Slides - MIT - Communications Futures Program

advertisement
The New Normal in
Privacy: discussion of a
dilemma
Karen Sollins
Principal Scientist, MIT CSAIL
October 2, 2014
10/2/14
Karen Sollins: Privacy
1
Consider recent examples: the
Snowden case
►
►
►
10/2/14
Technical issues
►
NSA collecting information and analytics
►
Non-governmental organizations collecting information and providing it to the
government (sometimes under duress)
►
Security is imperfect
Legal issues
►
Fourth amendment in US
►
Treaties and other geopolitical legal bindings (or not)
Social issues: What I found at the most recent IETF
►
“Snowdon” and “NSA” were all the buzz
►
Sense of always looking over one’s shoulder
Karen Sollins: Privacy
2
“Snowdon”: questions/issues
►
►
Technical
►
Analytics? Collecting for future analytical tools?
►
Scalability?
Legal
What are the social norms for privacy?
► What are the social norms for responsibility for security/privacy?
► Each international governmental organization makes unilateral decisions.
Does this scale (in Andy’s terms, not just growth)?
► Where are the stable points (in Dave’s terms) in the legal/regulatory
context?
►
►
10/2/14
Social: Is the new normal, watching over our shoulders?
Karen Sollins: Privacy
3
Consider recent examples:
Google, what they’re doing
►
►
►
Technical issue: increasing use of HTTPS
►
Last spring: gmail
►
August, 2014: positive ranking in search engines for encrypted websites.
Currently, lightweight
►
Will increase the weighting
Business issues:
►
Placement in search results
►
Pressure to encrypt using HTTPS (SSL/TLS)
►
Improve Google’s image
►
Perhaps reduce Google’s risks
Social issues:
►
10/2/14
►
Appearance that Google has the user’s interest at heart
Karen Sollins: Privacy
4
Google: questions/issues
►
Technical issues:
►
HTTPS is about authenticated and encrypted communication
►
Says nothing about content itself being encrypted at Google
►
►
10/2/14
Email “known” to Google
►
Copies of pages “known” to Google
“Traditional” Google functions uninterruped
Business issues
►
►
►
Does this change Google’s business model?
►
No: continued analysis, continued advertising and bit data functions
►
Yes: Google can trust authentication and integrity. Individuals can trust threats from
cleartext, unauthenticated mail sources.
Social issue: where is the increased privacy and where not? How to value
the effects of “Big Data”? (Unchanged here.)
Karen Sollins: Privacy
5
Consider recent examples:
Apple and iOS8
►
Technical issue:
Apple will no longer be able to “open” an iPhone.
► Anything protected by the passcode on an iPhone will be inaccessible to
Apple
► Everything in the iCloud, as well as all tracking, monitoring, meta-data
collected by Apple will not be protected.
►
►
Legal issues:
►
►
Even with legal warrants, Apple “cannot” obtain information
Social Issues:
Should we be redefining what is considered “in plain view” in light of smart
phone technology and use?
► If the user has protected his or her iPhone with a passcode, what
responsibility does Apple have for privacy of information in their services?
►
10/2/14
Karen Sollins: Privacy
6
Apple: questions/issues
►
►
Legal issues
►
If passcode locks a phone, and the police stop someone with an iPhone in use, can
they look at the phone before it locks itself, and how does that interact with the
requirement for a warrant?
►
What is “legal search and seizure” under Fourth Amendment?
►
[Orin Kerr,Volokh Conspiracy Blog/Julian Sanchez, Cato Institute]
Is it necessary (from Fourth Amendment perspective) to support the government in what it
has become accustomed to?
►
Where is the boundary between privacy and public/government need for search and
seizure? Is there ever too much crypto?
►
Courts have balanced privacy and government (social norm) requirements repeatedly as
technology has evolved. How might we rebalance now in light of smart phones?
Social issues
►
10/2/14
►
Trying to change the user’s “trust” model, but how much is this actually true?
Karen Sollins: Privacy
7
Some questions: business
issues
►
10/2/14
Google and Apple are making business decisions about the
appearance of privacy.
►
In your organization, are you also finding business tradeoffs with
respect to privacy?
►
Which kinds of information should remain in control of customers and
which in control of the service provider (whether TV/Entertainment,
user service provider, communications service provider or many
others)?
►
How does one handle the customer perception (in contrast with the
reality of what information is collected about the user and used in
provision of service and business opportunities)?
►
How is this changing with advances in technology? Social norms?
►
How do you do the cost-benefit analysis?
Karen Sollins: Privacy
8
Some questions: privacy and
governance
►
The US Fourth Amendment is very US centric.
►
In places where personal information is considered inalienably
accrued to the subject of the information, what is the balance
between that and
► The
need by government to enforce laws and regulations?
► The
need of companies to collect information in the operation of their
businesses (consider the need for network provisioning and
management, the need to determine economic interest in
entertainment products, etc)?
►
In other parts of the world, personal information is considered
under the ownership of the government.
► How
10/2/14
does this affect business models?
Karen Sollins: Privacy
9
Questions: The Internet is
global
►
If the new normal is different in different social and legal
regimes, how do we reconcile these differences across
those social and geopolitical boundaries? Are there business
models for privacy that might transcend those boundaries?
►
Are there technologies needed (or existing), that will help
us to support heterogeneity in the face of the need for a
global Internet, technically, socially, and legally?
10/2/14
Karen Sollins: Privacy
10
Your questions and answers
Karen Sollins
sollins@csail.mit.edu
+1 617 253 6006
10/2/14
Karen Sollins: Privacy
11
Download