
    –

    no more identity prison
●


        be what's fun to be, not what you supposedly “are”
    –

        the end of guilt
    –
“Restaurant Surveillance Sign” by Richard Smith (http://flickr.com/people/smith/)
                            http://flickr.com/photos/smith/55403952/
License: Creative Commons 2.0 Attribution / http://creativecommons.org/licenses/by/2.0/deed.en
Surveillance vs. Sousveillance
    equiveillance
●


        watching, documenting actions of police & co.
    –

        document yourself; Hasan Elahi alibi
    –

    transparency of force
●


        no secret watching; open the camera feeds!
    –

        more powerful → more transparency
    –

    freedom through total transparency?
●


        worst case scenario, “better than alternative”
    –

        still room for secrets of any kind?
    –
“WHAT ARE YOU LOOKING AT?” by nolifebeforecoffee
                         (http://www.nolifebeforecoffee.blogspot.com/)
                    http://flickr.com/photos/nolifebeforecoffee/124659356/
License: Creative Commons 2.0 Attribution / http://creativecommons.org/licenses/by/2.0/deed.en
Control vs. Trust
    lack of information: less freedom
●


        fear, suspicion, mistrust
    –

        need for control, deterrence
    –

        many strict, general laws; strong punishments
    –

    –

    abundance of information: more freedom
●


        trust
    –

        less need for strict control or deterrence
    –

        few, precise laws; easy punishments
    –
“Pyramid with the all-seeing eye on the back side of the US 1-Dollar bill”
   http://commons.wikimedia.org/wiki/File:Dollarnote_siegel_hq.jpg
Reading recommendations
    “Privacy” in: “Stanford Encyclopedia of
●

    Philosophy”, 2006
        http://plato.stanford.edu/entries/privacy/
    –

    “The Value of Privacy”, Beate Rössler, 1995
●


    “The Fall of Public Man”, Richard Sennett, 1977
●


    “Facebook and the Social Dynamics of
●

    Privacy”, James Grimmelmann, 2008
        http://works.bepress.com/james_grimmelmann/20/
    –

    “The Transparent Society”, David Brin, 1998
●

Mais conteúdo relacionado

Mais procurados

Building Community with Social Media
Building Community with Social MediaBuilding Community with Social Media
Building Community with Social MediaNick Westergaard
 
Graphic Facilitation for SIKM Presentation
Graphic Facilitation for SIKM PresentationGraphic Facilitation for SIKM Presentation
Graphic Facilitation for SIKM PresentationNancy Wright White
 
Why Radical Librarianship?
Why Radical Librarianship?Why Radical Librarianship?
Why Radical Librarianship?CILIPScotland
 
Faster horses & slow elevators: where does innovation come from?
Faster horses & slow elevators: where does innovation come from?Faster horses & slow elevators: where does innovation come from?
Faster horses & slow elevators: where does innovation come from?Franco Papeschi
 
Out in the Open Range
Out in the Open RangeOut in the Open Range
Out in the Open RangeAlan Levine
 
Building Sites Around Social Objects - Web 2.0 Expo SF 2009
Building Sites Around Social Objects - Web 2.0 Expo SF 2009Building Sites Around Social Objects - Web 2.0 Expo SF 2009
Building Sites Around Social Objects - Web 2.0 Expo SF 2009Jyri Engeström
 
Digital Civil Rights (Bits of Freedom)
Digital Civil Rights (Bits of Freedom)Digital Civil Rights (Bits of Freedom)
Digital Civil Rights (Bits of Freedom)Hans de Zwart
 

Mais procurados (8)

Building Community with Social Media
Building Community with Social MediaBuilding Community with Social Media
Building Community with Social Media
 
Graphic Facilitation for SIKM Presentation
Graphic Facilitation for SIKM PresentationGraphic Facilitation for SIKM Presentation
Graphic Facilitation for SIKM Presentation
 
Drawing On Walls N Voice2008
Drawing On Walls N Voice2008Drawing On Walls N Voice2008
Drawing On Walls N Voice2008
 
Why Radical Librarianship?
Why Radical Librarianship?Why Radical Librarianship?
Why Radical Librarianship?
 
Faster horses & slow elevators: where does innovation come from?
Faster horses & slow elevators: where does innovation come from?Faster horses & slow elevators: where does innovation come from?
Faster horses & slow elevators: where does innovation come from?
 
Out in the Open Range
Out in the Open RangeOut in the Open Range
Out in the Open Range
 
Building Sites Around Social Objects - Web 2.0 Expo SF 2009
Building Sites Around Social Objects - Web 2.0 Expo SF 2009Building Sites Around Social Objects - Web 2.0 Expo SF 2009
Building Sites Around Social Objects - Web 2.0 Expo SF 2009
 
Digital Civil Rights (Bits of Freedom)
Digital Civil Rights (Bits of Freedom)Digital Civil Rights (Bits of Freedom)
Digital Civil Rights (Bits of Freedom)
 

Destaque

Killing (the Power of) Time. Archiving selves, cities, histories and universes.
Killing (the Power of) Time. Archiving selves, cities, histories and universes.Killing (the Power of) Time. Archiving selves, cities, histories and universes.
Killing (the Power of) Time. Archiving selves, cities, histories and universes.Christian Heller
 
Metodos contracetivos quimicos
Metodos contracetivos quimicosMetodos contracetivos quimicos
Metodos contracetivos quimicosgracindabento
 

Destaque (9)

Datenschutz Als Ideologie
Datenschutz Als IdeologieDatenschutz Als Ideologie
Datenschutz Als Ideologie
 
Killing (the Power of) Time. Archiving selves, cities, histories and universes.
Killing (the Power of) Time. Archiving selves, cities, histories and universes.Killing (the Power of) Time. Archiving selves, cities, histories and universes.
Killing (the Power of) Time. Archiving selves, cities, histories and universes.
 
Datenschutz Als Ideologie
Datenschutz Als IdeologieDatenschutz Als Ideologie
Datenschutz Als Ideologie
 
Datenschutz Als Ideologie
Datenschutz Als IdeologieDatenschutz Als Ideologie
Datenschutz Als Ideologie
 
Datenschutz Als Ideologie
Datenschutz Als IdeologieDatenschutz Als Ideologie
Datenschutz Als Ideologie
 
Datenschutz Als Ideologie
Datenschutz Als IdeologieDatenschutz Als Ideologie
Datenschutz Als Ideologie
 
Nothing To Hide
Nothing To HideNothing To Hide
Nothing To Hide
 
Datenschutz Als Ideologie
Datenschutz Als IdeologieDatenschutz Als Ideologie
Datenschutz Als Ideologie
 
Metodos contracetivos quimicos
Metodos contracetivos quimicosMetodos contracetivos quimicos
Metodos contracetivos quimicos
 

Semelhante a Embracing Postprivacy: Optimism towards a future where there is "Nothing to hide"

Five myths about the future of culture and the commons
Five myths about the future of culture and the commonsFive myths about the future of culture and the commons
Five myths about the future of culture and the commonsMike Linksvayer
 
Identity Wars: the End of Human Society
Identity Wars: the End of Human SocietyIdentity Wars: the End of Human Society
Identity Wars: the End of Human SocietyChristian Heller
 
Society vs Privacy: the impossible dilemma
Society vs Privacy: the impossible dilemma Society vs Privacy: the impossible dilemma
Society vs Privacy: the impossible dilemma Mathias Klang
 
Privacy by Default - IA Summit 2017
Privacy by Default - IA Summit 2017Privacy by Default - IA Summit 2017
Privacy by Default - IA Summit 2017Lutz Schmitt
 
"If you love your content, set it free" ?
"If you love your content, set it free" ?"If you love your content, set it free" ?
"If you love your content, set it free" ?Mike Ellis
 
Cryptoanarchism
CryptoanarchismCryptoanarchism
Cryptoanarchismq3XKFc5XR
 
20130724 ted x-marc smith-digital health futures empowerment or coercion
20130724 ted x-marc smith-digital health futures empowerment or coercion20130724 ted x-marc smith-digital health futures empowerment or coercion
20130724 ted x-marc smith-digital health futures empowerment or coercionMarc Smith
 
Future of Android ... And How To Stop It!
Future of Android ... And How To Stop It!Future of Android ... And How To Stop It!
Future of Android ... And How To Stop It!Terence Eden
 
Legal Aspects Of New Media Quirk 2008
Legal Aspects Of New Media   Quirk   2008Legal Aspects Of New Media   Quirk   2008
Legal Aspects Of New Media Quirk 2008Paul Jacobson
 
The digital divide in the post-Snowden era
The digital divide in the post-Snowden eraThe digital divide in the post-Snowden era
The digital divide in the post-Snowden eraIan Clark
 
The Hacker Perspective
The Hacker PerspectiveThe Hacker Perspective
The Hacker Perspectivejjtay
 
Privacy in social media: so what?
Privacy in social media: so what?Privacy in social media: so what?
Privacy in social media: so what?Mathias Klang
 
Social Secrets Workshop
Social Secrets WorkshopSocial Secrets Workshop
Social Secrets Workshopannehelmond
 
Week 4: Social Media Ecologies
Week 4: Social Media EcologiesWeek 4: Social Media Ecologies
Week 4: Social Media EcologiesRay Brannon
 
Personal But Not Private
Personal But Not PrivatePersonal But Not Private
Personal But Not PrivateMathias Klang
 
Off the Grid: Is anonymity possible?
Off the Grid: Is anonymity possible?Off the Grid: Is anonymity possible?
Off the Grid: Is anonymity possible? Mathias Klang
 
Exploring the Future: Quantified Self and Learning
Exploring the Future: Quantified Self and LearningExploring the Future: Quantified Self and Learning
Exploring the Future: Quantified Self and LearningHans de Zwart
 

Semelhante a Embracing Postprivacy: Optimism towards a future where there is "Nothing to hide" (20)

Five myths about the future of culture and the commons
Five myths about the future of culture and the commonsFive myths about the future of culture and the commons
Five myths about the future of culture and the commons
 
Identity Wars: the End of Human Society
Identity Wars: the End of Human SocietyIdentity Wars: the End of Human Society
Identity Wars: the End of Human Society
 
Society vs Privacy: the impossible dilemma
Society vs Privacy: the impossible dilemma Society vs Privacy: the impossible dilemma
Society vs Privacy: the impossible dilemma
 
Privacy by Default - IA Summit 2017
Privacy by Default - IA Summit 2017Privacy by Default - IA Summit 2017
Privacy by Default - IA Summit 2017
 
"If you love your content, set it free" ?
"If you love your content, set it free" ?"If you love your content, set it free" ?
"If you love your content, set it free" ?
 
Drm and crypto
Drm and cryptoDrm and crypto
Drm and crypto
 
Cryptoanarchism
CryptoanarchismCryptoanarchism
Cryptoanarchism
 
The Digital Divide in the Post Snowden Era Presentation
The Digital Divide in the Post Snowden Era PresentationThe Digital Divide in the Post Snowden Era Presentation
The Digital Divide in the Post Snowden Era Presentation
 
Drm and crypto
Drm and cryptoDrm and crypto
Drm and crypto
 
20130724 ted x-marc smith-digital health futures empowerment or coercion
20130724 ted x-marc smith-digital health futures empowerment or coercion20130724 ted x-marc smith-digital health futures empowerment or coercion
20130724 ted x-marc smith-digital health futures empowerment or coercion
 
Future of Android ... And How To Stop It!
Future of Android ... And How To Stop It!Future of Android ... And How To Stop It!
Future of Android ... And How To Stop It!
 
Legal Aspects Of New Media Quirk 2008
Legal Aspects Of New Media   Quirk   2008Legal Aspects Of New Media   Quirk   2008
Legal Aspects Of New Media Quirk 2008
 
The digital divide in the post-Snowden era
The digital divide in the post-Snowden eraThe digital divide in the post-Snowden era
The digital divide in the post-Snowden era
 
The Hacker Perspective
The Hacker PerspectiveThe Hacker Perspective
The Hacker Perspective
 
Privacy in social media: so what?
Privacy in social media: so what?Privacy in social media: so what?
Privacy in social media: so what?
 
Social Secrets Workshop
Social Secrets WorkshopSocial Secrets Workshop
Social Secrets Workshop
 
Week 4: Social Media Ecologies
Week 4: Social Media EcologiesWeek 4: Social Media Ecologies
Week 4: Social Media Ecologies
 
Personal But Not Private
Personal But Not PrivatePersonal But Not Private
Personal But Not Private
 
Off the Grid: Is anonymity possible?
Off the Grid: Is anonymity possible?Off the Grid: Is anonymity possible?
Off the Grid: Is anonymity possible?
 
Exploring the Future: Quantified Self and Learning
Exploring the Future: Quantified Self and LearningExploring the Future: Quantified Self and Learning
Exploring the Future: Quantified Self and Learning
 

Mais de Christian Heller

Was kommt nach der Privatheit?
Was kommt nach der Privatheit?Was kommt nach der Privatheit?
Was kommt nach der Privatheit?Christian Heller
 
Was da noch auf die Politik zugerollt kommt
Was da noch auf die Politik zugerollt kommtWas da noch auf die Politik zugerollt kommt
Was da noch auf die Politik zugerollt kommtChristian Heller
 
Supercomputer Earth: The Future of Civilization (& Africa\'s part in it)
Supercomputer Earth: The Future of Civilization (& Africa\'s part in it)Supercomputer Earth: The Future of Civilization (& Africa\'s part in it)
Supercomputer Earth: The Future of Civilization (& Africa\'s part in it)Christian Heller
 

Mais de Christian Heller (10)

pie_beta
pie_betapie_beta
pie_beta
 
roguelike_delta
roguelike_deltaroguelike_delta
roguelike_delta
 
Datenschutz Als Ideologie
Datenschutz Als IdeologieDatenschutz Als Ideologie
Datenschutz Als Ideologie
 
Datenschutz Als Ideologie
Datenschutz Als IdeologieDatenschutz Als Ideologie
Datenschutz Als Ideologie
 
Gestern Volk, morgen Netz
Gestern Volk, morgen NetzGestern Volk, morgen Netz
Gestern Volk, morgen Netz
 
Was kommt nach der Privatheit?
Was kommt nach der Privatheit?Was kommt nach der Privatheit?
Was kommt nach der Privatheit?
 
Mind Upload Cheat Codes
Mind Upload Cheat CodesMind Upload Cheat Codes
Mind Upload Cheat Codes
 
Was da noch auf die Politik zugerollt kommt
Was da noch auf die Politik zugerollt kommtWas da noch auf die Politik zugerollt kommt
Was da noch auf die Politik zugerollt kommt
 
Das egoistische Mem
Das egoistische MemDas egoistische Mem
Das egoistische Mem
 
Supercomputer Earth: The Future of Civilization (& Africa\'s part in it)
Supercomputer Earth: The Future of Civilization (& Africa\'s part in it)Supercomputer Earth: The Future of Civilization (& Africa\'s part in it)
Supercomputer Earth: The Future of Civilization (& Africa\'s part in it)
 

Último

New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESmohitsingh558521
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rick Flair
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
What is Artificial Intelligence?????????
What is Artificial Intelligence?????????What is Artificial Intelligence?????????
What is Artificial Intelligence?????????blackmambaettijean
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 

Último (20)

New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
What is Artificial Intelligence?????????
What is Artificial Intelligence?????????What is Artificial Intelligence?????????
What is Artificial Intelligence?????????
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 

Embracing Postprivacy: Optimism towards a future where there is "Nothing to hide"

  • 1. Embracing Post-Privacy Optimism towards a future where there is “Nothing to hide” Christian Heller / http://www.plomlompom.de December 29, 2008 25. Chaos Communication Congress bcc / Berlin, Germany
  • 2. “cctv” by Subcircle (http://www.subcircle.co.uk/) http://flickr.com/photos/8323834@N07/500970140/ License: Creative Commons 2.0 Attribution / http://creativecommons.org/licenses/by/2.0/deed.en
  • 3. Overview pessimism: the end of privacy ● question: the meaning of privacy ● optimism: ideas for post-privacy dys... utopias ● reading recommendations ● discussion ●
  • 4. “Secure Beneath the Watchful Eyes” by Kenneth Lu (http://subjunctive.net/klog/) http://flickr.com/photos/toasty/2171185463/ License: Creative Commons 2.0 Attribution / http://creativecommons.org/licenses/by/2.0/deed.en
  • 5. Privacy is doomed the privacy-eating monster ● growingly well-fed, ubiquitous, attractive, intelligent – once information is in, it cannot be removed again – the privacy-defending army ● laws ineffective; technology insecure – pre-MySpace generation getting old, disappearing – an uneven battle for the army ● cannot be won ultimately – can only be lost; easily –
  • 6. “Privat” by Daniel Lobo (http://www.daquellamanera.org/) http://flickr.com/photos/daquellamanera/311128375/ License: Creative Commons 2.0 Attribution / http://creativecommons.org/licenses/by/2.0/deed.en
  • 7. What is the meaning of Privacy? self-determination ● make your own decisions about your life – freedom from interference by others – information control ● control what information flows from you to others – control what information flows to you from others – intimacy ● sharing of privacy – interpersonal trust, dependence –
  • 8. “Tanzliedchen” by Hugo Bürkner, 1854 http://commons.wikimedia.org/wiki/File:Bürkner_Tanzliedchen.jpg
  • 9. private vs. public house, backroom, forum, parliament, ● ● home PC, head/brain newspaper, Slashdot hidden visible ● ● secure from scrutiny accountable to social ● ● of social norms norms free individual? controlled conformist? ● ● woman man ● ● isolated interconnected ● ● closet homosexuality gay pride parade ● ●
  • 10. “new tshirts” by Creative Commons (http://creativecommons.org/) http://flickr.com/photos/creativecommons/2294317099/in/photostream/ License: Creative Commons 2.0 Attribution / http://creativecommons.org/licenses/by/2.0/deed.en
  • 11. Hiding vs. Sharing new information economy ● no zero-sum game – the more you give, the more you receive – more information better than less information ● market runs better with more information – information more valuable (to the owner) if shared – the Hive Mind ● growing with or without you – you gain more by participating than you lose –
  • 12. “IMG_3483.JPG” by Drab Makyo (http://www.drab-makyo.com/) http://flickr.com/photos/ranna/773419070/in/photostream/ License: Creative Commons 2.0 Attribution / http://creativecommons.org/licenses/by/2.0/deed.en
  • 13. Redefining Normality diversity instead of conformism ● difference is good! difference is information! – personalization instead of “Gleichschaltung” – new normality: no normality ● no escape from ever-increasing diversity – forces tolerance increase – the googling employer? ● no untarnished candidates; emptiness suspicious – originality cannot yet be outsourced, automatized –
  • 14. “Identity Thief as Paris” by David Goehring (http://flickr.com/photos/carbonnyc/) http://flickr.com/photos/carbonnyc/57280104/in/photostream/ License: Creative Commons 2.0 Attribution / http://creativecommons.org/licenses/by/2.0/deed.en
  • 15. Identity fluidity & volatility identity multiplicity ● one human can constitute many identities – one identity can be constituted by many humans – no static core identity anymore ● identity hyper-dynamism; 15 minutes of identity x – identity viruses may freely change their hosts – no more identity prison ● be what's fun to be, not what you supposedly “are” – the end of guilt –
  • 16. “Restaurant Surveillance Sign” by Richard Smith (http://flickr.com/people/smith/) http://flickr.com/photos/smith/55403952/ License: Creative Commons 2.0 Attribution / http://creativecommons.org/licenses/by/2.0/deed.en
  • 17. Surveillance vs. Sousveillance equiveillance ● watching, documenting actions of police & co. – document yourself; Hasan Elahi alibi – transparency of force ● no secret watching; open the camera feeds! – more powerful → more transparency – freedom through total transparency? ● worst case scenario, “better than alternative” – still room for secrets of any kind? –
  • 18. “WHAT ARE YOU LOOKING AT?” by nolifebeforecoffee (http://www.nolifebeforecoffee.blogspot.com/) http://flickr.com/photos/nolifebeforecoffee/124659356/ License: Creative Commons 2.0 Attribution / http://creativecommons.org/licenses/by/2.0/deed.en
  • 19. Control vs. Trust lack of information: less freedom ● fear, suspicion, mistrust – need for control, deterrence – many strict, general laws; strong punishments – – abundance of information: more freedom ● trust – less need for strict control or deterrence – few, precise laws; easy punishments –
  • 20. “Pyramid with the all-seeing eye on the back side of the US 1-Dollar bill” http://commons.wikimedia.org/wiki/File:Dollarnote_siegel_hq.jpg
  • 21. Reading recommendations “Privacy” in: “Stanford Encyclopedia of ● Philosophy”, 2006 http://plato.stanford.edu/entries/privacy/ – “The Value of Privacy”, Beate Rössler, 1995 ● “The Fall of Public Man”, Richard Sennett, 1977 ● “Facebook and the Social Dynamics of ● Privacy”, James Grimmelmann, 2008 http://works.bepress.com/james_grimmelmann/20/ – “The Transparent Society”, David Brin, 1998 ●