SlideShare una empresa de Scribd logo
1 de 20
Descargar para leer sin conexión
Who will control the
Next Billion? – A Case
of Chat Apps from Asia
(or Why I think it’s important to help improve data protection in East
Asia if you really care about personal data of the internet Next Billion)

@bact
Arthit Suriyawongkul
Thai Netizen Network

Silicon Valley, 4 March 2014
Lead to Summary
●

Mobile chat apps are now everywhere in East
and Southeast Asia
–
–

●

becomes a mobile identity – provides authentication service for 3rd party apps
mobile social network platform – built for mobile from day one (unlike Facebook)

These “chat apps” grow globally fast
–
–

●

manufacturing influence (bundled to mobile handsets)
“soft-power” cultural influence (K-Pop, J-Pop, Manga)

Data of the mobile Next Billion will be more
transmitted to/processed in East Asia
Summary
●

●

Data will no longer concentrated in US/Europe,
so should the attention of data protection too?
Human rights standards so vary in other parts of
the world and the protection may not cross-border
–

●

e.g. ASEAN Human Rights Declaration

Privacy/cyber-security laws of East Asian
jurisdictions will affect more people globally
–

your communication data and personal data could be one day regulated by Chinese law

–

through monetary and educational assistants, China and Japan already have influence
in SE Asia cyber-security policy
The Apps and
the Culture
All the Communications and Sharing
(Group) Chat, Voice/Video Call, Media/Location Sharing, GAMES, AUTHEN/IDENTITY
Plus Cute Characters (Stickers)

Where’s my sticker shop on ChatSecure and Cryptocat? :p
Asian People Love It
How Big They Are Now?
Chat App
WhatsApp

Country
of Origin
US

Number of
Users
400M

Line

Japan

300M
(50M in Japan)

WeChat

China

300M
(200M in China)

KakaoTalk

Korea

130M

ChatON

Korea

100M
Growth Trends
●

●

●

●

“Line, WeChat: Asian social networks move to
conquer Europe” – AFP (29 Sep 2013)
“How WeChat, Line plan to taken on Facebook,
Skype” – The Times of India (30 Sep 2013)
“Asian Messaging Apps WeChat and Line Challenge
Silicon Valley. China’s WeChat and Japan’s Line Are
Threatening the Global Growth of WhatsApp and
Facebook.” – The Wall Street Journal (9 Oct 2013)
… and the Facebook’s WhatsApp deal recently
Where is the Next Billion?
●

Mobile internet users in Africa, China, South
America, South Asia and Southeast Asia
The Control
Protections Across Borders
“We want LINE Corp. to be the the first line of
surveillance and send us any ‘suspicious’ activity
on their app.” – Technology Crime Suppression
Division, Royal Thai Police (2013)
LINE Corp. in Japan said there’s no official
request from Thai Police. Any request for personal
data should be done under Japanese law.
http://advocacy.globalvoicesonline.org/2013/08/19/thailand-wants-to-monitor-conversations-on-line-app/
http://www.telecomasia.net/content/naver-denies-collaborating-thai-govt
Violations Across Borders
●

●

●

●

●

Some Chinese keywords got
censored in LINE
Study from Citizen Lab found
regionally-based Keyword
Censorship in LINE
LINE in China operated by a
Chinese company
Censorship follows user,
go across borders
https://citizenlab.org/2013/11/asia-chats-investigating-regionally-ba
sed-keyword-censorship-line/
Assumption (That Not Goes)
Across Borders
●

LINE did no encryption on 2G/3G network

●

Metadata and entire conversations in plain text

●

●

With small changes in data request string, can
pull historical chat logs up to two months old.
Made a wrong assumption that the 2G/3G
network is already secure (in many countries, it’s
not)

●

http://www.telecomasia.net/blog/content/line-vulnerable-man-middle-attack

●

https://citizenlab.org/2013/11/asia-chats-analyzing-information-controls-privacy-asian-messaging-applications/
Who will control the Next Billion?
●

●

●

●

South Korea, Japan, China, and Taiwan are
exporters of popular IT apps and devices. These
countries have huge influence in Southeast Asia
and emerging markets.
Political, economical, and/or cultural.
LINE is based in Japan. A subsidiary of a South
Korean company. LINE China (“Lianwo”) is
operated by a Chinese licensee.
WeChat (“Weixin”) is based in China.
Japan/China Influences on
Cyberpolicy (tech/law) in SE Asia
●
●

●
●

●
●

Japan-ASEAN Information Security Policy Meeting
Japan-ASEAN Ministerial Policy Meeting on Cyber
Security Cooperation
ASEAN Smart Network Initiative
ASEAN-Japan Joint Information Security Awareness
Raising Initiatives
China-ASEAN Defence Ministers' Meeting
ASEAN-China Information Superhighway Working
Group
Asian values in your pocket
●

●

●

●

As these chat apps/social network are growing, more data
will be transmitted to, stored and processed in East Asia.
“Asian values” embedded in these countries’ information
laws will play more role in information freedom globally.
Often times, in these countries, companies
cooperate/collaborate with authority. No Transparency
Report. Communication protocol is not open. Everything is
behind the door.
Asian values? From Japan? From South Korea? From
China? From where?
What We Can Do?
Together, we can do more of this
EFF’s “Who's Doing What?” (Tech)

EFF’s “Who Has Your Back?” (Law)

and this...

?????
?????
?????

?????
?????
@bact
Arthit Suriyawongkul
Thai Netizen Network
arthit@thainetizen.org
●

Parts of this presentation was presented at
●

Regional Consultation on Freedom of Expression for Civil
Liberties in Asia (22 Nov 2013, Bangkok)

●

●

●

CNXP (6 Dec 2013, Chiang Mai)
FOSSASIA (1 Mar 2014, Phnom Penh)

Thanks for all the comments from those forums and social media.

Más contenido relacionado

Destacado

A survey on cyber law
A survey on cyber lawA survey on cyber law
A survey on cyber lawSantosh Panda
 
Global Cyber-Laws and E-Commerce & Strategic Implication for E-Commerce
Global Cyber-Laws and E-Commerce & Strategic Implication for E-CommerceGlobal Cyber-Laws and E-Commerce & Strategic Implication for E-Commerce
Global Cyber-Laws and E-Commerce & Strategic Implication for E-Commercewelcometofacebook
 
The cyber law regime in India
The cyber law regime in IndiaThe cyber law regime in India
The cyber law regime in IndiaShankey Gupta
 
Cybercrime Legislation in the Middle East
Cybercrime Legislation in the Middle EastCybercrime Legislation in the Middle East
Cybercrime Legislation in the Middle EastMohamed N. El-Guindy
 
Legal aspects of handling cyber frauds
Legal aspects of handling cyber fraudsLegal aspects of handling cyber frauds
Legal aspects of handling cyber fraudsSagar Rahurkar
 
Introduction to Cyber law (IT Act 2000)
Introduction to Cyber law (IT Act 2000)Introduction to Cyber law (IT Act 2000)
Introduction to Cyber law (IT Act 2000)Ambar Deo
 
Hacking - Cyber Crimes and Cyber Laws - Information Technology ACT 2000
Hacking - Cyber Crimes and Cyber Laws - Information Technology ACT 2000Hacking - Cyber Crimes and Cyber Laws - Information Technology ACT 2000
Hacking - Cyber Crimes and Cyber Laws - Information Technology ACT 2000Jyotindra Zaveri
 
cyber crime & cyber law
cyber crime & cyber lawcyber crime & cyber law
cyber crime & cyber lawhimanshumunjal
 
An Introduction to Cyber Law - I.T. Act 2000 (India)
An Introduction to Cyber Law - I.T. Act 2000 (India)An Introduction to Cyber Law - I.T. Act 2000 (India)
An Introduction to Cyber Law - I.T. Act 2000 (India)Chetan Bharadwaj
 
Information technology act 2000
Information technology act 2000Information technology act 2000
Information technology act 2000Akash Varaiya
 
Cybercrime.ppt
Cybercrime.pptCybercrime.ppt
Cybercrime.pptAeman Khan
 

Destacado (15)

A survey on cyber law
A survey on cyber lawA survey on cyber law
A survey on cyber law
 
Global Cyber-Laws and E-Commerce & Strategic Implication for E-Commerce
Global Cyber-Laws and E-Commerce & Strategic Implication for E-CommerceGlobal Cyber-Laws and E-Commerce & Strategic Implication for E-Commerce
Global Cyber-Laws and E-Commerce & Strategic Implication for E-Commerce
 
The cyber law regime in India
The cyber law regime in IndiaThe cyber law regime in India
The cyber law regime in India
 
Cybercrime Legislation in the Middle East
Cybercrime Legislation in the Middle EastCybercrime Legislation in the Middle East
Cybercrime Legislation in the Middle East
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Legal aspects of handling cyber frauds
Legal aspects of handling cyber fraudsLegal aspects of handling cyber frauds
Legal aspects of handling cyber frauds
 
Introduction to Cyber law (IT Act 2000)
Introduction to Cyber law (IT Act 2000)Introduction to Cyber law (IT Act 2000)
Introduction to Cyber law (IT Act 2000)
 
Intellectual property
Intellectual propertyIntellectual property
Intellectual property
 
Hacking - Cyber Crimes and Cyber Laws - Information Technology ACT 2000
Hacking - Cyber Crimes and Cyber Laws - Information Technology ACT 2000Hacking - Cyber Crimes and Cyber Laws - Information Technology ACT 2000
Hacking - Cyber Crimes and Cyber Laws - Information Technology ACT 2000
 
Cyber law-it-act-2000
Cyber law-it-act-2000Cyber law-it-act-2000
Cyber law-it-act-2000
 
Cyber Law
Cyber  LawCyber  Law
Cyber Law
 
cyber crime & cyber law
cyber crime & cyber lawcyber crime & cyber law
cyber crime & cyber law
 
An Introduction to Cyber Law - I.T. Act 2000 (India)
An Introduction to Cyber Law - I.T. Act 2000 (India)An Introduction to Cyber Law - I.T. Act 2000 (India)
An Introduction to Cyber Law - I.T. Act 2000 (India)
 
Information technology act 2000
Information technology act 2000Information technology act 2000
Information technology act 2000
 
Cybercrime.ppt
Cybercrime.pptCybercrime.ppt
Cybercrime.ppt
 

Similar a Who will control the Next Billion? – A Case of Chat Apps from Asia (#RightsCon 2014)

Digital Innovations in Asia by Mark Inkster
Digital Innovations in Asia by Mark InksterDigital Innovations in Asia by Mark Inkster
Digital Innovations in Asia by Mark InksterThe Digital Insurer
 
China & Japan: Influencing our future
China & Japan: Influencing our futureChina & Japan: Influencing our future
China & Japan: Influencing our futureNigelG
 
Internet Society Update
Internet Society UpdateInternet Society Update
Internet Society UpdateAPNIC
 
ebusiness Strategy in Entrepreneurship 1: Pedro Eloy at SMECC - 20130806
ebusiness Strategy in Entrepreneurship 1: Pedro Eloy at SMECC - 20130806ebusiness Strategy in Entrepreneurship 1: Pedro Eloy at SMECC - 20130806
ebusiness Strategy in Entrepreneurship 1: Pedro Eloy at SMECC - 20130806smecchk
 
Sigit policy framework on public sector social media utilization- moving fo...
Sigit   policy framework on public sector social media utilization- moving fo...Sigit   policy framework on public sector social media utilization- moving fo...
Sigit policy framework on public sector social media utilization- moving fo...Sigit Puspito Wigati Jarot
 
Sigit policy framework on public sector social media utilization- moving fo...
Sigit   policy framework on public sector social media utilization- moving fo...Sigit   policy framework on public sector social media utilization- moving fo...
Sigit policy framework on public sector social media utilization- moving fo...Sigit Puspito Wigati Jarot
 
Mobile Southeast Asia Report 2012
Mobile Southeast Asia Report 2012Mobile Southeast Asia Report 2012
Mobile Southeast Asia Report 2012WiseKnow Thailand
 
2014 q2q3umeng insight_report_en
2014 q2q3umeng insight_report_en2014 q2q3umeng insight_report_en
2014 q2q3umeng insight_report_enUmeng
 
[2014 q2q3umeng insight] China’s Mobile Internet:Further Segmentation and Ver...
[2014 q2q3umeng insight] China’s Mobile Internet:Further Segmentation and Ver...[2014 q2q3umeng insight] China’s Mobile Internet:Further Segmentation and Ver...
[2014 q2q3umeng insight] China’s Mobile Internet:Further Segmentation and Ver...Umeng
 
Digital Asia – ASEAN in ascendence. Team Finland Future Watch Report, May 2016
Digital Asia – ASEAN in ascendence. Team Finland Future Watch Report, May 2016Digital Asia – ASEAN in ascendence. Team Finland Future Watch Report, May 2016
Digital Asia – ASEAN in ascendence. Team Finland Future Watch Report, May 2016Didar Kaitasalo
 
Digital Asia – ASEAN in ascendence. Team Finland Future Watch Report, May 2016
Digital Asia – ASEAN in ascendence. Team Finland Future Watch Report, May 2016Digital Asia – ASEAN in ascendence. Team Finland Future Watch Report, May 2016
Digital Asia – ASEAN in ascendence. Team Finland Future Watch Report, May 2016Team Finland Future Watch
 
Threading it all together – Q2 Tech Trends
Threading it all together – Q2 Tech TrendsThreading it all together – Q2 Tech Trends
Threading it all together – Q2 Tech TrendsKatie Harbath
 
The interpretation of the relationship among big data, IoT and smart city - C...
The interpretation of the relationship among big data, IoT and smart city - C...The interpretation of the relationship among big data, IoT and smart city - C...
The interpretation of the relationship among big data, IoT and smart city - C...Antenna Manufacturer Coco
 
Why tech-giants move their outsourcing operations to Vietnam- whitepaper
Why tech-giants move their outsourcing operations to Vietnam- whitepaperWhy tech-giants move their outsourcing operations to Vietnam- whitepaper
Why tech-giants move their outsourcing operations to Vietnam- whitepaperTMA Solutions
 
China Mobile Internet 2013 Overview (Umeng)
China Mobile Internet 2013 Overview (Umeng)China Mobile Internet 2013 Overview (Umeng)
China Mobile Internet 2013 Overview (Umeng)Hubery Zhou
 
2013 Umeng Insight Report
2013 Umeng Insight Report2013 Umeng Insight Report
2013 Umeng Insight ReportUmeng
 
Internet Governance & Digital Rights by Waihiga K. Muturi, Rtn..pdf
Internet Governance & Digital Rights by Waihiga K. Muturi, Rtn..pdfInternet Governance & Digital Rights by Waihiga K. Muturi, Rtn..pdf
Internet Governance & Digital Rights by Waihiga K. Muturi, Rtn..pdfWAIHIGA K.MUTURI
 
WeChat, the shape of the connected China
WeChat, the shape of the connected ChinaWeChat, the shape of the connected China
WeChat, the shape of the connected ChinaFabernovel
 

Similar a Who will control the Next Billion? – A Case of Chat Apps from Asia (#RightsCon 2014) (20)

Digital Innovations in Asia by Mark Inkster
Digital Innovations in Asia by Mark InksterDigital Innovations in Asia by Mark Inkster
Digital Innovations in Asia by Mark Inkster
 
China & Japan: Influencing our future
China & Japan: Influencing our futureChina & Japan: Influencing our future
China & Japan: Influencing our future
 
Internet Society Update
Internet Society UpdateInternet Society Update
Internet Society Update
 
ebusiness Strategy in Entrepreneurship 1: Pedro Eloy at SMECC - 20130806
ebusiness Strategy in Entrepreneurship 1: Pedro Eloy at SMECC - 20130806ebusiness Strategy in Entrepreneurship 1: Pedro Eloy at SMECC - 20130806
ebusiness Strategy in Entrepreneurship 1: Pedro Eloy at SMECC - 20130806
 
Sigit policy framework on public sector social media utilization- moving fo...
Sigit   policy framework on public sector social media utilization- moving fo...Sigit   policy framework on public sector social media utilization- moving fo...
Sigit policy framework on public sector social media utilization- moving fo...
 
Sigit policy framework on public sector social media utilization- moving fo...
Sigit   policy framework on public sector social media utilization- moving fo...Sigit   policy framework on public sector social media utilization- moving fo...
Sigit policy framework on public sector social media utilization- moving fo...
 
Mobile Southeast Asia Report 2012
Mobile Southeast Asia Report 2012Mobile Southeast Asia Report 2012
Mobile Southeast Asia Report 2012
 
2014 q2q3umeng insight_report_en
2014 q2q3umeng insight_report_en2014 q2q3umeng insight_report_en
2014 q2q3umeng insight_report_en
 
[2014 q2q3umeng insight] China’s Mobile Internet:Further Segmentation and Ver...
[2014 q2q3umeng insight] China’s Mobile Internet:Further Segmentation and Ver...[2014 q2q3umeng insight] China’s Mobile Internet:Further Segmentation and Ver...
[2014 q2q3umeng insight] China’s Mobile Internet:Further Segmentation and Ver...
 
Going Mobile
Going MobileGoing Mobile
Going Mobile
 
Digital Asia – ASEAN in ascendence. Team Finland Future Watch Report, May 2016
Digital Asia – ASEAN in ascendence. Team Finland Future Watch Report, May 2016Digital Asia – ASEAN in ascendence. Team Finland Future Watch Report, May 2016
Digital Asia – ASEAN in ascendence. Team Finland Future Watch Report, May 2016
 
Digital Asia – ASEAN in ascendence. Team Finland Future Watch Report, May 2016
Digital Asia – ASEAN in ascendence. Team Finland Future Watch Report, May 2016Digital Asia – ASEAN in ascendence. Team Finland Future Watch Report, May 2016
Digital Asia – ASEAN in ascendence. Team Finland Future Watch Report, May 2016
 
Threading it all together – Q2 Tech Trends
Threading it all together – Q2 Tech TrendsThreading it all together – Q2 Tech Trends
Threading it all together – Q2 Tech Trends
 
The interpretation of the relationship among big data, IoT and smart city - C...
The interpretation of the relationship among big data, IoT and smart city - C...The interpretation of the relationship among big data, IoT and smart city - C...
The interpretation of the relationship among big data, IoT and smart city - C...
 
Why tech-giants move their outsourcing operations to Vietnam- whitepaper
Why tech-giants move their outsourcing operations to Vietnam- whitepaperWhy tech-giants move their outsourcing operations to Vietnam- whitepaper
Why tech-giants move their outsourcing operations to Vietnam- whitepaper
 
China Mobile Internet 2013 Overview (Umeng)
China Mobile Internet 2013 Overview (Umeng)China Mobile Internet 2013 Overview (Umeng)
China Mobile Internet 2013 Overview (Umeng)
 
2013 Umeng Insight Report
2013 Umeng Insight Report2013 Umeng Insight Report
2013 Umeng Insight Report
 
Internet Governance & Digital Rights by Waihiga K. Muturi, Rtn..pdf
Internet Governance & Digital Rights by Waihiga K. Muturi, Rtn..pdfInternet Governance & Digital Rights by Waihiga K. Muturi, Rtn..pdf
Internet Governance & Digital Rights by Waihiga K. Muturi, Rtn..pdf
 
Inside Tencent
Inside TencentInside Tencent
Inside Tencent
 
WeChat, the shape of the connected China
WeChat, the shape of the connected ChinaWeChat, the shape of the connected China
WeChat, the shape of the connected China
 

Más de Arthit Suriyawongkul

Beyond retailer-consumer relationships
Beyond retailer-consumer relationshipsBeyond retailer-consumer relationships
Beyond retailer-consumer relationshipsArthit Suriyawongkul
 
ทุน ข้อมูล และสภาพแวดล้อม: เพื่อสนับสนุนการมีส่วนร่วมของประชาชนในการออกแบบแล...
 ทุน ข้อมูล และสภาพแวดล้อม: เพื่อสนับสนุนการมีส่วนร่วมของประชาชนในการออกแบบแล... ทุน ข้อมูล และสภาพแวดล้อม: เพื่อสนับสนุนการมีส่วนร่วมของประชาชนในการออกแบบแล...
ทุน ข้อมูล และสภาพแวดล้อม: เพื่อสนับสนุนการมีส่วนร่วมของประชาชนในการออกแบบแล...Arthit Suriyawongkul
 
กฎหมายเกี่ยวกับเนื้อหา โฆษณา และการตลาดออนไลน์ (ทำให้เพื่อนไปสอบ DAAT ไม่รู้จ...
กฎหมายเกี่ยวกับเนื้อหา โฆษณา และการตลาดออนไลน์ (ทำให้เพื่อนไปสอบ DAAT ไม่รู้จ...กฎหมายเกี่ยวกับเนื้อหา โฆษณา และการตลาดออนไลน์ (ทำให้เพื่อนไปสอบ DAAT ไม่รู้จ...
กฎหมายเกี่ยวกับเนื้อหา โฆษณา และการตลาดออนไลน์ (ทำให้เพื่อนไปสอบ DAAT ไม่รู้จ...Arthit Suriyawongkul
 
พ.ร.บ.คุ้มครอง
ข้อมูลส่วนบุคคล และสิทธิในความเป็นส่วนตัว
พ.ร.บ.คุ้มครอง
ข้อมูลส่วนบุคคล และสิทธิในความเป็นส่วนตัวพ.ร.บ.คุ้มครอง
ข้อมูลส่วนบุคคล และสิทธิในความเป็นส่วนตัว
พ.ร.บ.คุ้มครอง
ข้อมูลส่วนบุคคล และสิทธิในความเป็นส่วนตัวArthit Suriyawongkul
 
Rights-based Internet Governance: การอภิบาลอินเทอร์เน็ตโดยคิดจากสิทธิเป็นที่ตั้ง
Rights-based Internet Governance: การอภิบาลอินเทอร์เน็ตโดยคิดจากสิทธิเป็นที่ตั้งRights-based Internet Governance: การอภิบาลอินเทอร์เน็ตโดยคิดจากสิทธิเป็นที่ตั้ง
Rights-based Internet Governance: การอภิบาลอินเทอร์เน็ตโดยคิดจากสิทธิเป็นที่ตั้งArthit Suriyawongkul
 
ว่าด้วยสื่อสังคม
ว่าด้วยสื่อสังคมว่าด้วยสื่อสังคม
ว่าด้วยสื่อสังคมArthit Suriyawongkul
 
โดนอุ้มในโลกเสมือน
โดนอุ้มในโลกเสมือน โดนอุ้มในโลกเสมือน
โดนอุ้มในโลกเสมือน Arthit Suriyawongkul
 
คนทำงานและแรงงานในยุคดิจิทัล
คนทำงานและแรงงานในยุคดิจิทัลคนทำงานและแรงงานในยุคดิจิทัล
คนทำงานและแรงงานในยุคดิจิทัลArthit Suriyawongkul
 
Three-Layer Model for the Control of Online Content: A Study on Thailand
Three-Layer Model for the Control of Online Content: A Study on ThailandThree-Layer Model for the Control of Online Content: A Study on Thailand
Three-Layer Model for the Control of Online Content: A Study on ThailandArthit Suriyawongkul
 
Mapping Stakeholders, Decision-makers, and Implementers in Thailand’s Cyber P...
Mapping Stakeholders, Decision-makers, and Implementers in Thailand’s Cyber P...Mapping Stakeholders, Decision-makers, and Implementers in Thailand’s Cyber P...
Mapping Stakeholders, Decision-makers, and Implementers in Thailand’s Cyber P...Arthit Suriyawongkul
 
Data Protection
 in the Age of Big Data
Data Protection
 in the Age of Big DataData Protection
 in the Age of Big Data
Data Protection
 in the Age of Big DataArthit Suriyawongkul
 
Anonymity in the Digital Age #digitalcitizen16
Anonymity in the Digital Age #digitalcitizen16Anonymity in the Digital Age #digitalcitizen16
Anonymity in the Digital Age #digitalcitizen16Arthit Suriyawongkul
 
Information Laws in Mekong Countries
Information Laws in Mekong CountriesInformation Laws in Mekong Countries
Information Laws in Mekong CountriesArthit Suriyawongkul
 
แนะนำมูลนิธิเพื่ออินเทอร์เน็ตและวัฒนธรรมพลเมือง
แนะนำมูลนิธิเพื่ออินเทอร์เน็ตและวัฒนธรรมพลเมืองแนะนำมูลนิธิเพื่ออินเทอร์เน็ตและวัฒนธรรมพลเมือง
แนะนำมูลนิธิเพื่ออินเทอร์เน็ตและวัฒนธรรมพลเมืองArthit Suriyawongkul
 
การส่งเสริมการกำกับกันเอง
ในกิจการสื่อใหม่ยุคหลอมรวม
การส่งเสริมการกำกับกันเอง
ในกิจการสื่อใหม่ยุคหลอมรวมการส่งเสริมการกำกับกันเอง
ในกิจการสื่อใหม่ยุคหลอมรวม
การส่งเสริมการกำกับกันเอง
ในกิจการสื่อใหม่ยุคหลอมรวมArthit Suriyawongkul
 
Cybercrime and Cybersecurity Differences
Cybercrime and Cybersecurity DifferencesCybercrime and Cybersecurity Differences
Cybercrime and Cybersecurity DifferencesArthit Suriyawongkul
 
Development and Concerns over "Digital Economy" Bills in Thailand
Development and Concerns over "Digital Economy" Bills in ThailandDevelopment and Concerns over "Digital Economy" Bills in Thailand
Development and Concerns over "Digital Economy" Bills in ThailandArthit Suriyawongkul
 
The Junta Digital Agenda: 76 Days Later
The Junta Digital Agenda: 76 Days LaterThe Junta Digital Agenda: 76 Days Later
The Junta Digital Agenda: 76 Days LaterArthit Suriyawongkul
 
The state of Internet freedom after the coup in Thailand
The state of Internet freedom after the coup in ThailandThe state of Internet freedom after the coup in Thailand
The state of Internet freedom after the coup in ThailandArthit Suriyawongkul
 

Más de Arthit Suriyawongkul (20)

Beyond retailer-consumer relationships
Beyond retailer-consumer relationshipsBeyond retailer-consumer relationships
Beyond retailer-consumer relationships
 
ทุน ข้อมูล และสภาพแวดล้อม: เพื่อสนับสนุนการมีส่วนร่วมของประชาชนในการออกแบบแล...
 ทุน ข้อมูล และสภาพแวดล้อม: เพื่อสนับสนุนการมีส่วนร่วมของประชาชนในการออกแบบแล... ทุน ข้อมูล และสภาพแวดล้อม: เพื่อสนับสนุนการมีส่วนร่วมของประชาชนในการออกแบบแล...
ทุน ข้อมูล และสภาพแวดล้อม: เพื่อสนับสนุนการมีส่วนร่วมของประชาชนในการออกแบบแล...
 
กฎหมายเกี่ยวกับเนื้อหา โฆษณา และการตลาดออนไลน์ (ทำให้เพื่อนไปสอบ DAAT ไม่รู้จ...
กฎหมายเกี่ยวกับเนื้อหา โฆษณา และการตลาดออนไลน์ (ทำให้เพื่อนไปสอบ DAAT ไม่รู้จ...กฎหมายเกี่ยวกับเนื้อหา โฆษณา และการตลาดออนไลน์ (ทำให้เพื่อนไปสอบ DAAT ไม่รู้จ...
กฎหมายเกี่ยวกับเนื้อหา โฆษณา และการตลาดออนไลน์ (ทำให้เพื่อนไปสอบ DAAT ไม่รู้จ...
 
พ.ร.บ.คุ้มครอง
ข้อมูลส่วนบุคคล และสิทธิในความเป็นส่วนตัว
พ.ร.บ.คุ้มครอง
ข้อมูลส่วนบุคคล และสิทธิในความเป็นส่วนตัวพ.ร.บ.คุ้มครอง
ข้อมูลส่วนบุคคล และสิทธิในความเป็นส่วนตัว
พ.ร.บ.คุ้มครอง
ข้อมูลส่วนบุคคล และสิทธิในความเป็นส่วนตัว
 
Rights-based Internet Governance: การอภิบาลอินเทอร์เน็ตโดยคิดจากสิทธิเป็นที่ตั้ง
Rights-based Internet Governance: การอภิบาลอินเทอร์เน็ตโดยคิดจากสิทธิเป็นที่ตั้งRights-based Internet Governance: การอภิบาลอินเทอร์เน็ตโดยคิดจากสิทธิเป็นที่ตั้ง
Rights-based Internet Governance: การอภิบาลอินเทอร์เน็ตโดยคิดจากสิทธิเป็นที่ตั้ง
 
ว่าด้วยสื่อสังคม
ว่าด้วยสื่อสังคมว่าด้วยสื่อสังคม
ว่าด้วยสื่อสังคม
 
โดนอุ้มในโลกเสมือน
โดนอุ้มในโลกเสมือน โดนอุ้มในโลกเสมือน
โดนอุ้มในโลกเสมือน
 
คนทำงานและแรงงานในยุคดิจิทัล
คนทำงานและแรงงานในยุคดิจิทัลคนทำงานและแรงงานในยุคดิจิทัล
คนทำงานและแรงงานในยุคดิจิทัล
 
Three-Layer Model for the Control of Online Content: A Study on Thailand
Three-Layer Model for the Control of Online Content: A Study on ThailandThree-Layer Model for the Control of Online Content: A Study on Thailand
Three-Layer Model for the Control of Online Content: A Study on Thailand
 
Mapping Stakeholders, Decision-makers, and Implementers in Thailand’s Cyber P...
Mapping Stakeholders, Decision-makers, and Implementers in Thailand’s Cyber P...Mapping Stakeholders, Decision-makers, and Implementers in Thailand’s Cyber P...
Mapping Stakeholders, Decision-makers, and Implementers in Thailand’s Cyber P...
 
Data Protection
 in the Age of Big Data
Data Protection
 in the Age of Big DataData Protection
 in the Age of Big Data
Data Protection
 in the Age of Big Data
 
Anonymity in the Digital Age #digitalcitizen16
Anonymity in the Digital Age #digitalcitizen16Anonymity in the Digital Age #digitalcitizen16
Anonymity in the Digital Age #digitalcitizen16
 
Information Laws in Mekong Countries
Information Laws in Mekong CountriesInformation Laws in Mekong Countries
Information Laws in Mekong Countries
 
แนะนำมูลนิธิเพื่ออินเทอร์เน็ตและวัฒนธรรมพลเมือง
แนะนำมูลนิธิเพื่ออินเทอร์เน็ตและวัฒนธรรมพลเมืองแนะนำมูลนิธิเพื่ออินเทอร์เน็ตและวัฒนธรรมพลเมือง
แนะนำมูลนิธิเพื่ออินเทอร์เน็ตและวัฒนธรรมพลเมือง
 
การส่งเสริมการกำกับกันเอง
ในกิจการสื่อใหม่ยุคหลอมรวม
การส่งเสริมการกำกับกันเอง
ในกิจการสื่อใหม่ยุคหลอมรวมการส่งเสริมการกำกับกันเอง
ในกิจการสื่อใหม่ยุคหลอมรวม
การส่งเสริมการกำกับกันเอง
ในกิจการสื่อใหม่ยุคหลอมรวม
 
Cybercrime and Cybersecurity Differences
Cybercrime and Cybersecurity DifferencesCybercrime and Cybersecurity Differences
Cybercrime and Cybersecurity Differences
 
Development and Concerns over "Digital Economy" Bills in Thailand
Development and Concerns over "Digital Economy" Bills in ThailandDevelopment and Concerns over "Digital Economy" Bills in Thailand
Development and Concerns over "Digital Economy" Bills in Thailand
 
Thailand on LINE
Thailand on LINEThailand on LINE
Thailand on LINE
 
The Junta Digital Agenda: 76 Days Later
The Junta Digital Agenda: 76 Days LaterThe Junta Digital Agenda: 76 Days Later
The Junta Digital Agenda: 76 Days Later
 
The state of Internet freedom after the coup in Thailand
The state of Internet freedom after the coup in ThailandThe state of Internet freedom after the coup in Thailand
The state of Internet freedom after the coup in Thailand
 

Último

Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DayH2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DaySri Ambati
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 

Último (20)

Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DayH2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 

Who will control the Next Billion? – A Case of Chat Apps from Asia (#RightsCon 2014)

  • 1. Who will control the Next Billion? – A Case of Chat Apps from Asia (or Why I think it’s important to help improve data protection in East Asia if you really care about personal data of the internet Next Billion) @bact Arthit Suriyawongkul Thai Netizen Network Silicon Valley, 4 March 2014
  • 2. Lead to Summary ● Mobile chat apps are now everywhere in East and Southeast Asia – – ● becomes a mobile identity – provides authentication service for 3rd party apps mobile social network platform – built for mobile from day one (unlike Facebook) These “chat apps” grow globally fast – – ● manufacturing influence (bundled to mobile handsets) “soft-power” cultural influence (K-Pop, J-Pop, Manga) Data of the mobile Next Billion will be more transmitted to/processed in East Asia
  • 3. Summary ● ● Data will no longer concentrated in US/Europe, so should the attention of data protection too? Human rights standards so vary in other parts of the world and the protection may not cross-border – ● e.g. ASEAN Human Rights Declaration Privacy/cyber-security laws of East Asian jurisdictions will affect more people globally – your communication data and personal data could be one day regulated by Chinese law – through monetary and educational assistants, China and Japan already have influence in SE Asia cyber-security policy
  • 5. All the Communications and Sharing (Group) Chat, Voice/Video Call, Media/Location Sharing, GAMES, AUTHEN/IDENTITY
  • 6. Plus Cute Characters (Stickers) Where’s my sticker shop on ChatSecure and Cryptocat? :p
  • 8. How Big They Are Now? Chat App WhatsApp Country of Origin US Number of Users 400M Line Japan 300M (50M in Japan) WeChat China 300M (200M in China) KakaoTalk Korea 130M ChatON Korea 100M
  • 9. Growth Trends ● ● ● ● “Line, WeChat: Asian social networks move to conquer Europe” – AFP (29 Sep 2013) “How WeChat, Line plan to taken on Facebook, Skype” – The Times of India (30 Sep 2013) “Asian Messaging Apps WeChat and Line Challenge Silicon Valley. China’s WeChat and Japan’s Line Are Threatening the Global Growth of WhatsApp and Facebook.” – The Wall Street Journal (9 Oct 2013) … and the Facebook’s WhatsApp deal recently
  • 10. Where is the Next Billion? ● Mobile internet users in Africa, China, South America, South Asia and Southeast Asia
  • 12. Protections Across Borders “We want LINE Corp. to be the the first line of surveillance and send us any ‘suspicious’ activity on their app.” – Technology Crime Suppression Division, Royal Thai Police (2013) LINE Corp. in Japan said there’s no official request from Thai Police. Any request for personal data should be done under Japanese law. http://advocacy.globalvoicesonline.org/2013/08/19/thailand-wants-to-monitor-conversations-on-line-app/ http://www.telecomasia.net/content/naver-denies-collaborating-thai-govt
  • 13. Violations Across Borders ● ● ● ● ● Some Chinese keywords got censored in LINE Study from Citizen Lab found regionally-based Keyword Censorship in LINE LINE in China operated by a Chinese company Censorship follows user, go across borders https://citizenlab.org/2013/11/asia-chats-investigating-regionally-ba sed-keyword-censorship-line/
  • 14. Assumption (That Not Goes) Across Borders ● LINE did no encryption on 2G/3G network ● Metadata and entire conversations in plain text ● ● With small changes in data request string, can pull historical chat logs up to two months old. Made a wrong assumption that the 2G/3G network is already secure (in many countries, it’s not) ● http://www.telecomasia.net/blog/content/line-vulnerable-man-middle-attack ● https://citizenlab.org/2013/11/asia-chats-analyzing-information-controls-privacy-asian-messaging-applications/
  • 15. Who will control the Next Billion? ● ● ● ● South Korea, Japan, China, and Taiwan are exporters of popular IT apps and devices. These countries have huge influence in Southeast Asia and emerging markets. Political, economical, and/or cultural. LINE is based in Japan. A subsidiary of a South Korean company. LINE China (“Lianwo”) is operated by a Chinese licensee. WeChat (“Weixin”) is based in China.
  • 16. Japan/China Influences on Cyberpolicy (tech/law) in SE Asia ● ● ● ● ● ● Japan-ASEAN Information Security Policy Meeting Japan-ASEAN Ministerial Policy Meeting on Cyber Security Cooperation ASEAN Smart Network Initiative ASEAN-Japan Joint Information Security Awareness Raising Initiatives China-ASEAN Defence Ministers' Meeting ASEAN-China Information Superhighway Working Group
  • 17. Asian values in your pocket ● ● ● ● As these chat apps/social network are growing, more data will be transmitted to, stored and processed in East Asia. “Asian values” embedded in these countries’ information laws will play more role in information freedom globally. Often times, in these countries, companies cooperate/collaborate with authority. No Transparency Report. Communication protocol is not open. Everything is behind the door. Asian values? From Japan? From South Korea? From China? From where?
  • 18. What We Can Do?
  • 19. Together, we can do more of this EFF’s “Who's Doing What?” (Tech) EFF’s “Who Has Your Back?” (Law) and this... ????? ????? ????? ????? ?????
  • 20. @bact Arthit Suriyawongkul Thai Netizen Network arthit@thainetizen.org ● Parts of this presentation was presented at ● Regional Consultation on Freedom of Expression for Civil Liberties in Asia (22 Nov 2013, Bangkok) ● ● ● CNXP (6 Dec 2013, Chiang Mai) FOSSASIA (1 Mar 2014, Phnom Penh) Thanks for all the comments from those forums and social media.