92
The Everyday Life of Surveillance (V): Architectures, Spaces, Territories Privacy by Design? Marc Langheinrich University of Lugano (USI) Switzerland

The Everyday Life of Surveillance (V): Architectures ... · PDF fileThe Everyday Life of Surveillance (V): Architectures, Spaces, Territories Privacy by Design? ... –Owner uses tags

Embed Size (px)

Citation preview

Page 1: The Everyday Life of Surveillance (V): Architectures ... · PDF fileThe Everyday Life of Surveillance (V): Architectures, Spaces, Territories Privacy by Design? ... –Owner uses tags

The Everyday Life of Surveillance (V): Architectures, Spaces, Territories

Privacy by Design?

Marc LangheinrichUniversity of Lugano (USI)

Switzerland

Page 2: The Everyday Life of Surveillance (V): Architectures ... · PDF fileThe Everyday Life of Surveillance (V): Architectures, Spaces, Territories Privacy by Design? ... –Owner uses tags
Page 3: The Everyday Life of Surveillance (V): Architectures ... · PDF fileThe Everyday Life of Surveillance (V): Architectures, Spaces, Territories Privacy by Design? ... –Owner uses tags

Projects

Page 4: The Everyday Life of Surveillance (V): Architectures ... · PDF fileThe Everyday Life of Surveillance (V): Architectures, Spaces, Territories Privacy by Design? ... –Owner uses tags

Privacy Ubiquitous Computing

Page 5: The Everyday Life of Surveillance (V): Architectures ... · PDF fileThe Everyday Life of Surveillance (V): Architectures, Spaces, Territories Privacy by Design? ... –Owner uses tags
Page 6: The Everyday Life of Surveillance (V): Architectures ... · PDF fileThe Everyday Life of Surveillance (V): Architectures, Spaces, Territories Privacy by Design? ... –Owner uses tags
Page 7: The Everyday Life of Surveillance (V): Architectures ... · PDF fileThe Everyday Life of Surveillance (V): Architectures, Spaces, Territories Privacy by Design? ... –Owner uses tags

Patras

Zurich

Gothenburg

Paris

Lancaster

Sevilla

Page 8: The Everyday Life of Surveillance (V): Architectures ... · PDF fileThe Everyday Life of Surveillance (V): Architectures, Spaces, Territories Privacy by Design? ... –Owner uses tags

Approaches to Ubicomp Privacy Disappearing Computer Troubadour Project (10/2002 - 05/2003)

• Make it Someone Else’s Problem– “For [my colleague] it is more appropriate to think

about [security and privacy] issues. It’s not really the case in my case“

• Absence of Protection as User Empowerment– “It’s maybe about letting them find their own

ways of cheating“

• Insist that “Good Security“ will Fix It– “All you need is really good firewalls“

Marc Langheinrich: The DC-Privacy Troubadour – Assessing Privacy Implications of DC-Projects. Designing for Privacy Workshop. DC Tales Conference, Santorini, Greece, June 2003.

24

Page 9: The Everyday Life of Surveillance (V): Architectures ... · PDF fileThe Everyday Life of Surveillance (V): Architectures, Spaces, Territories Privacy by Design? ... –Owner uses tags
Page 10: The Everyday Life of Surveillance (V): Architectures ... · PDF fileThe Everyday Life of Surveillance (V): Architectures, Spaces, Territories Privacy by Design? ... –Owner uses tags
Page 11: The Everyday Life of Surveillance (V): Architectures ... · PDF fileThe Everyday Life of Surveillance (V): Architectures, Spaces, Territories Privacy by Design? ... –Owner uses tags
Page 12: The Everyday Life of Surveillance (V): Architectures ... · PDF fileThe Everyday Life of Surveillance (V): Architectures, Spaces, Territories Privacy by Design? ... –Owner uses tags

NON PRIVACY BY NON DESIGNExample 1: Make it someone elses problem

Page 13: The Everyday Life of Surveillance (V): Architectures ... · PDF fileThe Everyday Life of Surveillance (V): Architectures, Spaces, Territories Privacy by Design? ... –Owner uses tags
Page 14: The Everyday Life of Surveillance (V): Architectures ... · PDF fileThe Everyday Life of Surveillance (V): Architectures, Spaces, Territories Privacy by Design? ... –Owner uses tags
Page 15: The Everyday Life of Surveillance (V): Architectures ... · PDF fileThe Everyday Life of Surveillance (V): Architectures, Spaces, Territories Privacy by Design? ... –Owner uses tags

“Uses the highest level of encryption allowed by the U.S.

government.”

Page 16: The Everyday Life of Surveillance (V): Architectures ... · PDF fileThe Everyday Life of Surveillance (V): Architectures, Spaces, Territories Privacy by Design? ... –Owner uses tags

2006

Page 17: The Everyday Life of Surveillance (V): Architectures ... · PDF fileThe Everyday Life of Surveillance (V): Architectures, Spaces, Territories Privacy by Design? ... –Owner uses tags

20 cards

no encryption

Page 18: The Everyday Life of Surveillance (V): Architectures ... · PDF fileThe Everyday Life of Surveillance (V): Architectures, Spaces, Territories Privacy by Design? ... –Owner uses tags

Cardholder‘s NameCard Number

Expiration Date

Page 19: The Everyday Life of Surveillance (V): Architectures ... · PDF fileThe Everyday Life of Surveillance (V): Architectures, Spaces, Territories Privacy by Design? ... –Owner uses tags
Page 20: The Everyday Life of Surveillance (V): Architectures ... · PDF fileThe Everyday Life of Surveillance (V): Architectures, Spaces, Territories Privacy by Design? ... –Owner uses tags

O‘Reilly Conf. 2008

Pablos Holman

Page 21: The Everyday Life of Surveillance (V): Architectures ... · PDF fileThe Everyday Life of Surveillance (V): Architectures, Spaces, Territories Privacy by Design? ... –Owner uses tags

“cards incorporate 128-bit encryption”

Page 22: The Everyday Life of Surveillance (V): Architectures ... · PDF fileThe Everyday Life of Surveillance (V): Architectures, Spaces, Territories Privacy by Design? ... –Owner uses tags

Cardholder‘s NameCard Number

Expiration Date

Page 23: The Everyday Life of Surveillance (V): Architectures ... · PDF fileThe Everyday Life of Surveillance (V): Architectures, Spaces, Territories Privacy by Design? ... –Owner uses tags
Page 24: The Everyday Life of Surveillance (V): Architectures ... · PDF fileThe Everyday Life of Surveillance (V): Architectures, Spaces, Territories Privacy by Design? ... –Owner uses tags
Page 25: The Everyday Life of Surveillance (V): Architectures ... · PDF fileThe Everyday Life of Surveillance (V): Architectures, Spaces, Territories Privacy by Design? ... –Owner uses tags

*MacBook Air not included

Page 26: The Everyday Life of Surveillance (V): Architectures ... · PDF fileThe Everyday Life of Surveillance (V): Architectures, Spaces, Territories Privacy by Design? ... –Owner uses tags

Defcon 2008

Flexilis

Page 27: The Everyday Life of Surveillance (V): Architectures ... · PDF fileThe Everyday Life of Surveillance (V): Architectures, Spaces, Territories Privacy by Design? ... –Owner uses tags
Page 28: The Everyday Life of Surveillance (V): Architectures ... · PDF fileThe Everyday Life of Surveillance (V): Architectures, Spaces, Territories Privacy by Design? ... –Owner uses tags
Page 29: The Everyday Life of Surveillance (V): Architectures ... · PDF fileThe Everyday Life of Surveillance (V): Architectures, Spaces, Territories Privacy by Design? ... –Owner uses tags
Page 30: The Everyday Life of Surveillance (V): Architectures ... · PDF fileThe Everyday Life of Surveillance (V): Architectures, Spaces, Territories Privacy by Design? ... –Owner uses tags

Non Privacy By Non Design

Page 31: The Everyday Life of Surveillance (V): Architectures ... · PDF fileThe Everyday Life of Surveillance (V): Architectures, Spaces, Territories Privacy by Design? ... –Owner uses tags

NON PRIVACY BY (BAD) DESIGNExample 2: User Empowerment

SECURITY

Page 32: The Everyday Life of Surveillance (V): Architectures ... · PDF fileThe Everyday Life of Surveillance (V): Architectures, Spaces, Territories Privacy by Design? ... –Owner uses tags
Page 33: The Everyday Life of Surveillance (V): Architectures ... · PDF fileThe Everyday Life of Surveillance (V): Architectures, Spaces, Territories Privacy by Design? ... –Owner uses tags

P<D<<LANGHEINRICH<<MARC<<<<<<<<<<<<<<<<<<<<<123456789?D<<710123?M070101?<<<<<<<<<<<<<<<?

Page 34: The Everyday Life of Surveillance (V): Architectures ... · PDF fileThe Everyday Life of Surveillance (V): Architectures, Spaces, Territories Privacy by Design? ... –Owner uses tags

MarcLangheinrich

Page 35: The Everyday Life of Surveillance (V): Architectures ... · PDF fileThe Everyday Life of Surveillance (V): Architectures, Spaces, Territories Privacy by Design? ... –Owner uses tags

DD/MMM/1971

Page 36: The Everyday Life of Surveillance (V): Architectures ... · PDF fileThe Everyday Life of Surveillance (V): Architectures, Spaces, Territories Privacy by Design? ... –Owner uses tags
Page 37: The Everyday Life of Surveillance (V): Architectures ... · PDF fileThe Everyday Life of Surveillance (V): Architectures, Spaces, Territories Privacy by Design? ... –Owner uses tags

P<D<<LANGHEINRICH<<MARC<<<<<<<<<<<<<<<<<<<<<12345678??D<<710123?M0701???<<<<<<<<<<<<<<<?

Page 38: The Everyday Life of Surveillance (V): Architectures ... · PDF fileThe Everyday Life of Surveillance (V): Architectures, Spaces, Territories Privacy by Design? ... –Owner uses tags
Page 39: The Everyday Life of Surveillance (V): Architectures ... · PDF fileThe Everyday Life of Surveillance (V): Architectures, Spaces, Territories Privacy by Design? ... –Owner uses tags
Page 40: The Everyday Life of Surveillance (V): Architectures ... · PDF fileThe Everyday Life of Surveillance (V): Architectures, Spaces, Territories Privacy by Design? ... –Owner uses tags
Page 41: The Everyday Life of Surveillance (V): Architectures ... · PDF fileThe Everyday Life of Surveillance (V): Architectures, Spaces, Territories Privacy by Design? ... –Owner uses tags
Page 42: The Everyday Life of Surveillance (V): Architectures ... · PDF fileThe Everyday Life of Surveillance (V): Architectures, Spaces, Territories Privacy by Design? ... –Owner uses tags
Page 43: The Everyday Life of Surveillance (V): Architectures ... · PDF fileThe Everyday Life of Surveillance (V): Architectures, Spaces, Territories Privacy by Design? ... –Owner uses tags

Protection from Forgery!!

Page 44: The Everyday Life of Surveillance (V): Architectures ... · PDF fileThe Everyday Life of Surveillance (V): Architectures, Spaces, Territories Privacy by Design? ... –Owner uses tags

Digital Signature

Page 45: The Everyday Life of Surveillance (V): Architectures ... · PDF fileThe Everyday Life of Surveillance (V): Architectures, Spaces, Territories Privacy by Design? ... –Owner uses tags

„ ...cloned and manipulated... “

Page 46: The Everyday Life of Surveillance (V): Architectures ... · PDF fileThe Everyday Life of Surveillance (V): Architectures, Spaces, Territories Privacy by Design? ... –Owner uses tags
Page 47: The Everyday Life of Surveillance (V): Architectures ... · PDF fileThe Everyday Life of Surveillance (V): Architectures, Spaces, Territories Privacy by Design? ... –Owner uses tags

MustermannChristian0000000000000

?

Proof of Genuine Passport ?

Page 48: The Everyday Life of Surveillance (V): Architectures ... · PDF fileThe Everyday Life of Surveillance (V): Architectures, Spaces, Territories Privacy by Design? ... –Owner uses tags
Page 49: The Everyday Life of Surveillance (V): Architectures ... · PDF fileThe Everyday Life of Surveillance (V): Architectures, Spaces, Territories Privacy by Design? ... –Owner uses tags
Page 50: The Everyday Life of Surveillance (V): Architectures ... · PDF fileThe Everyday Life of Surveillance (V): Architectures, Spaces, Territories Privacy by Design? ... –Owner uses tags
Page 51: The Everyday Life of Surveillance (V): Architectures ... · PDF fileThe Everyday Life of Surveillance (V): Architectures, Spaces, Territories Privacy by Design? ... –Owner uses tags

Non Security By Bad Design

Page 52: The Everyday Life of Surveillance (V): Architectures ... · PDF fileThe Everyday Life of Surveillance (V): Architectures, Spaces, Territories Privacy by Design? ... –Owner uses tags

PRIVACY BY DESIGN?Example 3: Good Firewalls

Page 53: The Everyday Life of Surveillance (V): Architectures ... · PDF fileThe Everyday Life of Surveillance (V): Architectures, Spaces, Territories Privacy by Design? ... –Owner uses tags
Page 54: The Everyday Life of Surveillance (V): Architectures ... · PDF fileThe Everyday Life of Surveillance (V): Architectures, Spaces, Territories Privacy by Design? ... –Owner uses tags

Smart Fridge

Page 55: The Everyday Life of Surveillance (V): Architectures ... · PDF fileThe Everyday Life of Surveillance (V): Architectures, Spaces, Territories Privacy by Design? ... –Owner uses tags

Smart Stove

Page 56: The Everyday Life of Surveillance (V): Architectures ... · PDF fileThe Everyday Life of Surveillance (V): Architectures, Spaces, Territories Privacy by Design? ... –Owner uses tags

Receiptless Returns

Page 57: The Everyday Life of Surveillance (V): Architectures ... · PDF fileThe Everyday Life of Surveillance (V): Architectures, Spaces, Territories Privacy by Design? ... –Owner uses tags

Fast Checkout

Page 58: The Everyday Life of Surveillance (V): Architectures ... · PDF fileThe Everyday Life of Surveillance (V): Architectures, Spaces, Territories Privacy by Design? ... –Owner uses tags
Page 59: The Everyday Life of Surveillance (V): Architectures ... · PDF fileThe Everyday Life of Surveillance (V): Architectures, Spaces, Territories Privacy by Design? ... –Owner uses tags
Page 60: The Everyday Life of Surveillance (V): Architectures ... · PDF fileThe Everyday Life of Surveillance (V): Architectures, Spaces, Territories Privacy by Design? ... –Owner uses tags
Page 61: The Everyday Life of Surveillance (V): Architectures ... · PDF fileThe Everyday Life of Surveillance (V): Architectures, Spaces, Territories Privacy by Design? ... –Owner uses tags

WhigModel #2342

Material: PolyesterTiger ThongMaker: Woolworth

Last washed: 5 days ago

ViagraMaker: Pfizer

Size: Maxi (60 pills)

Ori

gina

l “RF

ID-M

an”

Art

wor

k (c

) 200

6 A

ri Ju

els,

RSA

Lab

orat

orie

s

Page 62: The Everyday Life of Surveillance (V): Architectures ... · PDF fileThe Everyday Life of Surveillance (V): Architectures, Spaces, Territories Privacy by Design? ... –Owner uses tags
Page 63: The Everyday Life of Surveillance (V): Architectures ... · PDF fileThe Everyday Life of Surveillance (V): Architectures, Spaces, Territories Privacy by Design? ... –Owner uses tags
Page 64: The Everyday Life of Surveillance (V): Architectures ... · PDF fileThe Everyday Life of Surveillance (V): Architectures, Spaces, Territories Privacy by Design? ... –Owner uses tags
Page 65: The Everyday Life of Surveillance (V): Architectures ... · PDF fileThe Everyday Life of Surveillance (V): Architectures, Spaces, Territories Privacy by Design? ... –Owner uses tags
Page 66: The Everyday Life of Surveillance (V): Architectures ... · PDF fileThe Everyday Life of Surveillance (V): Architectures, Spaces, Territories Privacy by Design? ... –Owner uses tags
Page 67: The Everyday Life of Surveillance (V): Architectures ... · PDF fileThe Everyday Life of Surveillance (V): Architectures, Spaces, Territories Privacy by Design? ... –Owner uses tags
Page 68: The Everyday Life of Surveillance (V): Architectures ... · PDF fileThe Everyday Life of Surveillance (V): Architectures, Spaces, Territories Privacy by Design? ... –Owner uses tags
Page 69: The Everyday Life of Surveillance (V): Architectures ... · PDF fileThe Everyday Life of Surveillance (V): Architectures, Spaces, Territories Privacy by Design? ... –Owner uses tags
Page 70: The Everyday Life of Surveillance (V): Architectures ... · PDF fileThe Everyday Life of Surveillance (V): Architectures, Spaces, Territories Privacy by Design? ... –Owner uses tags

Working Hypothesis

Page 71: The Everyday Life of Surveillance (V): Architectures ... · PDF fileThe Everyday Life of Surveillance (V): Architectures, Spaces, Territories Privacy by Design? ... –Owner uses tags

People don‘t want privacy tools

Page 72: The Everyday Life of Surveillance (V): Architectures ... · PDF fileThe Everyday Life of Surveillance (V): Architectures, Spaces, Territories Privacy by Design? ... –Owner uses tags

People want to get things done!The more secure, private, safe, the better

Page 73: The Everyday Life of Surveillance (V): Architectures ... · PDF fileThe Everyday Life of Surveillance (V): Architectures, Spaces, Territories Privacy by Design? ... –Owner uses tags

Getting Things Done?

Page 74: The Everyday Life of Surveillance (V): Architectures ... · PDF fileThe Everyday Life of Surveillance (V): Architectures, Spaces, Territories Privacy by Design? ... –Owner uses tags

Vision

Page 75: The Everyday Life of Surveillance (V): Architectures ... · PDF fileThe Everyday Life of Surveillance (V): Architectures, Spaces, Territories Privacy by Design? ... –Owner uses tags

Hands Free Privacy

The more secure, private, safe, the better

Page 76: The Everyday Life of Surveillance (V): Architectures ... · PDF fileThe Everyday Life of Surveillance (V): Architectures, Spaces, Territories Privacy by Design? ... –Owner uses tags

Example: The Shamir Tag

Langheinrich, Marti: Practical Minimalist Cryptography for RFID Privacy. IEEE Systems Journal, Vol. 1, No. 2, 2007

Page 77: The Everyday Life of Surveillance (V): Architectures ... · PDF fileThe Everyday Life of Surveillance (V): Architectures, Spaces, Territories Privacy by Design? ... –Owner uses tags

Example: The Shamir Tag

• Unsolicited read-outs take long time–Difficult (but not impossible) to track

or identify

• Instant Identification for known tags–Owner uses tags without restrictions

Langheinrich, Marti: Practical Minimalist Cryptography for RFID Privacy. IEEE Systems Journal, Vol. 1, No. 2, 2007

Page 78: The Everyday Life of Surveillance (V): Architectures ... · PDF fileThe Everyday Life of Surveillance (V): Architectures, Spaces, Territories Privacy by Design? ... –Owner uses tags

Shamir Tags Illustrated

OriginalRFID-Tag:

RFID-Tag contains encrypted ID + Key, but cut in many small pieces. All pieces are needed to decrypt Tag ID.

Page 79: The Everyday Life of Surveillance (V): Architectures ... · PDF fileThe Everyday Life of Surveillance (V): Architectures, Spaces, Territories Privacy by Design? ... –Owner uses tags

Shamir Tags Illustrated

OriginalRFID-Tag:

UnknownReader sees:

Only few shares disclosed A few more shares disclosed Still not enough shares…

wait wait wait

RFID-Tag contains encrypted ID + Key, but cut in many small pieces. All pieces are needed to decrypt Tag ID.

time

Page 80: The Everyday Life of Surveillance (V): Architectures ... · PDF fileThe Everyday Life of Surveillance (V): Architectures, Spaces, Territories Privacy by Design? ... –Owner uses tags

Shamir Tags Illustrated

+ =

OriginalRFID-Tag:

UnknownReader sees:

Owner‘sReader sees:

Owner checks forknown (cached) tag

Instant IdentificationOnly few shares disclosed

Only few shares disclosed A few more shares disclosed Still not enough shares…

wait wait wait

RFID-Tag contains encrypted ID + Key, but cut in many small pieces. All pieces are needed to decrypt Tag ID.

Page 81: The Everyday Life of Surveillance (V): Architectures ... · PDF fileThe Everyday Life of Surveillance (V): Architectures, Spaces, Territories Privacy by Design? ... –Owner uses tags

Consumers receive basicprotection for all tagged goods

Additional security mechanism can be layered above Shamir Tags

Page 82: The Everyday Life of Surveillance (V): Architectures ... · PDF fileThe Everyday Life of Surveillance (V): Architectures, Spaces, Territories Privacy by Design? ... –Owner uses tags

Summary

Page 83: The Everyday Life of Surveillance (V): Architectures ... · PDF fileThe Everyday Life of Surveillance (V): Architectures, Spaces, Territories Privacy by Design? ... –Owner uses tags

Privacy by Design

• Difficult to do even for technology experts– Industrial (RFID Credit Cards)

– Government (ePassport)

• Difficult if wrong user model– People want to get things done

– Privacy, security often gets in the way

• We need usable security and privacy– Sometimes less security may mean more privacy

Page 84: The Everyday Life of Surveillance (V): Architectures ... · PDF fileThe Everyday Life of Surveillance (V): Architectures, Spaces, Territories Privacy by Design? ... –Owner uses tags

Outlook

Page 85: The Everyday Life of Surveillance (V): Architectures ... · PDF fileThe Everyday Life of Surveillance (V): Architectures, Spaces, Territories Privacy by Design? ... –Owner uses tags
Page 86: The Everyday Life of Surveillance (V): Architectures ... · PDF fileThe Everyday Life of Surveillance (V): Architectures, Spaces, Territories Privacy by Design? ... –Owner uses tags
Page 87: The Everyday Life of Surveillance (V): Architectures ... · PDF fileThe Everyday Life of Surveillance (V): Architectures, Spaces, Territories Privacy by Design? ... –Owner uses tags
Page 88: The Everyday Life of Surveillance (V): Architectures ... · PDF fileThe Everyday Life of Surveillance (V): Architectures, Spaces, Territories Privacy by Design? ... –Owner uses tags
Page 89: The Everyday Life of Surveillance (V): Architectures ... · PDF fileThe Everyday Life of Surveillance (V): Architectures, Spaces, Territories Privacy by Design? ... –Owner uses tags
Page 90: The Everyday Life of Surveillance (V): Architectures ... · PDF fileThe Everyday Life of Surveillance (V): Architectures, Spaces, Territories Privacy by Design? ... –Owner uses tags
Page 91: The Everyday Life of Surveillance (V): Architectures ... · PDF fileThe Everyday Life of Surveillance (V): Architectures, Spaces, Territories Privacy by Design? ... –Owner uses tags
Page 92: The Everyday Life of Surveillance (V): Architectures ... · PDF fileThe Everyday Life of Surveillance (V): Architectures, Spaces, Territories Privacy by Design? ... –Owner uses tags

The wireless century will bring an end to many crimes. It will be a century of morality, since it is known that morality and fear are one and the same.

(Robert Sloss, “The World in 100 Years”, 1910)