Se ha denunciado esta presentación.
Utilizamos tu perfil de LinkedIn y tus datos de actividad para personalizar los anuncios y mostrarte publicidad más relevante. Puedes cambiar tus preferencias de publicidad en cualquier momento.

Spectrum of privacy 2017 01-10

1.871 visualizaciones

Publicado el

Consumers' private info and privacy are being violated without their consent or knowledge. This is context for the series of privacy forward services that consumers may choose to use to protect themselves -- because no one else will (protect them).

Publicado en: Internet
  • Sé el primero en comentar

  • Sé el primero en recomendar esto

Spectrum of privacy 2017 01-10

  1. 1. January 2017 / Page 0marketing.scienceconsulting group, inc. Spectrum of Privacy Less private More sensitive More private Less sensitive secret personal public anonymous • passwords • social sec # • passport • name • address • email • phone # • social media • geolocation • cookies • ad tech / retargeting • ? Meta data No meta data “services which leak meta data are less private”
  2. 2. January 2017 / Page 1marketing.scienceconsulting group, inc. Set of Privacy-Forward Services pass.wd netw.rk • secure messaging • no meta data • strong passwords • easy to use for humans • device-to- device comms • atomic permissions No meta data • session based keys • perfect forward privacy meta data Key problem to solve: weak passwords single private key d2d comms + + Meta data Phone # and email used to identify endpoints reveal identity and meta data. • ownership • permissions to spend ++ mon.ey undemo- cratic
  3. 3. 1. anything you want tracked and saved for later, use EMAIL 2. anything you do not want tracked, with no meta data about the transmission, use “the anti-email” consumer alpha currently available at
  4. 4. January 2017 / Page 3marketing.scienceconsulting group, inc. personal mail lockbox only you have private key for decrypting messages dropped into your lock box public phone senders use a public phone to anonymously create and send messages to your lock box Offline Analogies – no meta data
  5. 5. January 2017 / Page 4marketing.scienceconsulting group, inc. 1. No meta data (no phone # or email required) 2. Endpoints are anonymous, not associatable 3. Message encrypted with recipient’s public key 4. Every part of transmission is “transient” ? ?njbf8nw8cw9casssddnasda3131wcwyfkj01 Public key encryption Private key decryption Top Features