SlideShare a Scribd company logo
1 of 26
Online Privacy
A Customer’s Perspective
2
Source: https://www.youtube.com/watch?v=vVTKHI5ovyc
In the last 7 years
3
4
Source: http://www.slideshare.net/kumar641/presentation-to-tp-forum-sep-2007
3 lessons
• Privacy is in the details- how do you deal with
exceptions and false positives?
• Institutionalise privacy protection
• In a high-trust environment, the more you
speak about privacy protection, the more
nervous people get about privacy
5
But trust is rapidly eroding
6
And is actually worse in reality
7
Source: http://www.theguardian.com/world/interactive/2013/jul/31/nsa-xkeyscore-program-full-presentation
Pervasive, ubiquitous surveillance
8
Source: http://www.theguardian.com/world/interactive/2013/jul/31/nsa-xkeyscore-program-full-presentation
Pervasive, ubiquitous surveillance
9
Conspiracy theories natural
10
Source: http://www.nbr.co.nz/article/dictators-guide-internet-how-balkanize-dirty-web-ck-143819
The Dictator’s Guide to the Internet: How to Balkanize the Dirty Web
Ian Apperley in the National Business Review
Major online service providers
also under scrutiny
11
Source: http://www.metafilter.com/95152/Userdriven-discontent#3256046
12
Source: http://www.ideachampions.com/weblogs/archives/2010/06/the_value_of_co_1.shtml
Mandatory notifications?
13
For major security breaches, a good
idea but...
14
1. Anonymity online is a myth
15
2. Take sensible steps
Source: http://mashable.com/2013/04/30/facebook-graph-search-privacy-infographic/
But accept people are human and very
poor at risk evaluation
Excellent read: http://www.schneier.com/essay-155.html
16
3. Consider if you are willing to pay for
privacy. Professionals and businesses
should consider confidentiality and
legal risks.
Source: http://paranoia.dubfire.net/2011/11/two-honest-google-employees-our.html
17
So, what am I doing?
Source: http://romanticactoftheday.blogspot.co.nz/2012/09/your-gold-plated-word.html
1. Talking about the issues
18
Source: http://internetganesha.wordpress.com/
2. Becoming a cypherpunk
19
“An activist advocating widespread use
of strong cryptography as a route to
social and political change”
Source: http://en.wikipedia.org/wiki/Cypherpunk
Source: http://goldenageofgaia.com/2010/12/cypherpunk-the-origin-of-wikileaks/
20
1x 1x
1 million x
Customer’s perspective
21
Don’t be a low
hanging victim
Send sealed letter,
not postcard
Crypto for the masses
• Perceived need
• It has to just work
• No compromise in functionality
• Real security requires end-to-end encryption
22
23
What’s next?
Source: http://my-squidoo-lens.blogspot.co.nz/2010/10/animal-psychology.html
Inspiration from the Bitcoin system
• Decentralised ledgers connected by crypto-
enforced contracts
• Peer-to-peer, irreversible transactions
• 51% agreement = “truth”
• Very low costs, global scale
24
Takeaways
• Design systems and processes for a low or
zero trust environment.
• Customers can take more responsibility and
actions to protect their privacy.
• Cryptography is expected to be increasingly
used online routinely, just like drawing
curtains in the Panopticon.
25
Questions / comments
Vikram Kumar
CEO, Mega Ltd.
Email: vikram@mega.co.nz
Twitter: @vikram_nz
26

More Related Content

Viewers also liked (8)

Osdc 2013 p
Osdc 2013 pOsdc 2013 p
Osdc 2013 p
 
Stepping Up conference 2013
Stepping Up conference 2013Stepping Up conference 2013
Stepping Up conference 2013
 
Cloud Computing 101
Cloud Computing 101Cloud Computing 101
Cloud Computing 101
 
Bitcoins and Altcoins: Privacy in a decentralised world
Bitcoins and Altcoins: Privacy in a decentralised worldBitcoins and Altcoins: Privacy in a decentralised world
Bitcoins and Altcoins: Privacy in a decentralised world
 
Paradigm shift: from the bitcoin Blockchain to Networked Computing
Paradigm shift: from the bitcoin Blockchain to Networked ComputingParadigm shift: from the bitcoin Blockchain to Networked Computing
Paradigm shift: from the bitcoin Blockchain to Networked Computing
 
The time is now for the Internet of Things
The time is now for the Internet of ThingsThe time is now for the Internet of Things
The time is now for the Internet of Things
 
Internet Thinking (for 'real' companies)
Internet Thinking (for 'real' companies)Internet Thinking (for 'real' companies)
Internet Thinking (for 'real' companies)
 
IoT, Fog Computing and the Blockchain
IoT, Fog Computing and the BlockchainIoT, Fog Computing and the Blockchain
IoT, Fog Computing and the Blockchain
 

Similar to Online Privacy: A Customer's Perspective

OpenCongress.tw - 工作坊簡報
OpenCongress.tw - 工作坊簡報OpenCongress.tw - 工作坊簡報
OpenCongress.tw - 工作坊簡報
Charles Chuang
 
COURSE MATERIAL to choose fromUSE ATLEAST 6 MINIMUM FOR REFER.docx
COURSE MATERIAL to choose fromUSE ATLEAST 6 MINIMUM FOR REFER.docxCOURSE MATERIAL to choose fromUSE ATLEAST 6 MINIMUM FOR REFER.docx
COURSE MATERIAL to choose fromUSE ATLEAST 6 MINIMUM FOR REFER.docx
marilucorr
 
Networked Learning for Collaboration, Creativity and Communication
Networked Learning for Collaboration, Creativity and CommunicationNetworked Learning for Collaboration, Creativity and Communication
Networked Learning for Collaboration, Creativity and Communication
Jeremy Brueck
 
BYOD & Social Media: The Risks and Benefits for Education
BYOD & Social Media: The Risks and Benefits for EducationBYOD & Social Media: The Risks and Benefits for Education
BYOD & Social Media: The Risks and Benefits for Education
Bloxx
 
FINAL presentationMay2016
FINAL presentationMay2016FINAL presentationMay2016
FINAL presentationMay2016
Melissa Krasnow
 

Similar to Online Privacy: A Customer's Perspective (20)

I am the Cavalry (The Cavalry Is Us) Sourceconf September 2015
I am the Cavalry (The Cavalry Is Us) Sourceconf September 2015I am the Cavalry (The Cavalry Is Us) Sourceconf September 2015
I am the Cavalry (The Cavalry Is Us) Sourceconf September 2015
 
Privacy. Winter School on “Topics in Digital Trust”. IIT Bombay
Privacy. Winter School on “Topics in Digital Trust”. IIT BombayPrivacy. Winter School on “Topics in Digital Trust”. IIT Bombay
Privacy. Winter School on “Topics in Digital Trust”. IIT Bombay
 
Appreciating Contradications: The Cyberpsychology of Information Security
Appreciating Contradications: The Cyberpsychology of Information SecurityAppreciating Contradications: The Cyberpsychology of Information Security
Appreciating Contradications: The Cyberpsychology of Information Security
 
How Blockchain Is Impacting Business Right Now - Amy Neumann Power Hour CLE A...
How Blockchain Is Impacting Business Right Now - Amy Neumann Power Hour CLE A...How Blockchain Is Impacting Business Right Now - Amy Neumann Power Hour CLE A...
How Blockchain Is Impacting Business Right Now - Amy Neumann Power Hour CLE A...
 
ER&L 2023 - Invisible Threat, Cybercrime and the Library.pptx
ER&L 2023 - Invisible Threat, Cybercrime and the Library.pptxER&L 2023 - Invisible Threat, Cybercrime and the Library.pptx
ER&L 2023 - Invisible Threat, Cybercrime and the Library.pptx
 
Implementing Blockchain applications in healthcare
Implementing Blockchain applications in healthcareImplementing Blockchain applications in healthcare
Implementing Blockchain applications in healthcare
 
Top tips for protecting your business online Oct 13
Top tips for protecting your business online Oct 13Top tips for protecting your business online Oct 13
Top tips for protecting your business online Oct 13
 
OpenCongress.tw - 工作坊簡報
OpenCongress.tw - 工作坊簡報OpenCongress.tw - 工作坊簡報
OpenCongress.tw - 工作坊簡報
 
COURSE MATERIAL to choose fromUSE ATLEAST 6 MINIMUM FOR REFER.docx
COURSE MATERIAL to choose fromUSE ATLEAST 6 MINIMUM FOR REFER.docxCOURSE MATERIAL to choose fromUSE ATLEAST 6 MINIMUM FOR REFER.docx
COURSE MATERIAL to choose fromUSE ATLEAST 6 MINIMUM FOR REFER.docx
 
Networked Learning for Collaboration, Creativity and Communication
Networked Learning for Collaboration, Creativity and CommunicationNetworked Learning for Collaboration, Creativity and Communication
Networked Learning for Collaboration, Creativity and Communication
 
Thesis Proposal Piwowar Presentation 20091109
Thesis Proposal Piwowar Presentation 20091109Thesis Proposal Piwowar Presentation 20091109
Thesis Proposal Piwowar Presentation 20091109
 
Strategic Planning for Networks
Strategic Planning for NetworksStrategic Planning for Networks
Strategic Planning for Networks
 
Privacy-Preserving Authentication, Another Reason to Care about Zero-Knowledg...
Privacy-Preserving Authentication, Another Reason to Care about Zero-Knowledg...Privacy-Preserving Authentication, Another Reason to Care about Zero-Knowledg...
Privacy-Preserving Authentication, Another Reason to Care about Zero-Knowledg...
 
BYOD and Social Media in Education
BYOD and Social Media in EducationBYOD and Social Media in Education
BYOD and Social Media in Education
 
BYOD & Social Media: The Risks and Benefits for Education
BYOD & Social Media: The Risks and Benefits for EducationBYOD & Social Media: The Risks and Benefits for Education
BYOD & Social Media: The Risks and Benefits for Education
 
FINAL presentationMay2016
FINAL presentationMay2016FINAL presentationMay2016
FINAL presentationMay2016
 
HKU Data Curation MLIM7350 Class 7
HKU Data Curation MLIM7350 Class 7HKU Data Curation MLIM7350 Class 7
HKU Data Curation MLIM7350 Class 7
 
Millennial Disruption Insights 2015
Millennial Disruption Insights 2015Millennial Disruption Insights 2015
Millennial Disruption Insights 2015
 
Winning on Trust
Winning on TrustWinning on Trust
Winning on Trust
 
Learning in Networks of Knowledge
Learning in Networks of KnowledgeLearning in Networks of Knowledge
Learning in Networks of Knowledge
 

Recently uploaded

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 

Recently uploaded (20)

Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 

Online Privacy: A Customer's Perspective