Advertisement

The Future of Privacy

  • Chris Berg
Chapter
Part of the Palgrave Studies in Classical Liberalism book series (PASTCL)

Abstract

This chapter considers the future of privacy. New privacy-enhancing technologies offer new opportunities for privacy protection. The chapter first considers the complex anonymity properties of cryptocurrencies, concluding that the ability of first- and second-generation cryptocurrencies to protect financial privacy has been overstated. The chapter then considers newer cryptocurrencies like ZCash which exploit cryptographic techniques such as zero-knowledge proofs. These technologies offer new possibilities for privacy protection across a wide range of domains. The chapter surveys other new approaches to privacy protection and concludes with some speculation about the shifting balance between technology and surveillance.

Bibliography

  1. Allen, Darcy, Chris Berg, and Mikayla Novak. “Blockchain: An Entangled Political Economy Approach.” SSRN, 26 April 2018.Google Scholar
  2. Ben-Sasson, Eli, Alessandro Chiesa, Matthew Green, Eran Tromer, and Madars Virza. “Secure Sampling of Public Parameters for Succinct Zero Knowledge Proofs.” Paper presented at the Security and Privacy (SP), 2015 IEEE Symposium on, 2015.Google Scholar
  3. Berg, Alastair, Chris Berg, Sinclair Davidson, and Jason Potts, “Identity as Input to Exchange.” SSRN, 2018a.Google Scholar
  4. Berg, Chris, Sinclair Davidson, and Jason Potts. “The Blockchain Economy: A Beginner’s Guide to Institutional Cryptoeconomics.” Medium, 2017a.Google Scholar
  5. ———. “Blockchains Industrialise Trust.” SSRN, 2017b.Google Scholar
  6. ———. “Byzantine Political Economy.” Medium, 25 October 2017c.Google Scholar
  7. ———. “The Institutional Economics of Identity.” SSRN, 21 November 2017d.Google Scholar
  8. Berg, Chris, Brendan Markey-Towler, Mikayla Novak, and Jason Potts. “Blockchains Evolving: Institutional and Evolutionary Economics Perspectives.” SSRN, 11 April 2018b).Google Scholar
  9. Changpinyo, Soravit, Wei-Lun Chao, Boqing Gong, and Fei Sha. “Synthesized Classifiers for Zero-Shot Learning.” Paper presented at the Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, 2016.Google Scholar
  10. Chaum, David. “Blind Signatures for Untraceable Payments.” In Advances in Cryptology: Proceedings of Crypto 82, edited by David Chaum, Ronald L. Rivest, and Alan T. Sherman, 199–204. New York: SpringerScience+Business Media, 1983.Google Scholar
  11. Davidson, Sinclair, Primavera de Filippi, and Jason Potts. “Blockchains and the Economic Institutions of Capitalism.” Journal of Institutional Economics 14, no. 4 (2018): 639–658.Google Scholar
  12. Dwork, Cynthia. “Differential Privacy.” 33rd International Colloquium on Automata, Languages and Programming, Part II 4052 (2006): 1–12.Google Scholar
  13. Dwork, Cynthia, and Aaron Roth. “The Algorithmic Foundations of Differential Privacy.” Foundations and Trends in Theoretical Computer Science 9, no. 3–4 (2014): 211–407.Google Scholar
  14. Eckhoff, David, and Isabel Wagner. “Privacy in the Smart City—Applications, Technologies, Challenges and Solutions.” IEEE Communications Surveys & Tutorials 20, no. 1 (2018): 489–516.Google Scholar
  15. Electronic Frontier Foundation. “Surveillance Self-Defense: Assessing Your Risks.” https://ssd.eff.org/en/module/assessing-your-risks.
  16. Fandrich, Daniel. “How Private Are “Private” Electronic Payment Systems?” https://telarity.com/~dan/emoney-anon.html.
  17. Fei-Fei, Li, Rob Fergus, and Pietro Perona. “One-Shot Learning of Object Categories.” IEEE Transactions on Pattern Analysis and Machine Intelligence 28, no. 4 (2006): 594–611.Google Scholar
  18. Goldwasser, Shafi, Silvio Micali, and Charles Rackoff. “The Knowledge Complexity of Interactive Proof Systems.” SIAM Journal on Computing 18, no. 1 (1989): 186–208.Google Scholar
  19. Guri, Mordechai, Dima Bykhovsky, and Yuval Elovici. “Air-Jumper: Covert Air-Gap Exfiltration/Infiltration Via Security Cameras & Infrared (Ir).” arXiv preprint arXiv:1709.05742 (2017a).Google Scholar
  20. Guri, Mordechai, Matan Monitz, Yisroel Mirski, and Yuval Elovici. “Bitwhisper: Covert Signaling Channel between Air-Gapped Computers Using Thermal Manipulations.” Paper presented at the Computer Security Foundations Symposium (CSF), 2015 IEEE 28th, 2015.Google Scholar
  21. Guri, Mordechai, Yosef Solewicz, Andrey Daidakulov, and Yuval Elovici. “Acoustic Data Exfiltration from Speakerless Air-Gapped Computers Via Covert Hard-Drive Noise (‘Diskfiltration’).” Paper presented at the European Symposium on Research in Computer Security, 2017b.Google Scholar
  22. ———. “Fansmitter: Acoustic Data Exfiltration from (Speakerless) Air-Gapped Computers.” arXiv preprint arXiv:1606.05915 (2016).Google Scholar
  23. Guri, Mordechai, Boris Zadov, Andrey Daidakulov, and Yuval Elovici. “Odini: Escaping Sensitive Data from Faraday-Caged, Air-Gapped Computers Via Magnetic Fields.” arXiv preprint arXiv:1802.02700 (2018).Google Scholar
  24. Guri, Mordechai, Boris Zadov, and Yuval Elovici. “Led-It-Go: Leaking (a Lot of) Data from Air-Gapped Computers Via the (Small) Hard Drive Led.” Paper presented at the International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, 2017c.Google Scholar
  25. Hardjono, Thomas, and Ned Smith, “Cloud-Based Commissioning of Constrained Devices using Permissioned Blockchains.” Proceedings of ACM IoT Privacy, Trust, and Security, May 2016.Google Scholar
  26. Maitland, Greg, Jason Reid, Ernest Foo, Colin Boyd, and Ed Dawson. “Linkability in Practical Electronic Cash Design.” In Information Security, Lecture Notes in Computer Science, 149–63. Heidelberg and Berlin: Springer, 2000.Google Scholar
  27. May, Timothy C. “The Crypto Anarchist Manifesto.” 1988.Google Scholar
  28. ———. “Thirty Years of Crypto Anarchy.” Paper presented at the Hackers Congress Paralelní Polis, Prague, 1 October 2017.Google Scholar
  29. McMahan, Brendan, and Daniel Ramage. “Federated Learning: Collaborative Machine Learning without Centralized Training Data.” Google, https://research.googleblog.com/2017/04/federated-learning-collaborative.html.
  30. Moses, Asher, and Justin Norrie. “Drugs Bought with Virtual Cash.” The Sydney Morning Herald, 12 June 2011.Google Scholar
  31. Nakamoto, Satoshi. “Bitcoin: A Peer-to-Peer Electronic Cash System.” www.bitcoin.org, 2008a.
  32. ———. “Re: Bitcoin P2p E-Cash Paper.” In The Book of Satoshi: The Collected Writings of Bitcoin Creator Satoshi Nakamoto, edited by Phil Campagne. E53 Publishing LLC, 2008b.Google Scholar
  33. “Openmined.” https://www.openmined.org/.
  34. Palatucci, Mark, Dean Pomerleau, Geoffrey E. Hinton, and Tom M. Mitchell. “Zero-Shot Learning with Semantic Output Codes.” Paper presented at the Advances in Neural Information Processing Systems, 2009.Google Scholar
  35. Potts, Jason, Ellie Rennie, and Jake Goldenfein, “Blockchains and the Crypto City.” IT—Information Technology 59, no. 6 (2017): 285–93.Google Scholar
  36. Quesnelle, Jeffrey. “On the Linkability of Zcash Transactions.” arXiv preprint arXiv:1712.01210 (2017).Google Scholar
  37. Rogoff, Kenneth S. The Curse of Cash. Princeton: Princeton University Press, 2016.Google Scholar
  38. Romera-Paredes, Bernardino, and Philip Torr. “An Embarrassingly Simple Approach to Zero-Shot Learning.” Paper presented at the International Conference on Machine Learning, 2015.Google Scholar
  39. Segal, David. “Eagle Scout. Idealist. Drug Trafficker?” The New York Times, 18 January 2014.Google Scholar
  40. Spivack, Nova. “The Post-Privacy World.” Wired, July 2013.Google Scholar
  41. Thomas, Arun C. “The Amazing Tech Stack of Openmined.” Hackernoon, 4 December 2017.Google Scholar
  42. Vigna, Paul, and Michael J. Casey. The Age of Cryptocurrency: How Bitcoin and Digital Money Are Challenging the Global Economic Order. New York: St. Martin’s Press, 2015.Google Scholar
  43. Vinyals, Oriol, Charles Blundell, Tim Lillicrap, and Daan Wierstra. “Matching Networks for One Shot Learning.” Paper presented at the Advances in Neural Information Processing Systems, 2016.Google Scholar
  44. Wilcox, Zooko. “How to Generate Snark Parameters Securely.” https://z.cash/blog/snark-parameters.html.
  45. ———. “Zcash’s Zooko Wilcox on Why He Believes Privacy Coins Will Be Used More for Good than Bad.” By Laura Shin. Unchained, 27 March 2018.Google Scholar

Copyright information

© The Author(s) 2018

Authors and Affiliations

  • Chris Berg
    • 1
  1. 1.RMIT UniversityMelbourneAustralia

Personalised recommendations