Published on March 11, 2014
We know what you did last summer Location Privacy at SXSW 2014
Tyler Bell Julian Green
Location Privacy Has Evolved
Location Capture & Aggregation
WiFi Triangulation: DC to NYC
Location Sourcing - GPS - Wifi - IP Address - Cell Towers - Associative Location -- RFID (Your Badge) -- Bluetooth - "Checkins" - "Co-Travelers" - Receipts and Retail - Photos and Digital Assets - Apps and Advertising
Cradle-to-Grave: 'Quantified Self'
Welcome to iOS7
Location Aggregation: an application called 'creepy' demonstrates its cautionary potential https://github. com/ilektrojohn/creepy
NSA: Aggregating Location
NSA Cellphone Tracking
"Warheads on Foreheads" - SIM-targeting Drones
ACLU Vid: What the Government Can Do With That Location Data
Public Places & Expectation of Privacy
Headline: "Boston policemen complain about new plan to watch their movements" Anon officer: “No one likes it. Who wants to be followed all over the place?”
Minneapolis Mayor Rybak Tracked by License Plate Readers
"What’s really most intriguing is that you can be 100% guaranteed to be identified by simply your gait – how you walk." - CTO of the CIA
Protection & Law
Personally Identifiable Information (PII)
The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no Warrants shall issue, but upon probable cause, supported by Oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized. 4th Amendment
Precision Error: security breach by triangulation
Hey Kids! Remember to Mask Your IP
No Consumer Benefit
Convenience Privacy Thinking About Privacy
More private AND More convenient Lock Screens
Use Only What You Need
Jetpac City Guides
EFF Ten Steps Anonymity? 1. End-to-end encryption 2. HTTPS everywhere, VPN 3. Encrypt hard drive 4. Strong passwords, manager 5. Tor anonymity 6. 2-factor authentication 7. Don’t click on attachments 8. Update software/anti-virus 9. Separately encrypt secrets 10. Ask govt. to “Stop Watching Us” User Location Privacy
1. Request only what you need 2. Users choose 3. No surprises - say what you do, do what you say 4. Don’t share ID numbers 5. Control your ad network (any data sharing 3rd parties) 6. Transit encryption for PII - mobile access points insecure - https Design for Privacy First
Electronic Frontier Foundation https://www.eff.org/ ACLU http://www.aclu.org/blog/free-future Electronic Privacy Information Center http://epic.org/
SXSW 2014 ran from March 7 to 16. ... about privacy rights. The festival also featured a talk from another famous leaker, Julian Assange, ...
The Best of Tech from SXSW 2014. ... this year featured Edward Snowden and Julian ... "There was quite a bit of talk about the Internet of Things ...
... here's what struck me as ten trends to watch from SXSW. 1. Privacy The ... Top 10 Trends to Emerge from SXSW 2014. ... so much talk about it that ...
On Our Team at SXSW.... Congratulations. You’re attending SXSW Interactive, one of the top communications trend events in the world. We recognize what ...
Julian Green, Tyler Bell. More ... Do you feel like your peers just talk and talk just to hear themselves speak? ... ©2012-2014 SXSW, ...
2014 Schedule. Interactive: ... Welcome to the 2014 SXSW Interactive Festival. ... Julian Assange, founder of Wikileaks, ...
Appearing before a green screen that had been programmed to ... Julian Assange, founder of ... 2014 An article on Tuesday about a talk by Edward ...
South by Southwest (abbreviated as SXSW) ... featured a talk from another famous leaker, Julian ... 25, 2014. ^ A Guide to the South By Southwest ...