A Future for Privacy

Part of the SpringerBriefs in Cybersecurity book series (BRIEFSCYBER)


We discuss how the personal privacy that we are used to as a way of life is continuously being threatened by modern technology. We divide these threats into different categories based on who the perpetrator is, and the extent to which the privacy invasion was intended by the system designer. We discuss in detail how some technologies, like the web, compromise privacy. We explain why privacy is important and describe the conflict between privacy and law enforcement. Finally, we explain our ideas for the future, which include a system for verifiable accountability to allow citizens to see what and how much information is collected and used. We give some examples of how such technology could be used in the future.


Certificate Authority Trusted Platform Module Transport Layer Security Tracking User Deep Packet Inspection 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


  1. 1.
    Monkey brains control robot arms. (2003). BBC.
  2. 2.
    Sony recalls copy-protected CDs. (2005). BBC.
  3. 3.
    Chaos computer club analyzes government malware. (2011).
  4. 4.
    Facebook sorry over face tagging launch. (2011). BBC.
  5. 5.
    Germany spyware: Minister calls for probe of state use. (2011). BBC.
  6. 6.
    NSA slides explain the PRISM data-collection program. (2013). The Washington Post.
  7. 7.
    Live Q&A with Edward Snowden. (2014).
  8. 8.
    The NSA files. (2014). The guardian.
  9. 9.
    Abelson, H., Anderson, R., Bellovin, S. M., Benaloh, J., Blaze, M., Diffie, W., Gilmore, J., Neumann, P. G., Rivest, R. L., Schiller, J. I., & Schneier B. (1998). The risks of key recovery, key escrow, and trusted third-party encryption.
  10. 10.
    Acquisti, A., Gross, R., & Stutzman, F. (2011). Faces of Facebook: Privacy in the age of augmented reality. BlackHat USA.
  11. 11.
    Arapinis, M, Borgaonkar, R., Golde, N., Mancini, L., Redon, K., Ritter, E., & Ryan, M. (2012). New privacy issues in mobile telephony: fix and verification. In ACM Conference on Computer and Communications Security (pp. 205–216).
  12. 12.
    Bamford, J. (2012). The NSA is building the country’s biggest spy center. Wired magazine.
  13. 13.
    Black, J. (2001). Don’t make privacy the next victim of terror. Bloomberg Businessweek., 2001.
  14. 14.
    Blaze, M. (1994). Protocol failure in the escrowed encryption standard. In Proceedings of the Second ACM Conference on Computer and Communications Security (CCS).
  15. 15.
    Blaze, M. (2013). Phew, NSA is just collecting metadata. (you should still worry.). Wired magazine.
  16. 16.
    Boneh, D., Sahai, A., Waters, B. Functional encryption: Definitions and challenges. In Theory of Cryptography (pp. 253—273). Springer.Google Scholar
  17. 17.
    Bosker, B. (2011). Facebook’s Randi Zuckerberg: Anonymity online “has to go away”. Huffington Post.
  18. 18.
    Britten, N. (2010). Facebook users warned of burglary risk. The Telegraph.
  19. 19.
    Carrier iQ, Inc. What data is collected?
  20. 20.
    Chothia, T., & Smirnov, V. (2010). A traceability attack against e-passports. In Proceedings of the 14th International Conference on Financial Cryptography and Data Security.
  21. 21.
    Clayton, R. The Phorm “Webwise” system.
  22. 22.
    PrimeLife Consortium. (2011). Privacy-enhancing browser extensions.
  23. 23.
  24. 24.
    Eckersley, P. (2010). How unique is your web browser? In Proceedings of the Privacy Enhancing Technologies Symposium (PETS 2010), volume 6205 of Lecture Notes in Computer Science. Springer.
  25. 25.
  26. 26.
    Espiner, T. (2012). ISPs kept in dark about UK’s plans to intercept Twitter.
  27. 27.
    Inc. Facebook. Data use policy.
  28. 28.
    Inc. Facebook. (2013). What information does Facebook get when i visit a site with the like button or another social plugin?
  29. 29.
    Felten, E. W., Schneider, M. A. (2000). Timing attacks on web privacy. In ACM Conference on Computer and Communications Security, pp. 25–32.Google Scholar
  30. 30.
    Electronic Frontier Foundation. Sony BMG settlement FAQ.
  31. 31.
    Gahran, A. (2010). Using Wi-Fi? Firesheep may endanger your security. CNN.
  32. 32.
    Gentry, C. (2009). A Fully Homomorphic Encryption Scheme. PhD thesis, Stanford University, Advisor Dan Boneh.Google Scholar
  33. 33.
    Miniwatts Marketing Group. (2012). World internet users and population stats.
  34. 34.
    Trusted Computing Group. (2007). TPM Main Specification.Google Scholar
  35. 35.
    Hinsliff, G. (2008). MI5 seeks powers to trawl records in new terror hunt. The Observer.
  36. 36.
    The White House. (1994). Statement of the press secretary.
  37. 37.
    Huber, N. (2013). The tax man is watching you: (HMRC) snoops on public 14,000 times in a year. The Independent.
  38. 38.
    Adobe Systems Incorporated. What are local shared objects?
  39. 39.
    Johnson, B. (2010). Privacy no longer a social norm, says Facebook founder. Guardian.
  40. 40.
    Kamkar, S. Evercookie—virtually irrevocable persistent cookies.
  41. 41.
    Keneally, M. (2013). Yahoo CEO Marissa Mayer feared being sent to jail for treason over NSA scandal. Daily Mail.
  42. 42.
    LaPlante, M. D. Spies like us: NSA to build huge facility in Utah. The Salt Lake Tribune.
  43. 43.
    Laurie, B., Langley, A., & Kasper, E. (2013). Certificate transparency.
  44. 44.
    Lewis, P. (2008). Fears over privacy as police expand surveillance project. The Guardian.
  45. 45.
    Lewis, P., & Vallée, M. (2009). Revealed: police databank on thousands of protesters.
  46. 46.
    ARM Limited. (2009). ARM TrustZone API Specification, version 3.0.Google Scholar
  47. 47.
    Path Intelligence Ltd. Revolutionary technology for detailed data insights.
  48. 48.
    Martin, R. (2005). Mind control. Wired magazine.
  49. 49.
    McKeen, F., Alexandrovich, I., Berenzon, A., Rozas, C., Shafi, H., Shanbhogue, V., & Savagaonkar, U. Innovative instructions and software model for isolated execution. In Second Workshop on Hardware and Architectural Support for Security and Privacy (HASP 2013).Google Scholar
  50. 50.
    Mitchell, S. Anger over mass web surveillance plans. PC Pro magazine.
  51. 51.
    Nightingale, J. (2011). Fraudulent * certificate. Mozilla Security Blog.
  52. 52.
    The Home Office. (2010). Communications data.
  53. 53.
    Page, L. (2008). Spooks want to go fishing in Oyster database. The Register.
  54. 54.
    Pegoraro, R. (2011). Google’s Eric Schmidt steps down, depriving web of future quotes. Washington Post.
  55. 55.
    Perlroth, N. (2013). NSA able to foil basic safeguards of privacy on web. The New York Times.
  56. 56.
    Poulsen, K. (2007). FBI’s secret spyware tracks down teen who made bomb threats. Wired magazine.
  57. 57.
    Q-Success. W3Techs web technology surveys.
  58. 58.
    Ben Quinn. (2008). Virgin sacks 13 over Facebook “chav” remarks. The Guardian.
  59. 59.
    RIsen, J., Lichtblau, E. (2005). Bush lets U.S. spy on callers without courts. The New York Times.
  60. 60.
    Ryan, M. (2014). Enhanced certificate transparency and end-to-end encrypted mail. In Network and Distributed System Security (NDSS).
  61. 61.
    Saunders, L. (2009). Is “friending” in your future? Better pay your taxes first. The Wall Street Journal.
  62. 62.
    Schneier, B. (2010). Anonymity and the internet., 2010.
  63. 63.
  64. 64.
    Story, L. (2008). A company promises the deepest data mining yet. The New York Times.
  65. 65.

Copyright information

© The Author(s) 2014

Authors and Affiliations

  1. 1.School of Computer ScienceUniversity of BirminghamBirminghamUK

Personalised recommendations