Sunday.May 24, 2020
...
Presenter | Title of Presentation | Materials | Notes/Tweets | References | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Colin Wallis | Kantara PrivMas2020 Special | Video of the PrivMas Call | Colin Wallis (Unlicensed) Kick's off the Kantara PrivMas with international #PrivMas Gifts | Video Link to the Call - is here (its big at the moment) | ||||||
Doc Searls | Anti-Consentiment | The R Button https://cyber.harvard.edu/projectvrm/R-button https://blogs.harvard.edu/vrm/2012/04/15/lets-fix-the-car-rental-business/ | Former user (Deleted) Why #PrivMas needs to kill contract of adhesion - its not human consent | https://www.linuxjournal.com/content/cookies-go-other-way Is the operator the 4th party? http://blogs.harvard.edu/vrm/2009/04/12/vrm-and-the-four-party-system/ | ||||||
Mark Lizar | PrivMas -Intro | Review of the history of the legal standards and the background of this work in the OECD Transboarder Flows. Referencing the - 2003 ISTPA Presentation The History of OpenNotice & Biggest Lie: MyData, My Control, My Consent - the growth of my data focused communities and efforts. | Mark Lizar (Unlicensed) #PrivMas History | This presentation.is the 2003 ISTPA Presentation by John Sabo from Computer Associates, which serves a great backgrounder to the legal standards that lead to many of the current technical standards. https://www.oasis-open.org/people/distinguished-contributor/john-sabo | ||||||
Mathais De Bievre & Olivier Dion | aNew Governance Project for the EU Data Governance Architecture | European Commission Data Strategy- An infrastructure for decentralised consent (inherent to design) data infrastructure for permissions. Addressing the lock-in of big-data platforms Forming a New Governance in the MyData Community - with interoperability amongst data operator.
| aNG -the upstart EU Network -enjoys PrivMas at Kantara - with Separation of Powers and the Power of Skills & Mobility Use Cases | |||||||
Joss Langford | MyData Operator |
| MyData Operator - PrivMas at it's best - global best practices | |||||||
Jim Hazzard | Common Accord | https://hardjono.mit.edu/sites/default/files/documents/CommonAccord_Provenance_11182015.pdf http://www.commonaccord.org/index.php?action=list&file=G/GA4GH/ https://github.com/CommonAccord/Cmacc-Org/tree/master/Doc/G/GA4GH Accountability - e.g. http://www.commonaccord.org/index.php?action=doc&file=G/GA4GH/Accountability-Policy/Form/0.md | Common Accord, a #PriMas gift for a New Governance | |||||||
Muhammad Waqas | Alexa - AI Consent Receipts | Live Demo of a consent receipt sent via email - where the email must be read before the consent moves from implied consent to explicit consent. Implied to let Alexa offer a service and explicit for access to data - later in the flow - | ||||||||
Paul Knowles |
| From the Human Colossus Foundation for scaling data governance -" A home for synergy" | ||||||||
Tom Jones | A Call To Action for Consent Identity Protocol | Presented a dynamic architecture for real–time emergency response data access, also references to work in Kantara FIRE WG. | ||||||||
Xiaohu | BRUE: UMA For Cross Domain Explicit Consent (for HealthCare) | I'm hungry. That soup looks awesome! - BlockChain-UMA Specific Soup | ||||||||
Sal D'Agostino | Identity Surveillance Technology | Bigger Brother -https://www.nybooks.com/articles/2020/04/09/bigger-brother-surveillance-capitalism/ - a SoShanna Zubov Review - And a PrivMas gift - Active transparency Over Surveillance Capitalism | Salvatore D'Agostino Closes #PrivMas Eve - with a Toast and tale of Bigger Brother - to close |
...
The risks mitigated in the call are captured through masking identity in different ways to reduce privacy and security risk of the person, intended to be extremely flexible. Generally, people can identify each other through topic and voice, but the idea is to let people join the call, so no one really knows who each person is to begin with. And with all the Video Turned off.. as people present, and talk, they can turn on video, and people can communicate via chat.
The call should have one facilitator that can change masks, turning on and off vide.
1 person has to be known and the moderator - another person can be designated the security person for the call. If there is a real (or staged) call disruption - the moderator and the security person has a separation of powers, and need to keep a log of the secret chat where the security person has the decision making power to kick people off the call, but the moderator has the technical control to do so.
...