SlideShare ist ein Scribd-Unternehmen logo
1 von 18
SECURITY & PRIVACY
Gary Trimnell – Technical Director
TOP TECH
OLD TECH?
“Artificial intelligence requires computer power in the same
way that aircraft require horsepower”
- Hans Moravec
WHY NOW?
Advancements
Affordability
Accessibility
2020
200
million
VR Headsets
10
million
Driverless Cars
400
million
Wearables
2020
50 BILLION
Connected Devices
SECURITY & PRIVACY
Why worry?
What needs to be done to protect our data?
How can we stay informed ?
Who’s responsibility?
MORE DATA
44 trillion gigabytes of data by 2020
1.7 megabytes per second per human being on the planet
DISCONNECT THE CONNECTED
Complexity = Code = Bugs
TRANSPORT
TOYS
CRIME AS A SERVICE
Hacking made easy; for kids for fun.
RULES AND RATINGS
ADVOCACY
CONSUMERS, DEVELOPERS & VENDORS
Greater transparency
Invest more in security
Culture shift
Secure by design
MACHINE V MACHINE
“Whereas the short-term impact of AI depends on who
controls it, the long-term impact depends on whether it can
be controlled at all”
- Stephen Hawking
SXSW IS…
the perfect balance of the possible & practical.
THANKS.
gary@e3.co.uk

Weitere ähnliche Inhalte

Was ist angesagt?

Was ist angesagt? (20)

On the Horizon: Tech Trends for 2018
On the Horizon: Tech Trends for 2018On the Horizon: Tech Trends for 2018
On the Horizon: Tech Trends for 2018
 
AI for Telcos
AI for TelcosAI for Telcos
AI for Telcos
 
Sensorflare at Open Coffee Athens LXX - IoT (Feb 27, 2015)
Sensorflare at Open Coffee Athens LXX - IoT (Feb 27, 2015)Sensorflare at Open Coffee Athens LXX - IoT (Feb 27, 2015)
Sensorflare at Open Coffee Athens LXX - IoT (Feb 27, 2015)
 
The Future of the Internet of Things
The Future of the Internet of Things The Future of the Internet of Things
The Future of the Internet of Things
 
Mario Munich at AI Frontiers : Consumer robotics: embedding affordable AI in ...
Mario Munich at AI Frontiers : Consumer robotics: embedding affordable AI in ...Mario Munich at AI Frontiers : Consumer robotics: embedding affordable AI in ...
Mario Munich at AI Frontiers : Consumer robotics: embedding affordable AI in ...
 
Perspectives of Telecommunications in CALA - ECI Telecom - 20/10/2016
Perspectives of Telecommunications in CALA - ECI Telecom - 20/10/2016Perspectives of Telecommunications in CALA - ECI Telecom - 20/10/2016
Perspectives of Telecommunications in CALA - ECI Telecom - 20/10/2016
 
When the Internet of Things becomes the Security of Things
When the Internet of Things becomes the Security of ThingsWhen the Internet of Things becomes the Security of Things
When the Internet of Things becomes the Security of Things
 
Iot and Smart Cities by emran
Iot and Smart Cities by emranIot and Smart Cities by emran
Iot and Smart Cities by emran
 
CommunicAsia 2016 Daily - Day 3 (June 2, 2016)
CommunicAsia 2016 Daily - Day 3 (June 2, 2016)CommunicAsia 2016 Daily - Day 3 (June 2, 2016)
CommunicAsia 2016 Daily - Day 3 (June 2, 2016)
 
Future of IOT
Future of IOTFuture of IOT
Future of IOT
 
CII Automotive 4.0 summit 24 September 2020 - RR Dasgupta
CII Automotive 4.0 summit 24 September 2020 - RR DasguptaCII Automotive 4.0 summit 24 September 2020 - RR Dasgupta
CII Automotive 4.0 summit 24 September 2020 - RR Dasgupta
 
Internet of NO things
Internet of NO things Internet of NO things
Internet of NO things
 
Future of IOT
Future of IOTFuture of IOT
Future of IOT
 
Internet of Things (IoT) Past, Present, and Future
Internet of Things (IoT) Past, Present, and FutureInternet of Things (IoT) Past, Present, and Future
Internet of Things (IoT) Past, Present, and Future
 
Internet Of Things Uses & Applications In Various Industries | IOT
Internet Of Things Uses & Applications In Various Industries | IOTInternet Of Things Uses & Applications In Various Industries | IOT
Internet Of Things Uses & Applications In Various Industries | IOT
 
De presentatie van Michel Gulpen tijdens de GDPR-avond.
De presentatie van Michel Gulpen tijdens de GDPR-avond. De presentatie van Michel Gulpen tijdens de GDPR-avond.
De presentatie van Michel Gulpen tijdens de GDPR-avond.
 
Group7midterm 200404081547
Group7midterm 200404081547Group7midterm 200404081547
Group7midterm 200404081547
 
Group 7 (midterm)
Group 7 (midterm)Group 7 (midterm)
Group 7 (midterm)
 
Computer and Video Games
Computer and Video GamesComputer and Video Games
Computer and Video Games
 
Mobile Today: The Landscape and Opportunities for Australian SMB and Entrepre...
Mobile Today: The Landscape and Opportunities for Australian SMB and Entrepre...Mobile Today: The Landscape and Opportunities for Australian SMB and Entrepre...
Mobile Today: The Landscape and Opportunities for Australian SMB and Entrepre...
 

Ähnlich wie Insights from SXSW

Ericsson Technology Review, issue #1, 2016
Ericsson Technology Review, issue #1, 2016Ericsson Technology Review, issue #1, 2016
Ericsson Technology Review, issue #1, 2016
Ericsson
 
Unraveling the Critical Technology Elements: Navigating the Digital Landscape
Unraveling the Critical Technology Elements: Navigating the Digital LandscapeUnraveling the Critical Technology Elements: Navigating the Digital Landscape
Unraveling the Critical Technology Elements: Navigating the Digital Landscape
greendigital
 

Ähnlich wie Insights from SXSW (20)

Security & Privacy Considerations for Advancing Technology
Security & Privacy Considerations for Advancing TechnologySecurity & Privacy Considerations for Advancing Technology
Security & Privacy Considerations for Advancing Technology
 
Ericsson Technology Review, issue #1, 2016
Ericsson Technology Review, issue #1, 2016Ericsson Technology Review, issue #1, 2016
Ericsson Technology Review, issue #1, 2016
 
Ericsson Technology Review: Technology trends 2018 - Five technology trends a...
Ericsson Technology Review: Technology trends 2018 - Five technology trends a...Ericsson Technology Review: Technology trends 2018 - Five technology trends a...
Ericsson Technology Review: Technology trends 2018 - Five technology trends a...
 
The Current and Future State of Internet of Things: Unveiling the Opportunities
The Current and Future State of Internet of Things: Unveiling the OpportunitiesThe Current and Future State of Internet of Things: Unveiling the Opportunities
The Current and Future State of Internet of Things: Unveiling the Opportunities
 
Overview of IoT and Security issues
Overview of IoT and Security issuesOverview of IoT and Security issues
Overview of IoT and Security issues
 
Evolution of Mobile Communication(1G-6G) and IoT
Evolution of Mobile Communication(1G-6G) and IoTEvolution of Mobile Communication(1G-6G) and IoT
Evolution of Mobile Communication(1G-6G) and IoT
 
Digital Ecosystem
Digital EcosystemDigital Ecosystem
Digital Ecosystem
 
The Top 10 Technology Trends Of The 4th Industrial Revolution
The Top 10 Technology Trends Of The 4th Industrial RevolutionThe Top 10 Technology Trends Of The 4th Industrial Revolution
The Top 10 Technology Trends Of The 4th Industrial Revolution
 
Internet of Things
Internet of ThingsInternet of Things
Internet of Things
 
IOTCYBER
IOTCYBERIOTCYBER
IOTCYBER
 
Where 5 g meets iot!!!
Where 5 g meets iot!!!Where 5 g meets iot!!!
Where 5 g meets iot!!!
 
Digital Intox, Digital Detox
Digital Intox, Digital DetoxDigital Intox, Digital Detox
Digital Intox, Digital Detox
 
Imec Masterclass UCLL
Imec Masterclass UCLLImec Masterclass UCLL
Imec Masterclass UCLL
 
What Can We Expect From Upcoming Developments In IoT.pdf
What Can We Expect From Upcoming Developments In IoT.pdfWhat Can We Expect From Upcoming Developments In IoT.pdf
What Can We Expect From Upcoming Developments In IoT.pdf
 
Montclair share preso
Montclair share presoMontclair share preso
Montclair share preso
 
Middle East IoT Workshop
Middle East IoT WorkshopMiddle East IoT Workshop
Middle East IoT Workshop
 
Unraveling the Critical Technology Elements: Navigating the Digital Landscape
Unraveling the Critical Technology Elements: Navigating the Digital LandscapeUnraveling the Critical Technology Elements: Navigating the Digital Landscape
Unraveling the Critical Technology Elements: Navigating the Digital Landscape
 
Internet of Things : Stats and Facts
Internet of Things : Stats and FactsInternet of Things : Stats and Facts
Internet of Things : Stats and Facts
 
SecureMAG vol9
SecureMAG vol9SecureMAG vol9
SecureMAG vol9
 
Emerging trends in computer science and related technologies
Emerging trends in computer science and related technologiesEmerging trends in computer science and related technologies
Emerging trends in computer science and related technologies
 

Mehr von Bristol Media

B2B marketing. B2C marketing. It's all the same isn't it?
B2B marketing. B2C marketing.  It's all the same isn't it?B2B marketing. B2C marketing.  It's all the same isn't it?
B2B marketing. B2C marketing. It's all the same isn't it?
Bristol Media
 

Mehr von Bristol Media (20)

Why creative leaders experience more #WTF moments in the digital age and what...
Why creative leaders experience more #WTF moments in the digital age and what...Why creative leaders experience more #WTF moments in the digital age and what...
Why creative leaders experience more #WTF moments in the digital age and what...
 
VR comes of age. Why VR is relevant now and what it means for the future
VR comes of age. Why VR is relevant now and what it means for the futureVR comes of age. Why VR is relevant now and what it means for the future
VR comes of age. Why VR is relevant now and what it means for the future
 
Braving the way
Braving the wayBraving the way
Braving the way
 
Thriving in a reputation economy. The relevance of your online brand
Thriving in a reputation economy.  The relevance of your online brandThriving in a reputation economy.  The relevance of your online brand
Thriving in a reputation economy. The relevance of your online brand
 
Building compelling experiences for the connected world
Building compelling experiences for the connected worldBuilding compelling experiences for the connected world
Building compelling experiences for the connected world
 
Ten lessons from behavioural science for people in creative service businesses
Ten lessons from behavioural science for people in creative service businessesTen lessons from behavioural science for people in creative service businesses
Ten lessons from behavioural science for people in creative service businesses
 
Getting past the first date. How nurturing creativity together makes a new cl...
Getting past the first date. How nurturing creativity together makes a new cl...Getting past the first date. How nurturing creativity together makes a new cl...
Getting past the first date. How nurturing creativity together makes a new cl...
 
The next wave of innovation in social media
The next wave of innovation in social mediaThe next wave of innovation in social media
The next wave of innovation in social media
 
Making more with what you own
Making more with what you ownMaking more with what you own
Making more with what you own
 
The internet already has too much content. How should creativity respond?
The internet already has too much content. How should creativity respond?The internet already has too much content. How should creativity respond?
The internet already has too much content. How should creativity respond?
 
Leadership in the age of innovation
Leadership in the age of innovationLeadership in the age of innovation
Leadership in the age of innovation
 
How networks keep you healthy in the age of overload
How networks keep you healthy in the age of overloadHow networks keep you healthy in the age of overload
How networks keep you healthy in the age of overload
 
How can profit and purpose go hand in hand?
How can profit and purpose go hand in hand?How can profit and purpose go hand in hand?
How can profit and purpose go hand in hand?
 
Uncorporate - how to grow a ceative business without losing your soul
Uncorporate - how to grow a ceative business without losing your soulUncorporate - how to grow a ceative business without losing your soul
Uncorporate - how to grow a ceative business without losing your soul
 
How the National Trust is transforming - 500 web editors and a five year plan
How the National Trust is transforming - 500 web editors and a five year planHow the National Trust is transforming - 500 web editors and a five year plan
How the National Trust is transforming - 500 web editors and a five year plan
 
Living Services - the third era of digital
Living Services - the third era of digitalLiving Services - the third era of digital
Living Services - the third era of digital
 
Strategy - what the @*%! is it anyway?
Strategy - what the @*%! is it anyway?Strategy - what the @*%! is it anyway?
Strategy - what the @*%! is it anyway?
 
Social Never Sleeps
Social Never SleepsSocial Never Sleeps
Social Never Sleeps
 
How to retain your best clients
How to retain your best clientsHow to retain your best clients
How to retain your best clients
 
B2B marketing. B2C marketing. It's all the same isn't it?
B2B marketing. B2C marketing.  It's all the same isn't it?B2B marketing. B2C marketing.  It's all the same isn't it?
B2B marketing. B2C marketing. It's all the same isn't it?
 

Kürzlich hochgeladen

Kürzlich hochgeladen (20)

VIP Call Girls Dongri WhatsApp +91-9833363713, Full Night Service
VIP Call Girls Dongri WhatsApp +91-9833363713, Full Night ServiceVIP Call Girls Dongri WhatsApp +91-9833363713, Full Night Service
VIP Call Girls Dongri WhatsApp +91-9833363713, Full Night Service
 
Micro-Choices, Max Impact Personalizing Your Journey, One Moment at a Time.pdf
Micro-Choices, Max Impact Personalizing Your Journey, One Moment at a Time.pdfMicro-Choices, Max Impact Personalizing Your Journey, One Moment at a Time.pdf
Micro-Choices, Max Impact Personalizing Your Journey, One Moment at a Time.pdf
 
SALES-PITCH-an-introduction-to-sales.pptx
SALES-PITCH-an-introduction-to-sales.pptxSALES-PITCH-an-introduction-to-sales.pptx
SALES-PITCH-an-introduction-to-sales.pptx
 
Distribution Ad Platform_ The Role of Distribution Ad Network.pdf
Distribution Ad Platform_ The Role of  Distribution Ad Network.pdfDistribution Ad Platform_ The Role of  Distribution Ad Network.pdf
Distribution Ad Platform_ The Role of Distribution Ad Network.pdf
 
How consumers use technology and the impacts on their lives
How consumers use technology and the impacts on their livesHow consumers use technology and the impacts on their lives
How consumers use technology and the impacts on their lives
 
HITECH CITY CALL GIRL IN 9234842891 💞 INDEPENDENT ESCORT SERVICE HITECH CITY
HITECH CITY CALL GIRL IN 9234842891 💞 INDEPENDENT ESCORT SERVICE HITECH CITYHITECH CITY CALL GIRL IN 9234842891 💞 INDEPENDENT ESCORT SERVICE HITECH CITY
HITECH CITY CALL GIRL IN 9234842891 💞 INDEPENDENT ESCORT SERVICE HITECH CITY
 
The 9th May Incident in Pakistan A Turning Point in History.pptx
The 9th May Incident in Pakistan A Turning Point in History.pptxThe 9th May Incident in Pakistan A Turning Point in History.pptx
The 9th May Incident in Pakistan A Turning Point in History.pptx
 
[Expert Panel] New Google Shopping Ads Strategies Uncovered
[Expert Panel] New Google Shopping Ads Strategies Uncovered[Expert Panel] New Google Shopping Ads Strategies Uncovered
[Expert Panel] New Google Shopping Ads Strategies Uncovered
 
Instant Digital Issuance: An Overview With Critical First Touch Best Practices
Instant Digital Issuance: An Overview With Critical First Touch Best PracticesInstant Digital Issuance: An Overview With Critical First Touch Best Practices
Instant Digital Issuance: An Overview With Critical First Touch Best Practices
 
W.H.Bender Quote 61 -Influential restaurant and food service industry network...
W.H.Bender Quote 61 -Influential restaurant and food service industry network...W.H.Bender Quote 61 -Influential restaurant and food service industry network...
W.H.Bender Quote 61 -Influential restaurant and food service industry network...
 
Unveiling the Legacy of the Rosetta stone A Key to Ancient Knowledge.pptx
Unveiling the Legacy of the Rosetta stone A Key to Ancient Knowledge.pptxUnveiling the Legacy of the Rosetta stone A Key to Ancient Knowledge.pptx
Unveiling the Legacy of the Rosetta stone A Key to Ancient Knowledge.pptx
 
Alpha Media March 2024 Buyers Guide.pptx
Alpha Media March 2024 Buyers Guide.pptxAlpha Media March 2024 Buyers Guide.pptx
Alpha Media March 2024 Buyers Guide.pptx
 
10 Email Marketing Best Practices to Increase Engagements, CTR, And ROI
10 Email Marketing Best Practices to Increase Engagements, CTR, And ROI10 Email Marketing Best Practices to Increase Engagements, CTR, And ROI
10 Email Marketing Best Practices to Increase Engagements, CTR, And ROI
 
Discover Ardency Elite: Elevate Your Lifestyle
Discover Ardency Elite: Elevate Your LifestyleDiscover Ardency Elite: Elevate Your Lifestyle
Discover Ardency Elite: Elevate Your Lifestyle
 
Resumé Karina Perez | Digital Strategist
Resumé Karina Perez | Digital StrategistResumé Karina Perez | Digital Strategist
Resumé Karina Perez | Digital Strategist
 
TAM_AdEx-Cross_Media_Report-Banking_Finance_Investment_(BFSI)_2023.pdf
TAM_AdEx-Cross_Media_Report-Banking_Finance_Investment_(BFSI)_2023.pdfTAM_AdEx-Cross_Media_Report-Banking_Finance_Investment_(BFSI)_2023.pdf
TAM_AdEx-Cross_Media_Report-Banking_Finance_Investment_(BFSI)_2023.pdf
 
Cartona.pptx. Marketing how to present your project very well , discussed a...
Cartona.pptx.   Marketing how to present your project very well , discussed a...Cartona.pptx.   Marketing how to present your project very well , discussed a...
Cartona.pptx. Marketing how to present your project very well , discussed a...
 
Social Media Marketing Portfolio - Maharsh Benday
Social Media Marketing Portfolio - Maharsh BendaySocial Media Marketing Portfolio - Maharsh Benday
Social Media Marketing Portfolio - Maharsh Benday
 
HOW TO HANDLE SALES OBJECTIONS | SELLING AND NEGOTIATION
HOW TO HANDLE SALES OBJECTIONS | SELLING AND NEGOTIATIONHOW TO HANDLE SALES OBJECTIONS | SELLING AND NEGOTIATION
HOW TO HANDLE SALES OBJECTIONS | SELLING AND NEGOTIATION
 
2024 Social Trends Report V4 from Later.com
2024 Social Trends Report V4 from Later.com2024 Social Trends Report V4 from Later.com
2024 Social Trends Report V4 from Later.com
 

Insights from SXSW

Hinweis der Redaktion

  1. My name is Gary Trimnell and I am Technical Director for a digital agency called e3. I was really fortunate to be able to attend this years SXSW and as a techie I was of course interested in all of the really cool things that technology can do and how we can push them but am naturally drawn to the practical side. Today I am going to give a really brief overview of the topics of conversation that surrounded security and privacy at this years SXSW.
  2. So without a doubt the hot topics at this years SXSW were: Artificial Intelligence/Machine Learning Virtual Reality Connected Devices , the IoT.
  3. These are not brand new technologies that have only just emerged this year. AI for example was first founded as an academic discipline in the early 1950s. However between then and now there has been a couple of periods coined “AI Winters” where progress almost ground to a halt, this was primarily due to the funding stopping after the results failing to live up to the high expectations, and this was as a result of one fundamental problem, there simply wasn't enough compute power.
  4. So why are these technologies dominating this years SXSW? First and foremost there has been advancements in computing to provide the infrastructure and raw compute power necessary to process the vast amount of complex structured and unstructured data at scale which simply didn’t exist 50 years ago. Secondly the ubiquity of mobile devices in the modern age has driven the commoditisation of the technology that VR and IoT rely on such as High Definition screens, GPRS, Accelerometers making products more affordable. And finally there are a wealth of services being made available from companies like Google, Microsoft, IBM to allow the mass development community significantly lowering the barrier to entry and this is why we are seeing an explosion in there areas.
  5. And this is set to grow exponentially! By 2020 some are estimating that we will see …
  6. In total we could see anywhere up to 50 Billion Connected devices a little over 7 x the total world population This is 50 Billion devices that will be collecting information about us 50 billion potentially unsecure devices 99% of which could be completely unregulated
  7. With these sorts of predictions it isn’t hard to see why the other overarching key topic at SXSW was Security and Privacy. The key questions up for debate were : Why is Security important? How can we better protect our data? And who’s responsible.
  8. So why worry ,why does it need our attention? First and foremost we will continue to collecting and storing more and more personal information about ourseleves. The more data we collect the more we need to look at how to protect it.
  9. Products will get more complicated as more features are added to them. More complexity a piece of software is = more code = This in turn makes harder to maintain and secure. To put this into context the average iPhone APP will contain around 50,000 to 100,000 lines of code The modern high end car contains anywhere up to 100,000,000 lines of code Looking to the future of the fully autonomous car this will require a substantial amount more code to function. One way to mitigate this a little is to disconnect the connected devices: We will see the emergence of new protocols aimed at IoT that will allow connected devices to talk directly to each other without the need for them all to be directly attached to the WiFi network. Products also need to be developed so that individual features are isolated from each where they have no direct dependencies on each other.
  10. A couple of recent examples highlight this nesccesaity: Back in may 2015 a security researcher claimed to have taken control of some systems on board a United Airlines passenger plane he was on, getting as far as issuing a command that briefly changed the course of the plane. Another pair of hackers caused aJeep to crash in July 2015 by accessing. In both scenarios they claimed to have accessed critical controls via non dependant entertainment systems.
  11. Hello Barbie is another example hackers claimed they were able to get access to personal information through the toy. Use the microphone as surveillance device. And access the home Wi-Fi network and from there gain access to other internet connected devices in the house. What these examples do also do is highlight that the impact of someone gaining unauthorised access to these systems and devices in the future could have a far greater impact than being able to access some data.
  12. And now the ability to attack systems is being made easier than ever. A security expert called Adam Tyler gave a talk at SXSW in which he demonstrated just how easy this was and that ther has been a rise in these type of services being made available. He found a site through a simple search and within minutes created a ransomware bot by completing a simple form , ready for distribution. He also went on to say that you expect hacking to be carried out by highly intelligent experienced developers, in actual fact because the hardwork has been done and provided as a service, it is being carried out by children, for fun. There are currently 1 million new malicious software threats created daily , this number is only going to increase.
  13. What can we do to regulate and better inform consumers. Many of the clients that I work with expect us as an agency to have certain levels of accreditation like ISO 27001 and Cyber Essentials, to give them confidence that we have the necessary process and controls in place to manage information security. I think consumers will also become more savvy and look out for certain stamps of approval in the same way to distinguish products that have been more rigoursly tested. Biggest will be regulations that could have a financial impact, like EU General Data Protection Regulation will encourage vendors to consider security more when faced with a potential significant fine. And we could also see the introduction of self propagating rating system’s for IoT as we have seen in different sectors like SOLD Secure rating for locks. This will of course be driven by the market.
  14. What we will see more of is forums from which to discuss security concerns as they emerge driven by businesses, security experts and consumers alike. The IoT Security foundation was set-up at the end of last year and they are doing just that, they are an international, not-for profit, vendor neutral organisation. The their aim is to share best practice in order drive awareness and advocacy for the important issues surrounding the IoT and Security in order to raise user confidence and accelerate adoption.
  15. Lastly there was lots of debate at SXSW around who is responsible for security, ultimately this is the responsibility of everyone. Vendors will need to become more transparent about how consumer data is being used, what is being collected and how it will be secured in a clear and concise manner and not hidden with a 3000 word privacy policy , this will allow consumers to make more informed decisions on the risk versus reward. Nest do this really well, and they encourage consumers, developers and researchers to work with them to alert them if they find any vulnerabilities, supported by Googles vulnerability Reward Programme. We will see a culture shift in the way that many vendors operate to think more like a software agency and work closely with third party security experts to avoid PR disasters and invest more time and money into security to ensure that the products that they create are “Secure by design”.
  16. Is it inevitably in the long term that we will have to rely on research fields such as adversarial machine learning which sits at the intersection between machine learning and computer security. Applying these techniques to IoT to process the vast amount of data to determining safe device behaviour and general usage patterns, which can help to spot and block abnormal activity and potentially harmful behaviour in realtime. Eventually the responsibility may need to the machine thenselves shift to the machine themselves.
  17. SXSX confirmed that these technologies have the capability of significantly enhancing our lives but could also make it a whole lot harder which is why security & privacy cannot be sacrificed in the process, and this is why I think Security & Privacy will continue to be top of the agenda at next years SXSW.