SlideShare a Scribd company logo
Post Privacy

What should we do after the fail of
            privacy?

          @PeterKraker
          #knowcenter
First off
• Fueled by previous discussions at #bcg10 and
  #websci11

• The core of the problem is NOT the
  information that you provide voluntarily

• This talk is intentionally provocative to start a
  discussion
Why privacy will fail
• All data that exist about us is stored digitally
• Digital data is fugitive (easy to copy, hard to
  protect)
• See: Wikileaks, Anonymous, various data
  scandals near you
• Information can be inferred from other
  sources (e.g. social graph)  jigsaw puzzle
  effect
Therefore
 Data protection is a lost cause (and
sometimes not even the solution)
 Voluntarily provided information is only the
tip of the iceberg
My prediction
• Not all data will be apparantly visible
• But almost all data will be somehow
  obtainable
• A grey market for personal data
• The important questions are not if or when
  privacy will fail, but what we should do when
  it happens
What will we do?
• What I DO NOT think will work:
  – Let‘s just wait and see, society will be better if we
    see that no one is whithout fail
• Concepts
  – Information accountability (Weitzner et al.)
  – What else?

More Related Content

PDF
Picturing Pollution Globally and Locally
PPTX
Wikileaks: the hacker's game
PPTX
Social Media in Emergency Management
ODP
Taxonomien und Folksonomien – Tagging als neues HCI-Element
PPTX
Science 2.0 - Science Barcamp Vienna
PPTX
The Web in Science and Research: A tour through four topics
PPTX
Open science at Opencamp
PDF
Feeding TEL: Building an Ecosystem Around BuRST to Convey Publication Metadata
Picturing Pollution Globally and Locally
Wikileaks: the hacker's game
Social Media in Emergency Management
Taxonomien und Folksonomien – Tagging als neues HCI-Element
Science 2.0 - Science Barcamp Vienna
The Web in Science and Research: A tour through four topics
Open science at Opencamp
Feeding TEL: Building an Ecosystem Around BuRST to Convey Publication Metadata

Similar to Post privacy - What should we do after the fail of privacy? (20)

PPT
privacy and security
PPTX
Reinvent Yourself - Preso for Walnut St Labs SUMY 19-Aug-2014
PPTX
Corp Web Risks and Concerns
PPTX
Reining in the Data ITAG tech360 Penn State Great Valley 2015
PPT
Social Networking - An Ethical Hacker's View
PPTX
Internet Issues (How to Deal on Internet Security)
PDF
RW privacy-technology-outlook
PPT
Big Data, Security Intelligence, (And Why I Hate This Title)
PDF
Special Topics Day for Engineering Innovation Lecture on Cybersecurity
PPTX
Rules on the road to netique
PPTX
Technology in a global society presentation
PDF
Privacy and libraries
PDF
COMP 424 Computer System Security Fall 2016
PPTX
Cybersecurity Strategies - time for the next generation
PDF
Business considerations for privacy and open data: how not to get caught out
PPT
Social Engineering
PPT
Social engineering
PPTX
Conference about Social Engineering (by Wh0s)
PDF
Infosecurity2013nl 131103184054-phpapp01
PDF
Privacy is an Illusion and you’re all losers! - Cryptocow - Infosecurity 2013
privacy and security
Reinvent Yourself - Preso for Walnut St Labs SUMY 19-Aug-2014
Corp Web Risks and Concerns
Reining in the Data ITAG tech360 Penn State Great Valley 2015
Social Networking - An Ethical Hacker's View
Internet Issues (How to Deal on Internet Security)
RW privacy-technology-outlook
Big Data, Security Intelligence, (And Why I Hate This Title)
Special Topics Day for Engineering Innovation Lecture on Cybersecurity
Rules on the road to netique
Technology in a global society presentation
Privacy and libraries
COMP 424 Computer System Security Fall 2016
Cybersecurity Strategies - time for the next generation
Business considerations for privacy and open data: how not to get caught out
Social Engineering
Social engineering
Conference about Social Engineering (by Wh0s)
Infosecurity2013nl 131103184054-phpapp01
Privacy is an Illusion and you’re all losers! - Cryptocow - Infosecurity 2013
Ad

More from Open Knowledge Maps (20)

PPTX
Open Knowledge Maps
PDF
Academic SEO, or: How do I get my research to show up in search engines and d...
PDF
Open Science in Practice
PDF
Open Knowledge Maps Overview & Business Model
PDF
Changing The Way We Discover Research
PDF
On Open Knowledge Maps, Aiming High & Integrity
PDF
The Vienna Principles: A Vision for Scholarly Communication
PDF
Introduction to "Open Science - What's in it for me?"
PDF
Open Knowledge Maps - A Visual Interface to the World's Scientific Knowledge
PDF
Altmetrics & visualizations for discovery
PDF
Open Knowledge Maps for the Wikiverse!
PDF
Open Knowledge Maps: A Visual Interface to the World's Scientific Knowledge
PDF
The Open Science Way to do Literature Research
PDF
Open Knowledge Maps, a visual interface to the world's scientific knowledge
PPTX
Open Knowledge Maps Mozfest Demo
PDF
Open Science Lecture: Altmetrics
PPTX
Open Science in Practice
PDF
The Student's and Researcher's Guide to Discovery: Exploring Scientific Field...
PDF
Research data explored II: the Anatomy and Reception of figshare
PDF
Exploring Coverage and Distribution of Scholarly Identifiers on the Web
Open Knowledge Maps
Academic SEO, or: How do I get my research to show up in search engines and d...
Open Science in Practice
Open Knowledge Maps Overview & Business Model
Changing The Way We Discover Research
On Open Knowledge Maps, Aiming High & Integrity
The Vienna Principles: A Vision for Scholarly Communication
Introduction to "Open Science - What's in it for me?"
Open Knowledge Maps - A Visual Interface to the World's Scientific Knowledge
Altmetrics & visualizations for discovery
Open Knowledge Maps for the Wikiverse!
Open Knowledge Maps: A Visual Interface to the World's Scientific Knowledge
The Open Science Way to do Literature Research
Open Knowledge Maps, a visual interface to the world's scientific knowledge
Open Knowledge Maps Mozfest Demo
Open Science Lecture: Altmetrics
Open Science in Practice
The Student's and Researcher's Guide to Discovery: Exploring Scientific Field...
Research data explored II: the Anatomy and Reception of figshare
Exploring Coverage and Distribution of Scholarly Identifiers on the Web
Ad

Recently uploaded (20)

PPTX
A Presentation on Touch Screen Technology
PPTX
SOPHOS-XG Firewall Administrator PPT.pptx
PDF
Univ-Connecticut-ChatGPT-Presentaion.pdf
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PPTX
Tartificialntelligence_presentation.pptx
PPTX
Programs and apps: productivity, graphics, security and other tools
PDF
Hindi spoken digit analysis for native and non-native speakers
PDF
Assigned Numbers - 2025 - Bluetooth® Document
PDF
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
PDF
NewMind AI Weekly Chronicles - August'25-Week II
PPTX
A Presentation on Artificial Intelligence
PPTX
Chapter 5: Probability Theory and Statistics
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PPTX
cloud_computing_Infrastucture_as_cloud_p
PDF
Web App vs Mobile App What Should You Build First.pdf
PDF
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
PDF
A novel scalable deep ensemble learning framework for big data classification...
PDF
Heart disease approach using modified random forest and particle swarm optimi...
PPTX
TLE Review Electricity (Electricity).pptx
PDF
project resource management chapter-09.pdf
A Presentation on Touch Screen Technology
SOPHOS-XG Firewall Administrator PPT.pptx
Univ-Connecticut-ChatGPT-Presentaion.pdf
Digital-Transformation-Roadmap-for-Companies.pptx
Tartificialntelligence_presentation.pptx
Programs and apps: productivity, graphics, security and other tools
Hindi spoken digit analysis for native and non-native speakers
Assigned Numbers - 2025 - Bluetooth® Document
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
NewMind AI Weekly Chronicles - August'25-Week II
A Presentation on Artificial Intelligence
Chapter 5: Probability Theory and Statistics
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
cloud_computing_Infrastucture_as_cloud_p
Web App vs Mobile App What Should You Build First.pdf
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
A novel scalable deep ensemble learning framework for big data classification...
Heart disease approach using modified random forest and particle swarm optimi...
TLE Review Electricity (Electricity).pptx
project resource management chapter-09.pdf

Post privacy - What should we do after the fail of privacy?

  • 1. Post Privacy What should we do after the fail of privacy? @PeterKraker #knowcenter
  • 2. First off • Fueled by previous discussions at #bcg10 and #websci11 • The core of the problem is NOT the information that you provide voluntarily • This talk is intentionally provocative to start a discussion
  • 3. Why privacy will fail • All data that exist about us is stored digitally • Digital data is fugitive (easy to copy, hard to protect) • See: Wikileaks, Anonymous, various data scandals near you • Information can be inferred from other sources (e.g. social graph)  jigsaw puzzle effect
  • 4. Therefore  Data protection is a lost cause (and sometimes not even the solution)  Voluntarily provided information is only the tip of the iceberg
  • 5. My prediction • Not all data will be apparantly visible • But almost all data will be somehow obtainable • A grey market for personal data • The important questions are not if or when privacy will fail, but what we should do when it happens
  • 6. What will we do? • What I DO NOT think will work: – Let‘s just wait and see, society will be better if we see that no one is whithout fail • Concepts – Information accountability (Weitzner et al.) – What else?