The Paradox of Identity (why OpenID is Evil) Brad Templeton Electronic Frontier Foundation (& Foresight Institute)‏

Slides:



Advertisements
Similar presentations
Democracy in Social Networks? Ralf Bendrath bendrath.blogspot.com.
Advertisements

SRI Back from the Future Time-traveling AIs and privacy Brad Templeton Electronic Frontier Foundation (& Foresight Institute)
The Paradox of Choice: Why More Is Less Barry Schwartz Guided Paths to Success June, 2013.
Bakheet Aldosari, Ph.D. Health 305 Health Information Management Bakheet Aldosari, Ph.D.
T ank Gunnery is a Science not an Art Managing your Budget isn’t an Art either.
PERFORMANCE MEASURES -
Chapter 1 Identity and Ideology.
The Nixon Presidency Foreign Policy Achievements.
IGE105 – Communication Technology in a Changing World Dr. Ken Cosh Week 10.
The Paradox of Choice: Why More Is Less Barry Schwartz Ohio Board of Regents November, 2012.
Secular philosophies & popular worldviews Why do Christians look so odd to normal people?
9 th Grade Seminar Discussion May 13, Have you recently reached a point where, either in person or via technology, you pushed something too far.
Data Privacy Sebastian Leinmueller - Birgit Hainzlmaier MBA 664 Team Presentation.
Computer Insecurity & Privacy Throwing people in the mix Brad Templeton Electronic Frontier Foundation
Statistical Methods in Computer Science Why? Ido Dagan.
Anonymity Cs5090: Advanced Computer Networks, fall 2004 Department of Computer Science Michigan Tech University Byung Choi.
Von 2004 Will SIP Win? Brad Templeton Chairman of the Board Electronic Frontier Foundation
Apple Vs. Samsung By: Lin Choi, Grace Yang, Alexis Aguiar, Manas Joshi, and Bryan Li.
2 Define the term “medical ethics” Differentiate between ethics and morality Differentiate between ethics and low.
Automatic Evaluation Philipp Koehn Computer Science and Artificial Intelligence Lab Massachusetts Institute of Technology.
Educause 2006, Dallas TX What does a University need from Access Management? John Paschoud InfoSystems Engineer, LSE Library London School of Economics.
Tell your partner what you know about this story. Why do you think it is called the “Fall”? Is it going to be scientifically true? The Story of the Fall.
CALL NOW SPECIAL TOPICS Social Media.
Discipline & Guidance The keys to well-behaved children.
Modernityscotland.com 1 Study Theme 3B Human Rights in China.
Ministry of Health and Social Affairs Sweden Government Offices of Sweden Business promotion at Ministry of Health and Social Affairs - support to Swedish.
Adrian Crenshaw. Darknets  There are many definitions, but mine is “anonymizing private networks ”  Use of encryption.
Indecent Exposure – Are Your Private Parts Truly Private? (Privacy and Technology) Barbara Buckett Barbara Buckett & Associates 27 August 2008.
Warm up: Why were there racial tensions in the 1920’s?
Scavenger Hunt Use your copy / paste skills to add to this slideshow…. Let Mr. Stevens see it when your done to get the credit you deserve.
{ The First Amendment. Congress shall make no law respecting an establishment of religion, or prohibiting the free exercise thereof; or abridging the.
Let’s change it up a little bit!. Follow along! O Heart O Stomach O Brain and Liver O Heart O Stomach O Brain and Liver O Al-co-hol hurts all of those!
Theodicy: The Study of Evil  If God is Benevolent (all-good), Omnipotent (all-powerful) and Omniscient (all-knowing), how could evil exist?  In other.
Credit cards and prepaid cards “No Credit Check! Instant advance! Get your money today!”
Federalism Keeping Government Balanced. It Is All About the POWER!!! The study of government is the study of power. In the US, there are 3 levels of government:
Chapter 8: Search, Privacy, Government, and Evil By: Marissa Gittelman Tuesday, March CPS 49:Google, the Computer Science within and its Impact.
Gaby Orduna Period 1. Public records contain info about individuals, often very sensitive information. Are accessible electronically Courts and government.
How to prepare for your test All opinions are those of the presenter.
Lecture2 Networking. Overview and spam World Wide Web Censorship Freedom of expression Children and inappropriate content Breaking trust on the.
Lost Identity People steal your personal information and use it to rob you of your money and your dignity.
Make a list of numbers that begin with a ‘start number’ and increase by a fixed amount we will call the ‘jump number’. Let’s all use 3 as the start number.
DO NOW – Monday, December 16 On your Do Now response form: What is privacy? Our Constitution protects citizens’ privacy from government snooping. Why does.
South Korea, Australia, South Africa, Japan Vs. France, Saudi Arabia, China, Britain Source: days-lag-rest-world/story?id=
Class 5 – Getting to the Scope  How do we gather requirements?  User Stories  Functional Components  Agile Stories vs Waterfall Requirements  Drivers.
Symposia Studentium Sesiunea ştiinţific ă anual ă universitar ă din 15 aprilie 2010 Elaborated by BUDECI Tatiana, Faculty of Law, 1st year Scientific Adviser:
LAW for Business and Personal Use © 2012 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible.
Animals in Danger Unit 6. Language Learning Goal Be able to define: Balance Endangered Environment Extinct.
Unit 0 Review Tuesday, March 8 th, 2016 Present Perfect.
ПЕЧЕНЬ 9. Закладка печени в период эмбрионального развития.
* ESSENTIAL QUESTIONS Why date? What are characteristics that you look for that may lead you to date someone? Can you explain your expectations for dating?
SC Disagreements Post Revolutionary War
I have no friends on Facebook Or, ”Why I don't tweet, g-mail or myspace” Bob Edwards, BarCampCanberra2010.
Google Apps for Education
US History, Foundations
What is Computer Science?
History By Mr. Brad.
Bad Weather / No Lift Policy.
4 Big Evidence-Based Ah-Ha’s for Teaching and Learning
نام دوره: آیین نگارش مکاتبات اداری
This Is China!.
A few recent days in the news…
Semantic Web Technologies
Richard Feynman in “The Meaning of it All”.
– Communication Technology in a Changing World
History Art Dynamic parametric Music Show.
Scavenger Hunt Use your copy / paste skills to add to this slideshow….
WHY DO SOME DEVELOPING COUNTRIES BECOME AND STAY DEMOCRATIC
Dynamic Equilibrium.
Machines.
New Police Vetting Requirements
Presentation transcript:

The Paradox of Identity (why OpenID is Evil) Brad Templeton Electronic Frontier Foundation (& Foresight Institute)‏

Why does it matter? Bad Science

History of humanity is a long chorus of police states punctuated by a few recent stacatto notes of freedom.

We must take care not to build the infrastructure of a police state

We must consider the balance, and think when we change it And we’re really shifting the balance

Facebook reversed signup dynamic

Erasure of 4th amendment

Architecture will set defaults

Nobody cares about privacy until after invaded

Ease of Use is a Bug Mag stripe on your driver’s licence Long web form is impediment

End-User control prevents negotiation Negotiated vs. non-negotiated Negotiation only happens with power What’s the history of success? P3P? Agents? Reputations? Bizarrely, Passport could have done better! Proxies

Two choices: Let the TFH have their way, there are few of them, it costs us little Too many TFH: Agree with what we wan't or go away

Data exported is data lost

Data Portability or BEPSI

Time travelling robots from the future

China, Saudi Arabia, Future China

Falun Gong on Facebook