"],"_oembed_time_a5da4167e5273cba2c982654bd1a959b":["1508273441"],"_oembed_87784d1f6723c3d48cdc8a028de189ad":["

It's getting dark, but there's no time to waste and our Jamers are eager to go on! #privacyjam #gamejam @hiig_berlin pic.twitter.com/Yw2wetlkHy

— Booster_Space (@Booster_Space) October 7, 2017
"],"_oembed_time_87784d1f6723c3d48cdc8a028de189ad":["1508273475"],"_oembed_df557813da28a91b94d82470ea46767d":["

The atmosphere is getting tense here at the @hiig_berlin #privacyjam #Gamejam. The teams have to pitch their results at 6pm ?

— Booster_Space (@Booster_Space) October 8, 2017
"],"_oembed_time_df557813da28a91b94d82470ea46767d":["1508273475"],"_oembed_785b8a0878a2e7bf047b064c3e031eb7":["

Despite my sleepiness, very happy to be at #privacyjam this fine Saturday morning! Good luck gamers, see you tomorrow!

— Chillian J. Yikes! (@jilliancyork) October 7, 2017
"],"_oembed_time_785b8a0878a2e7bf047b064c3e031eb7":["1508275020"],"_oembed_c8671b4e7f1bccb6d62cbcd67c20a958":[""],"_oembed_time_c8671b4e7f1bccb6d62cbcd67c20a958":["1508275080"],"_oembed_4f7e495dfc65a3c5070f13d0845d6711":[""],"_oembed_time_4f7e495dfc65a3c5070f13d0845d6711":["1508276022"],"_oembed_208ed5901e3761bc526c2931405442c0":["{{unknown}}"],"_oembed_85e8b34b5569310e43a2f609dc12dd38":["

It is all about context thinking and right technique #privacyengineering #PrivacyJam @CiscoTrust @hiig_berlin @CiscoSecurity pic.twitter.com/UPi7Os3c7v

— Lorena Marciano (@MarcianoLorena) October 7, 2017
"],"_oembed_time_85e8b34b5569310e43a2f609dc12dd38":["1508276062"],"_oembed_6a4cd4d09133f1b4c738ba4372392e77":["

@jilliancyork #PrivacyJam #Berlin @hiig_berlin “I’ve got nothing to hide” think again on the #4points + bonus! pic.twitter.com/GkAsTPEGhQ

— Lorena Marciano (@MarcianoLorena) October 7, 2017
"],"_oembed_time_6a4cd4d09133f1b4c738ba4372392e77":["1508276248"],"_oembed_8f51140a556ab596b11ce97bba249be2":["

The #end of #privacyjam thanks to @hiig pic.twitter.com/62aqIWSNxH

— Booster_Space (@Booster_Space) October 8, 2017
"],"_oembed_time_8f51140a556ab596b11ce97bba249be2":["1508276248"],"_oembed_4cc8f57764c5c572c5c1570b6ee54777":["

And the winner is... the activist!!! #privacyjam is finished! amazing experience! pic.twitter.com/H1mOhgL3qn

— Claus Schaale (@cschaale) October 8, 2017
"],"_oembed_time_4cc8f57764c5c572c5c1570b6ee54777":["1508276248"],"_oembed_9427a27dbf5840d5d61ee445ef1fb985":["

Full house #privacyjam with @mdennedy en vogue for a 48h ride. #gamejam #privacy #nothingtohide #gaming #love #sweatergoals pic.twitter.com/EIIvXQjiAz

— Katharina Beitz (@kunstet) October 8, 2017
"],"_oembed_time_9427a27dbf5840d5d61ee445ef1fb985":["1508276248"],"_oembed_16a8b19c1dac77eb5a81509f516ada0d":["

#PrivacyJam #GameJam It takes a village, and beer, to build a data centric game. pic.twitter.com/CNJ1J65x1J

— M Dennedy (@mdennedy) October 7, 2017
"],"_oembed_time_16a8b19c1dac77eb5a81509f516ada0d":["1508276420"],"_oembed_955b5074bef16ba521d93612683d5a04":["

The winners are … ‘the activists’ @hiig_berlin @Cisco_Germany #privacyjam pic.twitter.com/Hg323bYZ4R

— Klaus Lenssen (@klaus_lenssen) October 8, 2017
"],"_oembed_time_955b5074bef16ba521d93612683d5a04":["1508276420"],"_oembed_877bbe15089cad85021d7d34cdeafee7":["

#PrivacyJam rolling at @hiig_berlin , @MarcianoLorena @mdennedy @klaus_lenssen @CiscoSecurity as #privacybydesign experts! #WeAreCisco a pic.twitter.com/NoOXVGUGqo

— Claus Schaale (@cschaale) October 7, 2017
"],"_oembed_time_877bbe15089cad85021d7d34cdeafee7":["1508276420"],"_thumbnail_id":["36576"],"_oembed_395236c9ec44dd9816f32d1c085d53bc":["{{unknown}}"],"_oembed_e47463df45fbfb98329bfc74d2a9d8e4":["{{unknown}}"],"_oembed_ab0eaeeee2feb8edd03f5f1771b73442":[""],"_oembed_time_ab0eaeeee2feb8edd03f5f1771b73442":["1508315334"],"_oembed_55a2474b17bb10d36173243b8e131ae6":[""],"_oembed_time_55a2474b17bb10d36173243b8e131ae6":["1508315378"],"_wpml_media_duplicate":["1"],"_wp_attachment_metadata":[""],"_oembed_62bacec4b19180e553d2a5b3e9ceb48d":["

Despite my sleepiness, very happy to be at #privacyjam this fine Saturday morning! Good luck gamers, see you tomorrow!

— jillian (@jilliancyork) October 7, 2017
"],"_oembed_time_62bacec4b19180e553d2a5b3e9ceb48d":["1685701792"],"_oembed_aeab31ee95e0e6928aa91c848d03eb1f":["

@jilliancyork #PrivacyJam #Berlin @hiig_berlin “I’ve got nothing to hide” think again on the #4points + bonus! pic.twitter.com/GkAsTPEGhQ

— Lorena Marciano (@MarcianoLorena) October 7, 2017
"],"_oembed_time_aeab31ee95e0e6928aa91c848d03eb1f":["1685701792"],"_oembed_aa96b7916eacba76df112a1c507ebc2b":["

Brainstorming time! The teams are set up and already working on their ideas for the @hiig_berlin #privacyjam #GameJam pic.twitter.com/a5FDh03vkV

— Booster Space (@Booster_Space) October 7, 2017
"],"_oembed_time_aa96b7916eacba76df112a1c507ebc2b":["1685701792"],"_oembed_7ace6158f53c52e424e62011433fa8b3":["

#PrivacyJam #GameJam It takes a village, and beer, to build a data centric game. pic.twitter.com/CNJ1J65x1J

— Michelle Finneran Dennedy, JD (@mdennedy) October 7, 2017
"],"_oembed_time_7ace6158f53c52e424e62011433fa8b3":["1685701792"],"_oembed_73c12d3a09a9413016e9b769dcadd88c":["

It's getting dark, but there's no time to waste and our Jamers are eager to go on! #privacyjam #gamejam @hiig_berlin pic.twitter.com/Yw2wetlkHy

— Booster Space (@Booster_Space) October 7, 2017
"],"_oembed_time_73c12d3a09a9413016e9b769dcadd88c":["1685701792"],"_oembed_86ab31b810976948f4963dd29398bdca":["

Full house #privacyjam with @mdennedy en vogue for a 48h ride. #gamejam #privacy #nothingtohide #gaming #love #sweatergoals pic.twitter.com/EIIvXQjiAz

— Katharina Beitz (@katharina_beitz) October 8, 2017
"],"_oembed_time_86ab31b810976948f4963dd29398bdca":["1685701792"],"_oembed_f50918019ebe78bb9bc288d64dc5c2c6":["

The winners are … ‘the activists’ @hiig_berlin @Cisco_Germany #privacyjam pic.twitter.com/Hg323bYZ4R

— Klaus Lenssen (@klaus_lenssen) October 8, 2017
"],"_oembed_time_f50918019ebe78bb9bc288d64dc5c2c6":["1685701793"],"_oembed_8f578625ea3128311b9aba11ce213c6c":["

The #end of #privacyjam thanks to @hiig pic.twitter.com/62aqIWSNxH

— Booster Space (@Booster_Space) October 8, 2017
"],"_oembed_time_8f578625ea3128311b9aba11ce213c6c":["1685701793"],"_oembed_6ac0e6d9b4a0f8743315878729697707":[""],"_oembed_time_6ac0e6d9b4a0f8743315878729697707":["1685701791"],"_oembed_1c39d83bbd6a94494997d8a7adca4d8e":[""],"_oembed_time_1c39d83bbd6a94494997d8a7adca4d8e":["1685701792"],"_oembed_b9d01f5a8edf29269fb1e5fc087355f3":[""],"_oembed_time_b9d01f5a8edf29269fb1e5fc087355f3":["1685701792"],"_wpml_media_has_media":["1"],"_wpml_media_featured":["1"],"_wpml_word_count":["{\"total\":1226,\"to_translate\":{\"de\":1226}}"],"_wp_page_template":["default"],"_encloseme":["1"],"saswp_schema_type_product_pros_enable_cons":["0"],"_oembed_db10b00cebf89f9fa6cee51aa7e4a0fc":[""],"_oembed_time_db10b00cebf89f9fa6cee51aa7e4a0fc":["1685701808"],"_oembed_21c356e6be3502971ade6dc33362eee0":[""],"_oembed_time_21c356e6be3502971ade6dc33362eee0":["1685701808"],"_oembed_08b05b1d242a4cbb30936bb86677007c":["

It's getting dark, but there's no time to waste and our Jamers are eager to go on! #privacyjam #gamejam @hiig_berlin pic.twitter.com/Yw2wetlkHy

— Booster Space (@Booster_Space) October 7, 2017
"],"_oembed_time_08b05b1d242a4cbb30936bb86677007c":["1685701808"],"_oembed_44264234a1d36da35bcc6127d42137e2":["

Brainstorming time! The teams are set up and already working on their ideas for the @hiig_berlin #privacyjam #GameJam pic.twitter.com/a5FDh03vkV

— Booster Space (@Booster_Space) October 7, 2017
"],"_oembed_time_44264234a1d36da35bcc6127d42137e2":["1685701808"],"_oembed_302959d38603b70d4f2b34d2a9bbe153":[""],"_oembed_7a58207fb4c5baae1012a4f23efda3ae":["

#PrivacyJam #GameJam It takes a village, and beer, to build a data centric game. pic.twitter.com/CNJ1J65x1J

— Michelle Finneran Dennedy, JD (@mdennedy) October 7, 2017
"],"_oembed_time_302959d38603b70d4f2b34d2a9bbe153":["1685701808"],"_oembed_time_7a58207fb4c5baae1012a4f23efda3ae":["1685701808"],"_oembed_74d444410421ed33c0d301e52a13d860":["

@jilliancyork #PrivacyJam #Berlin @hiig_berlin “I’ve got nothing to hide” think again on the #4points + bonus! pic.twitter.com/GkAsTPEGhQ

— Lorena Marciano (@MarcianoLorena) October 7, 2017
"],"_oembed_time_74d444410421ed33c0d301e52a13d860":["1685701808"],"_oembed_00bbc6526648b5e6ecaeb33818cde833":["

Full house #privacyjam with @mdennedy en vogue for a 48h ride. #gamejam #privacy #nothingtohide #gaming #love #sweatergoals pic.twitter.com/EIIvXQjiAz

— Katharina Beitz (@katharina_beitz) October 8, 2017
"],"_oembed_time_00bbc6526648b5e6ecaeb33818cde833":["1685701808"],"_oembed_161a8cfd85687870faf39dc6e1e248e8":["

Despite my sleepiness, very happy to be at #privacyjam this fine Saturday morning! Good luck gamers, see you tomorrow!

— jillian (@jilliancyork) October 7, 2017
"],"_oembed_6cfe9199aa271cc55f408d7fecc37a23":["

The winners are … ‘the activists’ @hiig_berlin @Cisco_Germany #privacyjam pic.twitter.com/Hg323bYZ4R

— Klaus Lenssen (@klaus_lenssen) October 8, 2017
"],"_oembed_4fd38fed2faf9c1424797a99be73d264":["

The #end of #privacyjam thanks to @hiig pic.twitter.com/62aqIWSNxH

— Booster Space (@Booster_Space) October 8, 2017
"],"_oembed_time_161a8cfd85687870faf39dc6e1e248e8":["1685701808"],"_oembed_time_4fd38fed2faf9c1424797a99be73d264":["1685701808"],"_oembed_time_6cfe9199aa271cc55f408d7fecc37a23":["1685701808"],"post_doi":[""],"_post_doi":["post_doi"],"custom_author_name":[""],"_custom_author_name":["field_601816872e6ac"],"_yoast_wpseo_primary_category":["224"],"_yoast_wpseo_content_score":["90"],"_yoast_wpseo_estimated-reading-time-minutes":["6"],"_yoast_wpseo_wordproof_timestamp":[""]}},"jobLocation":{"@type":"Place","address":{"@type":"PostalAddress","streetAddress":"Französische Straße 9","addressLocality":"Berlin","addressRegion":"Berlin","PostalCode":"10117","addressCountry":"Germany"}},"baseSalary":{"@type":"MonetaryAmount","value":{"@type":"QuantitativeValue"}},"estimatedSalary":{"@type":"MonetaryAmount","value":{"@type":"QuantitativeValue"}},"title":"Nothing to hide?","description":"In our interconnected and digitised society, personal data is the new gold. Therefore, we increasingly have to deal with complex matters like privacy and data protection. But how to explain these concepts? That’s why developers, scientists, designers and artists came together at “Game Jam: Unveil the Privacy Threat”. The objective was to develop serious games that could exactly achieve that! In the first part of our review, HIIG researcher Maximilian von Grafenstein provided a summary of all the game concepts. Now, we want to give you a small glimpse of the best #PrivacyJam moments:\n\n\n\nhttps://twitter.com/jilliancyork/status/916591963956277248\n\nBefore getting started with the development of game concepts, three use cases helped all participants to recollect the many facets of privacy.\n\nhttps://twitter.com/MarcianoLorena/status/916596739381047297\nUse case 1: I’ve got nothing to hide!\nIn her keynote, Jillian York (Director of International Freedom of Expression at Electronic Frontier Foundation) gave five reasons for why the statement “I’ve nothing to hide!” is wrong:\n\n\nMany people think they have nothing to hide and thus do not need to protect their privacy. The reasoning behind this is that only people who have done something illegal would want to conceal their behavior; but, so the thinking goes, there’s no social need for protection for illegal behavior!\n\nHowever, this only relates to a tiny part of privacy protection. In fact, privacy laws doesn’t just protect those (allegedly) engaged in “illegal” behavior. Privacy also protects a person against the loss of reputation that can occur when information is disclosed and/or used in the wrong context. As early as the 17th century, the French high priest and statesman Cardinal Richelieu stated: “Give me a letter of six sentences written by the most honorable man, and I will find something sufficient to hang him.” Of course, we don’t hang people anymore. However, what this kind of reasoning indicates is that there can always be somebody who wants to use personal information against someone. It is this misuse of personal information that privacy seeks to protect against. Some people even say that it actually doesn’t matter what you may have to hide; what matters is your ability to decide whether to hide something or not. This ability is guaranteed by privacy. Privacy is hence an essential precondition for the enrollment of an autonomous personality.\nUse case 2: Oops… wrong recipient!\nThe second speaker, Michelle Dennedy (Cisco), illustrated how challenging it is to sensitise employees to privacy.\n\n\nThe most common privacy threat in companies arises when an employee accidentally sends personal information about somebody else to the wrong recipient. This may sound like a no-brainer, but in fact, it is one of the biggest challenges in implementing effective privacy protection policies within companies.\n\nThere are two typical constellations that give rise to slightly different challenges for companies trying to mitigate this threat: In the first constellation, an employee uses an email client, and in the second constellation, he/she grants access to a file depository. In both cases, an employee typically sends an email, or grants access to a repository, to the wrong recipient because the email client or repository incorrectly autocompletes the address based on the first few letters. The employee forgets to double-check the name and… oops, the information is sent to the wrong recipient. But there are differences between the cases: The differences between both cases refer to how such an employee can react. If the employee has granted access to a file repository, in principle, he or she can still restrict access retrospectively. In contrast, if the employee has sent an email, the information is definitely “gone”, and he or she can only ask the recipient not to read and/or open the content. However, in both cases employees often do not react at all, or they do not appropriately, because they fear negative consequences if his or her colleagues or superior find out about it.\nUse case 3: Unraveling the anonymity paradox!\nJonathan Fox (Cisco) demonstrated the challenges of data anonymisation in his keynote “Unravel the anonymization paradox!”.\n\n\nIf personal information were anonymized, all our privacy concerns would be gone! But what does “anonymized” mean? This question is one of the hardest to resolve in the privacy debate. At present, privacy experts are grappling with the paradox that – in the big data era – there is no anonymous data anymore. All data can always be related to an individual by means of data analysis technologies. The reason for this is that data is only considered “anonymized” if it cannot be related to an identified or even to an identifiable individual.\n\nIn order to understand this paradox, imagine more than three million Berlin citizens – and another million tourists – are carrying around their personal devices every single day. Imagine that there is a Berlin-wide wifi system, which is publically available for all people who have switched on their devices’ wifi by default. This wifi system collects the movement data of all these devices over a longer period of time. Can you imagine how useful this data would be for urban traffic management and many other innovations? But wouldn’t it be creepy if this data could also be misused against an individual later on? Imagine that this data is thus anonymized in order to mitigate these risks. In the process all personal identifiers (i.e. the MAC address and IMEI) of the devices captured by the wifi system – which could in principle lead to an identification of the owner or even carrier of a device – are “hashed” (i.e. substituted by a specific hash value for each identifier). This hash value does not, per se, contain information referring to the owner or carrier of the device. However, it is still possible to capture the device’s movement pattern by referring to this hash. This movement pattern becomes more and more precise over time. Now imagine a person who gets access to that movement pattern (e.g. an employee of the provider of the wifi system or another data-driven company) and suddenly discovers that this device must be owned by somebody he knows very well. The reason for this is that this device “leaves” the building where he lives at the same time every morning and “moves” to an address where only lawyers work: In terms of probability, that person must be his wife!\n\nThis risk of re-identification of “anonymized” data exists generally, where it is combined with further information. It is hard to say which information will be added and hard to say what the consequences of an identification are. It is hard to say under which conditions this risk is low enough in order to be socially acceptable.\nhttps://twitter.com/Booster_Space/status/916626137203314688\n\nhttps://twitter.com/mdennedy/status/916787900242591744\n\nhttps://twitter.com/Booster_Space/status/916700100277174272\n\nhttps://twitter.com/kunstet/status/917091957188546560\n\nhttps://twitter.com/klaus_lenssen/status/917093279304478720\n\nhttps://twitter.com/Booster_Space/status/917094486412550144\nAnd the winners are...\nTaking the perspective of an activist in a repressive state, the players of “Pieces of Data” learn how data collected by their smartphones can harm them, and even other parties – and how to protect themselves against such threats. \"Because this game was so advanced in its development, it won!\", Maximilian von Grafenstein states.\n\n\n\nThis Game Jam was part of our research project Privacy by Design in Smart Cities.\n\n\nThis post represents the view of the author and does not necessarily represent the view of the institute itself. For more information about the topics of these articles and associated research projects, please contact info@hiig.de.","url":"https://www.hiig.de/en/nothing-to-hide/","employmentType":{"_edit_lock":["1685702108:347"],"_edit_last":["347"],"ftf_open_type":[""],"page_contacts":["a:2:{s:5:\"title\";s:0:\"\";s:4:\"text\";s:0:\"\";}"],"_oembed_a5da4167e5273cba2c982654bd1a959b":["

Brainstorming time! The teams are set up and already working on their ideas for the @hiig_berlin #privacyjam #GameJam pic.twitter.com/a5FDh03vkV

— Booster_Space (@Booster_Space) October 7, 2017
"],"_oembed_time_a5da4167e5273cba2c982654bd1a959b":["1508273441"],"_oembed_87784d1f6723c3d48cdc8a028de189ad":["

It's getting dark, but there's no time to waste and our Jamers are eager to go on! #privacyjam #gamejam @hiig_berlin pic.twitter.com/Yw2wetlkHy

— Booster_Space (@Booster_Space) October 7, 2017
"],"_oembed_time_87784d1f6723c3d48cdc8a028de189ad":["1508273475"],"_oembed_df557813da28a91b94d82470ea46767d":["

The atmosphere is getting tense here at the @hiig_berlin #privacyjam #Gamejam. The teams have to pitch their results at 6pm ?

— Booster_Space (@Booster_Space) October 8, 2017
"],"_oembed_time_df557813da28a91b94d82470ea46767d":["1508273475"],"_oembed_785b8a0878a2e7bf047b064c3e031eb7":["

Despite my sleepiness, very happy to be at #privacyjam this fine Saturday morning! Good luck gamers, see you tomorrow!

— Chillian J. Yikes! (@jilliancyork) October 7, 2017
"],"_oembed_time_785b8a0878a2e7bf047b064c3e031eb7":["1508275020"],"_oembed_c8671b4e7f1bccb6d62cbcd67c20a958":[""],"_oembed_time_c8671b4e7f1bccb6d62cbcd67c20a958":["1508275080"],"_oembed_4f7e495dfc65a3c5070f13d0845d6711":[""],"_oembed_time_4f7e495dfc65a3c5070f13d0845d6711":["1508276022"],"_oembed_208ed5901e3761bc526c2931405442c0":["{{unknown}}"],"_oembed_85e8b34b5569310e43a2f609dc12dd38":["

It is all about context thinking and right technique #privacyengineering #PrivacyJam @CiscoTrust @hiig_berlin @CiscoSecurity pic.twitter.com/UPi7Os3c7v

— Lorena Marciano (@MarcianoLorena) October 7, 2017
"],"_oembed_time_85e8b34b5569310e43a2f609dc12dd38":["1508276062"],"_oembed_6a4cd4d09133f1b4c738ba4372392e77":["

@jilliancyork #PrivacyJam #Berlin @hiig_berlin “I’ve got nothing to hide” think again on the #4points + bonus! pic.twitter.com/GkAsTPEGhQ

— Lorena Marciano (@MarcianoLorena) October 7, 2017
"],"_oembed_time_6a4cd4d09133f1b4c738ba4372392e77":["1508276248"],"_oembed_8f51140a556ab596b11ce97bba249be2":["

The #end of #privacyjam thanks to @hiig pic.twitter.com/62aqIWSNxH

— Booster_Space (@Booster_Space) October 8, 2017
"],"_oembed_time_8f51140a556ab596b11ce97bba249be2":["1508276248"],"_oembed_4cc8f57764c5c572c5c1570b6ee54777":["

And the winner is... the activist!!! #privacyjam is finished! amazing experience! pic.twitter.com/H1mOhgL3qn

— Claus Schaale (@cschaale) October 8, 2017
"],"_oembed_time_4cc8f57764c5c572c5c1570b6ee54777":["1508276248"],"_oembed_9427a27dbf5840d5d61ee445ef1fb985":["

Full house #privacyjam with @mdennedy en vogue for a 48h ride. #gamejam #privacy #nothingtohide #gaming #love #sweatergoals pic.twitter.com/EIIvXQjiAz

— Katharina Beitz (@kunstet) October 8, 2017
"],"_oembed_time_9427a27dbf5840d5d61ee445ef1fb985":["1508276248"],"_oembed_16a8b19c1dac77eb5a81509f516ada0d":["

#PrivacyJam #GameJam It takes a village, and beer, to build a data centric game. pic.twitter.com/CNJ1J65x1J

— M Dennedy (@mdennedy) October 7, 2017
"],"_oembed_time_16a8b19c1dac77eb5a81509f516ada0d":["1508276420"],"_oembed_955b5074bef16ba521d93612683d5a04":["

The winners are … ‘the activists’ @hiig_berlin @Cisco_Germany #privacyjam pic.twitter.com/Hg323bYZ4R

— Klaus Lenssen (@klaus_lenssen) October 8, 2017
"],"_oembed_time_955b5074bef16ba521d93612683d5a04":["1508276420"],"_oembed_877bbe15089cad85021d7d34cdeafee7":["

#PrivacyJam rolling at @hiig_berlin , @MarcianoLorena @mdennedy @klaus_lenssen @CiscoSecurity as #privacybydesign experts! #WeAreCisco a pic.twitter.com/NoOXVGUGqo

— Claus Schaale (@cschaale) October 7, 2017
"],"_oembed_time_877bbe15089cad85021d7d34cdeafee7":["1508276420"],"_thumbnail_id":["36576"],"_oembed_395236c9ec44dd9816f32d1c085d53bc":["{{unknown}}"],"_oembed_e47463df45fbfb98329bfc74d2a9d8e4":["{{unknown}}"],"_oembed_ab0eaeeee2feb8edd03f5f1771b73442":[""],"_oembed_time_ab0eaeeee2feb8edd03f5f1771b73442":["1508315334"],"_oembed_55a2474b17bb10d36173243b8e131ae6":[""],"_oembed_time_55a2474b17bb10d36173243b8e131ae6":["1508315378"],"_wpml_media_duplicate":["1"],"_wp_attachment_metadata":[""],"_oembed_62bacec4b19180e553d2a5b3e9ceb48d":["

Despite my sleepiness, very happy to be at #privacyjam this fine Saturday morning! Good luck gamers, see you tomorrow!

— jillian (@jilliancyork) October 7, 2017
"],"_oembed_time_62bacec4b19180e553d2a5b3e9ceb48d":["1685701792"],"_oembed_aeab31ee95e0e6928aa91c848d03eb1f":["

@jilliancyork #PrivacyJam #Berlin @hiig_berlin “I’ve got nothing to hide” think again on the #4points + bonus! pic.twitter.com/GkAsTPEGhQ

— Lorena Marciano (@MarcianoLorena) October 7, 2017
"],"_oembed_time_aeab31ee95e0e6928aa91c848d03eb1f":["1685701792"],"_oembed_aa96b7916eacba76df112a1c507ebc2b":["

Brainstorming time! The teams are set up and already working on their ideas for the @hiig_berlin #privacyjam #GameJam pic.twitter.com/a5FDh03vkV

— Booster Space (@Booster_Space) October 7, 2017
"],"_oembed_time_aa96b7916eacba76df112a1c507ebc2b":["1685701792"],"_oembed_7ace6158f53c52e424e62011433fa8b3":["

#PrivacyJam #GameJam It takes a village, and beer, to build a data centric game. pic.twitter.com/CNJ1J65x1J

— Michelle Finneran Dennedy, JD (@mdennedy) October 7, 2017
"],"_oembed_time_7ace6158f53c52e424e62011433fa8b3":["1685701792"],"_oembed_73c12d3a09a9413016e9b769dcadd88c":["

It's getting dark, but there's no time to waste and our Jamers are eager to go on! #privacyjam #gamejam @hiig_berlin pic.twitter.com/Yw2wetlkHy

— Booster Space (@Booster_Space) October 7, 2017
"],"_oembed_time_73c12d3a09a9413016e9b769dcadd88c":["1685701792"],"_oembed_86ab31b810976948f4963dd29398bdca":["

Full house #privacyjam with @mdennedy en vogue for a 48h ride. #gamejam #privacy #nothingtohide #gaming #love #sweatergoals pic.twitter.com/EIIvXQjiAz

— Katharina Beitz (@katharina_beitz) October 8, 2017
"],"_oembed_time_86ab31b810976948f4963dd29398bdca":["1685701792"],"_oembed_f50918019ebe78bb9bc288d64dc5c2c6":["

The winners are … ‘the activists’ @hiig_berlin @Cisco_Germany #privacyjam pic.twitter.com/Hg323bYZ4R

— Klaus Lenssen (@klaus_lenssen) October 8, 2017
"],"_oembed_time_f50918019ebe78bb9bc288d64dc5c2c6":["1685701793"],"_oembed_8f578625ea3128311b9aba11ce213c6c":["

The #end of #privacyjam thanks to @hiig pic.twitter.com/62aqIWSNxH

— Booster Space (@Booster_Space) October 8, 2017
"],"_oembed_time_8f578625ea3128311b9aba11ce213c6c":["1685701793"],"_oembed_6ac0e6d9b4a0f8743315878729697707":[""],"_oembed_time_6ac0e6d9b4a0f8743315878729697707":["1685701791"],"_oembed_1c39d83bbd6a94494997d8a7adca4d8e":[""],"_oembed_time_1c39d83bbd6a94494997d8a7adca4d8e":["1685701792"],"_oembed_b9d01f5a8edf29269fb1e5fc087355f3":[""],"_oembed_time_b9d01f5a8edf29269fb1e5fc087355f3":["1685701792"],"_wpml_media_has_media":["1"],"_wpml_media_featured":["1"],"_wpml_word_count":["{\"total\":1226,\"to_translate\":{\"de\":1226}}"],"_wp_page_template":["default"],"_encloseme":["1"],"saswp_schema_type_product_pros_enable_cons":["0"],"_oembed_db10b00cebf89f9fa6cee51aa7e4a0fc":[""],"_oembed_time_db10b00cebf89f9fa6cee51aa7e4a0fc":["1685701808"],"_oembed_21c356e6be3502971ade6dc33362eee0":[""],"_oembed_time_21c356e6be3502971ade6dc33362eee0":["1685701808"],"_oembed_08b05b1d242a4cbb30936bb86677007c":["

It's getting dark, but there's no time to waste and our Jamers are eager to go on! #privacyjam #gamejam @hiig_berlin pic.twitter.com/Yw2wetlkHy

— Booster Space (@Booster_Space) October 7, 2017
"],"_oembed_time_08b05b1d242a4cbb30936bb86677007c":["1685701808"],"_oembed_44264234a1d36da35bcc6127d42137e2":["

Brainstorming time! The teams are set up and already working on their ideas for the @hiig_berlin #privacyjam #GameJam pic.twitter.com/a5FDh03vkV

— Booster Space (@Booster_Space) October 7, 2017
"],"_oembed_time_44264234a1d36da35bcc6127d42137e2":["1685701808"],"_oembed_302959d38603b70d4f2b34d2a9bbe153":[""],"_oembed_7a58207fb4c5baae1012a4f23efda3ae":["

#PrivacyJam #GameJam It takes a village, and beer, to build a data centric game. pic.twitter.com/CNJ1J65x1J

— Michelle Finneran Dennedy, JD (@mdennedy) October 7, 2017
"],"_oembed_time_302959d38603b70d4f2b34d2a9bbe153":["1685701808"],"_oembed_time_7a58207fb4c5baae1012a4f23efda3ae":["1685701808"],"_oembed_74d444410421ed33c0d301e52a13d860":["

@jilliancyork #PrivacyJam #Berlin @hiig_berlin “I’ve got nothing to hide” think again on the #4points + bonus! pic.twitter.com/GkAsTPEGhQ

— Lorena Marciano (@MarcianoLorena) October 7, 2017
"],"_oembed_time_74d444410421ed33c0d301e52a13d860":["1685701808"],"_oembed_00bbc6526648b5e6ecaeb33818cde833":["

Full house #privacyjam with @mdennedy en vogue for a 48h ride. #gamejam #privacy #nothingtohide #gaming #love #sweatergoals pic.twitter.com/EIIvXQjiAz

— Katharina Beitz (@katharina_beitz) October 8, 2017
"],"_oembed_time_00bbc6526648b5e6ecaeb33818cde833":["1685701808"],"_oembed_161a8cfd85687870faf39dc6e1e248e8":["

Despite my sleepiness, very happy to be at #privacyjam this fine Saturday morning! Good luck gamers, see you tomorrow!

— jillian (@jilliancyork) October 7, 2017
"],"_oembed_6cfe9199aa271cc55f408d7fecc37a23":["

The winners are … ‘the activists’ @hiig_berlin @Cisco_Germany #privacyjam pic.twitter.com/Hg323bYZ4R

— Klaus Lenssen (@klaus_lenssen) October 8, 2017
"],"_oembed_4fd38fed2faf9c1424797a99be73d264":["

The #end of #privacyjam thanks to @hiig pic.twitter.com/62aqIWSNxH

— Booster Space (@Booster_Space) October 8, 2017
"],"_oembed_time_161a8cfd85687870faf39dc6e1e248e8":["1685701808"],"_oembed_time_4fd38fed2faf9c1424797a99be73d264":["1685701808"],"_oembed_time_6cfe9199aa271cc55f408d7fecc37a23":["1685701808"],"post_doi":[""],"_post_doi":["post_doi"],"custom_author_name":[""],"_custom_author_name":["field_601816872e6ac"],"_yoast_wpseo_primary_category":["224"],"_yoast_wpseo_content_score":["90"],"_yoast_wpseo_estimated-reading-time-minutes":["6"],"_yoast_wpseo_wordproof_timestamp":[""]},"image":[{"@type":"ImageObject","@id":"https://www.hiig.de/en/nothing-to-hide/#primaryimage","url":"https://www.hiig.de/wp-content/uploads/2023/12/post_generic-1600x901.png","width":"1600","height":"901"},{"@type":"ImageObject","url":"https://www.hiig.de/wp-content/uploads/2023/12/post_generic-1200x900.png","width":"1200","height":"900"},{"@type":"ImageObject","url":"https://www.hiig.de/wp-content/uploads/2023/12/post_generic-1200x675.png","width":"1200","height":"675"}]}] Skip to content
GameJam_16-9 Skater
18 October 2017

Nothing to hide?

In our interconnected and digitised society, personal data is the new gold. Therefore, we increasingly have to deal with complex matters like privacy and data protection. But how to explain these concepts? That’s why developers, scientists, designers and artists came together at “Game Jam: Unveil the Privacy Threat”. The objective was to develop serious games that could exactly achieve that! In the first part of our review, HIIG researcher Maximilian von Grafenstein provided a summary of all the game concepts. Now, we want to give you a small glimpse of the best #PrivacyJam moments:

Before getting started with the development of game concepts, three use cases helped all participants to recollect the many facets of privacy.

Use case 1: I’ve got nothing to hide!

In her keynote, Jillian York (Director of International Freedom of Expression at Electronic Frontier Foundation) gave five reasons for why the statement “I’ve nothing to hide!” is wrong:

Many people think they have nothing to hide and thus do not need to protect their privacy. The reasoning behind this is that only people who have done something illegal would want to conceal their behavior; but, so the thinking goes, there’s no social need for protection for illegal behavior!

However, this only relates to a tiny part of privacy protection. In fact, privacy laws doesn’t just protect those (allegedly) engaged in “illegal” behavior. Privacy also protects a person against the loss of reputation that can occur when information is disclosed and/or used in the wrong context. As early as the 17th century, the French high priest and statesman Cardinal Richelieu stated: “Give me a letter of six sentences written by the most honorable man, and I will find something sufficient to hang him.” Of course, we don’t hang people anymore. However, what this kind of reasoning indicates is that there can always be somebody who wants to use personal information against someone. It is this misuse of personal information that privacy seeks to protect against. Some people even say that it actually doesn’t matter what you may have to hide; what matters is your ability to decide whether to hide something or not. This ability is guaranteed by privacy. Privacy is hence an essential precondition for the enrollment of an autonomous personality.

Use case 2: Oops… wrong recipient!

The second speaker, Michelle Dennedy (Cisco), illustrated how challenging it is to sensitise employees to privacy.

The most common privacy threat in companies arises when an employee accidentally sends personal information about somebody else to the wrong recipient. This may sound like a no-brainer, but in fact, it is one of the biggest challenges in implementing effective privacy protection policies within companies.

There are two typical constellations that give rise to slightly different challenges for companies trying to mitigate this threat: In the first constellation, an employee uses an email client, and in the second constellation, he/she grants access to a file depository. In both cases, an employee typically sends an email, or grants access to a repository, to the wrong recipient because the email client or repository incorrectly autocompletes the address based on the first few letters. The employee forgets to double-check the name and… oops, the information is sent to the wrong recipient. But there are differences between the cases: The differences between both cases refer to how such an employee can react. If the employee has granted access to a file repository, in principle, he or she can still restrict access retrospectively. In contrast, if the employee has sent an email, the information is definitely “gone”, and he or she can only ask the recipient not to read and/or open the content. However, in both cases employees often do not react at all, or they do not appropriately, because they fear negative consequences if his or her colleagues or superior find out about it.

Use case 3: Unraveling the anonymity paradox!

Jonathan Fox (Cisco) demonstrated the challenges of data anonymisation in his keynote “Unravel the anonymization paradox!”.

If personal information were anonymized, all our privacy concerns would be gone! But what does “anonymized” mean? This question is one of the hardest to resolve in the privacy debate. At present, privacy experts are grappling with the paradox that – in the big data era – there is no anonymous data anymore. All data can always be related to an individual by means of data analysis technologies. The reason for this is that data is only considered “anonymized” if it cannot be related to an identified or even to an identifiable individual.

In order to understand this paradox, imagine more than three million Berlin citizens – and another million tourists – are carrying around their personal devices every single day. Imagine that there is a Berlin-wide wifi system, which is publically available for all people who have switched on their devices’ wifi by default. This wifi system collects the movement data of all these devices over a longer period of time. Can you imagine how useful this data would be for urban traffic management and many other innovations? But wouldn’t it be creepy if this data could also be misused against an individual later on? Imagine that this data is thus anonymized in order to mitigate these risks. In the process all personal identifiers (i.e. the MAC address and IMEI) of the devices captured by the wifi system – which could in principle lead to an identification of the owner or even carrier of a device – are “hashed” (i.e. substituted by a specific hash value for each identifier). This hash value does not, per se, contain information referring to the owner or carrier of the device. However, it is still possible to capture the device’s movement pattern by referring to this hash. This movement pattern becomes more and more precise over time. Now imagine a person who gets access to that movement pattern (e.g. an employee of the provider of the wifi system or another data-driven company) and suddenly discovers that this device must be owned by somebody he knows very well. The reason for this is that this device “leaves” the building where he lives at the same time every morning and “moves” to an address where only lawyers work: In terms of probability, that person must be his wife!

This risk of re-identification of “anonymized” data exists generally, where it is combined with further information. It is hard to say which information will be added and hard to say what the consequences of an identification are. It is hard to say under which conditions this risk is low enough in order to be socially acceptable.

And the winners are…

Taking the perspective of an activist in a repressive state, the players of “Pieces of Data” learn how data collected by their smartphones can harm them, and even other parties – and how to protect themselves against such threats. “Because this game was so advanced in its development, it won!”, Maximilian von Grafenstein states.

This Game Jam was part of our research project Privacy by Design in Smart Cities.
This post represents the view of the author and does not necessarily represent the view of the institute itself. For more information about the topics of these articles and associated research projects, please contact info@hiig.de.

This post represents the view of the author and does not necessarily represent the view of the institute itself. For more information about the topics of these articles and associated research projects, please contact info@hiig.de.

Katrin Werner

Former Coordinator for Science Communication and Fundraising

Explore Research issue in focus

Du siehst eine Tastatur auf der eine Taste rot gefärbt ist und auf der „Control“ steht. Eine bildliche Metapher für die Regulierung von digitalen Plattformen im Internet und Data Governance. You see a keyboard on which one key is coloured red and says "Control". A figurative metaphor for the regulation of digital platforms on the internet and data governance.

Data governance

We develop robust data governance frameworks and models to provide practical solutions for good data governance policies.

Sign up for HIIG's Monthly Digest

and receive our latest blog articles.

Further articles

Generic visualizations generated by the author using Stable Diffusion AI representing futuristic visions for futures studies

Honey, we need to talk about the future

Can futures studies challenge the status quo beyond academia and approach public dialogue as an imaginative space for collective endeavours?

two Quechuas, sitting on green grass and looking at their smartphones, symbolising What are the indigenous perspectives of digitalisation? Quechuas in Peru show openness, challenges, and requirements to grow their digital economies

Exploring digitalisation: Indigenous perspectives from Puno, Peru

What are the indigenous perspectives of digitalisation? Quechuas in Peru show openness, challenges, and requirements to grow their digital economies.

eine mehrfarbige Baumlandschaft von oben, die eine bunte digitale Publikationslandschaft symbolisiert

Diamond OA: For a colourful digital publishing landscape

The blog post raises awareness of new financial pitfalls in the Open Access transformation and proposes a collaborative funding structure for Diamond OA in Germany.