SlideShare ist ein Scribd-Unternehmen logo
1 von 13
Online Privacy  ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Internet privacy From Wikipedia ' Internet privacy  consists of privacy over the media of the Internet: the ability to control what information one reveals about oneself over the Internet, and to control who can access that information. Experts in the field of Internet privacy have a consensus that Internet privacy does not really exist.   Privacy advocates believe that it should exist.
What Privacy? Privacy is a value which may only be appreciated once it is lost. Take for example your financial information, your medical records, or your buying patterns. How will  they  use that information? That is privacy.  "It's not about the man who wants to watch pornography in complete anonymity over the Internet. It's about the woman who's afraid to use the Internet to organize her community against a proposed toxic dump -- afraid because the dump's investors are sure to dig through her past if she becomes too much of a nuisance,"  Simson Garfinkel, Database Nation
It seems that there are two general reasons why privacy is important.  The first is that privacy helps individuals maintain their autonomy and individuality. People define themselves by controlling/revealing  information about themselves without the need for people to answer for the choices they make about what information is shared and what is held close.  A second reason that privacy is important is because of its functional benefits. The privacy of people's identities: for someone speaking freely at a political rally and not having to answer to political opponents or someone visiting a bar and not having to deal with unwanted suitors. Anonymity lends to privacy for safety and peace of mind.  It is our right to divulge information, to who we want. Privacy deals with how people who have this information on us will use it.
Where are the boundries? Anonymity can be socially useful in encouraging honesty, risk-taking, experimentation and creativity.  Confidentiality improves communication flows and is vital to trust in professional (doctors, lawyers, psychologists) and corporate settings.  Why would we give up protecting and demanding our privacy?  For convenience and savings? Better services?
Online vs Offline Apparently in Britain they have face-recognition systems to scan pedestrians in search of wanted criminals. There is nothing you can do to stop this. No law will prevent it.  Do you feel safer for it? Claims are “yes”. Do you feel unsafe without it? Banning the cameras will only drive this technology underground and then we have even less of an idea of what is really happening.
Online Supposedly computer users long ago gave up the notion of having any privacy in email.  Anything entered onto a computer is more or less considered fair  game, especially to your employer .  We assume that police with a warrant can access any kind of computer logs and your ISP may care to keep.
Technology  Makes it possible to gather personal information about each of us in a way that was never possible before.  Given rise to unprecedented innovation. Web 2.0 - As the online experience becomes more interactive, we share more information.  But in addition to worries about corporate spying, we should also take a close look at what governments can now access and use.
How safe are we? Echelon – Nobody knows! Phorm – public missunderstanding of privacy?  Spyware – the owner of the information has the right to do whatever with it? A Web bug is an object that is embedded in a web page or e-mail and is usually invisible to the user but allows checking that a user has viewed the page or e-mail. One common use is in e-mail tracking. Alternative names are Web beacon, tracking bug, tracking pixel, pixel tag, 1×1 gif, and clear gif. Anonymous proxy - why would you want to use it if not for dubious reasons - it is not as secure as you think!
Google and Privacy From their privacy policy: “ We use cookies to improve the quality of our service by storing user preferences and tracking user trends, such as how people search. Google also uses cookies in its advertising services to help advertisers and publishers serve and manage ads across the web. We may set a cookie in your browser when you visit a website and view or click on an ad supported by Google’s advertising services.” “ Google reads you (G)mail!” Dig by Microsoft at their rival.
Google desktop “ At first I didn't care if Google Desktop was on computers--regardless whether I wanted to use it or not. After I read about version 3, I have been recommending its removal from computers.” Search across computers feature (off by default) Once it indexes your computer, it copies your files; such as word documents, spreadsheets, PDFs, text files, and others; to Google's servers for up to 30 days. Please take a second and let that sink in... It copies your files to their servers! Those files could be anything from a shopping list, to your taxes, to your credit card information, to what ever you have stored on your computer.
Action Groups – the good guys? The Future of Privacy Forum  www.deepblueinteractive.com/blog/the- future-of-privacy - forum .html  Speculation about The Future of Privacy Forum among other companies include that it is a business group attempting to block new government intervention in the advertising business (think Google & Yahoo’s ad fate),  still others see it as a slice of a growing attempt to prevent  Google from gaining any further influence than it already has.  Microsoft in particular has been lobbying in Washington about privacy, a topic it views as Google’s jugular.
Thought for the day Survey the surveillance “ A weak government is not a guarantee of freedom. It is a guarantee of chaos that will be followed by tyranny. What we need is a strong  government that is totally subject to scrutiny so that every mistake that they make will be pounced upon.”  David Brin - Author of "The Transparent Society“ The cameras are getting smaller, the databases are getting more pervasive; the technologies for spying are getting more profound.  These things are coming, whether we embrace them or not. If we drive them underground, we'll have no say in how they're used.

Weitere ähnliche Inhalte

Andere mochten auch

Andere mochten auch (8)

Who Wants To Be Millionaire Digiacomo David
Who Wants To Be Millionaire Digiacomo DavidWho Wants To Be Millionaire Digiacomo David
Who Wants To Be Millionaire Digiacomo David
 
Ubuntu manual
Ubuntu manualUbuntu manual
Ubuntu manual
 
Guia de Ubuntu Server en Inglés
Guia de Ubuntu Server en Inglés Guia de Ubuntu Server en Inglés
Guia de Ubuntu Server en Inglés
 
Workstation Sales
Workstation SalesWorkstation Sales
Workstation Sales
 
Crisis Response and Risk Mitigation
Crisis Response and Risk MitigationCrisis Response and Risk Mitigation
Crisis Response and Risk Mitigation
 
Cognition Lesson Plan
Cognition Lesson PlanCognition Lesson Plan
Cognition Lesson Plan
 
Soilmechanics2
Soilmechanics2Soilmechanics2
Soilmechanics2
 
Soilmechanics1
Soilmechanics1Soilmechanics1
Soilmechanics1
 

Kürzlich hochgeladen

Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyKhushali Kathiriya
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businesspanagenda
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024The Digital Insurer
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodJuan lago vázquez
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingEdi Saputra
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...Principled Technologies
 

Kürzlich hochgeladen (20)

Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
 

MediaVision Presentation Online Privacy 06 02 2009

  • 1.
  • 2. Internet privacy From Wikipedia ' Internet privacy consists of privacy over the media of the Internet: the ability to control what information one reveals about oneself over the Internet, and to control who can access that information. Experts in the field of Internet privacy have a consensus that Internet privacy does not really exist. Privacy advocates believe that it should exist.
  • 3. What Privacy? Privacy is a value which may only be appreciated once it is lost. Take for example your financial information, your medical records, or your buying patterns. How will they use that information? That is privacy. "It's not about the man who wants to watch pornography in complete anonymity over the Internet. It's about the woman who's afraid to use the Internet to organize her community against a proposed toxic dump -- afraid because the dump's investors are sure to dig through her past if she becomes too much of a nuisance," Simson Garfinkel, Database Nation
  • 4. It seems that there are two general reasons why privacy is important. The first is that privacy helps individuals maintain their autonomy and individuality. People define themselves by controlling/revealing information about themselves without the need for people to answer for the choices they make about what information is shared and what is held close. A second reason that privacy is important is because of its functional benefits. The privacy of people's identities: for someone speaking freely at a political rally and not having to answer to political opponents or someone visiting a bar and not having to deal with unwanted suitors. Anonymity lends to privacy for safety and peace of mind. It is our right to divulge information, to who we want. Privacy deals with how people who have this information on us will use it.
  • 5. Where are the boundries? Anonymity can be socially useful in encouraging honesty, risk-taking, experimentation and creativity. Confidentiality improves communication flows and is vital to trust in professional (doctors, lawyers, psychologists) and corporate settings. Why would we give up protecting and demanding our privacy? For convenience and savings? Better services?
  • 6. Online vs Offline Apparently in Britain they have face-recognition systems to scan pedestrians in search of wanted criminals. There is nothing you can do to stop this. No law will prevent it. Do you feel safer for it? Claims are “yes”. Do you feel unsafe without it? Banning the cameras will only drive this technology underground and then we have even less of an idea of what is really happening.
  • 7. Online Supposedly computer users long ago gave up the notion of having any privacy in email. Anything entered onto a computer is more or less considered fair game, especially to your employer . We assume that police with a warrant can access any kind of computer logs and your ISP may care to keep.
  • 8. Technology Makes it possible to gather personal information about each of us in a way that was never possible before. Given rise to unprecedented innovation. Web 2.0 - As the online experience becomes more interactive, we share more information. But in addition to worries about corporate spying, we should also take a close look at what governments can now access and use.
  • 9. How safe are we? Echelon – Nobody knows! Phorm – public missunderstanding of privacy? Spyware – the owner of the information has the right to do whatever with it? A Web bug is an object that is embedded in a web page or e-mail and is usually invisible to the user but allows checking that a user has viewed the page or e-mail. One common use is in e-mail tracking. Alternative names are Web beacon, tracking bug, tracking pixel, pixel tag, 1×1 gif, and clear gif. Anonymous proxy - why would you want to use it if not for dubious reasons - it is not as secure as you think!
  • 10. Google and Privacy From their privacy policy: “ We use cookies to improve the quality of our service by storing user preferences and tracking user trends, such as how people search. Google also uses cookies in its advertising services to help advertisers and publishers serve and manage ads across the web. We may set a cookie in your browser when you visit a website and view or click on an ad supported by Google’s advertising services.” “ Google reads you (G)mail!” Dig by Microsoft at their rival.
  • 11. Google desktop “ At first I didn't care if Google Desktop was on computers--regardless whether I wanted to use it or not. After I read about version 3, I have been recommending its removal from computers.” Search across computers feature (off by default) Once it indexes your computer, it copies your files; such as word documents, spreadsheets, PDFs, text files, and others; to Google's servers for up to 30 days. Please take a second and let that sink in... It copies your files to their servers! Those files could be anything from a shopping list, to your taxes, to your credit card information, to what ever you have stored on your computer.
  • 12. Action Groups – the good guys? The Future of Privacy Forum www.deepblueinteractive.com/blog/the- future-of-privacy - forum .html Speculation about The Future of Privacy Forum among other companies include that it is a business group attempting to block new government intervention in the advertising business (think Google & Yahoo’s ad fate), still others see it as a slice of a growing attempt to prevent Google from gaining any further influence than it already has. Microsoft in particular has been lobbying in Washington about privacy, a topic it views as Google’s jugular.
  • 13. Thought for the day Survey the surveillance “ A weak government is not a guarantee of freedom. It is a guarantee of chaos that will be followed by tyranny. What we need is a strong government that is totally subject to scrutiny so that every mistake that they make will be pounced upon.” David Brin - Author of "The Transparent Society“ The cameras are getting smaller, the databases are getting more pervasive; the technologies for spying are getting more profound. These things are coming, whether we embrace them or not. If we drive them underground, we'll have no say in how they're used.

Hinweis der Redaktion

  1. Particularly broad!