>>: All right, so we're going to get started for the second panel. So the theme of the panel is on the business case for MPC. So we have a few panelists this time. We have Javier Salido from Trustworthy Computing at Microsoft. We have Vlad Kolesnikov from Bell Labs and Florian Kerschbaum from SAP. So yeah, so the theme of this panel is going to be the business case for MPC. So we want to kind of, get a sense of what are the killer apps for MPC and where are we headed with this technology? And so I guess, yeah, I'll get started with a question. The first question is probably the most obvious question, which David talked a little about today, which is: What are the killer applications for MPC? [laughter] If you don't know what the killer application is, what characteristics, or what the future is okay. >>: I don't have the final answer for the question, but so I have been trying to popularize secure computation, MPC, in SAP for now almost seven, eight years. And differently from what David said, where he said that you need to have a new application, I don't think that that's necessarily case. So in the beginning it was very much like we're not going to pay for any security or privacy. This is not -- not high on our list. They're not going to pay for this. And with the wider adoption of cloud computing, this actually changed. So the providers, they very much feel the need, I think, the business sectors -- I hope I don't have to explain who SAP is. We're selling to companies, and they're very reluctant to put their data into the cloud because they suddenly get worried they're dependent on the cloud provider. That makes them very much afraid, and the cloud provider is losing lots and lots of business because people say, well, you know, I already gave you this data, and now, if I give you this data also, that would really endanger me, be a liability for me. That's endangering me; I can't do that, so you're not getting it. And they're looking for solutions to that and there are actually quite a number of successful security startups which provide more or less less-secure, ad hoc solutions to these kind of things and they're doing very well. At some point in time if you go -- if you had this discussion today, we need PH-L user applications to go lower than that. If you do to more than one, you have to actually have two keys, and if you have two keys, you rule out more or less a lot of [indiscernible] solutions, and then you're back to secure computation. So there is a perm -- I think there is still a long way to go. But I do think that -- let me say like this: LK always has this picture where he says, you know, you have some technology and it's continuously improving, but the barrier it has to cross is also increasing. So actually you never actually make the threshold, and the threshold will always stay below. So what you actually have to have is you have to make a big jump to a complete different kind of viewpoint in order to make it. So I'm at the point of time where I say if secure computation doesn't the make it with cloud computing, it's not looking particularly good. >>: So like Seny mentioned, I work in the Trustworthy Computing group. I have to say that I'm coming at this from a slightly different angle on two counts. The first one is I don't focus on security; I focus on privacy. And as you're probably aware of, privacy is a land that so far has been relegated to lawyers. I'm not a lawyer. I have to get that out. The second thing is I'm not a researcher. My background has been mostly in consulting services out there with large enterprise customers, so those two factors have colored my view of MPC. If we ask the question what are the killer applications? I find it very, very hard to come up with a clear-cut answer, and I believe that to understand why that is the case, we need to understand who are the competitors of MPC. And the competitors of MPC might surprise you or it might not, but the competitors are lawyers. Why? Because the majority of companies out there think they don't have a problem. Either we don't have a security problem or we're not willing to invest in our security problem or we are covered. And when I say "we," I'm talking about any company out there. We are covered by what our lawyers tell us. You have to that I when we talk about laws, regulators tend to legislate towards objectives. There is what we want to happen as opposed to this is how it has to happen. And when you do that, then you start seeing in laws this language that talks about best efforts or reasonable efforts. And once you get into a courtroom, almost anything can look like a best effort or a reasonable effort. TPH-PS have been outlandishly careless, and lawyers focus on that, so companies believe, really believe, that they don't have a problem, and because they believe that they don't have a problem when it comes to securing privacy, then they don't pay as much attention to this type of technology. What this shows is that probably and in our experience, is focusing on other benefits of MPC, namely, economic benefits, efficiency benefits, that's what I think is going to turn the table around for MPC. And yes, oh, by the way, there are significant security and privacy benefits to go with that. But cases in which just the security and privacy will be able to justify the investment in MPC -- I'm not saying that there aren't any out there; I'm saying it's going to be very, very hard to find them. >>: So I wanted to mention one application that I saw that seemed people seemed to be interested in. It's not clear how good it is, and that's web-based e-mail. So I saw that it was in the -- internally at the company level valued, and therefore, there were discussions about this. And so if you have a web-based server and then you encrypt your data, so you get encrypted e-mail, and then they can search for it and get you whatever you want, but it's all encrypted over there. So the solutions that people use are auto preserving encryption, and that doesn't really give a good privacy guarantee in this setting, but if it can be done properly, then that could be something, something, a killer app maybe. >>: -- people use gmail and they don't care. >>: So that's even worse, right. >>: Some people care. I mean, in Brazil, we're pretty much money ->>: So there is a company e-mail and a personal e-mail. People don't care or they trust. >>: Columbia just moved to gmail. The whole Columbia University moved to. >>: Well they don't value their IP or their research. I don't know. [laughter] So this example is, okay, maybe that you will be motivated by the actual application. So later I think there will be questions, but my belief is that is really something that you will see the use of MPC. It has to come from very strong pressure, from legislation, I think. You cannot do this way like, you know, medical records, things like that. So you cannot deploy the system unless this happens, right, and only then people will say, okay, let's pay a million dollars and then make something that will pass legislation. And even then, it will be just enough so that the lawyers will say, okay, now it meets the threshold that you set by appropriate bodies. >>: So definitely legislation and regulation would help, but part of the problem also is the people who write the legislation or regulation don't know what's possible. So part of the challenge maybe is also kind of making technology more well-known and a little bit more mainstream so that people know it's even possible to do these things and so that it can then. So I know that people in Bell Labs, they talk to European bureaucracy to explain maybe what is possible but also at the high level. It's not that hard to understand. You say well, if you're a location-based service, you can make a requirement that the service provider -- I'm talking more about as a phone company, right -- the service provider will not know where you are but to answer a request, right, so that's the case for MPC. So if you can say it in human understandable words or in legalese appropriately, and then it's up to crypto people to do it right? >>: So there's a thing that we ran up against multiple times, comes not just in the case of MPC. A lot of the more innovative technologies out there -- just to throw another example, differential privacy, if you're familiar with it. About a year ago Arvin [indiscernible] over at Princeton published a couple of articles in IEEE Security and Privacy. I have the reference here. The articles were entitled "What Happened to the Crypto Dream?" And if you read those articles -- it's just a couple of them and eight pages total -- but he's spot-on on some of the issues here. The people that are going to have to adopt MPC are not consumers. The people that are going to have MPC are going to be companies, okay, either because they provide services to consumers or because they do business-to-business commerce or whatever. But it is going to be companies that are going to be adopting these things, and within these companies, there will be a technological decision-maker, particularly now in the age of the cloud, and with all the stuff talk about the NSA and [indiscernible] HQ and on and so forth. And I want to stress the fact that I'm not talking about some theoretical stuff here. I'm talking about real-life situations in which Microsoft have ran into, and that is when you start talking about these new technologies that has full use of cryptography in a way that is not the popularized way, it's not about hashing; it's not about encrypting; it's not about signing; it's not about PKI. It's about proofs of knowledge and blind signatures and MPC and all that good stuff. When you start talking about that, then you get the IT staffers from these companies asking questions, and then you run into a significant problem, which is as [indiscernible] correctly pointed out, which is how do you explain these black-magic-like technologies to people who are not used to them? It is really, really hard. It is really, really hard to get convince them that this stuff actually works. And then we'll run into the second problem. Once you've convinced them, oh, this could actually work, you run into the second problem, which is something we've been telling people. I mean you, as researchers, from the privacy point of view, something that we've been telling people for a long time, which is crypto is not for amateurs. You may get the theory right but the implementation completely wrong or the other way around or whatever combination you have. So once you get them to accept this idea that these black-magic-like technologies are really, really possible and they could actually become a solution, then getting them to adopt these technologies becomes also very, very hard because of the very high bar that there is for people to promote implementing these technologies. So I would agree that education is key. And by education, I don't just mean a bunch of grad students over at several universities. I mean the bulk of the people that are working on secure software development out there. There are some questions maybe. >>: Just a quick follow-up to your comments, which is that two of the aspects are possibly true for bitcoins right? I mean, how many of the bitcoin users know crypto? And also adopting bitcoins has a different -- it has an economic motivation as opposed to -- I mean, you don't need to convince someone to use bitcoins, so I mean it doesn't sort of come in your argument for promoting MPC ->>: There's a difference between adopting technology and building technology, right. So as researchers, we have different goals. One goal would be that the public adopts some technology and underlying it is MPC. Another one is to get companies like Google and Microsoft to take these technology's, implement them, and build them into products to make, you know, more privacy preserving solutions so that's where I think Javier was -- >>: You need to take a look at the whole problem and the incentives, which is, by the way, the argument that [indiscernible] makes. So the incentives here are what we talked about in the previous question. Does the company believe that they have a security problem? Not necessarily. A privacy problem? No. We're making money [laughter], okay, so that's the set of incentives, and then you move on to what you were saying. It is very easy for people out there to adopt bitcoins. (a) You have the incentives, or the clear monetary incentive is there. (b) You have companies out there that are selling you appliances to mine bitcoins. You buy your black box and you can start mining bitcoins. And the connection between your investment and your return on investment is very, very direct and very, very obvious, even to someone that knows nothing about technology. In the case of MPC, we're talking about first convincing the people that will have to implement the thing, okay. And there, the connection between the investment and the return on investment is not as obvious. And once you convince them that it's a good idea, then you have the problems that you, Mr. IT Administrator, or Mr. IT Developer that is going to have to be developing this thing -- and the whole future, by the way -- the whole future of your company depends on you doing the proper implementation. Ah, that's hard. >>: I just want to present a more optimistic perspective but based on three things that [indiscernible] said. One is companies that want to adopt and the other wants new things and this is actually what's going to be more [indiscernible] than trying to add this in existing things, and the fact that we need to get the word out. I think the word actually is getting out. I'm involved, actually, in three projects. Two of them, I can't say anything about, but these are actual, actual products that -- small things but actually being built. One is a more experimental predictive RSA. They have a new fraud-detection-type thing that uses authentication information from different customers and combines together to try and work out whether someone is logging in possibly fraudulently. And this is something that they want to deploy, but they're concerned very much that their customers will not want to give all of their authentication information to RSA, because actually, if you look at that information, it's actually very, very sensitive. It has location and other information, so as an enabler for them to actually deploy this product, they are building a prototype [indiscernible], but whatever [indiscernible] for them to try and see if that will work as an enabler for a new product. So I think that's very interesting, firstly, that they knew about it, they [indiscernible] to what they're interested in trying to do it, and I think that we're actually succeeding slowly, but the ball is just starting. >>: I think that is a very good point. Just I want to underscore two things. I'm not saying that it's impossible. My job -- actually, 80 percent of my time is just technology transfer, so I believe it is possible. But the argument I'm trying to make here is (a) we have to understand we're not going to be selling MPC on the security and privacy benefits alone, and (b) we have to acknowledge the fact that there is that uphill battle, education battle. The example you're giving is very good, but it's RSA. Those people know crypto; that's their business, which doesn't necessarily happen with everyone else. >>: I want to make a comment too because I thought about this. Actually, there are applications which currently are not being done because of the security reasons, which you could enable with privacy, and still I do not believe that this is going to be the killer app. So I have been trying to push SAP supply chain management to -- you heard the talk by Thomas. We were the guys doing supply chain management. I can show -- I can make a very easy calculation. You're going to save this much money if you do this, and people do not care. Establishing a new product is much more difficult than taking an existing product and adding a feature. So I think that for getting MPC out, it's because it's mainly it's security, right. It's much better to add a secure layer to add privacy than to say I have a new product that is now being able, because putting out new products -- I mean, it is a security product so it might be a little bit different, but putting out new products is much, much harder than actually taking an existing product and making it secure. >>: So I just wanted to -- David brought up this very insightful point yesterday. And I think perhaps one way to see that the prime impact is, you know, there are these new applications coming out like genomic applications, maybe storing our financial data in the cloud, and those applications are extremely privacy sensitive. Like, for instance, your genomic data. If the cloud server has data breach, then your genomic data can get leaked, and that pretty much encodes everything about you. So conceivably, if these applications are going to be put into the cloud, you may need higher security than what is out there today, okay. So that's one view about how this can potentially get deployed. Maybe we should think about new applications which are just too privacy-sensitive for today's cloud. So we can think about what new things we can enable. And another thing is let's say for today's particular services out there, maybe e-mail, social network, or something. If you can offer a privacy-preserving version of that and users have the choice, like let's say you have ways to monetize and still be profitable despite the additional cost and, you know, cost of operation for added security. Suppose you can do that. If users had a choice, then maybe they would opt in to the more secure version or at least a subset of them would opt into the more secure version. And perhaps that's a way to drive existing companies to it in order not to maybe lose their market share or something, they would perhaps also add secure features to their existing services. Although in spite of everything that I said, I think another key question is whether secure competition is the solution. So we definitely need more security for these genomic and financial applications, but there are other alternative technologies, and this is the point I brought up yesterday. There's like secure hardware. There are many different solutions, so which one will, in the end, be the optimal security and cost tradeoff, that is the part that's not clear to me. >>: Secure hardware works in some settings, and in some settings it doesn't work. If you have cell phone users, maybe it's harder to give secure hardware to each of them so they will compute. But maybe in the future, you can sell a box that somehow everybody agrees that it's safe, and then two companies can puts their data in that box and out comes the out, right. So in this way through this box will replace MPC, but for large, expensive functions. So the hope is I think that we should hope that many useful functions are cheap enough that you don't need to bother with the box. So fine. You have $10,000 overhead, but if the function is small, then it doesn't matter. >>: If you think about it actually, today's users place a fair amount of trust in the hardware that they compute on. Like, you know, I use my mobile phone. I use my laptop. And maybe the processor is produced by Intel. Even though I don't have to trust the cloud, I do have to trust the hardware on my local computer. So the competition gives me the guarantee that whatever the server does, I don't care, as long as my client is honest and, you know, secure then ->>: So you would need like a smartcard, like, thing on the phone, right, some protected environment. That's what you're talking about? >>: Right, so you have like secure processers that can, for instance, encrypt data. Then I think in order to achieve some of the goals that secure computation is aiming to achieve, you can have potentially faster solutions in practice if the hardware offers you some kind of . >>: It's about the marketing story. It's really about the marketing story. And the marketing story is you have your key; you have control over your key; the key stays with you; you encrypt and send it to the cloud, and you're done. That story sells. If you say well, you know, the guy over there, he has put something into his hardware, and you can trust that piece. Why don't you trust the guy in the first place, right? It's a very simple marketing story. It might not be true in the real case. You can probably make calculations that the hardware is just as secure, but it's really the marketing story. You can say, well, you know, there is some crypto guy. There is somebody, you know, he got a Turing Award, and he said if you encrypt and send it to the cloud, it's secure. And that sells, and that, I do think, that that can make a difference. The question is -- I also wanted to make another point about legislation. Actually, please, do not hope the legislation is going to help you, because the legislators have the problem right now. They have to make the laws for governing the cloud right now. If they would make a law to say you have to use MPC, the world would be in huge trouble [laughter] because we're not ready. We're nowhere near ready, right, and so this is -- there are lots and lots of steps to be taken, right. And be careful what you wish for in this case, so maybe some smaller solutions in the first place. Some startups that are doing some kjkj things might be the right way to go. >>: I just wanted to comment on one real quick. Yeah, really quick. The talk earlier today on the [indiscernible] -- this is an example of how legislation helps promote the MPC. Because it was forbidden for them to see the data to compute any statistics on the data because the privacy office -- I forgot the name of it -- maybe they said I couldn't do it and they had to use highly sanitized data that was nearly useless. But if they use MPC, that same office said that it is okay to compute on that data. So there is a huge difference in functionality that you see, and this is an example. This is an overarching solution that says you must use MPC. What does that mean even, right? What they say is here is a clear case. You don't see the private data, so it's okay to go. And there is a lot of examples of legislation that actually make life hard for implementers, but presumably it helps swob anything with medical records. It's a big deal, and there's -- it's not really useful for our community because the lawyers there are very, you know, many thousands of pages of, you know, what needs to be done, and before you read it, forget about it. It's not -- it's not interesting. Think about it. But the concept is there; that's something the government or people consider this is private and so deal with it. And then if it's stated cleanly, then our community can help solve it. >>: So this actually segues into another question, which is: Which parts of the world are more predisposed to adopt MPC? Does Europe's stronger privacy laws make it a better target for possibly deploying or having startups based on MPC systems? Sort of the geography something that we should be thinking about? >>: We can't hear. >>: Oh, sorry. The question is: Which parts of the world are more predisposed to adopt MPC? Does Europe's stronger privacy laws make it a better target for selling MPC? Is that something that we should be thinking about? Should we be developing solutions for the European market because we have a better chance of deploying there? >>: I wanted to mention one thing that fits here is a very interesting example. In the Netherlands, they deployed smart meters. It was maybe three years ago, and they collected everything because they wanted to see everything. And the people really didn't like it, and there was a big noise in the media, and they had to roll back entire whatever that phase of deployment. So it was very, very expensive, and they had to roll it back because people are more educated, I guess, in Europe about their privacy. And so that happened. >>: [indiscernible] >>: What? >>: -- educated. It wasn't too long ago in Germany, Eastern Germany. They know what happens when you don't have privacy, what a government can do. That's why I think ->>: This wasn't government. This was -- this was electric utility companies. >>: I'm saying that there's more awareness of privacy because of recent history. >>: You think that's what it is? >>: Now there's history, in fact, in the United States, right? With [laughter] actually we have. >>: Well, and people are talking about it all the time, so maybe there will be changes. >>: Crypto could solve that problem. >>: You think that you all are talking about lawyers and companies, but if there's big pressure from the people, either with this kind of privacy violation of just for some totally new app, that will be so cool and so awesome that I'd be willing to sell my soul for ->>: So a very good example is how much -- there's the shopping carts right, that, you know, they give it to you and you get it at a discount here and there on your orange juice, right. But like nobody thinks twice about -- not nobody. The majority of people and these shopping carts, they collect everything all about your habits, right. And so this tells me that most people really don't ->>: But your examples are things we already do, which, by definition, people are willing to do without privacy, you know. >>: Exactly. That's my point. If people don't care about privacy be ->>: There might be something new. I don't know, like giving all your genomic data maybe. [cross-talk] >>: -- for free. You would give everything. >>: It's very hard to convince people to value their ->>: -- naked pictures on the Internet. >>: Well, Facebook shows you that most of them don't care about that [laughter] [cross-talk] >>: I would severely challenge the notion that people don't care about privacy. I mean, people over in the industry have been saying that for 10, 20, 30 years, and there have been multiple studies that show you that that is not the case. Now, I say that and it kind of contradicts the obvious, which is people are still going out there and giving away their data. And even I, and I consider to be myself a privacy zealot, I give information away. And it's very, very simple: (a) what am I getting in return? And (b), what is my perceived risk based on what I'm doing? And the fact is that the majority of people out there -- I'm talking about the 99 percent -- have no clue about what the risks are. Because even the privacy professionals, even people like me that spend a hundred percent of our working lives thinking about this stuff really don't know how far this problem reaches. I don't know what companies -- other companies - out there are doing with my data. And again, I read about this all the time; I think about this all the time; I talk to other people that read and think about this all the time. So it's very hard for Joe Anybody out there to really have a clue of what the risks are. So I would challenge that. >>: The risks are that your entire e-mail and your entire phone conversations were logged. I think people are upset about it, no? Or is it just [cross-talk] >>: Google knows all this stuff. >>: Because Google knows it and there's an imbalance, the solution would be regulation, and the regulators are going to ask, okay, so what's the story? And somebody is going to come say, oh, this is 10,000 times slower, and Google, we can't pay for this, and the discussion is done. So this the power imbalance if the consumer market is too high in order to regulate for something like secure computation. >>: Yeah, and that takes us back to your original question, which is: Are the laws in Europe such that they would facilitate the introduction of MPC? I don't know. I do know that the laws in Europe have forced Microsoft to make changes for specific countries, not for all of Europe, with a specific product, and that is true. Whether those laws would push us in the direction of adopting MPC at any point in time, I'm a skeptic. However, I do think that there are other things in the European environment that are likely to force the adoption of MPC, which is the unique characteristics, economic characteristics, of the European Union. And the best argument that I can make to support the statement I just made is probably a case study that's probably very well-known to you, which is the sugar beet market in Denmark. If you take a look at that, it is the very specific situation of that market in Denmark that actually forced the adoption of MPC. The primary considerations are not security and privacy, rather the reality of the market and the nature of the needs of the players in the market. And if we look at it from that way, I would, yes. It is much more likely that this type of solution will be first adopted in the European Union than it is in the United States. >>: Why is that the case? >>: Because this example of -- sorry, I didn't hear. The example of the sugar beet market in Denmark is an example where you have -- if I recall correctly, the example is a state-owned monopoly that controls the auctions of sugar beet. Now, the concern here of the people producing the sugar beet was that this entity had so much power over the market that it could sway prices and that it could force some of the farmers to get out of business or the sell at a cheaper rate or whatever. So the only solution that they could come up with in which every single party would trust the end solution was by using an MPC application that would allow people to submit their bids, selling and buying bids, and okay ->>: That, I get. But the question is: Why is that more common in Europe than in the U.S? Conditional page break: 2 >>: I'm not saying that it's more common in Europe. I'm saying in general, the environment in Europe is conducive to that type of situation. Why? Because in the US, you don't have the complex systems of quotas, production quotas. In the case of farming, production quotas that are assigned to the different countries, and in each country, the market is managed by a different entity. It's all very complex. That's I think, one of the areas where MPC could shine. >>: But I would assume that like monopoly markets, if monopoly is the distinguishing feature, you probably have, I mean, I don't want to mention the building we're sitting in, right [laughter], but there are definitely monopoly markets in the US as well, and they would be just as amenable. >>: So I'm not a US citizen. I'm not making any judgments about the politics or social reality in either Europe or the US. I'm completely agnostic about that. I just look at the facts, what's out there, and what I think would be conducive to the adoption of the MPC. In the US, there are horrific monopolies, but that's a completely different conversation. >>: So we don't have much time left. So I want to get on to another question, which is: What other research communities have been successful at impacting the real world and industry? Why were they successful? What can we learn from them? So some examples are things like [indiscernible] systems, Hadoop. The database communities in general, I think, has had quite some -- the database research community has had quite some impact on industry information retrieval, obviously with search, and I know there's other kind of security-related communities that have tried to have an impact. Like differential privacy has been trying to kind of get some also TKAOPLS. So can we learn anything from those communities? And what have they done right? >>: Wow. >>: My guess is they have a need, you know. They have something that people actually physically need that is very clear, and it's obvious to everybody, so they make what they produce and will use it. So, optimizing something, supply chain. It's you can save the money and so, of course, you want to pay for this MPC. You don't save the money. So it's I think it's fundamentally different from this perspective. >>: -- crypto has a lot of impact. >>: Yeah well, so ->>: Why doesn't ->>: The MPC, yeah, because you have to protect against the guy on the wire, right. Obviously because - so the security people pay for security a little. They don't want to, but they kind of have to, right. But so that protects you against the guy on the wire, but if you're talking to your bank, you know, who wants to make sure that bank where you cannot cheat, you know? >>: [indiscernible] years since the invention of RSA for it to come out. Why do we expect it to happen now? In fact, I think, you know, we have more exposure than we've ever had before. There's more interest than ever, but these things just take time. >>: I completely agree with that assessment. You have to keep in mind that in the case of what I would call traditional crypto or basic crypto, the need had already been established before even the technologies were there. I mean, there was a need for banks to communicate securely between themselves and communication links were born. And maybe they were point-to-point, and they thought that that was enough. At some point, that stopped being enough and banks started to look for other measures, and that was what began to open the door. For instance, circumstances had to be moving from specific enterprise markets like banks, to general adoption by the public, and it was the existence of the Internet that made this need very, very explicit. But you're right; it took time. And I know I've come across very, very negative. I am not. I truly believe that MPC will be adopted. I don't think it's going to happen overnight. I don't think it's going to happen through legislation. It might happen. I think the probabilities are low. I don't think it's going to happen through a magic bullet app. I think it's going to happen just like the adoption of many other technologies that were far-reaching enough, which is, it's going to happen through hard work and dedication. And we need to look for those opportunities, and we need to educate people. And we need to create the spaces where the opportunities and the technology can come together, and we need to work together work to create the opportunities where education can happen. I think that that is what is going to change this. >>: I have a question. I never belonged to talk about APC and adopting your APC. We talk about MPC. We talk about individual people believing MPC or not, but there is another angle to view it. Maybe I, as an individual person, I'm not that much careful about my data. But when I give my data to Microsoft, it becomes more important for Microsoft to make it private, to believe it's private, because, for example, Microsoft or Google or other companies have a huge amount of data from individual people. And if they lose the privacy of this huge amount of data it can be a mess. And why we never talk about this impact, or maybe you've thought about it, but can I know your view of privacy in this aspect? >>: Why do we never talk about the consequences? >>: The consequences of revealing huge amount of data, not just individuals. >>: You have huge amounts of data being revealed here in the US to NSA. It's happening right now. >>: Yes but ->>: I think you're talking about ->>: Not specifically government or companies, even for other private companies when you lose a huge amount of data. >>: Oh, you mean through data breaches? >>: Yes. >>: So the consequences are huge. Again, I think what you have -- so it's not that companies don't worry about this. Some companies do; some companies don't. And some companies start worrying after they suffer the data breaches, yeah. Now, the problem with the data breach, again, is that your average person out there in the wild, as they say, really has no clue of what sorts of risk he or she is exposed to. Why? Because data breaches are very, very insidious in the sense that a lot of stuff can be happening to you and you don't know. Your identity may be stolen, but the identity might be so good that you never actually find out about it. You suffer. You pay the price, but you never notice. That's possible. In other cases people notice after a long time, and in other cases this use of the information that those nefarious parties might be making can be completely obscure. Again, you're still paying the price, but you don't know. >>: I'm not saying about me as an individual paying the price. I'm talking about, for example, Microsoft as a company paying the price because of the breach. Is there some price that your company must make because of the huge amount of private information? You have good data breaches and some marketing and stuff for people that you know, but, for instance, as you have other companies coming in and stole this private information that you have. It's a real huge loss for your company. >>: There is a significant -- there is a yearly survey put out by a company called Poneman Consulting, and I think they've been doing this yearly survey, I think, for the last 15 or 20 years. And every year, the average cost of a data breach -- they do a survey of the companies that have suffered data breaches, and they talked with them about what the direct costs of these breaches are and so on and so forth. And every year, the average cost of these breaches goes up. The numbers are horrendous, and there have been cases of companies that have almost disappeared because of these breaches. >>: Can this cost be a motivation for private companies to apply MPC on their own data that's their own data. It has value. Data has value, though. >>: I think it is a motivation, yes. >>: I've actually spoken to quite a few companies recently, because the issue which is exactly right to that issue. So the figure or the [indiscernible] to be aware. Some other companies that's one thing, but I have spoken to, for example, like a small hospital that's also a university in medicine somewhere in the US. I spoke to the chief security officer and he said, well, we don't even encrypt our data, but I at least have proof that I have told my managers many times that we need to [laughter]. So there is a lot of really sensitive data out there which isn't even being encrypted, and it really depends who you're talking about, and it's incredibly diverse about whether -- there are some who've said to me, yes, if you had this available now, we'd take. And it some have said, you know, I wish I could get my managers to even agree that we should encrypt our database, and everything in between. >>: We're already out of time. I am going to ask one last question and I just want the panelists to respond to this question because we're over time. So, I mean, all the panelists work in industry and all have tried to promote in their respective companies. So one question is: What have been the biggest objections or roadblocks that you run into, just out of curiosity? And which ones were the biggest. >>: The biggest objections and roadblocks. (a) We've had to justify MPC primarily on economic grounds rather than security and privacy and (b) I would say it is very hard sometimes to put these technologies in a context that is enticing enough for the business. And what I mean by that is this: You can explain what the damage does and weave in factors. And Seny is a witness to this. We've been to many, many internal forums and presented about MPC and explained these are the scenarios in which you could use MPC. And interestingly enough, the people don't seem to get it. It is only until you talk to someone whose immediate need is very clearly present in his mind or her mind that we saw a reaction. There was one person specifically to whom I had talked about MPC several times for whom MPC had not clicked. And one day in a coffee shop, it clicked, and things started to move really, really fast after that. So again education, keep trying, and focus not only on the security and privacy benefits. Think about what are the economics and the efficiencies that can be gained. >>: Yeah, I did try to promote secure computation, and the main objection was costs. In talking to engineers when they -- so the function there was kind of expensive. The overhead was high on some location-based privacy, or I forgot exactly what it was, but it was significant. It wasn't like a tiny portion that you can, you know, overpay whatever you want. With engineers in a scalable industry, they count every cent, and when they do that, the overheads that we talk without any problem, they're horrified, and it doesn't go much farther than this. So, you know, it needs to be an application that privacy is important and the cost is small. It can't be noticeable. And I wasn't even talking implementation costs. They had no idea that they'd have to hire, you know, [laughter] a bunch of new guys to implement it. It was just what's the length of message you need to send? At that level already, it was -- it was a show stopper, the costs. >>: It's very similar to what Javier said. You have to have someone who has a clear problem, and then you have to essentially claim you solved that problem. And if you have a good marketing story, they will not question you how you solved it. If you say, I encrypt it and you keep the key, the solution is fine. But the problem has to be -- it has to be a clear and present problem. And economic reasons might not be the ones that are actually driving it. So as I said, in supply chain management, the economic reasons are there. They are obvious, right. Everyone knows them, and they are obvious to people. >>: What was the -- why were they pushing back if you could sort of prove that? >>: The question is you have to convince the customer to do something different, and you're making money with the project right now. >>: So in your case, it was just a matter -- it was just inertia? They just -- you could prove that they would save money, but they were just kind of, well, we just don't feel like doing anything new and that's ->>: Business risk. You have to establish a new product. Way too much risk. We have a product right now. It doesn't do that. We can't do that. We know we can't do that. We can do, yeah, we have to do a little bit of hand waving, and that. Why do I care to solve the problem, right? And that is -establishing a new product is much, much harder than actually adding a feature to it, and somebody has -- it's making money right now, and he says, now, okay for something I -- it stopped. The money stops coming in for security reasons, most probably money stops coming in, then you have a chance, and then you have to be fast. >>: I agree, unfortunately, yeah. All right. So that's it for the panel. We had a bunch more questions, but we're pretty behind. So we're supposed to have break from 2:00 to 215, so we're just going to have a 5-minute break or I guess a 7-minute break. We'll be back at 2:15 for the next session. [applause]