



Designing Software With Privacy in Mind 77
dalektcalum writes "Dr. Ann Cavoukian, Canada's Information and Privacy Commissioner, recently gave a talk entitled Privacy by Design. The talk starts off by covering the basics of privacy, and privacy law, and then moves onto the important component: how to design software that properly protects users privacy. The majority of the talk is spent on design principles, but also examines specific technologies (such as Elliptical Curve Cryptography)." The site includes a flash video of the talk, but there are also several torrents for folks who want to avoid hammering their servers.
Konspiracy (Score:3, Funny)
Re: (Score:1)
important points (Score:5, Interesting)
Re: (Score:2)
#define DEBUG
#ifdef DEBUG
logInsaneAmountsOfData();
#endif
And then when you go to production, remove the first line. Voila!
Re: (Score:2, Insightful)
Re: (Score:3, Interesting)
If you have problems in production that you don't have in test, then you're not doing your job properly. Ideally, you should be getting problems in test that you don't get in production, as you're pushing your code past realistic limits to see how it fails.
Re: (Score:1)
Re: (Score:2)
http://arstechnica.com/news.ars/post/20071006-microsoft-wants-your-health-care-records-trust.html [arstechnica.com]
Possession is 9 points of the law (Score:5, Insightful)
In more detail, this should actually be implemented by my settings of my privacy preferences. Most requests would be handled routinely without my needing to consider them in detail. For example, if I'm requesting a loan from my bank and they want to check my credit history, then my privacy policy would be to check that it was really my bank and that I had really initiated the loan request, and then they could look at the required information. If they need to compile some summary statistics, I'd agree for them to look at some of my information long enough to tally it. Etc., etc.
If they need to make sure that I don't tamper with my data, they can sign it and put a checksum on it, and I won't be able to tamper with it. There are actually technologies that would still allow me to see what the information is even in that case. Actually, any technical problem you want to point at, I can refer you to the solutions. They are already published in the literature.
The *REAL* problem is that the companies want to own us.
A concrete example for Gmail (Score:2, Interesting)
The email and the indexes would live on my machine. When I reading some email with Gmail, it would scan the email and send only the appropriate keywords to Google, and they would respond with the appropriate ads to be displayed in the appropriate boxes on my computer--but they would not have any direct a
Re:A concrete example for Gmail (Score:5, Insightful)
Re: (Score:1)
If you live your life in a way that demands privacy to assure your personal security, you will be disappointed.
The privacy debates going these days are a bunch of bullshit. Privacy is a myth, and it serves the interests of those who already have access to all the data and don't want to lose that edge by sharing it with everyone else.
We should be striving towards dismantling the myth, banis
Re: (Score:2)
This article is a growing sign of the times, the wild wild west of the internet is coming to an end. In terms of what a company will be allowed to know or keep records of, with regards to the general public will tighten up and basically be reduced to the absolute minimum required for order placement and account keeping processes.
Privacy is not a myth, pri
Re: (Score:2)
Re: (Score:2)
Well, yes, of course, but I was replying to a post where the suggestion was that the mail is stored on _your_ computer. I interpreted that to mean that it isn't stored on someone else's server, because that would kind of make the whole point moot.
``The big problem with being able to read your personal email from anywhere is that it basically means that anyone else c
Re: (Score:2)
By the way, that relates to one of the nifty but little known features of Gmail. If you access Gmail with HTTPS instead of HTTP, then the entire connection stays encrypted. Most other Web-based email systems only attempt to encrypt the password exchange, and then go into the clear.
Though I can't prove it, I'm pretty sure that the email is stored in the clear on Gmail's servers. We know they are constantly searching
Re: (Score:2)
I own my computer and I access e-mail (once on its mailbox) via secure protocols like IMAPS and/or HTTPS.
Of course that doesn't cope with the MTA to MTA transmission which is usually in the clear.
But then, that's what PGP/GPG is for.
"Though I can't prove it, I'm pretty sure that the email is stored in the clear on Gmail's servers"
That's pretty irrelevant. It's obvious that the end user is doing nothing to decyph
Re: (Score:2)
Re: (Score:2)
Which part of "that's what PGP/GPG (or S/MIME) is for" didn't you understand?
Re: (Score:2)
Re: (Score:2)
My intended point is that by using the SMT protocol I'm not "basically [...] accepting that the email will be transmitted in the clear": there are known and not difficult to use protocols that are specifically designed to cypher point-to-point e-mail messages.
Re: (Score:2)
Why bother storing it on your end if you're going to do this? A web-based email could encrypt email as you checked it, using a key stored on your machine, and then delete the original
Re: (Score:2)
It does get more complicated when you consider the funding aspects, which basically means advertising revenue in Google's case. However, the question here would be what needs t
Re: (Score:2)
And, yes, it's a good guess that anything with 'citizen' in it is probably a joke.
Re: (Score:2)
Re: (Score:2)
Then you could have a fixed-IP xDSL connection and manage you own mail server/webmail, not that it is such a "geeky" task.
Re:A concrete example for Gmail (Score:4, Insightful)
Re: (Score:1)
You could publish a public key and have all senders encrypt their e-mail. I've had to do this using PGP for some sensitive e-mail communication. You can still use gmail servers, but you'd either have to decrypt the e-mail yourself or use a program that does it for you automatically.
If you're worried about private information then encrypt it. As long as you're sending e-mail without encryption your data in unsafe. Too bad most websites don't have a checkbox th
The sad truth is that you wouldn't like the result (Score:2)
Re:The sad truth is that you wouldn't like the res (Score:2)
Difference between rule 1 and rule 2 in this case. (Score:2)
Rule 2: For information you DO collect, do not trust the end user not to loose it.
Your points primarily relate to rule 1 -- That is, my application should not be storing any data not directly needed for its operation. I don't collection ss# because there is no need. I don't store credit card numbers because there is no need. You can't have stolen from me what I do not store.
On these points, I agree compl
Re:Difference between rule 1 and rule 2 in this ca (Score:2)
They [again referring to corporations and governments] don't want to do that because it is more convenient for them to collect, look at, exploit, and (in
Sure, but that's not what TFA is about. (Score:2)
misread... (Score:4, Funny)
Designing Software With Piracy in Mind
Hey! Me too! (Score:1, Interesting)
You know... all those copies of Windowses and Offices and Photoshops and etc...
Being so easily distributed and pirated that I am yet to see a user with a licensed Windows copy. Or a legal copy of Photoshop...
unbelievable... (Score:1)
Re: (Score:2, Insightful)
Re: (Score:1)
Privacy (Score:2, Insightful)
Just as an aside: You'll notice when you deal with privacy issues that many of the people who say, "If you aren't doing anything wrong, what are you trying to hide?" usually have pretty rigid limits on what parts of their own lives are on public display. Powerful organizations and people ha
Re:Privacy (Score:5, Interesting)
databases are risks (Score:2, Informative)
this happened due to some entries in some databases about them hanging around with the wrong people.
[1]
Re: (Score:1)
Re: (Score:1)
Re:Privacy - two points here (Score:2)
1. If you're not guilty, you've nothing to hide, think of the children, terrorists, blah, blah...
-OR-
2. The Govt. or others, (normally Google), should not have the right to know *everything* about you, rant, rave, loss of civil liberties...
Surely it's rather more nuanced than that? I've got 'nothing to hide', but I'm not about to publish my e-mail here, any more than I am about to leave my car in the street wi
Re: (Score:2)
However, there WILL COME A TIME when the definition of 'WRONG' changes and suddenly you're rounded up for being in the 'WRONG' category due to all the evidence they have against you in the myriad of databases they have on you.
Cases in point:
- Supporters of the Tzar during the Octoberist revolution, dissenters and non-party members in Soviet Russia
- Jews, Catholics, Gays, and oth
Down with privacy? (Score:3, Interesting)
Claiming that privacy's significance is fundamentally rooted in philosophical axioms specifically about privacy are all fine and well, but for those of us who live for more important things in life, something a bit more substantial is required.
IMHO, the significance of privacy breaks down into four issues, all derived from axiomatic benevolence (a very popular axiom):
1) Societal taboos: Society is irrational. Most
Re: (Score:1)
Stop right there. It's not necessary for society to be irrational for there to be a danger, because individuals are irrational. I'd rather not have any nutbar, who decides to take a dislike to me, have unfettered access to personal details such as my schedule and movements.
Re: (Score:1)
The problem is not with your facts but with their context. For one thing, we used to be guaranteed a level of anonymity by raw numbers. Technological advances are taking that away, but we still base our concept of what total lack of privacy would mean on our current situation. We still enjoy a level of protection we don't apprec
About Having Nothing to Hide (Score:2, Interesting)
Re: (Score:1)
Martin
Re: (Score:2)
And don't think I'm kidding. I'm told that in Belarus, people have been arrested for smiling.
Re:About Having Nothing to Hide (Score:4, Insightful)
Your rhetoric is un-nice.
Re: (Score:2)
Re: (Score:2)
I will not argue with you about your instinctive inclinations - if you do not feel the non-learned instinct most people have for protecting their reproductive organs with clothing at most times, and particularly in front of other people, then there is little in the way of argument that will convince you. The idea that those who do have these feelings are "hiding something" is correct here. They are in this case "hiding" something which society in general agrees th
Re: (Score:2)
Re:About Having Nothing to Hide (Score:4, Insightful)
That's because there's no argument to give. Privacy is the naturale state of things: you usually don't know anything about me. Then it is the one that breaks such a 'statu quo' the one that needs to convincingly argument about their intentions. I need no other "convincing argument" for my privacy than "such is my mood".
Trivia... (Score:1)
Video? (Score:1)
Small Correction (Score:3, Informative)
Re: (Score:1)
thank you (Score:1)
I don't think I'd have found it without that article, but I'm very interested. I'm downloading it right now (via torrent)
this is one of the rare occasions, when reading a