SlideShare una empresa de Scribd logo
1 de 65
Descargar para leer sin conexión
An Analysis of the Online Identity Battleground

                                            aestetix
                                         Shmoocon 2013

Monday, February 18, 13
Do you... Google?




Monday, February 18, 13
... wait, wtf?




Monday, February 18, 13
Thesis Statements



    ✤    Identity is multifaceted (“prismatic”)

    ✤    There is no such thing as a “real” name

    ✤    Imposing a singular identity is not only harmful, it doesn’t work




Monday, February 18, 13
What is NSTIC?

    ✤    National Strategy for Trusted Identities in Cyberspace (NSTIC)

    ✤    Created by Obama Administration to address current challenges in
         digital identity (passwords, identity theft, etc)

    ✤    Update from the February 2013 Plenary




Monday, February 18, 13
What is NSTIC?




Monday, February 18, 13
What is NSTIC?




Monday, February 18, 13
Myth #1



    Only pedophiles, criminals, and cyber-
    bullies do not want to use their legal
    names online!

    What is this “nym” thing?



                          http://mythbustersresults.com/photos/adam-savage-mythbusters.jpg
Monday, February 18, 13
What is a “nym”?




Monday, February 18, 13
What is a “nym”?




             ✤    Identity is not the same thing as a name

             ✤    Name: a label or symbol that is used to identify a person,
                  thing, or concept within a given context


Monday, February 18, 13
Various Nom de Plumes

     ✤   Publius

     ✤   J.K. Rowling

     ✤   Nicholas Bourbaki

     ✤   Ian Donald Calvin Euclid Zappa

     ✤   Richard Bachman, Deep Throat, Voltaire,
         George Eliot, the Bronte Sisters...


Monday, February 18, 13
Various Nom de Plumes




Monday, February 18, 13
What is a “nym”?

    Is identity internal or external?
     ✤   Self image (“id, ego and superego”)

     ✤   Reputation and the Citizen Kane style construct

     ✤   “The only thing worse than being talked about
         is not being talked about.” --Oscar Wilde




                            http://en.wikipedia.org/wiki/Citizen_Kane
Monday, February 18, 13
Why do names matter?


       ✤    Valerie Plaine

       ✤    Witness Protection Program

       ✤    AOL and Netflix databases




Monday, February 18, 13
What are social networks?


             ✤    A “social network” is a force that brings people or their
                  personas together on a regular basis.

             ✤    A “friend” is a person that you would choose to be in contact
                  with.

             ✤    An “institution” is a custom, practice, relationship, or
                  significant behavior pattern within a social network.



Monday, February 18, 13
Defining “identity”

    ✤    Carl Jung:

          ✤    Rational or
                “Conscious”

          ✤    Emotional or
                “Unconscious”




Monday, February 18, 13
Bringing Identity Online

    ✤    aestetix’s Method (draft spec):




Monday, February 18, 13
So what’s a “nym”?

             ✤    Pseudonym - a name that might not found on or linkable to
                  any previously mentioned documents

             ✤    Polynym - a name consisting of multiple words or symbols

             ✤    Mononym - a name consisting of one word or symbol

             ✤    Autonym - a name bestowed upon oneself

             ✤    Anonym - a name representing anonymity



Monday, February 18, 13
Why not “real” name?

             ✤    Negative implications

             ✤    Lack of agency

             ✤    Easily substituted with
                  better alternatives

             ✤    Where does this concept come from, anyways?


                          http://www.shescribes.com/2011/07/i-cant-believe-its-not-butter-toast-tweet-100-giveaway.html




Monday, February 18, 13
What are social networks?

             ✤    Joseph Campbell: right hand
                  path, left hand path, and the
                  Hero’s Journey

             ✤    General Petraeus

             ✤    Why do hacker handles matter?




Monday, February 18, 13
Establishing Identity Online



    ✤    Zooko’s Triangle




                            http://www.skyhunter.com/marcs/petnames/IntroPetNames.html



Monday, February 18, 13
Myth #2



    We can stop cyber-bullying by forcing
    people to use their legal names

    People who do not use their legal
    names do not contribute positively to
    discussions



                          http://mythbustersresults.com/photos/adam-savage-mythbusters.jpg
Monday, February 18, 13
Do Names Matter?




Monday, February 18, 13
Do Names Matter?




Monday, February 18, 13
Do Names Matter?




               http://en.wikipedia.org/wiki/Phineas_Gage   http://circularabsurdity.blogspot.com/2010/11/my-steampunk-art.html

Monday, February 18, 13
Do Names Matter?

    ✤    Case Study:
         TechCrunch




Monday, February 18, 13
Do Names Matter?

    ✤    Case Study:
         TechCrunch




Monday, February 18, 13
Do Names Matter?

    ✤    Case Study:
         TechCrunch




Monday, February 18, 13
Do Names Matter?

    ✤    Case Study: Disqus, 60+ million users (Jan 10, 2012)




                               http://disqus.com/research/pseudonyms/
Monday, February 18, 13
Do Names Matter?

    ✤    Case Study: Disqus, 60+ million users (Jan 10, 2012)




                               http://disqus.com/research/pseudonyms/
Monday, February 18, 13
Total Lack of Names
    ✤    Social Number (launched Dec 2012)




Monday, February 18, 13
Total Lack of Names
    ✤    Social Number (launched Dec 2012)




Monday, February 18, 13
Total Lack of Names
    ✤    Social Number (launched Dec 2012)




Monday, February 18, 13
Myth #3




    We cannot trust anyone who does not
    use their legal name online




Monday, February 18, 13
Trust and Reputation




                          https://twitter.com/AntDeRosa/status/292796075348197376

Monday, February 18, 13
Trust and Reputation




Monday, February 18, 13
Trust and Reputation




Monday, February 18, 13
Trust and Reputation
    ✤    “Klout” scores




                          http://www.socialbrite.org/2010/07/22/klout-measure-your-twitter-influence/

Monday, February 18, 13
Trust and Transparency

             ✤    What does transparency mean?

             ✤    Is there such a thing as full transparency?

             ✤    Who decides how transparent we get to be?

             ✤    Active versus Passive communication of personal
                  information




Monday, February 18, 13
Myth #4




    We can trust online “identity
    providers” like Google and Facebook




Monday, February 18, 13
Does Identity Matter?

        Eric Schmidt, Executive Chairman at Google:
    ✤    “The only way to manage this is true transparency and no
         anonymity. In a world of asynchronous threats, it is too
         dangerous for there not to be some way to identify you. We
         need a [verified] name service for people. Governments will
         demand it.” (Techonomy, August 2010)

    ✤    “If you have something that you don't want anyone to know,
         maybe you shouldn't be doing it in the first place."(CNBC
         Interview, December 2009)



Monday, February 18, 13
Does Identity Matter?
       Mark Zuckerberg, CEO at Facebook:

   ✤    “The days of you having a different image for
        your work friends or co-workers and for the
        other people you know are probably coming to
        an end pretty quickly.
        Having two identities for yourself is an
        example of a lack of integrity.” (Interview,
        October 2011)




                          http://allinio.com/2012/12/holiday-carol-good-king-zuckerberg/


Monday, February 18, 13
Does Identity Matter?
       Chris “moot” Poole, Founder of 4chan

   ✤    “The portrait of identity online is often painted
        in black and white. Who you are online is who
        you are offline.
        “Human identity doesn't work like that online
        or offline. It's not 'who you share with,' it's 'who
        you share as.’ Identity is prismatic.” (Web 2.0)




                    http://www.hollywood.com/news/New_Yogi_Bear_Poster_Reveals_His_Darkest_Secret/7082914


Monday, February 18, 13
Recap of 2011


    ✤    My G+ account was suspended

    ✤    Confusion over “common name”

    ✤    Request for government issued ID

    ✤    Questions about ID != common name

    ✤    Account suddenly reinstated


                          http://www.tumblr.com/tagged/nym%20wars
Monday, February 18, 13
Recap of 2011




Monday, February 18, 13
I Wasn’t Alone!




Monday, February 18, 13
Where are we now?


    ✤    Updates to the Google+ policy (as of 10/27/2012):

          ✤    Limiting name changes (3 every 2 years)

          ✤    Names appeal (includes “significant following”)

          ✤    Nicknames policy




Monday, February 18, 13
Where are we now?

   ✤    Google’s idea of “pseudonyms”:




Monday, February 18, 13
Where are we now?

    ✤    Google patent #8271894 (granted Sep 18, 2012)




Monday, February 18, 13
Where are we now?




Monday, February 18, 13
Where are we now?




Monday, February 18, 13
Where are we now?




Monday, February 18, 13
Bringing Identity Online

    ✤    Google’s Method:




Monday, February 18, 13
Where are we now?
    ✤   “Snitchgate” (September 2012)




Monday, February 18, 13
Where are we now?
    ✤    Instagram Fiasco (Jan 22, 2013)




                     http://news.cnet.com/8301-1023_3-57565293-93/instagram-account-crackdown-alarms-members-who-think-theyve-been-hacked/

Monday, February 18, 13
Where are we now?
    ✤    Instagram Fiasco




Monday, February 18, 13
Where are we now?
    ✤    Instagram Fiasco




Monday, February 18, 13
Where are we now?

    ✤    Questions for thought:

          ✤    Who are Google and Facebook trying to
               “impress”?

          ✤    Who else might have access to this data?

          ✤    Why would Chewbacca, an 8-foot-tall Wookie,
               want to live on Endor with a bunch of 2-foot-
               tall Ewoks? Is that his real name?

                               https://en.wikipedia.org/wiki/File:0330chewbacca.jpg

Monday, February 18, 13
Myth #5




    We are currently fixing this
    through legislation.




Monday, February 18, 13
Legal issues?


          ✤    South Korea Real Name Verification Law (2003-2012)

                ✤   Required Resident Registration Number to be used for
                    verification to improve “quality”

                ✤   Repealed in 2012 after Korea Communications Commission
                    found a 0.9% change

                ✤   Follow-up study by Carnegie-Mellon



Monday, February 18, 13
Legal issues?

    ✤    Strengthening Network Internet Protection (China)

          ✤    Passed on 28 December 2012

                ✤     Section VI: Network service providers that handle website
                      access services for users, handle fixed telephone, mobile
                      telephone and other surfing formalities, or provide information
                      publication services to users, shall, when concluding agreements
                      with users or affirming the provision of service, require users to
                      provide real identity information.

                http://chinacopyrightandmedia.wordpress.com/2012/12/28/national-peoples-congress-standing-committee-decision-concerning-strengthening-network-information-protection/



Monday, February 18, 13
Legal issues?

    ✤    California Proposition 35 (passed Nov 6, 2012)

    ✤    Californians Against Sexual Exploitation (“CASE”)

          ✤    Section 290.014 (b): If any person who is required to register
               pursuant to the Act adds or changes his or her account with an
               Internet service provider or adds or changes an Internet
               identifier, the person shall send written notice of the addition or
               change to the law enforcement agency or agencies with which he
               or she is currently registered within 24 hours. ...”

    ✤    EFF filed lawsuit, injunction granted as of Jan 11, 2013

Monday, February 18, 13
Legal issues?

    ✤    German Telemedia Act (passed 26 February 2007)

          ✤    Section 13 (6): “The service provider must enable the use of
               telemedia and payment for them to occur anonymously or via a
               pseudonym where this is technically possible and reasonable. The
               recipient of the service is to be informed about this possibility.”




                  http://www.cgerli.org/fileadmin/user_upload/interne_Dokumente/Legislation/Telemedia_Act__TMA_.pdf

Monday, February 18, 13
Moving Forward
    ✤    Join NymRights! (www.nymrights.org)

    ✤    Anyone can be an IDESG/NSTIC member!




Monday, February 18, 13
Questions?

             ✤    @aestetix




Monday, February 18, 13

Más contenido relacionado

Similar a Shmoocon - Beyond Nymwars

Democratizing Educational Technology
Democratizing Educational TechnologyDemocratizing Educational Technology
Democratizing Educational TechnologyAri Najarian
 
Galapag.us thesis presentation
Galapag.us thesis presentationGalapag.us thesis presentation
Galapag.us thesis presentationBen Turner
 
Identity Management in Social Media
Identity Management in Social MediaIdentity Management in Social Media
Identity Management in Social MediaLaura Visconti
 
What Matters Now. Part 2
What Matters Now. Part 2What Matters Now. Part 2
What Matters Now. Part 2Dean Shareski
 
Chic Geek YYC March 2013 Presentation
Chic Geek YYC March 2013 PresentationChic Geek YYC March 2013 Presentation
Chic Geek YYC March 2013 PresentationVictoria MacLean
 
Parenting the App Generation
Parenting the App GenerationParenting the App Generation
Parenting the App Generationmetzy
 
Kicking impostor syndrome in the head
Kicking impostor syndrome in the headKicking impostor syndrome in the head
Kicking impostor syndrome in the headdreamwidth
 
Pragmatic Designer's Guide to Identity on the Web
Pragmatic Designer's Guide to Identity on the WebPragmatic Designer's Guide to Identity on the Web
Pragmatic Designer's Guide to Identity on the WebJamie Reffell
 
Pettinger israel ignite_slideshow
Pettinger israel ignite_slideshowPettinger israel ignite_slideshow
Pettinger israel ignite_slideshowIsrael Pettinger
 
Infopresse montreal feb 6 big data
Infopresse montreal feb 6   big dataInfopresse montreal feb 6   big data
Infopresse montreal feb 6 big dataAlistair Croll
 
Digital Citizenship Symposium - Slide Compilation
Digital Citizenship Symposium - Slide CompilationDigital Citizenship Symposium - Slide Compilation
Digital Citizenship Symposium - Slide CompilationAlec Couros
 
Legal Aspects Of New Media Quirk 2008
Legal Aspects Of New Media   Quirk   2008Legal Aspects Of New Media   Quirk   2008
Legal Aspects Of New Media Quirk 2008Paul Jacobson
 
Thriving In The 21st Century: Speaking the Language of the Digital Native
Thriving In The 21st Century: Speaking the Language of the Digital NativeThriving In The 21st Century: Speaking the Language of the Digital Native
Thriving In The 21st Century: Speaking the Language of the Digital NativeGlenn Wiebe
 
SoLoMo: SOcial LOcal MObile April 2013
SoLoMo: SOcial LOcal MObile April 2013SoLoMo: SOcial LOcal MObile April 2013
SoLoMo: SOcial LOcal MObile April 2013Kathleen Heuer
 
Wikis, Blogs, and Tweets, Oh My!: Creating Avenues for Student Participation ...
Wikis, Blogs, and Tweets, Oh My!: Creating Avenues for Student Participation ...Wikis, Blogs, and Tweets, Oh My!: Creating Avenues for Student Participation ...
Wikis, Blogs, and Tweets, Oh My!: Creating Avenues for Student Participation ...CSU, Chico
 

Similar a Shmoocon - Beyond Nymwars (20)

Good IA Every Day
Good IA Every DayGood IA Every Day
Good IA Every Day
 
Democratizing Educational Technology
Democratizing Educational TechnologyDemocratizing Educational Technology
Democratizing Educational Technology
 
Galapag.us thesis presentation
Galapag.us thesis presentationGalapag.us thesis presentation
Galapag.us thesis presentation
 
Identity Management in Social Media
Identity Management in Social MediaIdentity Management in Social Media
Identity Management in Social Media
 
What Matters Now. Part 2
What Matters Now. Part 2What Matters Now. Part 2
What Matters Now. Part 2
 
Chic Geek YYC March 2013 Presentation
Chic Geek YYC March 2013 PresentationChic Geek YYC March 2013 Presentation
Chic Geek YYC March 2013 Presentation
 
Parenting the App Generation
Parenting the App GenerationParenting the App Generation
Parenting the App Generation
 
Gloucester
GloucesterGloucester
Gloucester
 
Kicking impostor syndrome in the head
Kicking impostor syndrome in the headKicking impostor syndrome in the head
Kicking impostor syndrome in the head
 
Pragmatic Designer's Guide to Identity on the Web
Pragmatic Designer's Guide to Identity on the WebPragmatic Designer's Guide to Identity on the Web
Pragmatic Designer's Guide to Identity on the Web
 
Safer internet day 2011
Safer internet day 2011Safer internet day 2011
Safer internet day 2011
 
Safer internet day 2011
Safer internet day 2011Safer internet day 2011
Safer internet day 2011
 
Pettinger israel ignite_slideshow
Pettinger israel ignite_slideshowPettinger israel ignite_slideshow
Pettinger israel ignite_slideshow
 
Infopresse montreal feb 6 big data
Infopresse montreal feb 6   big dataInfopresse montreal feb 6   big data
Infopresse montreal feb 6 big data
 
Birth of hashtag
Birth of hashtagBirth of hashtag
Birth of hashtag
 
Digital Citizenship Symposium - Slide Compilation
Digital Citizenship Symposium - Slide CompilationDigital Citizenship Symposium - Slide Compilation
Digital Citizenship Symposium - Slide Compilation
 
Legal Aspects Of New Media Quirk 2008
Legal Aspects Of New Media   Quirk   2008Legal Aspects Of New Media   Quirk   2008
Legal Aspects Of New Media Quirk 2008
 
Thriving In The 21st Century: Speaking the Language of the Digital Native
Thriving In The 21st Century: Speaking the Language of the Digital NativeThriving In The 21st Century: Speaking the Language of the Digital Native
Thriving In The 21st Century: Speaking the Language of the Digital Native
 
SoLoMo: SOcial LOcal MObile April 2013
SoLoMo: SOcial LOcal MObile April 2013SoLoMo: SOcial LOcal MObile April 2013
SoLoMo: SOcial LOcal MObile April 2013
 
Wikis, Blogs, and Tweets, Oh My!: Creating Avenues for Student Participation ...
Wikis, Blogs, and Tweets, Oh My!: Creating Avenues for Student Participation ...Wikis, Blogs, and Tweets, Oh My!: Creating Avenues for Student Participation ...
Wikis, Blogs, and Tweets, Oh My!: Creating Avenues for Student Participation ...
 

Último

The Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfThe Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfSeasiaInfotech2
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 

Último (20)

The Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfThe Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdf
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 

Shmoocon - Beyond Nymwars

  • 1. An Analysis of the Online Identity Battleground aestetix Shmoocon 2013 Monday, February 18, 13
  • 2. Do you... Google? Monday, February 18, 13
  • 3. ... wait, wtf? Monday, February 18, 13
  • 4. Thesis Statements ✤ Identity is multifaceted (“prismatic”) ✤ There is no such thing as a “real” name ✤ Imposing a singular identity is not only harmful, it doesn’t work Monday, February 18, 13
  • 5. What is NSTIC? ✤ National Strategy for Trusted Identities in Cyberspace (NSTIC) ✤ Created by Obama Administration to address current challenges in digital identity (passwords, identity theft, etc) ✤ Update from the February 2013 Plenary Monday, February 18, 13
  • 6. What is NSTIC? Monday, February 18, 13
  • 7. What is NSTIC? Monday, February 18, 13
  • 8. Myth #1 Only pedophiles, criminals, and cyber- bullies do not want to use their legal names online! What is this “nym” thing? http://mythbustersresults.com/photos/adam-savage-mythbusters.jpg Monday, February 18, 13
  • 9. What is a “nym”? Monday, February 18, 13
  • 10. What is a “nym”? ✤ Identity is not the same thing as a name ✤ Name: a label or symbol that is used to identify a person, thing, or concept within a given context Monday, February 18, 13
  • 11. Various Nom de Plumes ✤ Publius ✤ J.K. Rowling ✤ Nicholas Bourbaki ✤ Ian Donald Calvin Euclid Zappa ✤ Richard Bachman, Deep Throat, Voltaire, George Eliot, the Bronte Sisters... Monday, February 18, 13
  • 12. Various Nom de Plumes Monday, February 18, 13
  • 13. What is a “nym”? Is identity internal or external? ✤ Self image (“id, ego and superego”) ✤ Reputation and the Citizen Kane style construct ✤ “The only thing worse than being talked about is not being talked about.” --Oscar Wilde http://en.wikipedia.org/wiki/Citizen_Kane Monday, February 18, 13
  • 14. Why do names matter? ✤ Valerie Plaine ✤ Witness Protection Program ✤ AOL and Netflix databases Monday, February 18, 13
  • 15. What are social networks? ✤ A “social network” is a force that brings people or their personas together on a regular basis. ✤ A “friend” is a person that you would choose to be in contact with. ✤ An “institution” is a custom, practice, relationship, or significant behavior pattern within a social network. Monday, February 18, 13
  • 16. Defining “identity” ✤ Carl Jung: ✤ Rational or “Conscious” ✤ Emotional or “Unconscious” Monday, February 18, 13
  • 17. Bringing Identity Online ✤ aestetix’s Method (draft spec): Monday, February 18, 13
  • 18. So what’s a “nym”? ✤ Pseudonym - a name that might not found on or linkable to any previously mentioned documents ✤ Polynym - a name consisting of multiple words or symbols ✤ Mononym - a name consisting of one word or symbol ✤ Autonym - a name bestowed upon oneself ✤ Anonym - a name representing anonymity Monday, February 18, 13
  • 19. Why not “real” name? ✤ Negative implications ✤ Lack of agency ✤ Easily substituted with better alternatives ✤ Where does this concept come from, anyways? http://www.shescribes.com/2011/07/i-cant-believe-its-not-butter-toast-tweet-100-giveaway.html Monday, February 18, 13
  • 20. What are social networks? ✤ Joseph Campbell: right hand path, left hand path, and the Hero’s Journey ✤ General Petraeus ✤ Why do hacker handles matter? Monday, February 18, 13
  • 21. Establishing Identity Online ✤ Zooko’s Triangle http://www.skyhunter.com/marcs/petnames/IntroPetNames.html Monday, February 18, 13
  • 22. Myth #2 We can stop cyber-bullying by forcing people to use their legal names People who do not use their legal names do not contribute positively to discussions http://mythbustersresults.com/photos/adam-savage-mythbusters.jpg Monday, February 18, 13
  • 23. Do Names Matter? Monday, February 18, 13
  • 24. Do Names Matter? Monday, February 18, 13
  • 25. Do Names Matter? http://en.wikipedia.org/wiki/Phineas_Gage http://circularabsurdity.blogspot.com/2010/11/my-steampunk-art.html Monday, February 18, 13
  • 26. Do Names Matter? ✤ Case Study: TechCrunch Monday, February 18, 13
  • 27. Do Names Matter? ✤ Case Study: TechCrunch Monday, February 18, 13
  • 28. Do Names Matter? ✤ Case Study: TechCrunch Monday, February 18, 13
  • 29. Do Names Matter? ✤ Case Study: Disqus, 60+ million users (Jan 10, 2012) http://disqus.com/research/pseudonyms/ Monday, February 18, 13
  • 30. Do Names Matter? ✤ Case Study: Disqus, 60+ million users (Jan 10, 2012) http://disqus.com/research/pseudonyms/ Monday, February 18, 13
  • 31. Total Lack of Names ✤ Social Number (launched Dec 2012) Monday, February 18, 13
  • 32. Total Lack of Names ✤ Social Number (launched Dec 2012) Monday, February 18, 13
  • 33. Total Lack of Names ✤ Social Number (launched Dec 2012) Monday, February 18, 13
  • 34. Myth #3 We cannot trust anyone who does not use their legal name online Monday, February 18, 13
  • 35. Trust and Reputation https://twitter.com/AntDeRosa/status/292796075348197376 Monday, February 18, 13
  • 36. Trust and Reputation Monday, February 18, 13
  • 37. Trust and Reputation Monday, February 18, 13
  • 38. Trust and Reputation ✤ “Klout” scores http://www.socialbrite.org/2010/07/22/klout-measure-your-twitter-influence/ Monday, February 18, 13
  • 39. Trust and Transparency ✤ What does transparency mean? ✤ Is there such a thing as full transparency? ✤ Who decides how transparent we get to be? ✤ Active versus Passive communication of personal information Monday, February 18, 13
  • 40. Myth #4 We can trust online “identity providers” like Google and Facebook Monday, February 18, 13
  • 41. Does Identity Matter? Eric Schmidt, Executive Chairman at Google: ✤ “The only way to manage this is true transparency and no anonymity. In a world of asynchronous threats, it is too dangerous for there not to be some way to identify you. We need a [verified] name service for people. Governments will demand it.” (Techonomy, August 2010) ✤ “If you have something that you don't want anyone to know, maybe you shouldn't be doing it in the first place."(CNBC Interview, December 2009) Monday, February 18, 13
  • 42. Does Identity Matter? Mark Zuckerberg, CEO at Facebook: ✤ “The days of you having a different image for your work friends or co-workers and for the other people you know are probably coming to an end pretty quickly. Having two identities for yourself is an example of a lack of integrity.” (Interview, October 2011) http://allinio.com/2012/12/holiday-carol-good-king-zuckerberg/ Monday, February 18, 13
  • 43. Does Identity Matter? Chris “moot” Poole, Founder of 4chan ✤ “The portrait of identity online is often painted in black and white. Who you are online is who you are offline. “Human identity doesn't work like that online or offline. It's not 'who you share with,' it's 'who you share as.’ Identity is prismatic.” (Web 2.0) http://www.hollywood.com/news/New_Yogi_Bear_Poster_Reveals_His_Darkest_Secret/7082914 Monday, February 18, 13
  • 44. Recap of 2011 ✤ My G+ account was suspended ✤ Confusion over “common name” ✤ Request for government issued ID ✤ Questions about ID != common name ✤ Account suddenly reinstated http://www.tumblr.com/tagged/nym%20wars Monday, February 18, 13
  • 45. Recap of 2011 Monday, February 18, 13
  • 46. I Wasn’t Alone! Monday, February 18, 13
  • 47. Where are we now? ✤ Updates to the Google+ policy (as of 10/27/2012): ✤ Limiting name changes (3 every 2 years) ✤ Names appeal (includes “significant following”) ✤ Nicknames policy Monday, February 18, 13
  • 48. Where are we now? ✤ Google’s idea of “pseudonyms”: Monday, February 18, 13
  • 49. Where are we now? ✤ Google patent #8271894 (granted Sep 18, 2012) Monday, February 18, 13
  • 50. Where are we now? Monday, February 18, 13
  • 51. Where are we now? Monday, February 18, 13
  • 52. Where are we now? Monday, February 18, 13
  • 53. Bringing Identity Online ✤ Google’s Method: Monday, February 18, 13
  • 54. Where are we now? ✤ “Snitchgate” (September 2012) Monday, February 18, 13
  • 55. Where are we now? ✤ Instagram Fiasco (Jan 22, 2013) http://news.cnet.com/8301-1023_3-57565293-93/instagram-account-crackdown-alarms-members-who-think-theyve-been-hacked/ Monday, February 18, 13
  • 56. Where are we now? ✤ Instagram Fiasco Monday, February 18, 13
  • 57. Where are we now? ✤ Instagram Fiasco Monday, February 18, 13
  • 58. Where are we now? ✤ Questions for thought: ✤ Who are Google and Facebook trying to “impress”? ✤ Who else might have access to this data? ✤ Why would Chewbacca, an 8-foot-tall Wookie, want to live on Endor with a bunch of 2-foot- tall Ewoks? Is that his real name? https://en.wikipedia.org/wiki/File:0330chewbacca.jpg Monday, February 18, 13
  • 59. Myth #5 We are currently fixing this through legislation. Monday, February 18, 13
  • 60. Legal issues? ✤ South Korea Real Name Verification Law (2003-2012) ✤ Required Resident Registration Number to be used for verification to improve “quality” ✤ Repealed in 2012 after Korea Communications Commission found a 0.9% change ✤ Follow-up study by Carnegie-Mellon Monday, February 18, 13
  • 61. Legal issues? ✤ Strengthening Network Internet Protection (China) ✤ Passed on 28 December 2012 ✤ Section VI: Network service providers that handle website access services for users, handle fixed telephone, mobile telephone and other surfing formalities, or provide information publication services to users, shall, when concluding agreements with users or affirming the provision of service, require users to provide real identity information. http://chinacopyrightandmedia.wordpress.com/2012/12/28/national-peoples-congress-standing-committee-decision-concerning-strengthening-network-information-protection/ Monday, February 18, 13
  • 62. Legal issues? ✤ California Proposition 35 (passed Nov 6, 2012) ✤ Californians Against Sexual Exploitation (“CASE”) ✤ Section 290.014 (b): If any person who is required to register pursuant to the Act adds or changes his or her account with an Internet service provider or adds or changes an Internet identifier, the person shall send written notice of the addition or change to the law enforcement agency or agencies with which he or she is currently registered within 24 hours. ...” ✤ EFF filed lawsuit, injunction granted as of Jan 11, 2013 Monday, February 18, 13
  • 63. Legal issues? ✤ German Telemedia Act (passed 26 February 2007) ✤ Section 13 (6): “The service provider must enable the use of telemedia and payment for them to occur anonymously or via a pseudonym where this is technically possible and reasonable. The recipient of the service is to be informed about this possibility.” http://www.cgerli.org/fileadmin/user_upload/interne_Dokumente/Legislation/Telemedia_Act__TMA_.pdf Monday, February 18, 13
  • 64. Moving Forward ✤ Join NymRights! (www.nymrights.org) ✤ Anyone can be an IDESG/NSTIC member! Monday, February 18, 13
  • 65. Questions? ✤ @aestetix Monday, February 18, 13