SlideShare ist ein Scribd-Unternehmen logo
1 von 38
Downloaden Sie, um offline zu lesen
Contextual Identity:
Freedom to be
All Your Selves
Monica Chew, Sid Stamm
Mozilla
{mmc,sid}@mozilla.com
Contextual Identity
Be who you want, when you want
Multiple identities abound!
Josephine Baker
Colleen Lachowicz
Snoop Dogg (Snoop Lion)
All your identities in one big identity
"Having two identities for yourself is an
example of a lack of integrity."
- Mark Zuckerberg, The Facebook Effect
"If you have something that you don't want
anyone to know, maybe you shouldn't be doing
it in the first place."
- Eric Schmidt, interview on CNBC
All your identities in one big identity
source: www.facebook.com/help/112146705538576/
“Facebook is a community where
people use their real identities. We
require everyone to provide their
real names, so you always know
who you're connecting with. This
helps keep our community safe.”
Mr. Burns is not pleased
A real world example
Bobbi Duncan Taylor McCormick
Outed when the choir director added them to a
public Facebook group, Queer Chorus
Fuck you, Google
I use my private Gmail account to email my boyfriend and my mother.
There’s a BIG drop-off between them and my other “most frequent”
contacts.
You know who my third most frequent contact is?
My abusive ex-husband.
Which is why it’s SO EXCITING, Google, that you AUTOMATICALLY
allowed all my most frequent contacts access to my Reader, including all
the comments I’ve made on Reader items, usually shared with my
boyfriend, who I had NO REASON to hide my current location or
workplace from, and never did.
All your services in one big service
source: www.fugitivus.net/2010/02/11/fuck-you-google/
catalyst: Google Buzz/Reader/Contacts integration
Twitter Direct Messaging Failures
sources: twitter.com/dmfail, wikipedia.org/wiki/Weinergate
catalyst: typing '@' instead of 'd'
What's in our privacy toolbox?
● Cryptography [RSA, AES, Diffie-Hellman]
● Contextual integrity [Barth et al.]
● Access control [Bell, LaPadula]
● Anonymizers [Dingledine, Marlinspike]
● Blockers [AdBlockPlus, Disconnect.me]
Our tools are necessary but not sufficient.
Access control: state of the art?
Changes are hard to track
source: http://mattmckeon.com/facebook-privacy/
Changes are hard to track
source: http://mattmckeon.com/facebook-privacy/
Changes are hard to track
source: http://mattmckeon.com/facebook-privacy/
Changes are hard to track
source: http://mattmckeon.com/facebook-privacy/
Changes are hard to track
source: http://mattmckeon.com/facebook-privacy/
Changes are hard to track
source: http://mattmckeon.com/facebook-privacy/
Be who you want, when
you want
How do we get there?
Call to action
Study mental models
What makes up online identity?
sites you visit once
devices you own
devices you borrow
devices you lend
sites you never visit
sites you often visit
topics you like
Call to action
Study identity management techniques
Multiple browsers
Multiple devices
Multiple profiles
Alternate identities
Privacy mode
Challenge
People value community
Challenge
People want their data everywhere
Popemobiles make it hard to share
Think different.
Hey, W2SP.
● Obscurity can be enough
● Embarrassment reduction
● Troll avoidance
● Mistake recovery
Room for imperfect solutions
How can we make things better?
● Question our own notions of identity, privacy
and publicity
● Write software for how users are, not how
we wish them to be
Open questions
● How can we design privacy and sharing to
be less brittle, more flexible?
● How can we balance desire for spontaneous
interaction with the need for privacy?
Works in progress
● Blushproof [with David Keeler]
● Cookiemonster [with David Dahl]
● Behavioral segmentation [Mozilla UR]
Questions?

Weitere ähnliche Inhalte

Was ist angesagt?

FILM 260 - Social Media: The Dangers of Over Sharing
FILM 260 - Social Media: The Dangers of Over Sharing FILM 260 - Social Media: The Dangers of Over Sharing
FILM 260 - Social Media: The Dangers of Over Sharing
Emma Irwin
 

Was ist angesagt? (16)

Stalking in the Cyberspace
Stalking in the CyberspaceStalking in the Cyberspace
Stalking in the Cyberspace
 
Drinking from a Fire Hose
Drinking from a Fire HoseDrinking from a Fire Hose
Drinking from a Fire Hose
 
Engaging The Conversation
Engaging The ConversationEngaging The Conversation
Engaging The Conversation
 
Introduction to Social Media for Small Business
Introduction to Social Media for Small BusinessIntroduction to Social Media for Small Business
Introduction to Social Media for Small Business
 
FILM 260 - Social Media: The Dangers of Over Sharing
FILM 260 - Social Media: The Dangers of Over Sharing FILM 260 - Social Media: The Dangers of Over Sharing
FILM 260 - Social Media: The Dangers of Over Sharing
 
Untech10: Mobile Matters: What Association Leaders Need To Know
Untech10: Mobile Matters: What Association Leaders Need To KnowUntech10: Mobile Matters: What Association Leaders Need To Know
Untech10: Mobile Matters: What Association Leaders Need To Know
 
4-H volunteers final
4-H volunteers final4-H volunteers final
4-H volunteers final
 
Social Networking: Past, Present & Future
Social Networking: Past, Present & FutureSocial Networking: Past, Present & Future
Social Networking: Past, Present & Future
 
Social Media 101
Social Media 101Social Media 101
Social Media 101
 
Why Mobile Matters - ASAE Technology Conference
Why Mobile Matters - ASAE Technology ConferenceWhy Mobile Matters - ASAE Technology Conference
Why Mobile Matters - ASAE Technology Conference
 
Connections Lost: The Damages of Textual Conversation and Multi-Communication
Connections Lost: The Damages of Textual Conversation and Multi-CommunicationConnections Lost: The Damages of Textual Conversation and Multi-Communication
Connections Lost: The Damages of Textual Conversation and Multi-Communication
 
Social Media Beltwide Cotton
Social Media Beltwide CottonSocial Media Beltwide Cotton
Social Media Beltwide Cotton
 
Tracking Boba Fett's Invoice, or Hey, It Went Viral!
Tracking Boba Fett's Invoice, or Hey, It Went Viral!Tracking Boba Fett's Invoice, or Hey, It Went Viral!
Tracking Boba Fett's Invoice, or Hey, It Went Viral!
 
Fear And Loathing in Social Media
Fear And Loathing in Social MediaFear And Loathing in Social Media
Fear And Loathing in Social Media
 
Storytelling & Social Media: Creating Social Buzz
Storytelling & Social Media: Creating Social Buzz Storytelling & Social Media: Creating Social Buzz
Storytelling & Social Media: Creating Social Buzz
 
Introduction to Facebook and Twitter
Introduction to Facebook and TwitterIntroduction to Facebook and Twitter
Introduction to Facebook and Twitter
 

Ähnlich wie Contextual identity w2sp

Lis 768 Privacy Presentation
Lis 768 Privacy PresentationLis 768 Privacy Presentation
Lis 768 Privacy Presentation
Julia Bryan-Diehl
 
Multimedia01
Multimedia01Multimedia01
Multimedia01
Les Davy
 
Week 7: Privacy-rev2013
Week 7:  Privacy-rev2013Week 7:  Privacy-rev2013
Week 7: Privacy-rev2013
Ray Brannon
 
Gez Daring - Building Online Communities
Gez Daring - Building Online CommunitiesGez Daring - Building Online Communities
Gez Daring - Building Online Communities
InBlackandWhite
 
Data privacy day - Ryan McNutt
Data privacy day - Ryan McNuttData privacy day - Ryan McNutt
Data privacy day - Ryan McNutt
McNutt
 

Ähnlich wie Contextual identity w2sp (20)

Security Dangers of Social Networking
Security Dangers of Social NetworkingSecurity Dangers of Social Networking
Security Dangers of Social Networking
 
Social - Best habits to follow and pitfalls to avoid
Social - Best habits to follow and pitfalls to avoidSocial - Best habits to follow and pitfalls to avoid
Social - Best habits to follow and pitfalls to avoid
 
Lis 768 Privacy Presentation
Lis 768 Privacy PresentationLis 768 Privacy Presentation
Lis 768 Privacy Presentation
 
Multimedia01
Multimedia01Multimedia01
Multimedia01
 
Youth Communication and Privacy in the Social Media Age
Youth Communication and Privacy in the Social Media AgeYouth Communication and Privacy in the Social Media Age
Youth Communication and Privacy in the Social Media Age
 
A Social Media Evolution Whats Next?
A Social Media Evolution   Whats Next?A Social Media Evolution   Whats Next?
A Social Media Evolution Whats Next?
 
A Social Media Evolution - Whats Next
A Social Media Evolution - Whats NextA Social Media Evolution - Whats Next
A Social Media Evolution - Whats Next
 
Grasping Social Patterns
Grasping Social PatternsGrasping Social Patterns
Grasping Social Patterns
 
IS 20090 Week 2 - Social Networks
IS 20090 Week 2 - Social NetworksIS 20090 Week 2 - Social Networks
IS 20090 Week 2 - Social Networks
 
Social groups for awareness
Social groups for awarenessSocial groups for awareness
Social groups for awareness
 
Week 7: Privacy-rev2013
Week 7:  Privacy-rev2013Week 7:  Privacy-rev2013
Week 7: Privacy-rev2013
 
Gez Daring - Building Online Communities
Gez Daring - Building Online CommunitiesGez Daring - Building Online Communities
Gez Daring - Building Online Communities
 
Marketing Innovation Summit: Integrating Social Media into the Mix
Marketing Innovation Summit:  Integrating Social Media into the MixMarketing Innovation Summit:  Integrating Social Media into the Mix
Marketing Innovation Summit: Integrating Social Media into the Mix
 
The FACEBOOK and TWITTER Phenomenon [9-28-2010]
The FACEBOOK and TWITTER Phenomenon [9-28-2010]The FACEBOOK and TWITTER Phenomenon [9-28-2010]
The FACEBOOK and TWITTER Phenomenon [9-28-2010]
 
Casott employee conference 2015
Casott employee conference 2015Casott employee conference 2015
Casott employee conference 2015
 
Social web for grannies
Social web for granniesSocial web for grannies
Social web for grannies
 
Web pp
Web ppWeb pp
Web pp
 
Social Media Basics: Security Loopholes with Twitter & Other Social Media
Social Media Basics: Security Loopholes with Twitter & Other Social MediaSocial Media Basics: Security Loopholes with Twitter & Other Social Media
Social Media Basics: Security Loopholes with Twitter & Other Social Media
 
Data privacy day - Ryan McNutt
Data privacy day - Ryan McNuttData privacy day - Ryan McNutt
Data privacy day - Ryan McNutt
 
Effectiveness Vs Efficiency: Practical ways for dealing with Information Over...
Effectiveness Vs Efficiency: Practical ways for dealing with Information Over...Effectiveness Vs Efficiency: Practical ways for dealing with Information Over...
Effectiveness Vs Efficiency: Practical ways for dealing with Information Over...
 

Kürzlich hochgeladen

Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Victor Rentea
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 

Kürzlich hochgeladen (20)

Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 

Contextual identity w2sp

  • 1. Contextual Identity: Freedom to be All Your Selves Monica Chew, Sid Stamm Mozilla {mmc,sid}@mozilla.com
  • 2. Contextual Identity Be who you want, when you want
  • 7. All your identities in one big identity "Having two identities for yourself is an example of a lack of integrity." - Mark Zuckerberg, The Facebook Effect "If you have something that you don't want anyone to know, maybe you shouldn't be doing it in the first place." - Eric Schmidt, interview on CNBC
  • 8. All your identities in one big identity source: www.facebook.com/help/112146705538576/ “Facebook is a community where people use their real identities. We require everyone to provide their real names, so you always know who you're connecting with. This helps keep our community safe.”
  • 9. Mr. Burns is not pleased
  • 10. A real world example Bobbi Duncan Taylor McCormick Outed when the choir director added them to a public Facebook group, Queer Chorus
  • 11. Fuck you, Google I use my private Gmail account to email my boyfriend and my mother. There’s a BIG drop-off between them and my other “most frequent” contacts. You know who my third most frequent contact is? My abusive ex-husband. Which is why it’s SO EXCITING, Google, that you AUTOMATICALLY allowed all my most frequent contacts access to my Reader, including all the comments I’ve made on Reader items, usually shared with my boyfriend, who I had NO REASON to hide my current location or workplace from, and never did. All your services in one big service source: www.fugitivus.net/2010/02/11/fuck-you-google/ catalyst: Google Buzz/Reader/Contacts integration
  • 12. Twitter Direct Messaging Failures sources: twitter.com/dmfail, wikipedia.org/wiki/Weinergate catalyst: typing '@' instead of 'd'
  • 13. What's in our privacy toolbox? ● Cryptography [RSA, AES, Diffie-Hellman] ● Contextual integrity [Barth et al.] ● Access control [Bell, LaPadula] ● Anonymizers [Dingledine, Marlinspike] ● Blockers [AdBlockPlus, Disconnect.me] Our tools are necessary but not sufficient.
  • 14. Access control: state of the art?
  • 15. Changes are hard to track source: http://mattmckeon.com/facebook-privacy/
  • 16. Changes are hard to track source: http://mattmckeon.com/facebook-privacy/
  • 17. Changes are hard to track source: http://mattmckeon.com/facebook-privacy/
  • 18. Changes are hard to track source: http://mattmckeon.com/facebook-privacy/
  • 19. Changes are hard to track source: http://mattmckeon.com/facebook-privacy/
  • 20. Changes are hard to track source: http://mattmckeon.com/facebook-privacy/
  • 21. Be who you want, when you want How do we get there?
  • 22. Call to action Study mental models
  • 23. What makes up online identity? sites you visit once devices you own devices you borrow devices you lend sites you never visit sites you often visit topics you like
  • 24. Call to action Study identity management techniques
  • 31. Challenge People want their data everywhere
  • 32. Popemobiles make it hard to share
  • 34. ● Obscurity can be enough ● Embarrassment reduction ● Troll avoidance ● Mistake recovery Room for imperfect solutions
  • 35. How can we make things better? ● Question our own notions of identity, privacy and publicity ● Write software for how users are, not how we wish them to be
  • 36. Open questions ● How can we design privacy and sharing to be less brittle, more flexible? ● How can we balance desire for spontaneous interaction with the need for privacy?
  • 37. Works in progress ● Blushproof [with David Keeler] ● Cookiemonster [with David Dahl] ● Behavioral segmentation [Mozilla UR]