Diese Präsentation wurde erfolgreich gemeldet.
Die SlideShare-Präsentation wird heruntergeladen. ×

We're Being Owned: Why We Must Take Control of Our Online Identities

Anzeige
Anzeige
Anzeige
Anzeige
Anzeige
Anzeige
Anzeige
Anzeige
Anzeige
Anzeige
Anzeige
Anzeige
Wird geladen in …3
×

Hier ansehen

1 von 13 Anzeige

We're Being Owned: Why We Must Take Control of Our Online Identities

Herunterladen, um offline zu lesen

Jim Flynn's TED Talk at TEDx Amherst 2019 about online identity and privacy. He discusses the dangers of letting private companies claim our identities and behavioral data, and then use that data to influence us in the service of some other party's economic or political interests.

Jim Flynn's TED Talk at TEDx Amherst 2019 about online identity and privacy. He discusses the dangers of letting private companies claim our identities and behavioral data, and then use that data to influence us in the service of some other party's economic or political interests.

Anzeige
Anzeige

Weitere Verwandte Inhalte

Aktuellste (20)

Anzeige

We're Being Owned: Why We Must Take Control of Our Online Identities

  1. 1. “We're Being Owned: Why We Must Take Control of Our Online Identities” By Jim Flynn https://www.youtube.com/watch?v=CddSSRNR7u0 https://jamespflynn.com https://www.tedxamherst.org April 7, 2019
  2. 2. KUWA “To be” in Swahili You must be a unique human.
  3. 3. ...a global, perpetual, nonrevocable and sublicensable license…
  4. 4. Contract Law
  5. 5. Attributes Behavior AI Make money selling predictions Your Digital Self Influence
  6. 6. Shown to 61M US Voters in 2010 Resulted in 238K additional votes From Bond, et al in Nature at https://www.nature.com/articles/nature11421
  7. 7. Buy a beer Driver’s License Photo, name, address, DOB, eye color, height, etc. Get on a lift Profile Photo, name, Address, DOB, etc. Your Digital Self Credit History Wellness Location
  8. 8. Buy a beer Cryptographic proof that you are over 21 Get on a ski lift Cryptographic proof that you have a pass There is no linkage between the proofs. Self-Sovereign Identity
  9. 9. Individual Sovereignty What’s disclosed How it’s used Right to delete it Right to move it
  10. 10. It’s inevitable. There’s too much money involved. Innovation! They consented!
  11. 11. See the video at: https://www.youtube.com/watch?v=CddSSRNR7u0

×