SlideShare ist ein Scribd-Unternehmen logo
1 von 72
Downloaden Sie, um offline zu lesen
Privacy is a UX Problem
David Dahl, SpiderOak, Inc.

Future Insights Live

Las Vegas, NV June 3rd, 2015
1
David Dahl
• Privacy Enthusiast

• Director, Crypton - SpiderOak

• Former Privacy Engineer, Mozilla

• ILM, DOE, consultant

• @deezthugs
A beam splitter
To NSA
InternetBackbone
In 2006, a whistle-blower came forward from ATT named Mark Klein. He gave us a heads up that our personal communications were being siphoned off of the internet
via a literal prism that split the internet backbone fiber optics line in San Francisco to be copied, searched sorted, sliced and diced. “Former director of the NSA's World
Geopolitical and Military Analysis Reporting Group, William Binney, has estimated that 10 to 20 such facilities have been installed throughout the United States.” https://
en.wikipedia.org/wiki/Room_641A 

I find this very disturbing. Also, how difficult is it to send a truly private message to someone online? For most users this has been until recently effectively impossible.
Naturally this got me thinking about Silicon Valley companies and what they actually do - and the fact that so few of them provide privacy with their services, least of all
privacy from *them*
Intersection of 

Crypto Nerds & 

UX Designers
The number 1 reason for this talk is in this Venn diagram. Do you see any orange in this Venn diagram? A sliver?

When I was at Mozilla I remember bending our UX designers’ ears about privacy and crypto and User Interface design. It was a bit baffling for both of us to try and
understand each other. There really was too little interaction between privacy & crypto engineers and UX. Most of the software designed for preserving online privacy
suffers from this
Wait, privacy is
*just*
a UX problem?
Well, kind of…
Who has heard of GPG or PGP? Used GPG or PGP? This image is a screenshot of the first page of the GPG user guide. Clearly, GPG documentation is dense, technical
and long winded. This is not going to work for the majority.

In this talk I want to navigate through concepts, issues and pitfalls of using apps built for privacy. I will also cover newer advances in privacy UX. Please take this talk as a
call to action to familiarize yourself with privacy techniques and tooling - you *can* make it better
We have the technology!
We have incredibly fast and capable devices today. There is no reason we cannot also have privacy in all of our communications.
We have very fast, tiny computers
in our pockets
All of us do. Some even have 2.
…and on our wrists.
These are devices are capable of decrypting real-time streaming video & audio data! Ok, well, maybe not this device, but one a bit like it.
We have
very fast
networks
connected
to these
tiny
computers
Not to get out in the weeds, but, some of our network operators are hostile to privacy, which presents further problems.
The math is sound WTF?
Strong crypto DOES work. This is a page from Snowden’s files. Even the NSA cannot decrypt a PGP message. Note: this does not stop the NSA from storing this
message until the computer is broken into and the private key is taken. Unless… January 2032 arrives and they delete or reclassify this message! Srsly?
This Snowden slide illustrates just how much of a problem Tor, TrueCrypt and TAILS are for the NSA. 

TruCrypt is a disk encryption tool and was recently audited and found to be sound

Tails stands for “The Amnesic Incognito Live System”, a secure linux distribution booted from a USB stick, which has Tor Browser and other tools ready to use. Once you
shutdown all traces of your activities vanishes.
Privacy nerds have an embarrassment of riches
in crypto libraries
[NaCl, BoringSSL, SJCL, LibGCrypt, NSS & others in many languages ]
Not that many of them are easy
for developers to actually use
Crypto libraries must be used with care. When I worked at Mozilla and implemented window.crypto.getRandomValues it took an inordinate amount of time to land a
feature that “just” produced random numbers.
You’ve probably noticed a lack of web applications
Web pages are not considered safe for cryptography & privacy applications. You know, those pages that load JS files from CDNs that can be anywhere. JavaScript
source files are not verified at all, they are just downloaded and immediately run. 

This problem is not going away any time soon. Browser vendors are slowly working towards signed and verified web apps, but it is such a vast change in the way
browsers work.

Naturally, you can build HTML5 apps that can be packaged and signed and not load external content. This does work. I am doing it today.
Pitfalls
Common issues in creating and
using private applications
Lets talk about some of the pitfalls we run into with privacy apps. Some of these issues are related to GPG & PGP. But even some newer applications suffer from some
notable problems.
Understanding Cryptography concepts is a requirement
for using many privacy applications
Some apps ask the user to choose algorithms
& key lengths (whatever that means!) to use
GPG / PGP, which does work to defend people against
dragnet surveillance can be horribly difficult to even install
That being said, there are some new takes on PGP: Yahoo Mail has a browser extension, Whiteout.io is a new email client that supports PGP with any eye toward better
UX, and there are others as well
Jargon
keys
fingerprints
signatures
Jargon and comcepts in Crypto is dense and complicated. A Math degree is required to truly understand it. For instance, a “key” is used to unlock data but it is also used
to identify you. Fingerprints make it easy to verify keys. Signatures verify that the sender is the originator of data - or has access to the private key that created the
encrypted message. The “signature” is the best real-world analog here.

Side note, most everyone who you think might be a crypto nerd will never admit to it. Some of the top engineers in Silicon Valley who do crypto every day will not admit
they “know crypto”. It is a dark art. I only claim to be able to use APIs, with guidance from professionals.
Keys
Most applications have a
step where “keys” are
generated
Do users really need to know
about this?
Knowing about key generation adds complexity to the mental model a user is used to in a communications app. Hiding this step is worth considering. I would prefer to
not refer to keys at all. Creating new metaphors for these crypto-specific operations is a better idea. A “key” really represents a user - or the ability to converse with said
user. A peer’s keys represent them - can’t we just use an “account” & “contacts” model here and do away with all of this key jargon?
Fingerprints
A fingerprint is a shorter string derived from and which helps identify a longer key 

My GPG fingerprint is: 

094A 590E 099D 4621 A7DB 440A 8425 DACF 4F19 5F87

Before you collect my public key - and save it into your “key database”, you should compare my fingerprint to the one that you will get with my public key or via a key
server lookup.

I publish my fingerprint on my business card in order to hand contacts an out of band copy of the fingerprint. This goes a long way towards really verifying my public key
and my messages to contacts
Signatures
Signatures are used in proving authenticity of a message,
either encrypted or plain text.
All encrypted messages should also be signed
Many GPG front-end applications default to NOT signing each message. Why this is I do not know. It is less safe to send an unsigned message. We end up with an extra
step for users to do - and many may not even know to do this.
Are your eyes
glazing over
yet?
Just wait!
All these extra bits needed to make software more private need to be turned around and used - with new metaphors and mental models - to make the software feel
private but not be a chore to operate
GPG Usage
Enigmail on Thunderbird
• Install Thunderbird
• Install GPG
• Install Enigmail
• Try not to Fail
• There is Hope here…
To get GPG email going - in this case - you have to install 3 different products! Then you walk through a messy “Wizard” to generate keys and publish your public key to
a “keyserver”. After all of this you must be aware that by default, all email is sent in plain text and you usually have to be proactive about making sure your message is
going to the right person using the correct key and the message is both encrypted and signed. Also, your subject line is never encrypted.
Lets send a GPG message via Thunderbird & Enigmail. Now, don’t get me wrong, I think this all works great - for me, a privacy nerd - but this is not going to work to
make privacy universally usable. The first thing I notice here is that the message WILL NOT be encrypted & signed. That is OK, as most email is not, but this sometimes
will allow you to send what you wanted private in the clear! Let’s pick a recipient - but I am not sure if I have the public key…
It turns out my recipient has more than one key! We have wandered into bad UX so quickly here. This is unusable by the vast majority of internet users.
My default settings set the messages to not be signed when encrypting. This is bad default behavior.
“Pre-send” warning!
My privacy is guarded by a
Modal Dialog and a Toolbar
I’m not even kidding. This is cutting edge stuff. The app now interrupts your message sending to make sure its actually encrypted and a toolbar makes it easy to make
sure all messages are signed as well! Thank you UX gods!
Now we are sending the message correctly after clicking on both the Lock and the Pencil. Normally, this works correctly, but this is perilous as email is designed to be
clear text and we are bolting on some privacy measures. Don’t be in a hurry. Again, this is unusable by humans.
Privacy is best not bolted-on!
EMAIL
GPG
We need applications that are built from the ground up with privacy at the core of the application. Bolt-ons do work, but are dangerous to rely on.

You can also use GPG as a general encryption tool for files and messages outside of an email program. This is how Snowden passed along his documents to Laura &
Glenn.
We have ‘Mobile first’ development
And we have ‘User First’ development
We also need ‘Privacy First’ development
This is the future. Privacy First development
Greenwald nearly missed
the story of a lifetime!
GPG fail to install even! THANK YOU LAURA POITRAS
Here we have a screen capture from “Citizen4”, the Snowden Documentary. 

This is an extreme example, but Glenn Greenwald was unable to even install GPG in order to communicate with Snowden. 

I highly suggest you see the movie.
Of course this talk is not about the UX to help avoid NSA
targeting. You might as well tape your mobile phone to a
Greyhound bus bumper, smash your computer and travel
overland with cash and false identity papers to South
America and become a farmer in the Pampas
(I did some research for a friend)
Avoiding some blanket wiretapping and dragnet surveillance is possible. Avoiding surveillance when personally targeted is probably impossible - and I am not advocating
that is a possible:)
What is a likely threat model?
Advertisers are a threat
Ok, not advertisers, it is companies that
sell your data you to advertisers.
Like, nearly everyone in Silicon Valley
Side Note:
We really have to stop and think about what is happening here. What is the logical conclusion of all of the data being gathered and stored about you?
You are not the Customer
You are the product
Google
You
Facebook
Twitter
Bing
Yahoo!
We all may think these search engines and social networks are free software. They are not. The real reason they exist is to milk you of your private life and sell it to the
highest bidder. This will cost you in the long run. 

[Insurance company rates example: read about beers, go to many bars, car insurance rates through the roof. Buy too much junk food and watch A LOT of Amazon Prime
or Netflix? Your Health insurance rates will climb.]
The real danger is the aggregation of all of our social networking posts, social graph, search history and location history. We are being sliced, diced and categorized into
buckets of user types. Our most private conversations, opinions and movements are known to marketers and possibly worse. Even things we don’t search for are known
to them. It is probably true that our search engines know more about us than the NSA and even our closest friends.
New-ish Privacy Applications
Ok, that was a bit of a side note…

Lets talk about some newer privacy apps and the potential issues we will run into
Crypto.cat
• Relatively easy to use

• Installation: Browser
extension /Chrome App

• Obtuse verification process

• Great for real-time chat for
groups
Overview: easy to use compared to GPG, provides instant messaging for groups. Still difficult to verify and authenticate others
We need to set up a secret
question & answer for each
person we talk to?
That’s a lot of work
Since Crypto.cat allows you to use it anyway without doing this, it provides for bad habits and is just too much work for non-nerds to use
Crypto.cat docs are built in and very good. Regardless, it is a lot of work to use properly.
While not ideal, this built-in documentation is good. How can we build systems like this that don’t need or require even less built-in documentation?
“UX is like a joke if you have to
explain it you have done it wrong”
I don’t blame crypto.cat here, there are just doing what everyone else has done.

They are trying to make it fun and more humane and I applaud them for that.
Signal
Probably the best experience in
privacy: encrypted phone calls and
texting

https://whispersystems.org/
Started off as “text secure” on android, now on iOS and Android, its called “Signal”
Signal looks and feels like
any other texting application
but all texting and calling is
end to end encrypted
Key generation is done behind the scenes. The contacts are verified over an initial SMS message that hands the other your public key and fingerprint
You still need to verify fingerprints.
“tap to copy” makes
it pretty easy
to get your own fingerprint
for others to verify
over a 2nd channel
you get a new phone and your key will change, so others will be warned when they are sent a new public key behind the scenes.
Encrypted calling is elegant
A phrase is used to verify
your caller is
who you think it is.
It should be
the same on each device
Encrypted calling in signal started off life as “RedPhone” for android, which was mentioned in that Snowden slide.

There is a lot to say about Signal. It is the next generation app for ease of use and slick UX for privacy. The crypto is pretty cutting edge as well, which uses “key
ratcheting” for text messages. Each text is encrypted with a new key. Very slick and hard to attack.
A downside:
notifications are generic
This is true of most privacy-leaning applications. Since notifications might pop up at any time - and when your phone is visible to others, a generic notification is all we
can really do. Perhaps using sensors we can determine if the user is holding the device we can decrypt the actual notification. (On iOS, this may be problematic as
background operations can be limited, apple’s concern about using too much CPU in the background)
Anonymity Online
• Tor Browser
• Ricochet (IM)
Anonymity online is possible. The best tool for this is the Tor Browser for web browsing, and tools built on top of the Tor network protocol. Ricochet is one of these
applications and is used for IM.

My focus is on applications that are open source. Also, these are apps you can help improve the UX for. Apps that are closed source I have to wonder about the
"privacy" being trustable.
While Tor Browser is a bit slow, it does allow for real anonymity online. It is built on top of Firefox and through the Snowden leaks we have learned that Tor does indeed
work! It is used heavily by dissidents and activists living under repressive regimes as well as many journalists that don’t want any of their research queries tied back to
them, etc.
https://github.com/ricochet-im/ricochet/releases
Ricochet:
Anonymous
metadata-resistant
instant messaging
that just works
Ricochet is a somewhat new anonymous chat tool that tunnels all of its communications through the Tor network. It is not the easiest thing to use but is anonymous,
hiding all of its metadata well.
You exchange identifiers through another channel, perhaps even in person (which is best). Once you exchange IDs, you can chat anonymously with end to end
encryption
Design for Privacy Applications
How do we do better?

Lets talk about the operating and design model for Privacy Applications

The client is the powerful actor. This turns things a a bit upside down. The source of truth is not 100% encapsulated in the server. Working with this model can be
challenging and some use cases are difficult to implement.
Client
ServerThe development
model is somewhat
inverted:
The client
generates the
account (and keys)
Theclienttellstheservertostorethe
accountdata
An inverted model makes for some very tricky operations. The client is the source of truth (it generates keys and tells the server what to store)
Client
Server
All communications data
is encrypted on the
client
And passed to the
server, where the server
is unaware of what the
data is
Client
Server
Searching is always done on the client
Search indexes are created on
the client, stored on the server
and are pulled down to the client,
decrypted and searched locally
Search is difficult as we must search the plain text on the client. Normally this data is indexed on the server and easily searchable there. This breaks what is known as
“Zero Knowledge”. Indexed data must be searched on the client only. There are some advances in encryption technology where we can search encrypted data directly
on the server, but this is not mainstream or easy to implement, it is still very much “research"
The UX of Privacy starts at the API
We need APIs that encapsulate the complex crypto operations that underlying libraries require. Developers need better “SDK UX” to be able to safely design and develop
applications in a “privacy first” effort.
Crypton is an attempt
at better UX for
privacy-centered apps
Well, mainly better UX for APIs so
developers can use crypto properly
by NOT actually using Crypto!
It is not easy to use crypto APIs - and of course that much more difficult to IMPLEMENT crypto APIs. Crypton is a stab at an SDK any developer who knows JavaScript
can implement privacy-centered applications with little knowledge of crypto. Crypton provides APIs that resemble normal app-building APIs but everything is encrypted
end to end. 

Sadly, there are few projects like this.
Crypton at a glance
crypton.generateAccount(‘username’, ‘password’,
function (error, account){});
crypton.authorize(‘username’, ‘password’, function (error, session){});
session.getOrCreateItem(‘wineList’, function (error, item){});
session.items.wineList.value.reds = [{cabernet: ‘sonoma’}];
session.items.wineList.save(function (err) {});
session.getPeer(‘alice’, function (err, alice) {});
session.items.wineList.share(alice, function (err) {});
Not to get too far into the APIs crypton provides, but Crypton’s APIs read like any other web API. All of the crypto is encapsulated inside functions anyone can use, and
all of the normal parameters that developers need to choose are set for you to “smart defaults” - that have been audited by professionals. This is UX *too*, making the
framework APIs simple. The developer never deals directly with the encryption. When you call “getFoo()”, decryption happens even before you are handed the plain text
object.
The SAFE (Secure Access for Everyone) network can be best
described as a fully distributed data management service. This
network manages static and dynamic data as well as
communications. Importantly the data held is either:
Encrypted by clients
Cryptographically signed by clients
MaidSafe is another project that is attempting to build a Peer to Peer network that by default does nothing but end to end encryption. The project is working on a beta
version of its network now and has a lot of potential. MaidSafe will allow you to build most applications we use today where the network (everyone else’s computer on
the network) is the datacenter.
Top Privacy UX issues
• Key Exchange
• Verifying others
The management of keys has always been a complex and confusing affair. Keys need to be exchanged to begin communication and again when keys change. 

Verification of contacts is usually awkward, with one or more contacts wondering why it is necessary and be OK with using the application in an unsafe, unverified mode.
New Metaphors
New Metaphors need to be created to allow application users to better understand (or to completely hide the complexity of key exchange)
Crypton’s Contact Card Concept
The Contact Card metaphor.

Everyone has an ID or Business Card. You show it to people so they can verify who you are, or learn a bit about you.

Eliminates specialized jargon from privacy: no “keys” are referred to.

An exchange of Contact Cards establishes a secure communication channel
Scanning or loading
the Contact ID compares
the fingerprint against one
queried from the server
A match adds the contact to
your contacts DB
This whitelists the scanned ID
and allows them to “follow you”
Also, we are in the process of simplifying the Card design as well as the workflow, it needs to be as seamless as possible.
My current project:
ZK: A “Zero-Knowledge Twitter”
Fun Fact!
ZK does “GPS to place name”
via a database lookup
instead of a “maps GPS API”
“ZK” is the code name for a Zero Knowledge twitter-like application I am building as a proof of concept of non-data-minable social networking. Users create accounts,
exchange Contact cards (out of band via SMS, email) and are then following each other. A major difference here is that following is whitelisted. Bob must scan Alice’s
card in order for Alice to follow Bob
CMU
Privacy Engineering Program
SpiderOak is currently
working with a group of
grad students in this
program on a privacy UX
project
The good news is that programs like Carnegie Mellon’s Privacy Engineering Program exist, and is turning out a great group of multi-disciplinary engineers who really
understand technology UX, crypto and humans

The students are helping to improve the Contact Card concept by doing UX research via focus groups and Mechanical Turk surveys.
Adopt a project!
I would like to see UX designers adopting crypto projects.

Its a huge challenge! *& you can learn while doing* 

Crypto nerds need to pay attention to UX, to design, designers will blow their minds
Why should I (UX Designer Extraordinaire) do this?
WHY DO THIS?

[why should I as a UX designer pay attention to crypto communications systems?]

Future Demand!
Current & Future Demand!
Government and corporate spying is at an all time high. We are living in a “golden age of surveillance”. The web, our apps, our networks are all surveilling us.

*All* email probably routes through NSA, Chinese, Russian, corporate collection points.

The facilities NSA is building to house data can house a copy of everything digital we produce that interests them. They can store all of it forever, decrypting it once they
get the keys or key factoring is possible.
End 2 End Encryption solves for (some of) the Sony Hack
(also, email should die in a fire)
All cloud systems that consume plain text are one tiny exploit from a 'Sony Email situation' or ‘The Fappening'.

End-2-end encryption systems make cloud storage and communications data complete garbage to an attacker. Imagine a messaging system a corporation can put in
place for internal and external collaboration.

Naturally, with external collaborators this breaks down. It makes good business sense to build a communications tool that outside users can use, however, this is not
going to be commonplace anytime soon.
With E2E encryption tools, attackers must attack the device
THIS IS EXPENSIVE
The target goes from 1 semi-well-protected network to hundreds maybe thousands of devices. 

The economics of surveillance make is easy and cheap to do dragnet spying.

For instance:

@dymaxian, on Twitter: “We need to go from 10 Cents per user per day to $10000 per user per day to get state surveillance to the right scale”
The ‘Alpha Incident’
A privacy bomb has already gone
off, but, like the nuke tests in the
South Pacific, many are not at all
aware of the damage done.

Just wait.

I’m talking about a wide-scale “The
Fappening" with your junk!
There has yet to be what I call the "Alpha Incident"

This is when - overnight - a cloud communications company is hacked and 10, 20, 50 million people's message history is stolen and hosted in keyword-searchable
format on a server in Eastern Europe or similar jurisdiction. People will begin to question why they use these systems.
Silicon Valley’s Business Model
Real capitalism is when you offer a service or good to a customer and they pay you for it because it benefits THEM. Silicon Valley's model makes you the product and
*you* are sold to companies. Your devices are logical extensions of you.
‘Some might say "I don't care if they violate my privacy;
I've got nothing to hide.” … Arguing that you don't care
about the right to privacy because you have nothing to
hide is no different than saying you don't care about free
speech because you have nothing to say.’
- Edward Snowden
"If you have something that you don't want anyone to know,
maybe you shouldn't be doing it in the first place.”
- Eric Schmidt
2 quotes here, I’ll leave this as my last slide. If you are in the Eric Schmidt camp, you are sadly mistaken.

Weitere ähnliche Inhalte

Was ist angesagt?

Man vs Internet - Current challenges and future tendencies of establishing tr...
Man vs Internet - Current challenges and future tendencies of establishing tr...Man vs Internet - Current challenges and future tendencies of establishing tr...
Man vs Internet - Current challenges and future tendencies of establishing tr...Luis Grangeia
 
Data Privacy for Activists
Data Privacy for ActivistsData Privacy for Activists
Data Privacy for ActivistsGreg Stromire
 
Securing Database Passwords Using a Combination of hashing and Salting Techni...
Securing Database Passwords Using a Combination of hashing and Salting Techni...Securing Database Passwords Using a Combination of hashing and Salting Techni...
Securing Database Passwords Using a Combination of hashing and Salting Techni...Fego Ogwara
 
The Internet of Things: We've Got to Chat
The Internet of Things: We've Got to ChatThe Internet of Things: We've Got to Chat
The Internet of Things: We've Got to ChatDuo Security
 
Wo defensive trickery_13mar2017
Wo defensive trickery_13mar2017Wo defensive trickery_13mar2017
Wo defensive trickery_13mar2017Dan Kaminsky
 
ANALYSIS OF IMAGE WATERMARKING USING LEAST SIGNIFICANT BIT ALGORITHM
ANALYSIS OF IMAGE WATERMARKING USING LEAST SIGNIFICANT BIT ALGORITHMANALYSIS OF IMAGE WATERMARKING USING LEAST SIGNIFICANT BIT ALGORITHM
ANALYSIS OF IMAGE WATERMARKING USING LEAST SIGNIFICANT BIT ALGORITHMijistjournal
 
WebApps vs Blockchain dApps (SmartContracts): tools, vulns and standards
WebApps vs Blockchain dApps (SmartContracts): tools, vulns and standardsWebApps vs Blockchain dApps (SmartContracts): tools, vulns and standards
WebApps vs Blockchain dApps (SmartContracts): tools, vulns and standardsSecuRing
 
Keyboard collector
Keyboard collectorKeyboard collector
Keyboard collectorwncstudent1
 
Eat Your Vegetables - Data Security for Data Scientists
Eat Your Vegetables - Data Security for Data ScientistsEat Your Vegetables - Data Security for Data Scientists
Eat Your Vegetables - Data Security for Data ScientistsWilliam Voorhees
 
CGI White Paper - Key Incryption Mechanism
CGI White Paper - Key Incryption MechanismCGI White Paper - Key Incryption Mechanism
CGI White Paper - Key Incryption MechanismAmit Singh
 
2019 JJUG CCC Stateless Microservice Security with MicroProfile JWT
2019 JJUG CCC Stateless Microservice Security with MicroProfile JWT2019 JJUG CCC Stateless Microservice Security with MicroProfile JWT
2019 JJUG CCC Stateless Microservice Security with MicroProfile JWTDavid Blevins
 

Was ist angesagt? (13)

Man vs Internet - Current challenges and future tendencies of establishing tr...
Man vs Internet - Current challenges and future tendencies of establishing tr...Man vs Internet - Current challenges and future tendencies of establishing tr...
Man vs Internet - Current challenges and future tendencies of establishing tr...
 
Data Privacy for Activists
Data Privacy for ActivistsData Privacy for Activists
Data Privacy for Activists
 
Securing Database Passwords Using a Combination of hashing and Salting Techni...
Securing Database Passwords Using a Combination of hashing and Salting Techni...Securing Database Passwords Using a Combination of hashing and Salting Techni...
Securing Database Passwords Using a Combination of hashing and Salting Techni...
 
The Internet of Things: We've Got to Chat
The Internet of Things: We've Got to ChatThe Internet of Things: We've Got to Chat
The Internet of Things: We've Got to Chat
 
Wo defensive trickery_13mar2017
Wo defensive trickery_13mar2017Wo defensive trickery_13mar2017
Wo defensive trickery_13mar2017
 
ANALYSIS OF IMAGE WATERMARKING USING LEAST SIGNIFICANT BIT ALGORITHM
ANALYSIS OF IMAGE WATERMARKING USING LEAST SIGNIFICANT BIT ALGORITHMANALYSIS OF IMAGE WATERMARKING USING LEAST SIGNIFICANT BIT ALGORITHM
ANALYSIS OF IMAGE WATERMARKING USING LEAST SIGNIFICANT BIT ALGORITHM
 
WebApps vs Blockchain dApps (SmartContracts): tools, vulns and standards
WebApps vs Blockchain dApps (SmartContracts): tools, vulns and standardsWebApps vs Blockchain dApps (SmartContracts): tools, vulns and standards
WebApps vs Blockchain dApps (SmartContracts): tools, vulns and standards
 
Keyboard collector
Keyboard collectorKeyboard collector
Keyboard collector
 
Ppt
PptPpt
Ppt
 
Eat Your Vegetables - Data Security for Data Scientists
Eat Your Vegetables - Data Security for Data ScientistsEat Your Vegetables - Data Security for Data Scientists
Eat Your Vegetables - Data Security for Data Scientists
 
CGI White Paper - Key Incryption Mechanism
CGI White Paper - Key Incryption MechanismCGI White Paper - Key Incryption Mechanism
CGI White Paper - Key Incryption Mechanism
 
Broken by design (Danny Fullerton)
Broken by design (Danny Fullerton)Broken by design (Danny Fullerton)
Broken by design (Danny Fullerton)
 
2019 JJUG CCC Stateless Microservice Security with MicroProfile JWT
2019 JJUG CCC Stateless Microservice Security with MicroProfile JWT2019 JJUG CCC Stateless Microservice Security with MicroProfile JWT
2019 JJUG CCC Stateless Microservice Security with MicroProfile JWT
 

Andere mochten auch

How to improve mobile UI/UX
How to improve mobile UI/UXHow to improve mobile UI/UX
How to improve mobile UI/UXiQSpace
 
TechTalk 77 UI & UX Presentation
TechTalk 77 UI & UX PresentationTechTalk 77 UI & UX Presentation
TechTalk 77 UI & UX PresentationEvan Purnama
 
Why UX #FAILS (with notes)
Why UX #FAILS (with notes)Why UX #FAILS (with notes)
Why UX #FAILS (with notes)Chris Feix
 
UX & UI Design - Differentiate through design
UX & UI Design - Differentiate through designUX & UI Design - Differentiate through design
UX & UI Design - Differentiate through designDMI
 
エンジニアのためのUX入門
エンジニアのためのUX入門エンジニアのためのUX入門
エンジニアのためのUX入門Kazuyuki CHINDA
 
Simple Steps to UX/UI Web Design
Simple Steps to UX/UI Web DesignSimple Steps to UX/UI Web Design
Simple Steps to UX/UI Web DesignKoombea
 

Andere mochten auch (8)

How to improve mobile UI/UX
How to improve mobile UI/UXHow to improve mobile UI/UX
How to improve mobile UI/UX
 
TechTalk 77 UI & UX Presentation
TechTalk 77 UI & UX PresentationTechTalk 77 UI & UX Presentation
TechTalk 77 UI & UX Presentation
 
Ux is not UI
Ux is not UIUx is not UI
Ux is not UI
 
UX is not UI!
UX is not UI!UX is not UI!
UX is not UI!
 
Why UX #FAILS (with notes)
Why UX #FAILS (with notes)Why UX #FAILS (with notes)
Why UX #FAILS (with notes)
 
UX & UI Design - Differentiate through design
UX & UI Design - Differentiate through designUX & UI Design - Differentiate through design
UX & UI Design - Differentiate through design
 
エンジニアのためのUX入門
エンジニアのためのUX入門エンジニアのためのUX入門
エンジニアのためのUX入門
 
Simple Steps to UX/UI Web Design
Simple Steps to UX/UI Web DesignSimple Steps to UX/UI Web Design
Simple Steps to UX/UI Web Design
 

Ähnlich wie Privacy is a UX problem (David Dahl)

The ultimate privacy guide
The ultimate privacy guideThe ultimate privacy guide
The ultimate privacy guideJD Liners
 
Protecting Your Privacy: Cyberspace Security, Real World Safety
Protecting Your Privacy: Cyberspace Security, Real World SafetyProtecting Your Privacy: Cyberspace Security, Real World Safety
Protecting Your Privacy: Cyberspace Security, Real World SafetyAEGILITY
 
Evolution of Monitoring and Prometheus (Dublin 2018)
Evolution of Monitoring and Prometheus (Dublin 2018)Evolution of Monitoring and Prometheus (Dublin 2018)
Evolution of Monitoring and Prometheus (Dublin 2018)Brian Brazil
 
From 🤦 to 🐿️
From 🤦 to 🐿️From 🤦 to 🐿️
From 🤦 to 🐿️Ori Pekelman
 
Migrating PGP to the Cloud
Migrating PGP to the CloudMigrating PGP to the Cloud
Migrating PGP to the CloudEchoworx
 
International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)irjes
 
INSECURE Magazine - 35
INSECURE Magazine - 35INSECURE Magazine - 35
INSECURE Magazine - 35Felipe Prado
 
Steganography ProjectReport
Steganography ProjectReportSteganography ProjectReport
Steganography ProjectReportekta sharma
 
Faster Secure Software Development with Continuous Deployment - PH Days 2013
Faster Secure Software Development with Continuous Deployment - PH Days 2013Faster Secure Software Development with Continuous Deployment - PH Days 2013
Faster Secure Software Development with Continuous Deployment - PH Days 2013Nick Galbreath
 
Rsa Encryption in java
Rsa Encryption in java Rsa Encryption in java
Rsa Encryption in java PiyushPatil73
 

Ähnlich wie Privacy is a UX problem (David Dahl) (20)

Cyber security for journalists
Cyber security for journalistsCyber security for journalists
Cyber security for journalists
 
Get started with hacking
Get started with hackingGet started with hacking
Get started with hacking
 
128 BIT WHAT?
128 BIT WHAT?128 BIT WHAT?
128 BIT WHAT?
 
The ultimate privacy guide
The ultimate privacy guideThe ultimate privacy guide
The ultimate privacy guide
 
Protecting Your Privacy: Cyberspace Security, Real World Safety
Protecting Your Privacy: Cyberspace Security, Real World SafetyProtecting Your Privacy: Cyberspace Security, Real World Safety
Protecting Your Privacy: Cyberspace Security, Real World Safety
 
Inscibe and Squeeze
Inscibe and SqueezeInscibe and Squeeze
Inscibe and Squeeze
 
Evolution of Monitoring and Prometheus (Dublin 2018)
Evolution of Monitoring and Prometheus (Dublin 2018)Evolution of Monitoring and Prometheus (Dublin 2018)
Evolution of Monitoring and Prometheus (Dublin 2018)
 
From 🤦 to 🐿️
From 🤦 to 🐿️From 🤦 to 🐿️
From 🤦 to 🐿️
 
Understanding Keylogger
Understanding KeyloggerUnderstanding Keylogger
Understanding Keylogger
 
One Time Pad Journal
One Time Pad JournalOne Time Pad Journal
One Time Pad Journal
 
Migrating PGP to the Cloud
Migrating PGP to the CloudMigrating PGP to the Cloud
Migrating PGP to the Cloud
 
cryptography
cryptographycryptography
cryptography
 
International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)
 
NWSLTR_Volume8_Issue1
NWSLTR_Volume8_Issue1NWSLTR_Volume8_Issue1
NWSLTR_Volume8_Issue1
 
INSECURE Magazine - 35
INSECURE Magazine - 35INSECURE Magazine - 35
INSECURE Magazine - 35
 
Encryption by fastech
Encryption by fastechEncryption by fastech
Encryption by fastech
 
Steganography ProjectReport
Steganography ProjectReportSteganography ProjectReport
Steganography ProjectReport
 
IoT Security: Cases and Methods
IoT Security: Cases and MethodsIoT Security: Cases and Methods
IoT Security: Cases and Methods
 
Faster Secure Software Development with Continuous Deployment - PH Days 2013
Faster Secure Software Development with Continuous Deployment - PH Days 2013Faster Secure Software Development with Continuous Deployment - PH Days 2013
Faster Secure Software Development with Continuous Deployment - PH Days 2013
 
Rsa Encryption in java
Rsa Encryption in java Rsa Encryption in java
Rsa Encryption in java
 

Mehr von Future Insights

The Human Body in the IoT. Tim Cannon + Ryan O'Shea
The Human Body in the IoT. Tim Cannon + Ryan O'SheaThe Human Body in the IoT. Tim Cannon + Ryan O'Shea
The Human Body in the IoT. Tim Cannon + Ryan O'SheaFuture Insights
 
Pretty pictures - Brandon Satrom
Pretty pictures - Brandon SatromPretty pictures - Brandon Satrom
Pretty pictures - Brandon SatromFuture Insights
 
Putting real time into practice - Saul Diez-Guerra
Putting real time into practice - Saul Diez-GuerraPutting real time into practice - Saul Diez-Guerra
Putting real time into practice - Saul Diez-GuerraFuture Insights
 
Surviving the enterprise storm - @RianVDM
Surviving the enterprise storm - @RianVDMSurviving the enterprise storm - @RianVDM
Surviving the enterprise storm - @RianVDMFuture Insights
 
Exploring Open Date with BigQuery: Jenny Tong
Exploring Open Date with BigQuery: Jenny TongExploring Open Date with BigQuery: Jenny Tong
Exploring Open Date with BigQuery: Jenny TongFuture Insights
 
A Universal Theory of Everything, Christopher Murphy
A Universal Theory of Everything, Christopher MurphyA Universal Theory of Everything, Christopher Murphy
A Universal Theory of Everything, Christopher MurphyFuture Insights
 
Horizon Interactive Awards, Mike Sauce & Jeff Jahn
Horizon Interactive Awards, Mike Sauce & Jeff JahnHorizon Interactive Awards, Mike Sauce & Jeff Jahn
Horizon Interactive Awards, Mike Sauce & Jeff JahnFuture Insights
 
Reading Your Users’ Minds: Empiricism, Design, and Human Behavior, Shane F. B...
Reading Your Users’ Minds: Empiricism, Design, and Human Behavior, Shane F. B...Reading Your Users’ Minds: Empiricism, Design, and Human Behavior, Shane F. B...
Reading Your Users’ Minds: Empiricism, Design, and Human Behavior, Shane F. B...Future Insights
 
Front End Development Transformation at Scale, Damon Deaner
Front End Development Transformation at Scale, Damon DeanerFront End Development Transformation at Scale, Damon Deaner
Front End Development Transformation at Scale, Damon DeanerFuture Insights
 
Structuring Data from Unstructured Things. Sean Lorenz
Structuring Data from Unstructured Things. Sean LorenzStructuring Data from Unstructured Things. Sean Lorenz
Structuring Data from Unstructured Things. Sean LorenzFuture Insights
 
Cinematic UX, Brad Weaver
Cinematic UX, Brad WeaverCinematic UX, Brad Weaver
Cinematic UX, Brad WeaverFuture Insights
 
The Future is Modular, Jonathan Snook
The Future is Modular, Jonathan SnookThe Future is Modular, Jonathan Snook
The Future is Modular, Jonathan SnookFuture Insights
 
Designing an Enterprise CSS Framework is Hard, Stephanie Rewis
Designing an Enterprise CSS Framework is Hard, Stephanie RewisDesigning an Enterprise CSS Framework is Hard, Stephanie Rewis
Designing an Enterprise CSS Framework is Hard, Stephanie RewisFuture Insights
 
Accessibility Is More Than What Lies In The Code, Jennison Asuncion
Accessibility Is More Than What Lies In The Code, Jennison AsuncionAccessibility Is More Than What Lies In The Code, Jennison Asuncion
Accessibility Is More Than What Lies In The Code, Jennison AsuncionFuture Insights
 
Sunny with a Chance of Innovation: A How-To for Product Managers and Designer...
Sunny with a Chance of Innovation: A How-To for Product Managers and Designer...Sunny with a Chance of Innovation: A How-To for Product Managers and Designer...
Sunny with a Chance of Innovation: A How-To for Product Managers and Designer...Future Insights
 
Designing for Dyslexia, Andrew Zusman
Designing for Dyslexia, Andrew ZusmanDesigning for Dyslexia, Andrew Zusman
Designing for Dyslexia, Andrew ZusmanFuture Insights
 
Beyond Measure, Erika Hall
Beyond Measure, Erika HallBeyond Measure, Erika Hall
Beyond Measure, Erika HallFuture Insights
 
Real Artists Ship, Haraldur Thorleifsson
Real Artists Ship, Haraldur ThorleifssonReal Artists Ship, Haraldur Thorleifsson
Real Artists Ship, Haraldur ThorleifssonFuture Insights
 
Ok Computer. Peter Gasston
Ok Computer. Peter GasstonOk Computer. Peter Gasston
Ok Computer. Peter GasstonFuture Insights
 
Digital Manuscripts Toolkit, using IIIF and JavaScript. Monica Messaggi Kaya
Digital Manuscripts Toolkit, using IIIF and JavaScript. Monica Messaggi KayaDigital Manuscripts Toolkit, using IIIF and JavaScript. Monica Messaggi Kaya
Digital Manuscripts Toolkit, using IIIF and JavaScript. Monica Messaggi KayaFuture Insights
 

Mehr von Future Insights (20)

The Human Body in the IoT. Tim Cannon + Ryan O'Shea
The Human Body in the IoT. Tim Cannon + Ryan O'SheaThe Human Body in the IoT. Tim Cannon + Ryan O'Shea
The Human Body in the IoT. Tim Cannon + Ryan O'Shea
 
Pretty pictures - Brandon Satrom
Pretty pictures - Brandon SatromPretty pictures - Brandon Satrom
Pretty pictures - Brandon Satrom
 
Putting real time into practice - Saul Diez-Guerra
Putting real time into practice - Saul Diez-GuerraPutting real time into practice - Saul Diez-Guerra
Putting real time into practice - Saul Diez-Guerra
 
Surviving the enterprise storm - @RianVDM
Surviving the enterprise storm - @RianVDMSurviving the enterprise storm - @RianVDM
Surviving the enterprise storm - @RianVDM
 
Exploring Open Date with BigQuery: Jenny Tong
Exploring Open Date with BigQuery: Jenny TongExploring Open Date with BigQuery: Jenny Tong
Exploring Open Date with BigQuery: Jenny Tong
 
A Universal Theory of Everything, Christopher Murphy
A Universal Theory of Everything, Christopher MurphyA Universal Theory of Everything, Christopher Murphy
A Universal Theory of Everything, Christopher Murphy
 
Horizon Interactive Awards, Mike Sauce & Jeff Jahn
Horizon Interactive Awards, Mike Sauce & Jeff JahnHorizon Interactive Awards, Mike Sauce & Jeff Jahn
Horizon Interactive Awards, Mike Sauce & Jeff Jahn
 
Reading Your Users’ Minds: Empiricism, Design, and Human Behavior, Shane F. B...
Reading Your Users’ Minds: Empiricism, Design, and Human Behavior, Shane F. B...Reading Your Users’ Minds: Empiricism, Design, and Human Behavior, Shane F. B...
Reading Your Users’ Minds: Empiricism, Design, and Human Behavior, Shane F. B...
 
Front End Development Transformation at Scale, Damon Deaner
Front End Development Transformation at Scale, Damon DeanerFront End Development Transformation at Scale, Damon Deaner
Front End Development Transformation at Scale, Damon Deaner
 
Structuring Data from Unstructured Things. Sean Lorenz
Structuring Data from Unstructured Things. Sean LorenzStructuring Data from Unstructured Things. Sean Lorenz
Structuring Data from Unstructured Things. Sean Lorenz
 
Cinematic UX, Brad Weaver
Cinematic UX, Brad WeaverCinematic UX, Brad Weaver
Cinematic UX, Brad Weaver
 
The Future is Modular, Jonathan Snook
The Future is Modular, Jonathan SnookThe Future is Modular, Jonathan Snook
The Future is Modular, Jonathan Snook
 
Designing an Enterprise CSS Framework is Hard, Stephanie Rewis
Designing an Enterprise CSS Framework is Hard, Stephanie RewisDesigning an Enterprise CSS Framework is Hard, Stephanie Rewis
Designing an Enterprise CSS Framework is Hard, Stephanie Rewis
 
Accessibility Is More Than What Lies In The Code, Jennison Asuncion
Accessibility Is More Than What Lies In The Code, Jennison AsuncionAccessibility Is More Than What Lies In The Code, Jennison Asuncion
Accessibility Is More Than What Lies In The Code, Jennison Asuncion
 
Sunny with a Chance of Innovation: A How-To for Product Managers and Designer...
Sunny with a Chance of Innovation: A How-To for Product Managers and Designer...Sunny with a Chance of Innovation: A How-To for Product Managers and Designer...
Sunny with a Chance of Innovation: A How-To for Product Managers and Designer...
 
Designing for Dyslexia, Andrew Zusman
Designing for Dyslexia, Andrew ZusmanDesigning for Dyslexia, Andrew Zusman
Designing for Dyslexia, Andrew Zusman
 
Beyond Measure, Erika Hall
Beyond Measure, Erika HallBeyond Measure, Erika Hall
Beyond Measure, Erika Hall
 
Real Artists Ship, Haraldur Thorleifsson
Real Artists Ship, Haraldur ThorleifssonReal Artists Ship, Haraldur Thorleifsson
Real Artists Ship, Haraldur Thorleifsson
 
Ok Computer. Peter Gasston
Ok Computer. Peter GasstonOk Computer. Peter Gasston
Ok Computer. Peter Gasston
 
Digital Manuscripts Toolkit, using IIIF and JavaScript. Monica Messaggi Kaya
Digital Manuscripts Toolkit, using IIIF and JavaScript. Monica Messaggi KayaDigital Manuscripts Toolkit, using IIIF and JavaScript. Monica Messaggi Kaya
Digital Manuscripts Toolkit, using IIIF and JavaScript. Monica Messaggi Kaya
 

Kürzlich hochgeladen

Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...apidays
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontologyjohnbeverley2021
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxRustici Software
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyKhushali Kathiriya
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...apidays
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxRemote DBA Services
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Jeffrey Haguewood
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
Introduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDMIntroduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDMKumar Satyam
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWERMadyBayot
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityWSO2
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MIND CTI
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024The Digital Insurer
 
AI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by AnitarajAI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by AnitarajAnitaRaj43
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Zilliz
 

Kürzlich hochgeladen (20)

Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Introduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDMIntroduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDM
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
AI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by AnitarajAI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by Anitaraj
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 

Privacy is a UX problem (David Dahl)

  • 1. Privacy is a UX Problem David Dahl, SpiderOak, Inc. Future Insights Live Las Vegas, NV June 3rd, 2015 1
  • 2. David Dahl • Privacy Enthusiast • Director, Crypton - SpiderOak • Former Privacy Engineer, Mozilla • ILM, DOE, consultant • @deezthugs
  • 3. A beam splitter To NSA InternetBackbone In 2006, a whistle-blower came forward from ATT named Mark Klein. He gave us a heads up that our personal communications were being siphoned off of the internet via a literal prism that split the internet backbone fiber optics line in San Francisco to be copied, searched sorted, sliced and diced. “Former director of the NSA's World Geopolitical and Military Analysis Reporting Group, William Binney, has estimated that 10 to 20 such facilities have been installed throughout the United States.” https:// en.wikipedia.org/wiki/Room_641A I find this very disturbing. Also, how difficult is it to send a truly private message to someone online? For most users this has been until recently effectively impossible. Naturally this got me thinking about Silicon Valley companies and what they actually do - and the fact that so few of them provide privacy with their services, least of all privacy from *them*
  • 4. Intersection of Crypto Nerds & UX Designers The number 1 reason for this talk is in this Venn diagram. Do you see any orange in this Venn diagram? A sliver? When I was at Mozilla I remember bending our UX designers’ ears about privacy and crypto and User Interface design. It was a bit baffling for both of us to try and understand each other. There really was too little interaction between privacy & crypto engineers and UX. Most of the software designed for preserving online privacy suffers from this
  • 5. Wait, privacy is *just* a UX problem? Well, kind of… Who has heard of GPG or PGP? Used GPG or PGP? This image is a screenshot of the first page of the GPG user guide. Clearly, GPG documentation is dense, technical and long winded. This is not going to work for the majority. In this talk I want to navigate through concepts, issues and pitfalls of using apps built for privacy. I will also cover newer advances in privacy UX. Please take this talk as a call to action to familiarize yourself with privacy techniques and tooling - you *can* make it better
  • 6. We have the technology! We have incredibly fast and capable devices today. There is no reason we cannot also have privacy in all of our communications.
  • 7. We have very fast, tiny computers in our pockets All of us do. Some even have 2.
  • 8. …and on our wrists. These are devices are capable of decrypting real-time streaming video & audio data! Ok, well, maybe not this device, but one a bit like it.
  • 9. We have very fast networks connected to these tiny computers Not to get out in the weeds, but, some of our network operators are hostile to privacy, which presents further problems.
  • 10. The math is sound WTF? Strong crypto DOES work. This is a page from Snowden’s files. Even the NSA cannot decrypt a PGP message. Note: this does not stop the NSA from storing this message until the computer is broken into and the private key is taken. Unless… January 2032 arrives and they delete or reclassify this message! Srsly?
  • 11. This Snowden slide illustrates just how much of a problem Tor, TrueCrypt and TAILS are for the NSA. TruCrypt is a disk encryption tool and was recently audited and found to be sound Tails stands for “The Amnesic Incognito Live System”, a secure linux distribution booted from a USB stick, which has Tor Browser and other tools ready to use. Once you shutdown all traces of your activities vanishes.
  • 12. Privacy nerds have an embarrassment of riches in crypto libraries [NaCl, BoringSSL, SJCL, LibGCrypt, NSS & others in many languages ] Not that many of them are easy for developers to actually use Crypto libraries must be used with care. When I worked at Mozilla and implemented window.crypto.getRandomValues it took an inordinate amount of time to land a feature that “just” produced random numbers.
  • 13. You’ve probably noticed a lack of web applications Web pages are not considered safe for cryptography & privacy applications. You know, those pages that load JS files from CDNs that can be anywhere. JavaScript source files are not verified at all, they are just downloaded and immediately run. This problem is not going away any time soon. Browser vendors are slowly working towards signed and verified web apps, but it is such a vast change in the way browsers work. Naturally, you can build HTML5 apps that can be packaged and signed and not load external content. This does work. I am doing it today.
  • 14. Pitfalls Common issues in creating and using private applications Lets talk about some of the pitfalls we run into with privacy apps. Some of these issues are related to GPG & PGP. But even some newer applications suffer from some notable problems.
  • 15. Understanding Cryptography concepts is a requirement for using many privacy applications Some apps ask the user to choose algorithms & key lengths (whatever that means!) to use GPG / PGP, which does work to defend people against dragnet surveillance can be horribly difficult to even install That being said, there are some new takes on PGP: Yahoo Mail has a browser extension, Whiteout.io is a new email client that supports PGP with any eye toward better UX, and there are others as well
  • 16. Jargon keys fingerprints signatures Jargon and comcepts in Crypto is dense and complicated. A Math degree is required to truly understand it. For instance, a “key” is used to unlock data but it is also used to identify you. Fingerprints make it easy to verify keys. Signatures verify that the sender is the originator of data - or has access to the private key that created the encrypted message. The “signature” is the best real-world analog here. Side note, most everyone who you think might be a crypto nerd will never admit to it. Some of the top engineers in Silicon Valley who do crypto every day will not admit they “know crypto”. It is a dark art. I only claim to be able to use APIs, with guidance from professionals.
  • 17. Keys Most applications have a step where “keys” are generated Do users really need to know about this? Knowing about key generation adds complexity to the mental model a user is used to in a communications app. Hiding this step is worth considering. I would prefer to not refer to keys at all. Creating new metaphors for these crypto-specific operations is a better idea. A “key” really represents a user - or the ability to converse with said user. A peer’s keys represent them - can’t we just use an “account” & “contacts” model here and do away with all of this key jargon?
  • 18. Fingerprints A fingerprint is a shorter string derived from and which helps identify a longer key My GPG fingerprint is: 094A 590E 099D 4621 A7DB 440A 8425 DACF 4F19 5F87 Before you collect my public key - and save it into your “key database”, you should compare my fingerprint to the one that you will get with my public key or via a key server lookup. I publish my fingerprint on my business card in order to hand contacts an out of band copy of the fingerprint. This goes a long way towards really verifying my public key and my messages to contacts
  • 19. Signatures Signatures are used in proving authenticity of a message, either encrypted or plain text. All encrypted messages should also be signed Many GPG front-end applications default to NOT signing each message. Why this is I do not know. It is less safe to send an unsigned message. We end up with an extra step for users to do - and many may not even know to do this.
  • 20. Are your eyes glazing over yet? Just wait! All these extra bits needed to make software more private need to be turned around and used - with new metaphors and mental models - to make the software feel private but not be a chore to operate
  • 21. GPG Usage Enigmail on Thunderbird • Install Thunderbird • Install GPG • Install Enigmail • Try not to Fail • There is Hope here… To get GPG email going - in this case - you have to install 3 different products! Then you walk through a messy “Wizard” to generate keys and publish your public key to a “keyserver”. After all of this you must be aware that by default, all email is sent in plain text and you usually have to be proactive about making sure your message is going to the right person using the correct key and the message is both encrypted and signed. Also, your subject line is never encrypted.
  • 22. Lets send a GPG message via Thunderbird & Enigmail. Now, don’t get me wrong, I think this all works great - for me, a privacy nerd - but this is not going to work to make privacy universally usable. The first thing I notice here is that the message WILL NOT be encrypted & signed. That is OK, as most email is not, but this sometimes will allow you to send what you wanted private in the clear! Let’s pick a recipient - but I am not sure if I have the public key…
  • 23. It turns out my recipient has more than one key! We have wandered into bad UX so quickly here. This is unusable by the vast majority of internet users.
  • 24. My default settings set the messages to not be signed when encrypting. This is bad default behavior.
  • 25. “Pre-send” warning! My privacy is guarded by a Modal Dialog and a Toolbar I’m not even kidding. This is cutting edge stuff. The app now interrupts your message sending to make sure its actually encrypted and a toolbar makes it easy to make sure all messages are signed as well! Thank you UX gods!
  • 26. Now we are sending the message correctly after clicking on both the Lock and the Pencil. Normally, this works correctly, but this is perilous as email is designed to be clear text and we are bolting on some privacy measures. Don’t be in a hurry. Again, this is unusable by humans.
  • 27. Privacy is best not bolted-on! EMAIL GPG We need applications that are built from the ground up with privacy at the core of the application. Bolt-ons do work, but are dangerous to rely on. You can also use GPG as a general encryption tool for files and messages outside of an email program. This is how Snowden passed along his documents to Laura & Glenn.
  • 28. We have ‘Mobile first’ development And we have ‘User First’ development We also need ‘Privacy First’ development This is the future. Privacy First development
  • 29. Greenwald nearly missed the story of a lifetime! GPG fail to install even! THANK YOU LAURA POITRAS Here we have a screen capture from “Citizen4”, the Snowden Documentary. This is an extreme example, but Glenn Greenwald was unable to even install GPG in order to communicate with Snowden. I highly suggest you see the movie.
  • 30. Of course this talk is not about the UX to help avoid NSA targeting. You might as well tape your mobile phone to a Greyhound bus bumper, smash your computer and travel overland with cash and false identity papers to South America and become a farmer in the Pampas (I did some research for a friend) Avoiding some blanket wiretapping and dragnet surveillance is possible. Avoiding surveillance when personally targeted is probably impossible - and I am not advocating that is a possible:)
  • 31. What is a likely threat model? Advertisers are a threat Ok, not advertisers, it is companies that sell your data you to advertisers. Like, nearly everyone in Silicon Valley Side Note: We really have to stop and think about what is happening here. What is the logical conclusion of all of the data being gathered and stored about you?
  • 32. You are not the Customer You are the product Google You Facebook Twitter Bing Yahoo! We all may think these search engines and social networks are free software. They are not. The real reason they exist is to milk you of your private life and sell it to the highest bidder. This will cost you in the long run. [Insurance company rates example: read about beers, go to many bars, car insurance rates through the roof. Buy too much junk food and watch A LOT of Amazon Prime or Netflix? Your Health insurance rates will climb.]
  • 33. The real danger is the aggregation of all of our social networking posts, social graph, search history and location history. We are being sliced, diced and categorized into buckets of user types. Our most private conversations, opinions and movements are known to marketers and possibly worse. Even things we don’t search for are known to them. It is probably true that our search engines know more about us than the NSA and even our closest friends.
  • 34. New-ish Privacy Applications Ok, that was a bit of a side note… Lets talk about some newer privacy apps and the potential issues we will run into
  • 35. Crypto.cat • Relatively easy to use • Installation: Browser extension /Chrome App • Obtuse verification process • Great for real-time chat for groups Overview: easy to use compared to GPG, provides instant messaging for groups. Still difficult to verify and authenticate others
  • 36. We need to set up a secret question & answer for each person we talk to? That’s a lot of work Since Crypto.cat allows you to use it anyway without doing this, it provides for bad habits and is just too much work for non-nerds to use
  • 37. Crypto.cat docs are built in and very good. Regardless, it is a lot of work to use properly.
  • 38.
  • 39.
  • 40. While not ideal, this built-in documentation is good. How can we build systems like this that don’t need or require even less built-in documentation?
  • 41. “UX is like a joke if you have to explain it you have done it wrong” I don’t blame crypto.cat here, there are just doing what everyone else has done. They are trying to make it fun and more humane and I applaud them for that.
  • 42. Signal Probably the best experience in privacy: encrypted phone calls and texting https://whispersystems.org/ Started off as “text secure” on android, now on iOS and Android, its called “Signal”
  • 43. Signal looks and feels like any other texting application but all texting and calling is end to end encrypted Key generation is done behind the scenes. The contacts are verified over an initial SMS message that hands the other your public key and fingerprint
  • 44. You still need to verify fingerprints. “tap to copy” makes it pretty easy to get your own fingerprint for others to verify over a 2nd channel you get a new phone and your key will change, so others will be warned when they are sent a new public key behind the scenes.
  • 45. Encrypted calling is elegant A phrase is used to verify your caller is who you think it is. It should be the same on each device Encrypted calling in signal started off life as “RedPhone” for android, which was mentioned in that Snowden slide. There is a lot to say about Signal. It is the next generation app for ease of use and slick UX for privacy. The crypto is pretty cutting edge as well, which uses “key ratcheting” for text messages. Each text is encrypted with a new key. Very slick and hard to attack.
  • 46. A downside: notifications are generic This is true of most privacy-leaning applications. Since notifications might pop up at any time - and when your phone is visible to others, a generic notification is all we can really do. Perhaps using sensors we can determine if the user is holding the device we can decrypt the actual notification. (On iOS, this may be problematic as background operations can be limited, apple’s concern about using too much CPU in the background)
  • 47. Anonymity Online • Tor Browser • Ricochet (IM) Anonymity online is possible. The best tool for this is the Tor Browser for web browsing, and tools built on top of the Tor network protocol. Ricochet is one of these applications and is used for IM. My focus is on applications that are open source. Also, these are apps you can help improve the UX for. Apps that are closed source I have to wonder about the "privacy" being trustable.
  • 48. While Tor Browser is a bit slow, it does allow for real anonymity online. It is built on top of Firefox and through the Snowden leaks we have learned that Tor does indeed work! It is used heavily by dissidents and activists living under repressive regimes as well as many journalists that don’t want any of their research queries tied back to them, etc.
  • 49. https://github.com/ricochet-im/ricochet/releases Ricochet: Anonymous metadata-resistant instant messaging that just works Ricochet is a somewhat new anonymous chat tool that tunnels all of its communications through the Tor network. It is not the easiest thing to use but is anonymous, hiding all of its metadata well.
  • 50. You exchange identifiers through another channel, perhaps even in person (which is best). Once you exchange IDs, you can chat anonymously with end to end encryption
  • 51. Design for Privacy Applications How do we do better? Lets talk about the operating and design model for Privacy Applications The client is the powerful actor. This turns things a a bit upside down. The source of truth is not 100% encapsulated in the server. Working with this model can be challenging and some use cases are difficult to implement.
  • 52. Client ServerThe development model is somewhat inverted: The client generates the account (and keys) Theclienttellstheservertostorethe accountdata An inverted model makes for some very tricky operations. The client is the source of truth (it generates keys and tells the server what to store)
  • 53. Client Server All communications data is encrypted on the client And passed to the server, where the server is unaware of what the data is
  • 54. Client Server Searching is always done on the client Search indexes are created on the client, stored on the server and are pulled down to the client, decrypted and searched locally Search is difficult as we must search the plain text on the client. Normally this data is indexed on the server and easily searchable there. This breaks what is known as “Zero Knowledge”. Indexed data must be searched on the client only. There are some advances in encryption technology where we can search encrypted data directly on the server, but this is not mainstream or easy to implement, it is still very much “research"
  • 55. The UX of Privacy starts at the API We need APIs that encapsulate the complex crypto operations that underlying libraries require. Developers need better “SDK UX” to be able to safely design and develop applications in a “privacy first” effort.
  • 56. Crypton is an attempt at better UX for privacy-centered apps Well, mainly better UX for APIs so developers can use crypto properly by NOT actually using Crypto! It is not easy to use crypto APIs - and of course that much more difficult to IMPLEMENT crypto APIs. Crypton is a stab at an SDK any developer who knows JavaScript can implement privacy-centered applications with little knowledge of crypto. Crypton provides APIs that resemble normal app-building APIs but everything is encrypted end to end. Sadly, there are few projects like this.
  • 57. Crypton at a glance crypton.generateAccount(‘username’, ‘password’, function (error, account){}); crypton.authorize(‘username’, ‘password’, function (error, session){}); session.getOrCreateItem(‘wineList’, function (error, item){}); session.items.wineList.value.reds = [{cabernet: ‘sonoma’}]; session.items.wineList.save(function (err) {}); session.getPeer(‘alice’, function (err, alice) {}); session.items.wineList.share(alice, function (err) {}); Not to get too far into the APIs crypton provides, but Crypton’s APIs read like any other web API. All of the crypto is encapsulated inside functions anyone can use, and all of the normal parameters that developers need to choose are set for you to “smart defaults” - that have been audited by professionals. This is UX *too*, making the framework APIs simple. The developer never deals directly with the encryption. When you call “getFoo()”, decryption happens even before you are handed the plain text object.
  • 58. The SAFE (Secure Access for Everyone) network can be best described as a fully distributed data management service. This network manages static and dynamic data as well as communications. Importantly the data held is either: Encrypted by clients Cryptographically signed by clients MaidSafe is another project that is attempting to build a Peer to Peer network that by default does nothing but end to end encryption. The project is working on a beta version of its network now and has a lot of potential. MaidSafe will allow you to build most applications we use today where the network (everyone else’s computer on the network) is the datacenter.
  • 59. Top Privacy UX issues • Key Exchange • Verifying others The management of keys has always been a complex and confusing affair. Keys need to be exchanged to begin communication and again when keys change. Verification of contacts is usually awkward, with one or more contacts wondering why it is necessary and be OK with using the application in an unsafe, unverified mode.
  • 60. New Metaphors New Metaphors need to be created to allow application users to better understand (or to completely hide the complexity of key exchange)
  • 61. Crypton’s Contact Card Concept The Contact Card metaphor. Everyone has an ID or Business Card. You show it to people so they can verify who you are, or learn a bit about you. Eliminates specialized jargon from privacy: no “keys” are referred to. An exchange of Contact Cards establishes a secure communication channel
  • 62. Scanning or loading the Contact ID compares the fingerprint against one queried from the server A match adds the contact to your contacts DB This whitelists the scanned ID and allows them to “follow you” Also, we are in the process of simplifying the Card design as well as the workflow, it needs to be as seamless as possible.
  • 63. My current project: ZK: A “Zero-Knowledge Twitter” Fun Fact! ZK does “GPS to place name” via a database lookup instead of a “maps GPS API” “ZK” is the code name for a Zero Knowledge twitter-like application I am building as a proof of concept of non-data-minable social networking. Users create accounts, exchange Contact cards (out of band via SMS, email) and are then following each other. A major difference here is that following is whitelisted. Bob must scan Alice’s card in order for Alice to follow Bob
  • 64. CMU Privacy Engineering Program SpiderOak is currently working with a group of grad students in this program on a privacy UX project The good news is that programs like Carnegie Mellon’s Privacy Engineering Program exist, and is turning out a great group of multi-disciplinary engineers who really understand technology UX, crypto and humans The students are helping to improve the Contact Card concept by doing UX research via focus groups and Mechanical Turk surveys.
  • 65. Adopt a project! I would like to see UX designers adopting crypto projects. Its a huge challenge! *& you can learn while doing* Crypto nerds need to pay attention to UX, to design, designers will blow their minds
  • 66. Why should I (UX Designer Extraordinaire) do this? WHY DO THIS? [why should I as a UX designer pay attention to crypto communications systems?] Future Demand!
  • 67. Current & Future Demand! Government and corporate spying is at an all time high. We are living in a “golden age of surveillance”. The web, our apps, our networks are all surveilling us. *All* email probably routes through NSA, Chinese, Russian, corporate collection points. The facilities NSA is building to house data can house a copy of everything digital we produce that interests them. They can store all of it forever, decrypting it once they get the keys or key factoring is possible.
  • 68. End 2 End Encryption solves for (some of) the Sony Hack (also, email should die in a fire) All cloud systems that consume plain text are one tiny exploit from a 'Sony Email situation' or ‘The Fappening'. End-2-end encryption systems make cloud storage and communications data complete garbage to an attacker. Imagine a messaging system a corporation can put in place for internal and external collaboration. Naturally, with external collaborators this breaks down. It makes good business sense to build a communications tool that outside users can use, however, this is not going to be commonplace anytime soon.
  • 69. With E2E encryption tools, attackers must attack the device THIS IS EXPENSIVE The target goes from 1 semi-well-protected network to hundreds maybe thousands of devices. The economics of surveillance make is easy and cheap to do dragnet spying. For instance: @dymaxian, on Twitter: “We need to go from 10 Cents per user per day to $10000 per user per day to get state surveillance to the right scale”
  • 70. The ‘Alpha Incident’ A privacy bomb has already gone off, but, like the nuke tests in the South Pacific, many are not at all aware of the damage done. Just wait. I’m talking about a wide-scale “The Fappening" with your junk! There has yet to be what I call the "Alpha Incident" This is when - overnight - a cloud communications company is hacked and 10, 20, 50 million people's message history is stolen and hosted in keyword-searchable format on a server in Eastern Europe or similar jurisdiction. People will begin to question why they use these systems.
  • 71. Silicon Valley’s Business Model Real capitalism is when you offer a service or good to a customer and they pay you for it because it benefits THEM. Silicon Valley's model makes you the product and *you* are sold to companies. Your devices are logical extensions of you.
  • 72. ‘Some might say "I don't care if they violate my privacy; I've got nothing to hide.” … Arguing that you don't care about the right to privacy because you have nothing to hide is no different than saying you don't care about free speech because you have nothing to say.’ - Edward Snowden "If you have something that you don't want anyone to know, maybe you shouldn't be doing it in the first place.” - Eric Schmidt 2 quotes here, I’ll leave this as my last slide. If you are in the Eric Schmidt camp, you are sadly mistaken.