1 \documentclass{article} |
1 \documentclass{article} |
2 \usepackage{../style} |
2 \usepackage{../style} |
|
3 \usepackage{../graphics} |
3 |
4 |
4 \begin{document} |
5 \begin{document} |
5 |
6 |
6 \section*{Handout 7 (Privacy)} |
7 \section*{Handout 7 (Privacy)} |
7 |
8 |
8 The first motor car was invented around 1886. For ten years, |
9 The first motor car was invented around 1886. For ten years, |
9 until 1896, the law in the UK and elsewhere required a person |
10 until 1896, the law in the UK (and elsewhere) required a |
10 to walk in front of any moving car waving a red flag. Cars |
11 person to walk in front of any moving car waving a red flag. |
11 were such a novelty that most people did not know what to make |
12 Cars were such a novelty that most people did not know what to |
12 of them. The person with the red flag was intended to warn the |
13 make of them. The person with the red flag was intended to |
13 public, for example horse owners, about the impending |
14 warn the public, for example horse owners, about the impending |
14 novelty---a car. In my humble opinion, we are at the same |
15 novelty---a car. In my humble opinion, we are at the same |
15 stage of development with privacy. Nobody really knows what it |
16 stage of development with privacy. Nobody really knows what it |
16 is about or what it is good for. All seems very hazy. There |
17 is about or what it is good for. All seems very hazy. There |
17 are a few laws (e.g.~cookie law, right-to-be-forgotten law) |
18 are a few laws (e.g.~cookie law, right-to-be-forgotten law) |
18 which address problems with privacy, but even if they are well |
19 which address problems with privacy, but even if they are well |
19 intentioned, they either back-fire or are already obsolete |
20 intentioned, they either back-fire or are already obsolete |
20 because of newer technologies. The result is that the world of |
21 because of newer technologies. The result is that the world of |
21 ``privacy'' looks a little bit like the old Wild West. |
22 ``privacy'' looks a little bit like the old Wild |
|
23 West---lawless and mythical. |
22 |
24 |
23 For example, UCAS, a charity set up to help students with |
25 For example, UCAS, a charity set up to help students with |
24 applying to universities, has a commercial unit that happily |
26 applying to universities, has a commercial unit that happily |
25 sells your email addresses to anybody who forks out enough |
27 sells your email addresses to anybody who forks out enough |
26 money in order to be able to bombard you with spam. Yes, you |
28 money for bombarding you with spam. Yes, you can opt out very |
27 can opt out very often in such ``schemes'', but in case of |
29 often from such ``schemes'', but in case of UCAS any opt-out |
28 UCAS any opt-out will limit also legit emails you might |
30 will limit also legit emails you might actually be interested |
29 actually be interested in.\footnote{The main objectionable |
31 in.\footnote{The main objectionable point, in my opinion, is |
30 point, in my opinion, is that the \emph{charity} everybody has |
32 that the \emph{charity} everybody has to use for HE |
31 to use for HE applications has actually very honourable goals |
33 applications has actually very honourable goals (e.g.~assist |
32 (e.g.~assist applicants in gaining access to universities), |
34 applicants in gaining access to universities), but the small |
33 but the small print (or better the link ``About |
35 print (or better the link ``About us'') reveals they set up |
34 us'') reveals they set up their organisation so that they can |
36 their organisation so that they can also shamelessly sell the |
35 also shamelessly sell the email addresses they ``harvest''. |
37 email addresses they ``harvest''. Everything is of course very |
36 Everything is of course very legal\ldots{}moral?\ldots{}well |
38 legal\ldots{}moral?\ldots{}well that is in the eye of the |
37 that is in the eye of the beholder. See: |
39 beholder. See: |
38 |
40 |
39 \url{http://www.ucas.com/about-us/inside-ucas/advertising-opportunities} |
41 \url{http://www.ucas.com/about-us/inside-ucas/advertising-opportunities} |
40 or |
42 or |
41 \url{http://www.theguardian.com/uk-news/2014/mar/12/ucas-sells-marketing-access-student-data-advertisers}} |
43 \url{http://www.theguardian.com/uk-news/2014/mar/12/ucas-sells-marketing-access-student-data-advertisers}} |
42 |
44 |
51 cookie to advertisers who in turn pay Verizon to tell them |
53 cookie to advertisers who in turn pay Verizon to tell them |
52 everything they want to know about the person who just made |
54 everything they want to know about the person who just made |
53 this request, that is you. |
55 this request, that is you. |
54 |
56 |
55 \begin{center} |
57 \begin{center} |
56 \includegraphics[scale=0.19]{../pics/verizon.png} |
58 \includegraphics[scale=0.17]{../pics/verizon.png} |
57 \end{center} |
59 \end{center} |
58 |
60 |
59 \noindent How disgusting? Even worse, Verizon is not known for |
61 \noindent How disgusting! Even worse, Verizon is not known for |
60 being the cheapest ISP on the planet (completely the |
62 being the cheapest ISP on the planet (completely the |
61 contrary), and also not known for providing the fastest |
63 contrary), and also not known for providing the fastest |
62 possible speeds, but rather for being among the few ISPs in |
64 possible speeds, but rather for being among the few ISPs in |
63 the US with a quasi-monopolistic ``market distribution''. |
65 the US with a quasi-monopolistic ``market distribution''. |
64 |
66 |
135 conclusions, take the example of Stephen Hawking: When he was |
137 conclusions, take the example of Stephen Hawking: When he was |
136 diagnosed with his disease, he was given a life expectancy of |
138 diagnosed with his disease, he was given a life expectancy of |
137 two years. If employers would know about such problems, would |
139 two years. If employers would know about such problems, would |
138 they have employed Hawking? Now, he is enjoying his 70+ |
140 they have employed Hawking? Now, he is enjoying his 70+ |
139 birthday. Clearly personal medical data needs to stay private. |
141 birthday. Clearly personal medical data needs to stay private. |
140 A movie which has this topic as its main focus is Gattaca from |
|
141 1997, in case you like to watch |
|
142 it.\footnote{\url{http://www.imdb.com/title/tt0119177/}} |
|
143 |
|
144 |
142 |
145 To cut a long story short, I let you ponder about the two |
143 To cut a long story short, I let you ponder about the two |
146 statements that are often voiced in discussions about privacy: |
144 statements which are often voiced in discussions about privacy: |
147 |
145 |
148 \begin{itemize} |
146 \begin{itemize} |
149 \item \textit{``You have zero privacy anyway. Get over it.''} |
147 \item \textit{``You have zero privacy anyway. Get over |
150 \mbox{}\hfill{}{\small{}by Scott Mcnealy (CEO of Sun)} |
148 it.''}\\ |
|
149 \mbox{}\hfill{}{\small{}(by Scott Mcnealy, former CEO of Sun)} |
151 |
150 |
152 \item \textit{``If you have nothing to hide, you have nothing |
151 \item \textit{``If you have nothing to hide, you have nothing |
153 to fear.''} |
152 to fear.''} |
154 \end{itemize} |
153 \end{itemize} |
155 |
154 |
156 \noindent If you want to read up further on this topic, I can |
155 \noindent If you like to watch a movie which has this topic as |
157 recommend the following article that appeared in 2011 in the |
156 its main focus I recommend \emph{Gattaca} from |
158 Chronicle of Higher Education |
157 1997.\footnote{\url{http://www.imdb.com/title/tt0119177/}} If |
|
158 you want to read up on this topic, I can recommend the |
|
159 following article that appeared in 2011 in the Chronicle of |
|
160 Higher Education: |
159 |
161 |
160 \begin{center} |
162 \begin{center} |
161 \url{http://chronicle.com/article/Why-Privacy-Matters-Even-if/127461/} |
163 \url{http://chronicle.com/article/Why-Privacy-Matters-Even-if/127461/} |
162 \end{center} |
164 \end{center} |
163 |
165 |
279 the AOL dataset shows clearly how incomplete such data can be: |
281 the AOL dataset shows clearly how incomplete such data can be: |
280 Although the queries uniquely identified the older lady, she |
282 Although the queries uniquely identified the older lady, she |
281 also looked up diseases that her friends had, which had |
283 also looked up diseases that her friends had, which had |
282 nothing to do with her. Any rational analysis of her query |
284 nothing to do with her. Any rational analysis of her query |
283 data must therefore have concluded, the lady is on her |
285 data must therefore have concluded, the lady is on her |
284 deathbed, while she was actually very much alive and kicking. |
286 death bed, while she was actually very much alive and kicking. |
285 |
287 |
286 \subsubsection*{Differential Privacy} |
288 \subsubsection*{Differential Privacy} |
287 |
289 |
288 Differential privacy is one of the few methods, that tries to |
290 Differential privacy is one of the few methods that tries to |
289 achieve forward privacy with large datasets. The basic idea |
291 achieve forward privacy. The basic idea is to add appropriate |
290 is to add appropriate noise, or errors, to any query of the |
292 noise, or errors, to any query of the dataset. The intention |
291 dataset. The intention is to make the result of a query |
293 is to make the result of a query insensitive to individual |
292 insensitive to individual entries in the database. The hope is |
294 entries in the database. That means the results are |
293 that the added error does not eliminate the ``signal'' one is |
295 approximately the same no matter if a particular individual is |
294 looking for by querying the dataset. |
296 in the dataset or not. The hope is that the added error does |
295 |
297 not eliminate the ``signal'' one is looking for in the |
296 |
298 dataset. |
297 |
299 |
298 \begin{center} |
300 %\begin{center} |
299 User\;\;\;\; |
301 %User\;\;\;\; |
300 \begin{tabular}{c} |
302 %\begin{tabular}{c} |
301 tell me $f(x)$ $\Rightarrow$\\ |
303 %tell me $f(x)$ $\Rightarrow$\\ |
302 $\Leftarrow$ $f(x) + \text{noise}$ |
304 %$\Leftarrow$ $f(x) + \text{noise}$ |
|
305 %\end{tabular} |
|
306 %\;\;\;\;\begin{tabular}{@{}c} |
|
307 %Database\\ |
|
308 %$x_1, \ldots, x_n$ |
|
309 %\end{tabular} |
|
310 %\end{center} |
|
311 % |
|
312 %\begin{center} |
|
313 %\begin{tabular}{l|l} |
|
314 %Staff & Salary\\\hline |
|
315 %$PM$ & \pounds{107}\\ |
|
316 %$PF$ & \pounds{102}\\ |
|
317 %$LM_1$ & \pounds{101}\\ |
|
318 %$LF_2$ & \pounds{97}\\ |
|
319 %$LM_3$ & \pounds{100}\\ |
|
320 %$LM_4$ & \pounds{99}\\ |
|
321 %$LF_5$ & \pounds{98} |
|
322 %\end{tabular} |
|
323 %\end{center} |
|
324 % |
|
325 % |
|
326 %\begin{center} |
|
327 %\begin{tikzpicture} |
|
328 %\begin{axis}[symbolic y coords={salary}, |
|
329 % ytick=data, |
|
330 % height=3cm] |
|
331 %\addplot+[jump mark mid] coordinates |
|
332 %{(0,salary) (0.1,salary) |
|
333 % (0.4,salary) (0.5,salary) |
|
334 % (0.8,salary) (0.9,salary)}; |
|
335 %\end{axis} |
|
336 %\end{tikzpicture} |
|
337 %\end{center} |
|
338 % |
|
339 %\begin{tikzpicture}[outline/.style={draw=#1,fill=#1!20}] |
|
340 % \node [outline=red] {red box}; |
|
341 % \node [outline=blue] at (0,-1) {blue box}; |
|
342 %\end{tikzpicture} |
|
343 |
|
344 \ldots |
|
345 |
|
346 |
|
347 \subsubsection*{Further Reading} |
|
348 |
|
349 Two cool articles about how somebody obtained via the Freedom |
|
350 of Information Law the taxicab dataset of New York and someone |
|
351 else showed how easy it is to mine for private information: |
|
352 |
|
353 \begin{center} |
|
354 \begin{tabular}{p{0.8\textwidth}} |
|
355 \url{http://chriswhong.com/open-data/foil_nyc_taxi/}\\ |
|
356 \url{http://research.neustar.biz/2014/09/15/riding-with-the-stars-passenger-privacy-in-the-nyc-taxicab-dataset} |
303 \end{tabular} |
357 \end{tabular} |
304 \;\;\;\;\begin{tabular}{@{}c} |
358 \end{center} |
305 Database\\ |
359 |
306 $x_1, \ldots, x_n$ |
360 \noindent |
307 \end{tabular} |
|
308 \end{center} |
|
309 |
|
310 \ldots |
|
311 |
|
312 |
|
313 \subsubsection*{Further Reading} |
|
314 |
|
315 A readable article about how supermarkets mine your shopping |
361 A readable article about how supermarkets mine your shopping |
316 habits (especially how they prey on young exhausted families |
362 habits (especially how they prey on new exhausted parents |
317 ;o) appeared in 2012 in the New York Times: |
363 ;o) appeared in 2012 in the New York Times: |
318 |
364 |
319 \begin{center} |
365 \begin{center} |
320 \url{http://www.nytimes.com/2012/02/19/magazine/shopping-habits.html} |
366 \url{http://www.nytimes.com/2012/02/19/magazine/shopping-habits.html} |
321 \end{center} |
367 \end{center} |