SlideShare a Scribd company logo
1 of 20
Download to read offline
Who will control the
Next Billion? – A Case
of Chat Apps from Asia
(or Why I think it’s important to help improve data protection in East
Asia if you really care about personal data of the internet Next Billion)

@bact
Arthit Suriyawongkul
Thai Netizen Network

Silicon Valley, 4 March 2014
Lead to Summary
●

Mobile chat apps are now everywhere in East
and Southeast Asia
–
–

●

becomes a mobile identity – provides authentication service for 3rd party apps
mobile social network platform – built for mobile from day one (unlike Facebook)

These “chat apps” grow globally fast
–
–

●

manufacturing influence (bundled to mobile handsets)
“soft-power” cultural influence (K-Pop, J-Pop, Manga)

Data of the mobile Next Billion will be more
transmitted to/processed in East Asia
Summary
●

●

Data will no longer concentrated in US/Europe,
so should the attention of data protection too?
Human rights standards so vary in other parts of
the world and the protection may not cross-border
–

●

e.g. ASEAN Human Rights Declaration

Privacy/cyber-security laws of East Asian
jurisdictions will affect more people globally
–

your communication data and personal data could be one day regulated by Chinese law

–

through monetary and educational assistants, China and Japan already have influence
in SE Asia cyber-security policy
The Apps and
the Culture
All the Communications and Sharing
(Group) Chat, Voice/Video Call, Media/Location Sharing, GAMES, AUTHEN/IDENTITY
Plus Cute Characters (Stickers)

Where’s my sticker shop on ChatSecure and Cryptocat? :p
Asian People Love It
How Big They Are Now?
Chat App
WhatsApp

Country
of Origin
US

Number of
Users
400M

Line

Japan

300M
(50M in Japan)

WeChat

China

300M
(200M in China)

KakaoTalk

Korea

130M

ChatON

Korea

100M
Growth Trends
●

●

●

●

“Line, WeChat: Asian social networks move to
conquer Europe” – AFP (29 Sep 2013)
“How WeChat, Line plan to taken on Facebook,
Skype” – The Times of India (30 Sep 2013)
“Asian Messaging Apps WeChat and Line Challenge
Silicon Valley. China’s WeChat and Japan’s Line Are
Threatening the Global Growth of WhatsApp and
Facebook.” – The Wall Street Journal (9 Oct 2013)
… and the Facebook’s WhatsApp deal recently
Where is the Next Billion?
●

Mobile internet users in Africa, China, South
America, South Asia and Southeast Asia
The Control
Protections Across Borders
“We want LINE Corp. to be the the first line of
surveillance and send us any ‘suspicious’ activity
on their app.” – Technology Crime Suppression
Division, Royal Thai Police (2013)
LINE Corp. in Japan said there’s no official
request from Thai Police. Any request for personal
data should be done under Japanese law.
http://advocacy.globalvoicesonline.org/2013/08/19/thailand-wants-to-monitor-conversations-on-line-app/
http://www.telecomasia.net/content/naver-denies-collaborating-thai-govt
Violations Across Borders
●

●

●

●

●

Some Chinese keywords got
censored in LINE
Study from Citizen Lab found
regionally-based Keyword
Censorship in LINE
LINE in China operated by a
Chinese company
Censorship follows user,
go across borders
https://citizenlab.org/2013/11/asia-chats-investigating-regionally-ba
sed-keyword-censorship-line/
Assumption (That Not Goes)
Across Borders
●

LINE did no encryption on 2G/3G network

●

Metadata and entire conversations in plain text

●

●

With small changes in data request string, can
pull historical chat logs up to two months old.
Made a wrong assumption that the 2G/3G
network is already secure (in many countries, it’s
not)

●

http://www.telecomasia.net/blog/content/line-vulnerable-man-middle-attack

●

https://citizenlab.org/2013/11/asia-chats-analyzing-information-controls-privacy-asian-messaging-applications/
Who will control the Next Billion?
●

●

●

●

South Korea, Japan, China, and Taiwan are
exporters of popular IT apps and devices. These
countries have huge influence in Southeast Asia
and emerging markets.
Political, economical, and/or cultural.
LINE is based in Japan. A subsidiary of a South
Korean company. LINE China (“Lianwo”) is
operated by a Chinese licensee.
WeChat (“Weixin”) is based in China.
Japan/China Influences on
Cyberpolicy (tech/law) in SE Asia
●
●

●
●

●
●

Japan-ASEAN Information Security Policy Meeting
Japan-ASEAN Ministerial Policy Meeting on Cyber
Security Cooperation
ASEAN Smart Network Initiative
ASEAN-Japan Joint Information Security Awareness
Raising Initiatives
China-ASEAN Defence Ministers' Meeting
ASEAN-China Information Superhighway Working
Group
Asian values in your pocket
●

●

●

●

As these chat apps/social network are growing, more data
will be transmitted to, stored and processed in East Asia.
“Asian values” embedded in these countries’ information
laws will play more role in information freedom globally.
Often times, in these countries, companies
cooperate/collaborate with authority. No Transparency
Report. Communication protocol is not open. Everything is
behind the door.
Asian values? From Japan? From South Korea? From
China? From where?
What We Can Do?
Together, we can do more of this
EFF’s “Who's Doing What?” (Tech)

EFF’s “Who Has Your Back?” (Law)

and this...

?????
?????
?????

?????
?????
@bact
Arthit Suriyawongkul
Thai Netizen Network
arthit@thainetizen.org
●

Parts of this presentation was presented at
●

Regional Consultation on Freedom of Expression for Civil
Liberties in Asia (22 Nov 2013, Bangkok)

●

●

●

CNXP (6 Dec 2013, Chiang Mai)
FOSSASIA (1 Mar 2014, Phnom Penh)

Thanks for all the comments from those forums and social media.

More Related Content

Viewers also liked

A survey on cyber law
A survey on cyber lawA survey on cyber law
A survey on cyber lawSantosh Panda
 
Global Cyber-Laws and E-Commerce & Strategic Implication for E-Commerce
Global Cyber-Laws and E-Commerce & Strategic Implication for E-CommerceGlobal Cyber-Laws and E-Commerce & Strategic Implication for E-Commerce
Global Cyber-Laws and E-Commerce & Strategic Implication for E-Commercewelcometofacebook
 
The cyber law regime in India
The cyber law regime in IndiaThe cyber law regime in India
The cyber law regime in IndiaShankey Gupta
 
Cybercrime Legislation in the Middle East
Cybercrime Legislation in the Middle EastCybercrime Legislation in the Middle East
Cybercrime Legislation in the Middle EastMohamed N. El-Guindy
 
Legal aspects of handling cyber frauds
Legal aspects of handling cyber fraudsLegal aspects of handling cyber frauds
Legal aspects of handling cyber fraudsSagar Rahurkar
 
Introduction to Cyber law (IT Act 2000)
Introduction to Cyber law (IT Act 2000)Introduction to Cyber law (IT Act 2000)
Introduction to Cyber law (IT Act 2000)Ambar Deo
 
Hacking - Cyber Crimes and Cyber Laws - Information Technology ACT 2000
Hacking - Cyber Crimes and Cyber Laws - Information Technology ACT 2000Hacking - Cyber Crimes and Cyber Laws - Information Technology ACT 2000
Hacking - Cyber Crimes and Cyber Laws - Information Technology ACT 2000Jyotindra Zaveri
 
cyber crime & cyber law
cyber crime & cyber lawcyber crime & cyber law
cyber crime & cyber lawhimanshumunjal
 
An Introduction to Cyber Law - I.T. Act 2000 (India)
An Introduction to Cyber Law - I.T. Act 2000 (India)An Introduction to Cyber Law - I.T. Act 2000 (India)
An Introduction to Cyber Law - I.T. Act 2000 (India)Chetan Bharadwaj
 
Information technology act 2000
Information technology act 2000Information technology act 2000
Information technology act 2000Akash Varaiya
 
Cybercrime.ppt
Cybercrime.pptCybercrime.ppt
Cybercrime.pptAeman Khan
 

Viewers also liked (15)

A survey on cyber law
A survey on cyber lawA survey on cyber law
A survey on cyber law
 
Global Cyber-Laws and E-Commerce & Strategic Implication for E-Commerce
Global Cyber-Laws and E-Commerce & Strategic Implication for E-CommerceGlobal Cyber-Laws and E-Commerce & Strategic Implication for E-Commerce
Global Cyber-Laws and E-Commerce & Strategic Implication for E-Commerce
 
The cyber law regime in India
The cyber law regime in IndiaThe cyber law regime in India
The cyber law regime in India
 
Cybercrime Legislation in the Middle East
Cybercrime Legislation in the Middle EastCybercrime Legislation in the Middle East
Cybercrime Legislation in the Middle East
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Legal aspects of handling cyber frauds
Legal aspects of handling cyber fraudsLegal aspects of handling cyber frauds
Legal aspects of handling cyber frauds
 
Introduction to Cyber law (IT Act 2000)
Introduction to Cyber law (IT Act 2000)Introduction to Cyber law (IT Act 2000)
Introduction to Cyber law (IT Act 2000)
 
Intellectual property
Intellectual propertyIntellectual property
Intellectual property
 
Hacking - Cyber Crimes and Cyber Laws - Information Technology ACT 2000
Hacking - Cyber Crimes and Cyber Laws - Information Technology ACT 2000Hacking - Cyber Crimes and Cyber Laws - Information Technology ACT 2000
Hacking - Cyber Crimes and Cyber Laws - Information Technology ACT 2000
 
Cyber law-it-act-2000
Cyber law-it-act-2000Cyber law-it-act-2000
Cyber law-it-act-2000
 
Cyber Law
Cyber  LawCyber  Law
Cyber Law
 
cyber crime & cyber law
cyber crime & cyber lawcyber crime & cyber law
cyber crime & cyber law
 
An Introduction to Cyber Law - I.T. Act 2000 (India)
An Introduction to Cyber Law - I.T. Act 2000 (India)An Introduction to Cyber Law - I.T. Act 2000 (India)
An Introduction to Cyber Law - I.T. Act 2000 (India)
 
Information technology act 2000
Information technology act 2000Information technology act 2000
Information technology act 2000
 
Cybercrime.ppt
Cybercrime.pptCybercrime.ppt
Cybercrime.ppt
 

Similar to Who will control the Next Billion? – A Case of Chat Apps from Asia (#RightsCon 2014)

Digital Innovations in Asia by Mark Inkster
Digital Innovations in Asia by Mark InksterDigital Innovations in Asia by Mark Inkster
Digital Innovations in Asia by Mark InksterThe Digital Insurer
 
China & Japan: Influencing our future
China & Japan: Influencing our futureChina & Japan: Influencing our future
China & Japan: Influencing our futureNigelG
 
Internet Society Update
Internet Society UpdateInternet Society Update
Internet Society UpdateAPNIC
 
ebusiness Strategy in Entrepreneurship 1: Pedro Eloy at SMECC - 20130806
ebusiness Strategy in Entrepreneurship 1: Pedro Eloy at SMECC - 20130806ebusiness Strategy in Entrepreneurship 1: Pedro Eloy at SMECC - 20130806
ebusiness Strategy in Entrepreneurship 1: Pedro Eloy at SMECC - 20130806smecchk
 
Sigit policy framework on public sector social media utilization- moving fo...
Sigit   policy framework on public sector social media utilization- moving fo...Sigit   policy framework on public sector social media utilization- moving fo...
Sigit policy framework on public sector social media utilization- moving fo...Sigit Puspito Wigati Jarot
 
Sigit policy framework on public sector social media utilization- moving fo...
Sigit   policy framework on public sector social media utilization- moving fo...Sigit   policy framework on public sector social media utilization- moving fo...
Sigit policy framework on public sector social media utilization- moving fo...Sigit Puspito Wigati Jarot
 
Mobile Southeast Asia Report 2012
Mobile Southeast Asia Report 2012Mobile Southeast Asia Report 2012
Mobile Southeast Asia Report 2012WiseKnow Thailand
 
[2014 q2q3umeng insight] China’s Mobile Internet:Further Segmentation and Ver...
[2014 q2q3umeng insight] China’s Mobile Internet:Further Segmentation and Ver...[2014 q2q3umeng insight] China’s Mobile Internet:Further Segmentation and Ver...
[2014 q2q3umeng insight] China’s Mobile Internet:Further Segmentation and Ver...Umeng
 
2014 q2q3umeng insight_report_en
2014 q2q3umeng insight_report_en2014 q2q3umeng insight_report_en
2014 q2q3umeng insight_report_enUmeng
 
Digital Asia – ASEAN in ascendence. Team Finland Future Watch Report, May 2016
Digital Asia – ASEAN in ascendence. Team Finland Future Watch Report, May 2016Digital Asia – ASEAN in ascendence. Team Finland Future Watch Report, May 2016
Digital Asia – ASEAN in ascendence. Team Finland Future Watch Report, May 2016Didar Kaitasalo
 
Digital Asia – ASEAN in ascendence. Team Finland Future Watch Report, May 2016
Digital Asia – ASEAN in ascendence. Team Finland Future Watch Report, May 2016Digital Asia – ASEAN in ascendence. Team Finland Future Watch Report, May 2016
Digital Asia – ASEAN in ascendence. Team Finland Future Watch Report, May 2016Team Finland Future Watch
 
Threading it all together – Q2 Tech Trends
Threading it all together – Q2 Tech TrendsThreading it all together – Q2 Tech Trends
Threading it all together – Q2 Tech TrendsKatie Harbath
 
The interpretation of the relationship among big data, IoT and smart city - C...
The interpretation of the relationship among big data, IoT and smart city - C...The interpretation of the relationship among big data, IoT and smart city - C...
The interpretation of the relationship among big data, IoT and smart city - C...Antenna Manufacturer Coco
 
Why tech-giants move their outsourcing operations to Vietnam- whitepaper
Why tech-giants move their outsourcing operations to Vietnam- whitepaperWhy tech-giants move their outsourcing operations to Vietnam- whitepaper
Why tech-giants move their outsourcing operations to Vietnam- whitepaperTMA Solutions
 
2013 Umeng Insight Report
2013 Umeng Insight Report2013 Umeng Insight Report
2013 Umeng Insight ReportUmeng
 
China Mobile Internet 2013 Overview (Umeng)
China Mobile Internet 2013 Overview (Umeng)China Mobile Internet 2013 Overview (Umeng)
China Mobile Internet 2013 Overview (Umeng)Hubery Zhou
 
Internet Governance & Digital Rights by Waihiga K. Muturi, Rtn..pdf
Internet Governance & Digital Rights by Waihiga K. Muturi, Rtn..pdfInternet Governance & Digital Rights by Waihiga K. Muturi, Rtn..pdf
Internet Governance & Digital Rights by Waihiga K. Muturi, Rtn..pdfWAIHIGA K.MUTURI
 
WeChat, the shape of the connected China
WeChat, the shape of the connected ChinaWeChat, the shape of the connected China
WeChat, the shape of the connected ChinaFabernovel
 

Similar to Who will control the Next Billion? – A Case of Chat Apps from Asia (#RightsCon 2014) (20)

Digital Innovations in Asia by Mark Inkster
Digital Innovations in Asia by Mark InksterDigital Innovations in Asia by Mark Inkster
Digital Innovations in Asia by Mark Inkster
 
China & Japan: Influencing our future
China & Japan: Influencing our futureChina & Japan: Influencing our future
China & Japan: Influencing our future
 
Internet Society Update
Internet Society UpdateInternet Society Update
Internet Society Update
 
ebusiness Strategy in Entrepreneurship 1: Pedro Eloy at SMECC - 20130806
ebusiness Strategy in Entrepreneurship 1: Pedro Eloy at SMECC - 20130806ebusiness Strategy in Entrepreneurship 1: Pedro Eloy at SMECC - 20130806
ebusiness Strategy in Entrepreneurship 1: Pedro Eloy at SMECC - 20130806
 
Sigit policy framework on public sector social media utilization- moving fo...
Sigit   policy framework on public sector social media utilization- moving fo...Sigit   policy framework on public sector social media utilization- moving fo...
Sigit policy framework on public sector social media utilization- moving fo...
 
Sigit policy framework on public sector social media utilization- moving fo...
Sigit   policy framework on public sector social media utilization- moving fo...Sigit   policy framework on public sector social media utilization- moving fo...
Sigit policy framework on public sector social media utilization- moving fo...
 
Mobile Southeast Asia Report 2012
Mobile Southeast Asia Report 2012Mobile Southeast Asia Report 2012
Mobile Southeast Asia Report 2012
 
[2014 q2q3umeng insight] China’s Mobile Internet:Further Segmentation and Ver...
[2014 q2q3umeng insight] China’s Mobile Internet:Further Segmentation and Ver...[2014 q2q3umeng insight] China’s Mobile Internet:Further Segmentation and Ver...
[2014 q2q3umeng insight] China’s Mobile Internet:Further Segmentation and Ver...
 
2014 q2q3umeng insight_report_en
2014 q2q3umeng insight_report_en2014 q2q3umeng insight_report_en
2014 q2q3umeng insight_report_en
 
Going Mobile
Going MobileGoing Mobile
Going Mobile
 
Digital Asia – ASEAN in ascendence. Team Finland Future Watch Report, May 2016
Digital Asia – ASEAN in ascendence. Team Finland Future Watch Report, May 2016Digital Asia – ASEAN in ascendence. Team Finland Future Watch Report, May 2016
Digital Asia – ASEAN in ascendence. Team Finland Future Watch Report, May 2016
 
Digital Asia – ASEAN in ascendence. Team Finland Future Watch Report, May 2016
Digital Asia – ASEAN in ascendence. Team Finland Future Watch Report, May 2016Digital Asia – ASEAN in ascendence. Team Finland Future Watch Report, May 2016
Digital Asia – ASEAN in ascendence. Team Finland Future Watch Report, May 2016
 
Threading it all together – Q2 Tech Trends
Threading it all together – Q2 Tech TrendsThreading it all together – Q2 Tech Trends
Threading it all together – Q2 Tech Trends
 
The interpretation of the relationship among big data, IoT and smart city - C...
The interpretation of the relationship among big data, IoT and smart city - C...The interpretation of the relationship among big data, IoT and smart city - C...
The interpretation of the relationship among big data, IoT and smart city - C...
 
Why tech-giants move their outsourcing operations to Vietnam- whitepaper
Why tech-giants move their outsourcing operations to Vietnam- whitepaperWhy tech-giants move their outsourcing operations to Vietnam- whitepaper
Why tech-giants move their outsourcing operations to Vietnam- whitepaper
 
2013 Umeng Insight Report
2013 Umeng Insight Report2013 Umeng Insight Report
2013 Umeng Insight Report
 
China Mobile Internet 2013 Overview (Umeng)
China Mobile Internet 2013 Overview (Umeng)China Mobile Internet 2013 Overview (Umeng)
China Mobile Internet 2013 Overview (Umeng)
 
Internet Governance & Digital Rights by Waihiga K. Muturi, Rtn..pdf
Internet Governance & Digital Rights by Waihiga K. Muturi, Rtn..pdfInternet Governance & Digital Rights by Waihiga K. Muturi, Rtn..pdf
Internet Governance & Digital Rights by Waihiga K. Muturi, Rtn..pdf
 
Inside Tencent
Inside TencentInside Tencent
Inside Tencent
 
WeChat, the shape of the connected China
WeChat, the shape of the connected ChinaWeChat, the shape of the connected China
WeChat, the shape of the connected China
 

More from Arthit Suriyawongkul

Beyond retailer-consumer relationships
Beyond retailer-consumer relationshipsBeyond retailer-consumer relationships
Beyond retailer-consumer relationshipsArthit Suriyawongkul
 
ทุน ข้อมูล และสภาพแวดล้อม: เพื่อสนับสนุนการมีส่วนร่วมของประชาชนในการออกแบบแล...
 ทุน ข้อมูล และสภาพแวดล้อม: เพื่อสนับสนุนการมีส่วนร่วมของประชาชนในการออกแบบแล... ทุน ข้อมูล และสภาพแวดล้อม: เพื่อสนับสนุนการมีส่วนร่วมของประชาชนในการออกแบบแล...
ทุน ข้อมูล และสภาพแวดล้อม: เพื่อสนับสนุนการมีส่วนร่วมของประชาชนในการออกแบบแล...Arthit Suriyawongkul
 
กฎหมายเกี่ยวกับเนื้อหา โฆษณา และการตลาดออนไลน์ (ทำให้เพื่อนไปสอบ DAAT ไม่รู้จ...
กฎหมายเกี่ยวกับเนื้อหา โฆษณา และการตลาดออนไลน์ (ทำให้เพื่อนไปสอบ DAAT ไม่รู้จ...กฎหมายเกี่ยวกับเนื้อหา โฆษณา และการตลาดออนไลน์ (ทำให้เพื่อนไปสอบ DAAT ไม่รู้จ...
กฎหมายเกี่ยวกับเนื้อหา โฆษณา และการตลาดออนไลน์ (ทำให้เพื่อนไปสอบ DAAT ไม่รู้จ...Arthit Suriyawongkul
 
พ.ร.บ.คุ้มครอง
ข้อมูลส่วนบุคคล และสิทธิในความเป็นส่วนตัว
พ.ร.บ.คุ้มครอง
ข้อมูลส่วนบุคคล และสิทธิในความเป็นส่วนตัวพ.ร.บ.คุ้มครอง
ข้อมูลส่วนบุคคล และสิทธิในความเป็นส่วนตัว
พ.ร.บ.คุ้มครอง
ข้อมูลส่วนบุคคล และสิทธิในความเป็นส่วนตัวArthit Suriyawongkul
 
Rights-based Internet Governance: การอภิบาลอินเทอร์เน็ตโดยคิดจากสิทธิเป็นที่ตั้ง
Rights-based Internet Governance: การอภิบาลอินเทอร์เน็ตโดยคิดจากสิทธิเป็นที่ตั้งRights-based Internet Governance: การอภิบาลอินเทอร์เน็ตโดยคิดจากสิทธิเป็นที่ตั้ง
Rights-based Internet Governance: การอภิบาลอินเทอร์เน็ตโดยคิดจากสิทธิเป็นที่ตั้งArthit Suriyawongkul
 
ว่าด้วยสื่อสังคม
ว่าด้วยสื่อสังคมว่าด้วยสื่อสังคม
ว่าด้วยสื่อสังคมArthit Suriyawongkul
 
โดนอุ้มในโลกเสมือน
โดนอุ้มในโลกเสมือน โดนอุ้มในโลกเสมือน
โดนอุ้มในโลกเสมือน Arthit Suriyawongkul
 
คนทำงานและแรงงานในยุคดิจิทัล
คนทำงานและแรงงานในยุคดิจิทัลคนทำงานและแรงงานในยุคดิจิทัล
คนทำงานและแรงงานในยุคดิจิทัลArthit Suriyawongkul
 
Three-Layer Model for the Control of Online Content: A Study on Thailand
Three-Layer Model for the Control of Online Content: A Study on ThailandThree-Layer Model for the Control of Online Content: A Study on Thailand
Three-Layer Model for the Control of Online Content: A Study on ThailandArthit Suriyawongkul
 
Mapping Stakeholders, Decision-makers, and Implementers in Thailand’s Cyber P...
Mapping Stakeholders, Decision-makers, and Implementers in Thailand’s Cyber P...Mapping Stakeholders, Decision-makers, and Implementers in Thailand’s Cyber P...
Mapping Stakeholders, Decision-makers, and Implementers in Thailand’s Cyber P...Arthit Suriyawongkul
 
Data Protection
 in the Age of Big Data
Data Protection
 in the Age of Big DataData Protection
 in the Age of Big Data
Data Protection
 in the Age of Big DataArthit Suriyawongkul
 
Anonymity in the Digital Age #digitalcitizen16
Anonymity in the Digital Age #digitalcitizen16Anonymity in the Digital Age #digitalcitizen16
Anonymity in the Digital Age #digitalcitizen16Arthit Suriyawongkul
 
Information Laws in Mekong Countries
Information Laws in Mekong CountriesInformation Laws in Mekong Countries
Information Laws in Mekong CountriesArthit Suriyawongkul
 
แนะนำมูลนิธิเพื่ออินเทอร์เน็ตและวัฒนธรรมพลเมือง
แนะนำมูลนิธิเพื่ออินเทอร์เน็ตและวัฒนธรรมพลเมืองแนะนำมูลนิธิเพื่ออินเทอร์เน็ตและวัฒนธรรมพลเมือง
แนะนำมูลนิธิเพื่ออินเทอร์เน็ตและวัฒนธรรมพลเมืองArthit Suriyawongkul
 
การส่งเสริมการกำกับกันเอง
ในกิจการสื่อใหม่ยุคหลอมรวม
การส่งเสริมการกำกับกันเอง
ในกิจการสื่อใหม่ยุคหลอมรวมการส่งเสริมการกำกับกันเอง
ในกิจการสื่อใหม่ยุคหลอมรวม
การส่งเสริมการกำกับกันเอง
ในกิจการสื่อใหม่ยุคหลอมรวมArthit Suriyawongkul
 
Cybercrime and Cybersecurity Differences
Cybercrime and Cybersecurity DifferencesCybercrime and Cybersecurity Differences
Cybercrime and Cybersecurity DifferencesArthit Suriyawongkul
 
Development and Concerns over "Digital Economy" Bills in Thailand
Development and Concerns over "Digital Economy" Bills in ThailandDevelopment and Concerns over "Digital Economy" Bills in Thailand
Development and Concerns over "Digital Economy" Bills in ThailandArthit Suriyawongkul
 
The Junta Digital Agenda: 76 Days Later
The Junta Digital Agenda: 76 Days LaterThe Junta Digital Agenda: 76 Days Later
The Junta Digital Agenda: 76 Days LaterArthit Suriyawongkul
 
The state of Internet freedom after the coup in Thailand
The state of Internet freedom after the coup in ThailandThe state of Internet freedom after the coup in Thailand
The state of Internet freedom after the coup in ThailandArthit Suriyawongkul
 

More from Arthit Suriyawongkul (20)

Beyond retailer-consumer relationships
Beyond retailer-consumer relationshipsBeyond retailer-consumer relationships
Beyond retailer-consumer relationships
 
ทุน ข้อมูล และสภาพแวดล้อม: เพื่อสนับสนุนการมีส่วนร่วมของประชาชนในการออกแบบแล...
 ทุน ข้อมูล และสภาพแวดล้อม: เพื่อสนับสนุนการมีส่วนร่วมของประชาชนในการออกแบบแล... ทุน ข้อมูล และสภาพแวดล้อม: เพื่อสนับสนุนการมีส่วนร่วมของประชาชนในการออกแบบแล...
ทุน ข้อมูล และสภาพแวดล้อม: เพื่อสนับสนุนการมีส่วนร่วมของประชาชนในการออกแบบแล...
 
กฎหมายเกี่ยวกับเนื้อหา โฆษณา และการตลาดออนไลน์ (ทำให้เพื่อนไปสอบ DAAT ไม่รู้จ...
กฎหมายเกี่ยวกับเนื้อหา โฆษณา และการตลาดออนไลน์ (ทำให้เพื่อนไปสอบ DAAT ไม่รู้จ...กฎหมายเกี่ยวกับเนื้อหา โฆษณา และการตลาดออนไลน์ (ทำให้เพื่อนไปสอบ DAAT ไม่รู้จ...
กฎหมายเกี่ยวกับเนื้อหา โฆษณา และการตลาดออนไลน์ (ทำให้เพื่อนไปสอบ DAAT ไม่รู้จ...
 
พ.ร.บ.คุ้มครอง
ข้อมูลส่วนบุคคล และสิทธิในความเป็นส่วนตัว
พ.ร.บ.คุ้มครอง
ข้อมูลส่วนบุคคล และสิทธิในความเป็นส่วนตัวพ.ร.บ.คุ้มครอง
ข้อมูลส่วนบุคคล และสิทธิในความเป็นส่วนตัว
พ.ร.บ.คุ้มครอง
ข้อมูลส่วนบุคคล และสิทธิในความเป็นส่วนตัว
 
Rights-based Internet Governance: การอภิบาลอินเทอร์เน็ตโดยคิดจากสิทธิเป็นที่ตั้ง
Rights-based Internet Governance: การอภิบาลอินเทอร์เน็ตโดยคิดจากสิทธิเป็นที่ตั้งRights-based Internet Governance: การอภิบาลอินเทอร์เน็ตโดยคิดจากสิทธิเป็นที่ตั้ง
Rights-based Internet Governance: การอภิบาลอินเทอร์เน็ตโดยคิดจากสิทธิเป็นที่ตั้ง
 
ว่าด้วยสื่อสังคม
ว่าด้วยสื่อสังคมว่าด้วยสื่อสังคม
ว่าด้วยสื่อสังคม
 
โดนอุ้มในโลกเสมือน
โดนอุ้มในโลกเสมือน โดนอุ้มในโลกเสมือน
โดนอุ้มในโลกเสมือน
 
คนทำงานและแรงงานในยุคดิจิทัล
คนทำงานและแรงงานในยุคดิจิทัลคนทำงานและแรงงานในยุคดิจิทัล
คนทำงานและแรงงานในยุคดิจิทัล
 
Three-Layer Model for the Control of Online Content: A Study on Thailand
Three-Layer Model for the Control of Online Content: A Study on ThailandThree-Layer Model for the Control of Online Content: A Study on Thailand
Three-Layer Model for the Control of Online Content: A Study on Thailand
 
Mapping Stakeholders, Decision-makers, and Implementers in Thailand’s Cyber P...
Mapping Stakeholders, Decision-makers, and Implementers in Thailand’s Cyber P...Mapping Stakeholders, Decision-makers, and Implementers in Thailand’s Cyber P...
Mapping Stakeholders, Decision-makers, and Implementers in Thailand’s Cyber P...
 
Data Protection
 in the Age of Big Data
Data Protection
 in the Age of Big DataData Protection
 in the Age of Big Data
Data Protection
 in the Age of Big Data
 
Anonymity in the Digital Age #digitalcitizen16
Anonymity in the Digital Age #digitalcitizen16Anonymity in the Digital Age #digitalcitizen16
Anonymity in the Digital Age #digitalcitizen16
 
Information Laws in Mekong Countries
Information Laws in Mekong CountriesInformation Laws in Mekong Countries
Information Laws in Mekong Countries
 
แนะนำมูลนิธิเพื่ออินเทอร์เน็ตและวัฒนธรรมพลเมือง
แนะนำมูลนิธิเพื่ออินเทอร์เน็ตและวัฒนธรรมพลเมืองแนะนำมูลนิธิเพื่ออินเทอร์เน็ตและวัฒนธรรมพลเมือง
แนะนำมูลนิธิเพื่ออินเทอร์เน็ตและวัฒนธรรมพลเมือง
 
การส่งเสริมการกำกับกันเอง
ในกิจการสื่อใหม่ยุคหลอมรวม
การส่งเสริมการกำกับกันเอง
ในกิจการสื่อใหม่ยุคหลอมรวมการส่งเสริมการกำกับกันเอง
ในกิจการสื่อใหม่ยุคหลอมรวม
การส่งเสริมการกำกับกันเอง
ในกิจการสื่อใหม่ยุคหลอมรวม
 
Cybercrime and Cybersecurity Differences
Cybercrime and Cybersecurity DifferencesCybercrime and Cybersecurity Differences
Cybercrime and Cybersecurity Differences
 
Development and Concerns over "Digital Economy" Bills in Thailand
Development and Concerns over "Digital Economy" Bills in ThailandDevelopment and Concerns over "Digital Economy" Bills in Thailand
Development and Concerns over "Digital Economy" Bills in Thailand
 
Thailand on LINE
Thailand on LINEThailand on LINE
Thailand on LINE
 
The Junta Digital Agenda: 76 Days Later
The Junta Digital Agenda: 76 Days LaterThe Junta Digital Agenda: 76 Days Later
The Junta Digital Agenda: 76 Days Later
 
The state of Internet freedom after the coup in Thailand
The state of Internet freedom after the coup in ThailandThe state of Internet freedom after the coup in Thailand
The state of Internet freedom after the coup in Thailand
 

Recently uploaded

Design Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptxDesign Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptxFIDO Alliance
 
Intro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptxIntro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptxFIDO Alliance
 
Structuring Teams and Portfolios for Success
Structuring Teams and Portfolios for SuccessStructuring Teams and Portfolios for Success
Structuring Teams and Portfolios for SuccessUXDXConf
 
State of the Smart Building Startup Landscape 2024!
State of the Smart Building Startup Landscape 2024!State of the Smart Building Startup Landscape 2024!
State of the Smart Building Startup Landscape 2024!Memoori
 
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...ScyllaDB
 
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdfThe Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdfFIDO Alliance
 
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...FIDO Alliance
 
ERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage IntacctERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage IntacctBrainSell Technologies
 
WebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM PerformanceWebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM PerformanceSamy Fodil
 
Google I/O Extended 2024 Warsaw
Google I/O Extended 2024 WarsawGoogle I/O Extended 2024 Warsaw
Google I/O Extended 2024 WarsawGDSC PJATK
 
Easier, Faster, and More Powerful – Notes Document Properties Reimagined
Easier, Faster, and More Powerful – Notes Document Properties ReimaginedEasier, Faster, and More Powerful – Notes Document Properties Reimagined
Easier, Faster, and More Powerful – Notes Document Properties Reimaginedpanagenda
 
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...FIDO Alliance
 
How we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdfHow we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdfSrushith Repakula
 
(Explainable) Data-Centric AI: what are you explaininhg, and to whom?
(Explainable) Data-Centric AI: what are you explaininhg, and to whom?(Explainable) Data-Centric AI: what are you explaininhg, and to whom?
(Explainable) Data-Centric AI: what are you explaininhg, and to whom?Paolo Missier
 
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider  Progress from Awareness to Implementation.pptxTales from a Passkey Provider  Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider Progress from Awareness to Implementation.pptxFIDO Alliance
 
FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...
FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...
FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...FIDO Alliance
 
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...panagenda
 
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...marcuskenyatta275
 
Your enemies use GenAI too - staying ahead of fraud with Neo4j
Your enemies use GenAI too - staying ahead of fraud with Neo4jYour enemies use GenAI too - staying ahead of fraud with Neo4j
Your enemies use GenAI too - staying ahead of fraud with Neo4jNeo4j
 
Portal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russePortal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russe中 央社
 

Recently uploaded (20)

Design Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptxDesign Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptx
 
Intro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptxIntro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptx
 
Structuring Teams and Portfolios for Success
Structuring Teams and Portfolios for SuccessStructuring Teams and Portfolios for Success
Structuring Teams and Portfolios for Success
 
State of the Smart Building Startup Landscape 2024!
State of the Smart Building Startup Landscape 2024!State of the Smart Building Startup Landscape 2024!
State of the Smart Building Startup Landscape 2024!
 
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
 
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdfThe Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
 
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
 
ERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage IntacctERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage Intacct
 
WebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM PerformanceWebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM Performance
 
Google I/O Extended 2024 Warsaw
Google I/O Extended 2024 WarsawGoogle I/O Extended 2024 Warsaw
Google I/O Extended 2024 Warsaw
 
Easier, Faster, and More Powerful – Notes Document Properties Reimagined
Easier, Faster, and More Powerful – Notes Document Properties ReimaginedEasier, Faster, and More Powerful – Notes Document Properties Reimagined
Easier, Faster, and More Powerful – Notes Document Properties Reimagined
 
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
 
How we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdfHow we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdf
 
(Explainable) Data-Centric AI: what are you explaininhg, and to whom?
(Explainable) Data-Centric AI: what are you explaininhg, and to whom?(Explainable) Data-Centric AI: what are you explaininhg, and to whom?
(Explainable) Data-Centric AI: what are you explaininhg, and to whom?
 
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider  Progress from Awareness to Implementation.pptxTales from a Passkey Provider  Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
 
FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...
FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...
FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...
 
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
 
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
 
Your enemies use GenAI too - staying ahead of fraud with Neo4j
Your enemies use GenAI too - staying ahead of fraud with Neo4jYour enemies use GenAI too - staying ahead of fraud with Neo4j
Your enemies use GenAI too - staying ahead of fraud with Neo4j
 
Portal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russePortal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russe
 

Who will control the Next Billion? – A Case of Chat Apps from Asia (#RightsCon 2014)

  • 1. Who will control the Next Billion? – A Case of Chat Apps from Asia (or Why I think it’s important to help improve data protection in East Asia if you really care about personal data of the internet Next Billion) @bact Arthit Suriyawongkul Thai Netizen Network Silicon Valley, 4 March 2014
  • 2. Lead to Summary ● Mobile chat apps are now everywhere in East and Southeast Asia – – ● becomes a mobile identity – provides authentication service for 3rd party apps mobile social network platform – built for mobile from day one (unlike Facebook) These “chat apps” grow globally fast – – ● manufacturing influence (bundled to mobile handsets) “soft-power” cultural influence (K-Pop, J-Pop, Manga) Data of the mobile Next Billion will be more transmitted to/processed in East Asia
  • 3. Summary ● ● Data will no longer concentrated in US/Europe, so should the attention of data protection too? Human rights standards so vary in other parts of the world and the protection may not cross-border – ● e.g. ASEAN Human Rights Declaration Privacy/cyber-security laws of East Asian jurisdictions will affect more people globally – your communication data and personal data could be one day regulated by Chinese law – through monetary and educational assistants, China and Japan already have influence in SE Asia cyber-security policy
  • 5. All the Communications and Sharing (Group) Chat, Voice/Video Call, Media/Location Sharing, GAMES, AUTHEN/IDENTITY
  • 6. Plus Cute Characters (Stickers) Where’s my sticker shop on ChatSecure and Cryptocat? :p
  • 8. How Big They Are Now? Chat App WhatsApp Country of Origin US Number of Users 400M Line Japan 300M (50M in Japan) WeChat China 300M (200M in China) KakaoTalk Korea 130M ChatON Korea 100M
  • 9. Growth Trends ● ● ● ● “Line, WeChat: Asian social networks move to conquer Europe” – AFP (29 Sep 2013) “How WeChat, Line plan to taken on Facebook, Skype” – The Times of India (30 Sep 2013) “Asian Messaging Apps WeChat and Line Challenge Silicon Valley. China’s WeChat and Japan’s Line Are Threatening the Global Growth of WhatsApp and Facebook.” – The Wall Street Journal (9 Oct 2013) … and the Facebook’s WhatsApp deal recently
  • 10. Where is the Next Billion? ● Mobile internet users in Africa, China, South America, South Asia and Southeast Asia
  • 12. Protections Across Borders “We want LINE Corp. to be the the first line of surveillance and send us any ‘suspicious’ activity on their app.” – Technology Crime Suppression Division, Royal Thai Police (2013) LINE Corp. in Japan said there’s no official request from Thai Police. Any request for personal data should be done under Japanese law. http://advocacy.globalvoicesonline.org/2013/08/19/thailand-wants-to-monitor-conversations-on-line-app/ http://www.telecomasia.net/content/naver-denies-collaborating-thai-govt
  • 13. Violations Across Borders ● ● ● ● ● Some Chinese keywords got censored in LINE Study from Citizen Lab found regionally-based Keyword Censorship in LINE LINE in China operated by a Chinese company Censorship follows user, go across borders https://citizenlab.org/2013/11/asia-chats-investigating-regionally-ba sed-keyword-censorship-line/
  • 14. Assumption (That Not Goes) Across Borders ● LINE did no encryption on 2G/3G network ● Metadata and entire conversations in plain text ● ● With small changes in data request string, can pull historical chat logs up to two months old. Made a wrong assumption that the 2G/3G network is already secure (in many countries, it’s not) ● http://www.telecomasia.net/blog/content/line-vulnerable-man-middle-attack ● https://citizenlab.org/2013/11/asia-chats-analyzing-information-controls-privacy-asian-messaging-applications/
  • 15. Who will control the Next Billion? ● ● ● ● South Korea, Japan, China, and Taiwan are exporters of popular IT apps and devices. These countries have huge influence in Southeast Asia and emerging markets. Political, economical, and/or cultural. LINE is based in Japan. A subsidiary of a South Korean company. LINE China (“Lianwo”) is operated by a Chinese licensee. WeChat (“Weixin”) is based in China.
  • 16. Japan/China Influences on Cyberpolicy (tech/law) in SE Asia ● ● ● ● ● ● Japan-ASEAN Information Security Policy Meeting Japan-ASEAN Ministerial Policy Meeting on Cyber Security Cooperation ASEAN Smart Network Initiative ASEAN-Japan Joint Information Security Awareness Raising Initiatives China-ASEAN Defence Ministers' Meeting ASEAN-China Information Superhighway Working Group
  • 17. Asian values in your pocket ● ● ● ● As these chat apps/social network are growing, more data will be transmitted to, stored and processed in East Asia. “Asian values” embedded in these countries’ information laws will play more role in information freedom globally. Often times, in these countries, companies cooperate/collaborate with authority. No Transparency Report. Communication protocol is not open. Everything is behind the door. Asian values? From Japan? From South Korea? From China? From where?
  • 18. What We Can Do?
  • 19. Together, we can do more of this EFF’s “Who's Doing What?” (Tech) EFF’s “Who Has Your Back?” (Law) and this... ????? ????? ????? ????? ?????
  • 20. @bact Arthit Suriyawongkul Thai Netizen Network arthit@thainetizen.org ● Parts of this presentation was presented at ● Regional Consultation on Freedom of Expression for Civil Liberties in Asia (22 Nov 2013, Bangkok) ● ● ● CNXP (6 Dec 2013, Chiang Mai) FOSSASIA (1 Mar 2014, Phnom Penh) Thanks for all the comments from those forums and social media.