SlideShare a Scribd company logo
1 of 22
Download to read offline
a very brief history of privacy
in our data deluged world,

Sam Lessin @ drop.io
Voice Over (1/2):
1. hi, my name is sam lessin, and I am going to be speaking a bit about digital privacy - something i spend most of my days working
on in one way or another

2. for starters, what is privacy. people pre-pend the word in phrases like private thoughts, a private journal, private bedroom
exploits, or private plans to take over the world - but there are precious few good definitions of what the term actually means

3. The best way to describe privacy is as the limited transmission of information over time and/or between people. It is about moving
information from a trusted point A to a trusted point B without exposure.

4. why do we care about privacy? isn't it dead? -- we care because in all sorts of scenarios the value of information is inversely
related to how public it is. from corporate secrets, to gambling and the stock market, to even personal intimacy

5. fundamentally you are only as private as your weakest communicative link. the model for a private exchange is a one to one
discussion in the middle of nowhere. Output directly to Input. But the reality is that as we have made communication more efficient
we tend to rely on more intermediaries to communicate.

6. as with many things, one of the most interesting testing grounds for privacy is WAR. during war private information is extremely
valuable to all sides.... and you frequently have to use untrustworthy links in the communicative chain. The solution that evolved
quickly was 'security'

7. all security is breakable - it functions by changing the cost structure of information. You pay a cost to secure
your information(which is less expensive than the info transmitted is valuable)... the key is to make it expensive enough for the
enemy to break your security that it isn't worth it.

8. the reality is that outside of war, until very very recently most information was harmless/ mostly valueless on a mass scale- so
people were not very concerned about privacy. There simply was little to 'steal' from you information wise, so you didn't have to incur
much cost to protect your information.

9. three little familiar concepts, however, changed all that. the cost of and therefore volume of communication, information storage,
and compute power have changed the equation by making useless data useful and by making privacy measures much more expensive
on a relative basis.

10. these cost changes have drastically changed the amount of communication, the amount of communication that is saved, and the
ability to access that information. this is a HUGE deal
Voice Over (2/2):
11. people have been freaking out about this for a long time. Max Weber wrote about all these concepts and their impact
with regards to 'bureaucracy' and people have been updating the concepts all the way through Foucault's Power-Knowledge
in quot;Discipline and Punishquot;

12. interestingly, all this information and organization did allow for a new mechanism of non-secure 'privacy'. Simply trust
your privacy to them and the law. it is a felony to open mail

13. this worked relatively well, because even up through very recent history, little information was valuable and few people
were in a position to break trust.

14. Internet changes all that - all of a sudden lots of information was valuable at scale, and lots of people could touch it

15. institutions break down - laws don't work if you can't enforce them -- and with data flowing beyond boards and no
transparency into who has what = no enforcement

16. go military style? doesn't work - because security only works on cost differentials. Security isn't getting cheaper
faster than breaking security, information is getting more valuable for the bad guys and the good guys.

17. in fact, we are worse off than military information - value of which is very perishable - our data lasts forever - so if you
can't break today break tomorrow

18. this really really sucks for your kids - because 'public key' security is going to crumble with quantum computing - so
traditional security will melt.

19. so what should we do - future of privacy is about unwinding - decentralize, de-tag, destroy... you are also going to end
up with less 'privacy' - which is good, because you can sell your privacy for great stuff online

20. recap -
WTF is privacy?
the limited transmission of info…




                  between people
   over time
So What?
Only as private as your least
trusted link…


                             IO

                          I(OI)O


                   I(OI)(OI)(OI)(OI)O


           I(OI)(OI)(OI)(OI)(OI)(OI)(OI)(OI)O



     I(OI)(OI)(OI)(OI) (OI)(OI)(OI)(OI)(OI)(OI)(OI)(OI)O
OH CRAP, better use a code
Vi(1) – Cs(1)         Vi(2) – Cs(2)
                  >




          Security is based on
   Relative Values and Relative Costs
Ye’ old info = “mostly harmless”
Communication
Storage
Compute
All of Human History
volume



                                                   Network

                                                       Internet      Cuil
                                               Computer
                                                   Telephone       Googlie
                                               Morse code
                                                               Dog Pile
                                 Modern Bureaucracy
                                                             LOC
                                      type writer
                                                       Widner
                                    Calculus
                         Printing Press          Dewey Decimal
         Counting   Writing                Vatican
   Language
                                 Crazy Monks
                    Alexandria

                            ~years
Freaking out, moderate old school
OH CRAP (new school peacetime)
OH CRAP (1980s peacetime)
…then the intertubes

 value of your crap




                           all your crap is
                           valuable*!




                      ~years
Institutions can’t save you



    I(OI)(OI)(OI)(OI)(OI)(OI)(OI)(OI)O




                  ?
go military style? = fail




   Vi(1) – Cs(1)       Vi(2) – Cs(2)
                   >
Suckers
really sucks for your kids…
Future History: Back to Black



        1. decentralize

        2. de-tag

        3. destroy

        4. (give up)
DON’T PANIC, just be conscious

1. Privacy = limited transmission of info

2. Security = method for maintaining
privacy across un-trusted IO

3. Digital makes worthless crap valuable

4. Chill out, tread lightly


             http: //drop.io/swl
               twitter @lessin

More Related Content

Similar to New York September 2008 Ignite, Sam Lessin on Privacy

HES2011 - Raould Chiesa - Hackers Cybercriminals from Wargames to the Undergr...
HES2011 - Raould Chiesa - Hackers Cybercriminals from Wargames to the Undergr...HES2011 - Raould Chiesa - Hackers Cybercriminals from Wargames to the Undergr...
HES2011 - Raould Chiesa - Hackers Cybercriminals from Wargames to the Undergr...Hackito Ergo Sum
 
Infosecurity2013nl 131103184054-phpapp01
Infosecurity2013nl 131103184054-phpapp01Infosecurity2013nl 131103184054-phpapp01
Infosecurity2013nl 131103184054-phpapp01Kenneth Carnesi, JD
 
Privacy is an Illusion and you’re all losers! - Cryptocow - Infosecurity 2013
Privacy is an Illusion and you’re all losers! - Cryptocow - Infosecurity 2013Privacy is an Illusion and you’re all losers! - Cryptocow - Infosecurity 2013
Privacy is an Illusion and you’re all losers! - Cryptocow - Infosecurity 2013Cain Ransbottyn
 
OSDC 2014: Michael Renner - Secure encryption in a wiretapped future
OSDC 2014: Michael Renner - Secure encryption in a wiretapped futureOSDC 2014: Michael Renner - Secure encryption in a wiretapped future
OSDC 2014: Michael Renner - Secure encryption in a wiretapped futureNETWAYS
 
OSDC 2014: Michael Renner - Secure encryption in a wiretapped future
OSDC 2014: Michael Renner - Secure encryption in a wiretapped futureOSDC 2014: Michael Renner - Secure encryption in a wiretapped future
OSDC 2014: Michael Renner - Secure encryption in a wiretapped futureNETWAYS
 
Secure encryption in a wiretapped future
Secure encryption in a wiretapped futureSecure encryption in a wiretapped future
Secure encryption in a wiretapped futureMichael Renner
 
Next Night 5 Rob van Kranenburg
Next Night 5 Rob van KranenburgNext Night 5 Rob van Kranenburg
Next Night 5 Rob van Kranenburggenerationnext
 
How Spies Communicate – Mocomi.com
How Spies Communicate – Mocomi.comHow Spies Communicate – Mocomi.com
How Spies Communicate – Mocomi.comMocomi Kids
 
2600 v11 n2 (summer 1994)
2600 v11 n2 (summer 1994)2600 v11 n2 (summer 1994)
2600 v11 n2 (summer 1994)Felipe Prado
 
2600 v20 n3 (autumn 2003)
2600 v20 n3 (autumn 2003)2600 v20 n3 (autumn 2003)
2600 v20 n3 (autumn 2003)Felipe Prado
 
Raoul chiesa - Auditing the hacker mind - da wargames a underground economy
Raoul chiesa - Auditing the hacker mind - da wargames a underground economyRaoul chiesa - Auditing the hacker mind - da wargames a underground economy
Raoul chiesa - Auditing the hacker mind - da wargames a underground economyCRS4 Research Center in Sardinia
 
1 The Notion Information And Basic Types Of Information
1 The Notion Information And Basic Types Of Information1 The Notion Information And Basic Types Of Information
1 The Notion Information And Basic Types Of InformationAna Meskovska
 
2600 v16 n1 (spring 1999)
2600 v16 n1 (spring 1999)2600 v16 n1 (spring 1999)
2600 v16 n1 (spring 1999)Felipe Prado
 
Stories, Myth, and the Humane Network
Stories, Myth, and the Humane NetworkStories, Myth, and the Humane Network
Stories, Myth, and the Humane NetworkPeter Wang
 
Simon Harrison RWE - Chain of Things 010616 final
Simon Harrison RWE - Chain of Things 010616 finalSimon Harrison RWE - Chain of Things 010616 final
Simon Harrison RWE - Chain of Things 010616 finalSimon Harrison
 
2600 v08 n2 (summer 1991)
2600 v08 n2 (summer 1991)2600 v08 n2 (summer 1991)
2600 v08 n2 (summer 1991)Felipe Prado
 
Internet safety slides
Internet safety slidesInternet safety slides
Internet safety slidesEric Castro
 

Similar to New York September 2008 Ignite, Sam Lessin on Privacy (20)

HES2011 - Raould Chiesa - Hackers Cybercriminals from Wargames to the Undergr...
HES2011 - Raould Chiesa - Hackers Cybercriminals from Wargames to the Undergr...HES2011 - Raould Chiesa - Hackers Cybercriminals from Wargames to the Undergr...
HES2011 - Raould Chiesa - Hackers Cybercriminals from Wargames to the Undergr...
 
Infosecurity2013nl 131103184054-phpapp01
Infosecurity2013nl 131103184054-phpapp01Infosecurity2013nl 131103184054-phpapp01
Infosecurity2013nl 131103184054-phpapp01
 
Privacy is an Illusion and you’re all losers! - Cryptocow - Infosecurity 2013
Privacy is an Illusion and you’re all losers! - Cryptocow - Infosecurity 2013Privacy is an Illusion and you’re all losers! - Cryptocow - Infosecurity 2013
Privacy is an Illusion and you’re all losers! - Cryptocow - Infosecurity 2013
 
OSDC 2014: Michael Renner - Secure encryption in a wiretapped future
OSDC 2014: Michael Renner - Secure encryption in a wiretapped futureOSDC 2014: Michael Renner - Secure encryption in a wiretapped future
OSDC 2014: Michael Renner - Secure encryption in a wiretapped future
 
OSDC 2014: Michael Renner - Secure encryption in a wiretapped future
OSDC 2014: Michael Renner - Secure encryption in a wiretapped futureOSDC 2014: Michael Renner - Secure encryption in a wiretapped future
OSDC 2014: Michael Renner - Secure encryption in a wiretapped future
 
Secure encryption in a wiretapped future
Secure encryption in a wiretapped futureSecure encryption in a wiretapped future
Secure encryption in a wiretapped future
 
Next Night 5 Rob van Kranenburg
Next Night 5 Rob van KranenburgNext Night 5 Rob van Kranenburg
Next Night 5 Rob van Kranenburg
 
People the biggest cyber risk
People the biggest cyber riskPeople the biggest cyber risk
People the biggest cyber risk
 
How Spies Communicate – Mocomi.com
How Spies Communicate – Mocomi.comHow Spies Communicate – Mocomi.com
How Spies Communicate – Mocomi.com
 
2600 v11 n2 (summer 1994)
2600 v11 n2 (summer 1994)2600 v11 n2 (summer 1994)
2600 v11 n2 (summer 1994)
 
2600 v20 n3 (autumn 2003)
2600 v20 n3 (autumn 2003)2600 v20 n3 (autumn 2003)
2600 v20 n3 (autumn 2003)
 
nullcon 2010 - Underground Economy
nullcon 2010 - Underground Economynullcon 2010 - Underground Economy
nullcon 2010 - Underground Economy
 
Raoul chiesa - Auditing the hacker mind - da wargames a underground economy
Raoul chiesa - Auditing the hacker mind - da wargames a underground economyRaoul chiesa - Auditing the hacker mind - da wargames a underground economy
Raoul chiesa - Auditing the hacker mind - da wargames a underground economy
 
1 The Notion Information And Basic Types Of Information
1 The Notion Information And Basic Types Of Information1 The Notion Information And Basic Types Of Information
1 The Notion Information And Basic Types Of Information
 
2600 v16 n1 (spring 1999)
2600 v16 n1 (spring 1999)2600 v16 n1 (spring 1999)
2600 v16 n1 (spring 1999)
 
Stories, Myth, and the Humane Network
Stories, Myth, and the Humane NetworkStories, Myth, and the Humane Network
Stories, Myth, and the Humane Network
 
Simon Harrison RWE - Chain of Things 010616 final
Simon Harrison RWE - Chain of Things 010616 finalSimon Harrison RWE - Chain of Things 010616 final
Simon Harrison RWE - Chain of Things 010616 final
 
digital stega slides
digital stega slidesdigital stega slides
digital stega slides
 
2600 v08 n2 (summer 1991)
2600 v08 n2 (summer 1991)2600 v08 n2 (summer 1991)
2600 v08 n2 (summer 1991)
 
Internet safety slides
Internet safety slidesInternet safety slides
Internet safety slides
 

More from sam lessin

Bitcoin & Alt currencies, Feb 2014
Bitcoin & Alt currencies, Feb 2014Bitcoin & Alt currencies, Feb 2014
Bitcoin & Alt currencies, Feb 2014sam lessin
 
Drop.io at Amazon AWS NYC event
Drop.io at Amazon AWS NYC eventDrop.io at Amazon AWS NYC event
Drop.io at Amazon AWS NYC eventsam lessin
 
Drop.io at MEET Coworking
Drop.io at MEET CoworkingDrop.io at MEET Coworking
Drop.io at MEET Coworkingsam lessin
 
Digital Dumbo Stream Discussion
Digital Dumbo Stream DiscussionDigital Dumbo Stream Discussion
Digital Dumbo Stream Discussionsam lessin
 
Obama Implications, talk with Founder's Roundtable NYC
Obama Implications, talk with Founder's Roundtable NYCObama Implications, talk with Founder's Roundtable NYC
Obama Implications, talk with Founder's Roundtable NYCsam lessin
 
ACM ICPC Regional Finals Talk re: drop.io, privacy, entrepreneurship by sam l...
ACM ICPC Regional Finals Talk re: drop.io, privacy, entrepreneurship by sam l...ACM ICPC Regional Finals Talk re: drop.io, privacy, entrepreneurship by sam l...
ACM ICPC Regional Finals Talk re: drop.io, privacy, entrepreneurship by sam l...sam lessin
 
drop.io at Facebook Dev Austin Garage, SXSW
drop.io at Facebook Dev Austin Garage, SXSWdrop.io at Facebook Dev Austin Garage, SXSW
drop.io at Facebook Dev Austin Garage, SXSWsam lessin
 

More from sam lessin (8)

Bitcoin & Alt currencies, Feb 2014
Bitcoin & Alt currencies, Feb 2014Bitcoin & Alt currencies, Feb 2014
Bitcoin & Alt currencies, Feb 2014
 
Drop.io at Amazon AWS NYC event
Drop.io at Amazon AWS NYC eventDrop.io at Amazon AWS NYC event
Drop.io at Amazon AWS NYC event
 
Drop.io at MEET Coworking
Drop.io at MEET CoworkingDrop.io at MEET Coworking
Drop.io at MEET Coworking
 
Foo Thoughts
Foo ThoughtsFoo Thoughts
Foo Thoughts
 
Digital Dumbo Stream Discussion
Digital Dumbo Stream DiscussionDigital Dumbo Stream Discussion
Digital Dumbo Stream Discussion
 
Obama Implications, talk with Founder's Roundtable NYC
Obama Implications, talk with Founder's Roundtable NYCObama Implications, talk with Founder's Roundtable NYC
Obama Implications, talk with Founder's Roundtable NYC
 
ACM ICPC Regional Finals Talk re: drop.io, privacy, entrepreneurship by sam l...
ACM ICPC Regional Finals Talk re: drop.io, privacy, entrepreneurship by sam l...ACM ICPC Regional Finals Talk re: drop.io, privacy, entrepreneurship by sam l...
ACM ICPC Regional Finals Talk re: drop.io, privacy, entrepreneurship by sam l...
 
drop.io at Facebook Dev Austin Garage, SXSW
drop.io at Facebook Dev Austin Garage, SXSWdrop.io at Facebook Dev Austin Garage, SXSW
drop.io at Facebook Dev Austin Garage, SXSW
 

Recently uploaded

Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 

Recently uploaded (20)

Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 

New York September 2008 Ignite, Sam Lessin on Privacy

  • 1. a very brief history of privacy in our data deluged world, Sam Lessin @ drop.io
  • 2. Voice Over (1/2): 1. hi, my name is sam lessin, and I am going to be speaking a bit about digital privacy - something i spend most of my days working on in one way or another 2. for starters, what is privacy. people pre-pend the word in phrases like private thoughts, a private journal, private bedroom exploits, or private plans to take over the world - but there are precious few good definitions of what the term actually means 3. The best way to describe privacy is as the limited transmission of information over time and/or between people. It is about moving information from a trusted point A to a trusted point B without exposure. 4. why do we care about privacy? isn't it dead? -- we care because in all sorts of scenarios the value of information is inversely related to how public it is. from corporate secrets, to gambling and the stock market, to even personal intimacy 5. fundamentally you are only as private as your weakest communicative link. the model for a private exchange is a one to one discussion in the middle of nowhere. Output directly to Input. But the reality is that as we have made communication more efficient we tend to rely on more intermediaries to communicate. 6. as with many things, one of the most interesting testing grounds for privacy is WAR. during war private information is extremely valuable to all sides.... and you frequently have to use untrustworthy links in the communicative chain. The solution that evolved quickly was 'security' 7. all security is breakable - it functions by changing the cost structure of information. You pay a cost to secure your information(which is less expensive than the info transmitted is valuable)... the key is to make it expensive enough for the enemy to break your security that it isn't worth it. 8. the reality is that outside of war, until very very recently most information was harmless/ mostly valueless on a mass scale- so people were not very concerned about privacy. There simply was little to 'steal' from you information wise, so you didn't have to incur much cost to protect your information. 9. three little familiar concepts, however, changed all that. the cost of and therefore volume of communication, information storage, and compute power have changed the equation by making useless data useful and by making privacy measures much more expensive on a relative basis. 10. these cost changes have drastically changed the amount of communication, the amount of communication that is saved, and the ability to access that information. this is a HUGE deal
  • 3. Voice Over (2/2): 11. people have been freaking out about this for a long time. Max Weber wrote about all these concepts and their impact with regards to 'bureaucracy' and people have been updating the concepts all the way through Foucault's Power-Knowledge in quot;Discipline and Punishquot; 12. interestingly, all this information and organization did allow for a new mechanism of non-secure 'privacy'. Simply trust your privacy to them and the law. it is a felony to open mail 13. this worked relatively well, because even up through very recent history, little information was valuable and few people were in a position to break trust. 14. Internet changes all that - all of a sudden lots of information was valuable at scale, and lots of people could touch it 15. institutions break down - laws don't work if you can't enforce them -- and with data flowing beyond boards and no transparency into who has what = no enforcement 16. go military style? doesn't work - because security only works on cost differentials. Security isn't getting cheaper faster than breaking security, information is getting more valuable for the bad guys and the good guys. 17. in fact, we are worse off than military information - value of which is very perishable - our data lasts forever - so if you can't break today break tomorrow 18. this really really sucks for your kids - because 'public key' security is going to crumble with quantum computing - so traditional security will melt. 19. so what should we do - future of privacy is about unwinding - decentralize, de-tag, destroy... you are also going to end up with less 'privacy' - which is good, because you can sell your privacy for great stuff online 20. recap -
  • 5. the limited transmission of info… between people over time
  • 7. Only as private as your least trusted link… IO I(OI)O I(OI)(OI)(OI)(OI)O I(OI)(OI)(OI)(OI)(OI)(OI)(OI)(OI)O I(OI)(OI)(OI)(OI) (OI)(OI)(OI)(OI)(OI)(OI)(OI)(OI)O
  • 8. OH CRAP, better use a code
  • 9. Vi(1) – Cs(1) Vi(2) – Cs(2) > Security is based on Relative Values and Relative Costs
  • 10. Ye’ old info = “mostly harmless”
  • 12. All of Human History volume Network Internet Cuil Computer Telephone Googlie Morse code Dog Pile Modern Bureaucracy LOC type writer Widner Calculus Printing Press Dewey Decimal Counting Writing Vatican Language Crazy Monks Alexandria ~years
  • 14. OH CRAP (new school peacetime)
  • 15. OH CRAP (1980s peacetime)
  • 16. …then the intertubes value of your crap all your crap is valuable*! ~years
  • 17. Institutions can’t save you I(OI)(OI)(OI)(OI)(OI)(OI)(OI)(OI)O ?
  • 18. go military style? = fail Vi(1) – Cs(1) Vi(2) – Cs(2) >
  • 20. really sucks for your kids…
  • 21. Future History: Back to Black 1. decentralize 2. de-tag 3. destroy 4. (give up)
  • 22. DON’T PANIC, just be conscious 1. Privacy = limited transmission of info 2. Security = method for maintaining privacy across un-trusted IO 3. Digital makes worthless crap valuable 4. Chill out, tread lightly http: //drop.io/swl twitter @lessin