A slice of privacy

loaf is an email filtering verification system from Maciej and a partner, in early days yet. For the record, I love the ‘cantbedone.org’ URL.

I nearly did not blog this until I realized the underlying concept bothered me, and that I could explain why, in non-technical terms. It also fits broadly into my theme for the day: identity is the face we choose to show others, and privacy is the area of concerns that arise when that identity is challenged for one reason or another. Frustratingly, I’m in a hurry, and so I’m going to have to cover this very broadly and I hope I don’t misrepresent anything or mis-state a fact. If I do, I’ll clean it up as soon as I am aware of it.

The way that Loaf is described as working: an encrypted (or disguised, or hashed, at any rate it’s not human readable) copy of your whole email address book is appended to each one of your outbound email messages. When it’s recieved and parsed by another Loaf-using email system, the sender (you) is rated based, essentially, on your degree of familiarity to the recipient (or really, of course, to Loaf). The more familiar you are, the likelier it is that your message will get through.

It’s a pretty neat idea, and I can’t think of any reason, functionally, why this would be problematic.

However, I think there is a very good reason to mistrust the concept. It’s based on both legal approaches to privacy and ethical concerns underlying them. Forgive me a moment of digression.

Generally speaking, in the US, legal guidelines for organizations that gather and manage personally identifiable information (PII) are required to follow a specific set of practices with regard to how that information is gathered, stored, and made accessible for correction or deletion to the initial source of that data, generally the consumer. An example of that is COPPA, which is a law that effectively requires online data gatherers to either collect no PII from children under 13 or to ensure that parental permission has been granted for that data to be gathered.

It’s my opinion that the PII is the property of the consumer and that there is an ethical obligation to the consumer to permit some level of error-correction feedback mechanism. Additionally, there is an obligation on the part of the data maintainer to follow a ‘best-practices’ level of security with regards to the data, and practices which allow the data to move to a different organization with different privacy practices, while legal, are frowned upon. Of course, such data transfers happen all the time, notably in corporate acquisitions.

In practice, the response of most commercial organizations has been based on a desire to minimize the ancillary data-management costs of PII while making every effort to allow that data to be utilized within the business. It’s effectively a business asset, and as such is percieved as adding value to the organization. Thus your level of access to the data may be limited to writing a letter to the company to request that your record be deleted.

This is unsatisfactory for any number of reasons; adding to the problems with the current approach are the rumblings we hear about the possibility that data collections and methodologies may become available for proprietary protection under U.S. intellectual property law. This may mean, for example, that if in the context of a discussion of privacy management methodology I cited a sample record – or the structure of a specific PII database – I might be in violation of a proprietary concept or data object. But I’ll leave that bone for the EFF to worry at the moment, as vexing as it is.

Returning to Loaf: the concept relies on individual email users exposing their email address books to anyone they send email to. That information may or may not be unpackable to reconstitute the specific PII it contains in a way which is maliciously or unethically useful. From the lack of absolute language on the descriptive page I link to above, I’d be very surprised if it was impossible to do so.

Moreover, by deliberately placing the PII into a sharing-oriented environment, the strategy violates the legal and ethical guidelines I just sketched (however fuzzy my sketch might be), primarily by sharing a specifc element of that PII (your correspondent’s email address).

Therefore, it will be very difficult to deploy any solution based on this approach into commercial organizations that have been working to ensure compliance with the guidelines and regulations.

I am by no means an expert either in the sort of programming that Maciej (a good guy, by all accounts, and a hell of an online writer to boot) does, or, honestly, in online privacy. I do think that I have raised some valid points for discussion. I hope that Maciej or his partner can take the time to address them.

Danelope Week Part V

danelope_site_avatar_head.jpgOn October 3, 2000, Mr. Lope penned a few breif lines that directly contradict the central thesis of Being John Malkovich.

Of course, he’s also 2903.

This has nothing to do with Mr. Lope or anything, but my favorite part of Lawrence of Arabia is after Lawrence and the surviving boy under his, um, care pass through a blasted, abandoned Army base at the side of the Suez Canal, and emerge on the banks of the waterway. A lone motorcyclist on the opposite bank appears, and stops when hailed.

Cupping his hands, the British biker shouts over the unbridged gap of water and sand.

“Who are you?”

After a pause, he repeats the question with greater urgency. Lean cuts to a reverse-angle closeup of Lawrence’s face.

On Identity

The Statesman claims that Don Foster has fingered exposed unmasked uncovered revealed the author of Belle de Jour. Foster used computer-based linguistic analysis to deduce that Joe Klein wrote Primary Colors. [via Boing Boing]

USA Today Says Reporter Faked Stories [NYT]: Five-time Pulitzer nominee fired. Jack Kelley spent 21 years at USA Today, and judging by the fabrications cited in the article, had a knack for the dramatic moment:

For one of the stories that helped make him a Pulitzer Prize finalist in 2001, Kelley wrote that he was an eyewitness to a suicide bombing in Jerusalem and described the carnage in graphic detail. But the investigation showed that the man Kelley described as the bomber could not have been the culprit, and his description of three decapitated victims was contradicted by police.

The newspaper also said “the evidence strongly contradicted” other published accounts by Kelley: that he spent the night with Egyptian terrorists in 1997; met a vigilante Jewish settler named Avi Shapiro in 2001; watched a Pakistani student unfold a picture of the Sears Tower and say, “This one is mine,” in 2001; interviewed the daughter of an Iraqi general in 2003; or went on a high-speed hunt for Osama bin Laden in 2003.

And topping off our little collection, who wouldn’t be interested in reading what happens when a writer for The Stranger connives and cajoles Jayson Blair and Stephen Glass into meeting him for a beer at Brooklyn watering hole for a joint interview?

I think I have found my theme for the day; Charlie Kaufman sets the tone.