spectrum of privacy 2017 01-10

5
January 2017 / Page 1 marketing.science consulting group, inc. linkedin.com/in/ augustinefou Spectrum of Privacy Less private More sensitive More private Less sensitive secret personal public anonymous • passwords • social sec # • passport • name • address • email • phone # • social media • geolocati on • cookies • ad tech / retargeti ng •? Meta data No meta data “services which leak meta data are less private”

Upload: dr-augustine-fou-independent-ad-fraud-researcher

Post on 12-Jan-2017

131 views

Category:

Internet


0 download

TRANSCRIPT

Page 1: Spectrum of privacy 2017 01-10

January 2017 / Page 1marketing.scienceconsulting group, inc.

linkedin.com/in/augustinefou

Spectrum of Privacy

Less private

More sensitive

More private

Less sensitive

secret personal public anonymous

• passwords• social sec #• passport

• name• address• email• phone #

• social media• geolocation• cookies• ad tech /

retargeting

• ?

Meta data No meta data

“services which leak meta data are less private”

Page 2: Spectrum of privacy 2017 01-10

January 2017 / Page 2marketing.scienceconsulting group, inc.

linkedin.com/in/augustinefou

Set of Privacy-Forward Services

crpt.info pass.wd netw.rk• secure

messaging• no meta

data

• strong passwords

• easy to use for humans

• device-to-device comms

• atomic permissions

Meta data No meta data

brow.sr• session

based keys• perfect

forward privacy

meta dataKey problem to solve: weak passwords

single private key

d2d comms

+ + +

Phone # and email used to identify endpoints reveal identity and meta data.

Page 3: Spectrum of privacy 2017 01-10

crpt.info

1. anything you want tracked and saved for later, use EMAIL

2. anything you do not want tracked, with no meta data about the transmission, use crpt.info

“the anti-email”

consumer alpha currently available at http://crpt.info

Page 4: Spectrum of privacy 2017 01-10

January 2017 / Page 4marketing.scienceconsulting group, inc.

linkedin.com/in/augustinefou

personal mail lockbox

only you have private key for decrypting messages dropped

into your lock box

public phone

senders use a public phone to anonymously create and send

messages to your lock box

Offline Analogies – no meta data

Page 5: Spectrum of privacy 2017 01-10

January 2017 / Page 5marketing.scienceconsulting group, inc.

linkedin.com/in/augustinefou

1. No meta data (no phone # or email required)2. Endpoints are anonymous, not associatable3. Message encrypted with recipient’s public key4. Every part of transmission is “transient”

? ?njbf8nw8cw9casssddnasda3131wcwyfkj01

Public key encryption

Private key decryption

Top Features