IAPP-GDPR Web Banners-300x250-FINAL
People Want To Protest—Make It Easy for Them

A blog post on Freedom to Tinker caught my eye on Tuesday. In it, Arvind Narayanan talks about using encryption as protest. As he points out, in computer science, privacy-enhancing technologies (PETs) using crypto are generally used to protect anonymity or confidentiality against an adversary. But Narayanan also connects us with the thinking of Helen Nissenbaum on the political and ethical theory of obfuscation, which is “a strategy for individuals, groups or communities to hide; to protect themselves; to protest or enact civil disobedience, especially in the context of monitoring, aggregated analysis and profiling.”

Going further, Narayanan looks at “the hypothesis that users of encryption tools also have protest and civil disobedience in mind, instead of (or in addition to) self-defense or anonymity.”

Both good actors and bad have long used PETs to accomplish their goals—whether it’s a journalist protecting a source in a repressive regime or a child pornographer accessing and distributing illegal images. Yet, in another side effect of the Snowden disclosures and the reaction of people around the world to the overpowering surveillance capabilities of the state, PETs and encryption may now have a new and significant role. Ubiquitous surveillance, particularly by the NSA, has made some consumers gravitate to PETs, but it’s also affected how many non-U.S. users view U.S. business—enough to motivate the big tech companies to start rolling out and integrating PETs and encryption.

We’re seeing encryption and privacy make its way into the mainstream. Google is encrypting traffic on its servers, building an extension for PGP on Gmail called End-to-End and is even playing the name-and-shame game by identifying domains that don’t encrypt data. DuckDuckGo is now teaming up with Apple to allow for builtin private searches in the Safari browser and more companies—including Yahoo, Facebook and Twitter—use HTTPS by default.

A few months back, I decided that I should know how to use some basic encryption tools. I downloaded the Tor browser, read up on encrypted e-mail and put the Wickr app on my phone. Yet, I haven’t been actively using them. The Tor browser can be pretty slow, I still haven’t gotten around to using encrypted e-mail and I downloaded Wickr but don’t use it because my friends don’t use it.

(More on this to come: I plan on using and documenting my experiences as a novice PET user to see just how easy or difficult it is to use them.)

And that’s the catch about which Narayanan writes. “There is an inescapable trade-off between convenience and security—tools that put security first require user training and informed decisions, whereas insecure ones pitch themselves as one-click solutions.” And as he points out, “those that cater to the lowest common denominator will win.”

We know, because of a new survey from EMC, people love the ease-of-use of their devices, but are not willing to trade more privacy to get more of those services. In fact, only 21 percent said they were willing to make that trade. But how many are willing to trade ease-of-use for more security and anonymity?

Narayanan goes on to ask an important question about what can be learned from a market that naturally sinks to the lowest common denominator. “First, security and privacy researchers should study how users actually use PETs instead of assuming that all users have the same set of values and preferences.”

That’s sound advice. Privacy and security pros, ask yourselves this: Why do users want your services to be encrypted? Will the privacy and security enhancements be easy to use and therefore embraced, or will giving users the privacy they say they want inevitably drive them to a different product?

photo credit: VCU CNS via photopin cc

Written By

Jedidiah Bracy, CIPP/E, CIPP/US


If you want to comment on this post, you need to login.


Board of Directors

See the esteemed group of leaders shaping the future of the IAPP.

Contact Us

Need someone to talk to? We’re here for you.

IAPP Staff

Looking for someone specific? Visit the staff directory.

Learn more about the IAPP»

Daily Dashboard

The day’s top stories from around the world

Privacy Perspectives

Where the real conversations in privacy happen

The Privacy Advisor

Original reporting and feature articles on the latest privacy developments

Privacy Tracker

Alerts and legal analysis of legislative trends

Privacy Tech

Exploring the technology of privacy

Canada Dashboard Digest

A roundup of the top Canadian privacy news

Europe Data Protection Digest

A roundup of the top European data protection news

Asia-Pacific Dashboard Digest

A roundup of the top privacy news from the Asia-Pacific region

IAPP Westin Research Center

Original works. Groundbreaking research. Emerging scholars.

Advertise in IAPP Publications

Find out how to get your message in front the people you want to reach. Download a media kit now.

Get more News »

Find a KnowledgeNet Chapter Near You

Network and talk privacy at IAPP KnowledgeNet meetings, taking place worldwide.

Women Leading Privacy

Events, volunteer opportunities and more designed to help you give and get career support and expand your network.

IAPP Job Board

Looking for a new challenge, or need to hire your next privacy pro? The IAPP Job Board is the answer.

Join the Privacy List

Have ideas? Need advice? Subscribe to the Privacy List. It’s crowdsourcing, with an exceptional crowd.

Find more ways to Connect »

Find a Privacy Training Class

Two-day privacy training classes are held around the world. See the complete schedule now.

Online Privacy Training

Build your knowledge. The privacy know-how you need is just a click away.

The Training Post—Can’t-Miss Training Updates

Subscribe now to get the latest alerts on training opportunities around the world.

New Web Conferences Added!

See our list of upcoming web conferences. Just log on, listen in and learn!

Train Your Staff

Get your team up to speed on privacy by bringing IAPP training to your organization.

Learn more »

CIPP Certification

The global standard for the go-to person for privacy laws, regulations and frameworks

CIPM Certification

The first and only privacy certification for professionals who manage day-to-day operations

CIPT Certification

The industry benchmark for IT professionals worldwide to validate their knowledge of privacy requirements

Certify Your Staff

Find out how you can bring the world’s only globally recognized privacy certification to a group in your organization.

Learn more about IAPP certification »

Get Close-up

Looking for tools and info on a hot topic? Our close-up pages organize it for you in one easy-to-find place.

Where's Your DPA?

Our interactive DPA locator helps you find data protection authorities and summary of law by country.

IAPP Westin Research Center

See the latest original research from the IAPP Westin fellows.

Looking for Certification Study Resources?

Find out what you need to prepare for your exams

More Resources »

GDPR Comprehensive: Registration Open

New! Intensive two-day GDPR training led by the sharpest minds in the field. It's a can't-miss event.

The Congress Is Cancelled

The IAPP Europe Data Protection Congress 2015 is cancelled. Click through to learn more.

Sponsor an Event

Increase visibility for your organization—check out sponsorship opportunities today.

Exhibit at an Event

Put your brand in front of the largest gatherings of privacy pros in the world. Learn more.

More Conferences »

Become a Member

Start taking advantage of the many IAPP member benefits today

Corporate Members

See our list of high-profile corporate members—and find out why you should become one, too

Renew Your Membership

Don’t miss out for a minute—continue accessing your benefits

Join the IAPP»