{"id":36560,"date":"2017-10-18T10:54:05","date_gmt":"2017-10-18T08:54:05","guid":{"rendered":"https:\/\/www.hiig.de\/?p=36560\/"},"modified":"2023-06-02T12:30:34","modified_gmt":"2023-06-02T10:30:34","slug":"nothing-to-hide","status":"publish","type":"post","link":"https:\/\/www.hiig.de\/en\/nothing-to-hide\/","title":{"rendered":"Nothing to hide?"},"content":{"rendered":"<p><em>In our interconnected and digitised society, personal data is the new gold. Therefore, we increasingly have to deal with complex matters like privacy and data protection. But how to explain these concepts? That\u2019s why developers, scientists, designers and artists came together at \u201cGame Jam: Unveil the Privacy Threat\u201d. The objective was to develop serious games that could exactly achieve that! In the <a href=\"https:\/\/www.hiig.de\/en\/blog\/serious-games-as-a-tool-for-privacy-by-design\/\">first part of our review<\/a>, HIIG researcher Maximilian von Grafenstein provided a summary of all the game concepts. Now, we want to give you a small glimpse of the best #PrivacyJam moments:<\/em><\/p>\n\n\t\n\t\t<div class=\"gallery_clear\"><\/div> \n\t\t<div id=\"gallery_36560_1\" class=\"photospace\"> \n\t\n\t\t\t<!-- Start Advanced Gallery Html Containers -->\n\t\t\t<div class=\"thumbs_wrap2\">\n\t\t\t\t<div class=\"thumbs_wrap\">\n\t\t\t\t\t<div id=\"thumbs_36560_1\" class=\"thumnail_col hide_me\" >\n\t\t\t\t\t\t \n\t\t\t\t\t\t<ul class=\"thumbs noscript\">\t\t\t\t\n\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t<li><a class=\"thumb\" href=\"https:\/\/www.hiig.de\/wp-content\/uploads\/2017\/10\/IMGP1936.jpg\" title=\"IMGP1936\" >\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/www.hiig.de\/wp-content\/uploads\/2017\/10\/IMGP1936.jpg\" alt=\"\" title=\"IMGP1936\" \/>\n\t\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t<div class=\"caption\">\n\t\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t<li><a class=\"thumb\" href=\"https:\/\/www.hiig.de\/wp-content\/uploads\/2017\/10\/IMGP2046.jpg\" title=\"IMGP2046\" >\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/www.hiig.de\/wp-content\/uploads\/2017\/10\/IMGP2046.jpg\" alt=\"\" title=\"IMGP2046\" \/>\n\t\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t<div class=\"caption\">\n\t\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t<li><a class=\"thumb\" href=\"https:\/\/www.hiig.de\/wp-content\/uploads\/2017\/10\/IMGP2149.jpg\" title=\"IMGP2149\" >\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/www.hiig.de\/wp-content\/uploads\/2017\/10\/IMGP2149.jpg\" alt=\"\" title=\"IMGP2149\" \/>\n\t\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t<div class=\"caption\">\n\t\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t<li><a class=\"thumb\" href=\"https:\/\/www.hiig.de\/wp-content\/uploads\/2017\/10\/IMGP2138.jpg\" title=\"IMGP2138\" >\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/www.hiig.de\/wp-content\/uploads\/2017\/10\/IMGP2138.jpg\" alt=\"\" title=\"IMGP2138\" \/>\n\t\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t<div class=\"caption\">\n\t\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t<li><a class=\"thumb\" href=\"https:\/\/www.hiig.de\/wp-content\/uploads\/2017\/10\/IMG_9364.jpg\" title=\"IMG_9364\" >\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/www.hiig.de\/wp-content\/uploads\/2017\/10\/IMG_9364.jpg\" alt=\"\" title=\"IMG_9364\" \/>\n\t\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t<div class=\"caption\">\n\t\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t<li><a class=\"thumb\" href=\"https:\/\/www.hiig.de\/wp-content\/uploads\/2017\/10\/IMGP2220.jpg\" title=\"IMGP2220\" >\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/www.hiig.de\/wp-content\/uploads\/2017\/10\/IMGP2220.jpg\" alt=\"\" title=\"IMGP2220\" \/>\n\t\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t<div class=\"caption\">\n\t\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t<li><a class=\"thumb\" href=\"https:\/\/www.hiig.de\/wp-content\/uploads\/2017\/10\/MG_9329.jpg\" title=\"_MG_9329\" >\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/www.hiig.de\/wp-content\/uploads\/2017\/10\/MG_9329.jpg\" alt=\"\" title=\"_MG_9329\" \/>\n\t\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t<div class=\"caption\">\n\t\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t<li><a class=\"thumb\" href=\"https:\/\/www.hiig.de\/wp-content\/uploads\/2017\/10\/IMGP2154.jpg\" title=\"IMGP2154\" >\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/www.hiig.de\/wp-content\/uploads\/2017\/10\/IMGP2154.jpg\" alt=\"\" title=\"IMGP2154\" \/>\n\t\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t<div class=\"caption\">\n\t\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t<li><a class=\"thumb\" href=\"https:\/\/www.hiig.de\/wp-content\/uploads\/2017\/10\/MG_9344.jpg\" title=\"_MG_9344\" >\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/www.hiig.de\/wp-content\/uploads\/2017\/10\/MG_9344.jpg\" alt=\"\" title=\"_MG_9344\" \/>\n\t\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t<div class=\"caption\">\n\t\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t<li><a class=\"thumb\" href=\"https:\/\/www.hiig.de\/wp-content\/uploads\/2017\/10\/MG_9248.jpg\" title=\"_MG_9248\" >\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/www.hiig.de\/wp-content\/uploads\/2017\/10\/MG_9248.jpg\" alt=\"\" title=\"_MG_9248\" \/>\n\t\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t<div class=\"caption\">\n\t\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t<li><a class=\"thumb\" href=\"https:\/\/www.hiig.de\/wp-content\/uploads\/2017\/10\/MG_9264.jpg\" title=\"_MG_9264\" >\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/www.hiig.de\/wp-content\/uploads\/2017\/10\/MG_9264.jpg\" alt=\"\" title=\"_MG_9264\" \/>\n\t\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t<div class=\"caption\">\n\t\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t<li><a class=\"thumb\" href=\"https:\/\/www.hiig.de\/wp-content\/uploads\/2017\/10\/MG_9206.jpg\" title=\"_MG_9206\" >\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/www.hiig.de\/wp-content\/uploads\/2017\/10\/MG_9206.jpg\" alt=\"\" title=\"_MG_9206\" \/>\n\t\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t<div class=\"caption\">\n\t\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t\t\t<div class=\"photospace_clear\"><\/div>\n\t\t\t\t\t\t\t\t<a class=\"pageLink prev\" style=\"display:none\" href=\"#\" title=\"Previous Page\"><\/a>\n\t\t\t\t\t\t<a class=\"pageLink next\" style=\"display:none\" href=\"#\" title=\"Next Page\"><\/a>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\t\n\t\t\t<!-- Start Advanced Gallery Html Containers -->\n\t\t\t<div class=\"gal_content\">\n\t\t\t\t<div id=\"controls_36560_1\" class=\"controls\"><\/div>\n\t\t\t\t<div class=\"slideshow-container\">\n\t\t\t\t\t<div id=\"loading_36560_1\" class=\"loader\"><\/div>\n\t\t\t\t\t<div id=\"slideshow_36560_1\" class=\"slideshow\"><\/div>\n\t\t\t\t\t<div id=\"caption_36560_1\" class=\"caption-container\"><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\n\t\t\t<\/div>\n\t\n\t<\/div>\n\t\n\t<div class=\"gallery_clear\"><\/div>\n\t\n\t\n\t\n\t<script type='text\/javascript'>\n\t\t\t\n\t\t\tjQuery(document).ready(function($) {\n\t\t\t\t\n\t\t\t\t\/\/ We only want these styles applied when javascript is enabled\n\t\t\t\t$('.gal_content').css('display', 'block');\n\t\t\t\t$('.thumnail_col').css('width', '181px');\n\t\t\t\t\n\t\t\t\t\/\/ Initialize Advanced Galleriffic Gallery \n\t\t\t\tvar gallery = $('#thumbs_36560_1').galleriffic({ \n\t\t\t\t\tdelay:                     3500,\n\t\t\t\t\tnumThumbs:                 9,\n\t\t\t\t\tpreloadAhead:              9,\n\t\t\t\t\tenableTopPager:            0,\n\t\t\t\t\tenableBottomPager:         false,\n\t\t\t\t\timageContainerSel:         '#slideshow_36560_1',\n\t\t\t\t\tcontrolsContainerSel:      '#controls_36560_1',\n\t\t\t\t\tcaptionContainerSel:       '#caption_36560_1',  \n\t\t\t\t\tloadingContainerSel:       '#loading_36560_1',\n\t\t\t\t\trenderSSControls:          true,\n\t\t\t\t\trenderNavControls:         true,\n\t\t\t\t\tplayLinkText:              '',\n\t\t\t\t\tpauseLinkText:             '',\n\t\t\t\t\tprevLinkText:              '',\n\t\t\t\t\tnextLinkText:              '',\n\t\t\t\t\tnextPageLinkText:          '&rsaquo;',\n\t\t\t\t\tprevPageLinkText:          '&lsaquo;',\n\t\t\t\t\tenableHistory:              0,\n\t\t\t\t\tautoStart:                 \t0,\n\t\t\t\t\tenableKeyboardNavigation:\ttrue,\n\t\t\t\t\tsyncTransitions:           \t1,\n\t\t\t\t\tdefaultTransitionDuration: \t300,\n\t\t\t\t\t\t\n\t\t\t\t\tonTransitionOut:           function(slide, caption, isSync, callback) {\n\t\t\t\t\t\tslide.fadeTo(this.getDefaultTransitionDuration(isSync), 0.0, callback);\n\t\t\t\t\t\tcaption.fadeTo(this.getDefaultTransitionDuration(isSync), 0.0);\n\t\t\t\t\t},\n\t\t\t\t\tonTransitionIn:            function(slide, caption, isSync) {\n\t\t\t\t\t\tvar duration = this.getDefaultTransitionDuration(isSync);\n\t\t\t\t\t\tslide.fadeTo(duration, 1.0);\n\t\n\t\t\t\t\t\t\/\/ Position the caption at the bottom of the image and set its opacity\n\t\t\t\t\t\tvar slideImage = slide.find('img');\n\t\t\t\t\t\tcaption.width(slideImage.width())\n\t\t\t\t\t\t\t.css({\n\t\t\t\t\t\t\t\t\/\/'bottom' : Math.floor((slide.height() - slideImage.outerHeight()) \/ 2 - 40),\n\t\t\t\t\t\t\t\t'top' : slideImage.outerHeight(),\n\t\t\t\t\t\t\t\t'left' : Math.floor((slide.width() - slideImage.width()) \/ 2) + slideImage.outerWidth() - slideImage.width()\n\t\t\t\t\t\t\t})\n\t\t\t\t\t\t\t.fadeTo(duration, 1.0);\n\t\t\t\t\t\t\n\t\t\t\t\t},\n\t\t\t\t\tonPageTransitionOut:       function(callback) {\n\t\t\t\t\t\tthis.hide();\n\t\t\t\t\t\tsetTimeout(callback, 100); \/\/ wait a bit\n\t\t\t\t\t},\n\t\t\t\t\tonPageTransitionIn:        function() {\n\t\t\t\t\t\tvar prevPageLink = this.find('a.prev').css('display', 'none');\n\t\t\t\t\t\tvar nextPageLink = this.find('a.next').css('display', 'none');\n\t\t\t\t\t\t\n\t\t\t\t\t\t\/\/ Show appropriate next \/ prev page links\n\t\t\t\t\t\tif (this.displayedPage > 0)\n\t\t\t\t\t\t\tprevPageLink.css('display', 'block');\n\t\t\n\t\t\t\t\t\tvar lastPage = this.getNumPages() - 1;\n\t\t\t\t\t\tif (this.displayedPage < lastPage)\n\t\t\t\t\t\t\tnextPageLink.css('display', 'block');\n\t\t\n\t\t\t\t\t\tthis.fadeTo('fast', 1.0);\n\t\t\t\t\t}\n\t\t\t\t\t\n\t\t\t\t}); \n\t\t\t\t\n\t\t\t\t\n\t\t\t\t\n\t\t\t\t\/**************** Event handlers for custom next \/ prev page links **********************\/\n\t\t\n\t\t\t\tgallery.find('a.prev').click(function(e) {\n\t\t\t\t\tgallery.previousPage();\n\t\t\t\t\te.preventDefault();\n\t\t\t\t});\n\t\t\n\t\t\t\tgallery.find('a.next').click(function(e) {\n\t\t\t\t\tgallery.nextPage(); \n\t\t\t\t\te.preventDefault();\n\t\t\t\t});\n\t\t\n\t\t\t});\n\t\t<\/script>\n\t\t\n\t\t\n<p>https:\/\/twitter.com\/jilliancyork\/status\/916591963956277248<\/p>\n<p>Before getting started with the development of game concepts, three use cases helped all participants to recollect the many facets of privacy.<\/p>\n<blockquote class=\"twitter-tweet\" data-width=\"500\" data-dnt=\"true\">\n<p lang=\"en\" dir=\"ltr\"><a href=\"https:\/\/twitter.com\/jilliancyork?ref_src=twsrc%5Etfw\">@jilliancyork<\/a> <a href=\"https:\/\/twitter.com\/hashtag\/PrivacyJam?src=hash&amp;ref_src=twsrc%5Etfw\">#PrivacyJam<\/a> <a href=\"https:\/\/twitter.com\/hashtag\/Berlin?src=hash&amp;ref_src=twsrc%5Etfw\">#Berlin<\/a> <a href=\"https:\/\/twitter.com\/hiig_berlin?ref_src=twsrc%5Etfw\">@hiig_berlin<\/a> \u201cI\u2019ve got nothing to hide\u201d think again on the <a href=\"https:\/\/twitter.com\/hashtag\/4points?src=hash&amp;ref_src=twsrc%5Etfw\">#4points<\/a> + bonus! <a href=\"https:\/\/t.co\/GkAsTPEGhQ\">pic.twitter.com\/GkAsTPEGhQ<\/a><\/p>\n<p>&mdash; Lorena Marciano (@MarcianoLorena) <a href=\"https:\/\/twitter.com\/MarcianoLorena\/status\/916596739381047297?ref_src=twsrc%5Etfw\">October 7, 2017<\/a><\/p><\/blockquote>\n<p><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<h3>Use case 1: I\u2019ve got nothing to hide!<\/h3>\n<p>In her keynote, <strong>Jillian York<\/strong> (Director of International Freedom of Expression at\u00a0<a href=\"https:\/\/www.eff.org\/\">Electronic Frontier Foundation<\/a>) gave five reasons for why the statement \u201cI\u2019ve nothing to hide!\u201d is wrong:<\/p>\n<div class=\"lyte-wrapper\" style=\"width:420px;max-width:100%;margin:5px auto;\"><div class=\"lyMe\" id=\"WYL_cHcCfuyoO8k\"><div id=\"lyte_cHcCfuyoO8k\" data-src=\"https:\/\/www.hiig.de\/wp-content\/plugins\/wp-youtube-lyte\/lyteCache.php?origThumbUrl=%2F%2Fi.ytimg.com%2Fvi%2FcHcCfuyoO8k%2Fhqdefault.jpg\" class=\"pL\"><div class=\"tC\"><div class=\"tT\"><\/div><\/div><div class=\"play\"><\/div><div class=\"ctrl\"><div class=\"Lctrl\"><\/div><div class=\"Rctrl\"><\/div><\/div><\/div><noscript><a href=\"https:\/\/youtu.be\/cHcCfuyoO8k\" rel=\"nofollow\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.hiig.de\/wp-content\/plugins\/wp-youtube-lyte\/lyteCache.php?origThumbUrl=https%3A%2F%2Fi.ytimg.com%2Fvi%2FcHcCfuyoO8k%2F0.jpg\" alt=\"YouTube video thumbnail\" width=\"420\" height=\"216\" \/><br \/>Watch this video on YouTube<\/a><\/noscript><\/div><\/div><div class=\"lL\" style=\"max-width:100%;width:420px;margin:5px auto;\"><\/div><\/p>\n<blockquote><p>Many people think they have nothing to hide and thus do not need to protect their privacy. The reasoning behind this is that only people who have done something illegal would want to conceal their behavior; but, so the thinking goes, there\u2019s no social need for protection for illegal behavior!<\/p>\n<p>However, this only relates to a tiny part of privacy protection. In fact, privacy laws doesn\u2019t just protect those (allegedly) engaged in \u201cillegal\u201d behavior. Privacy also protects a person against the loss of reputation that can occur when information is disclosed and\/or used in the wrong context. As early as the 17th century, the French high priest and statesman Cardinal Richelieu stated: \u201cGive me a letter of six sentences written by the most honorable man, and I will find something sufficient to hang him.\u201d Of course, we don\u2019t hang people anymore. However, what this kind of reasoning indicates is that there can always be somebody who wants to use personal information against someone. It is this misuse of personal information that privacy seeks to protect against. Some people even say that it actually doesn\u2019t matter what you may have to hide; what matters is your ability to decide whether to hide something or not. This ability is guaranteed by privacy. Privacy is hence an essential precondition for the enrollment of an autonomous personality.<\/p><\/blockquote>\n<h3>Use case 2: Oops\u2026 wrong recipient!<\/h3>\n<p>The second speaker, <strong>Michelle Dennedy<\/strong> (<a href=\"https:\/\/www.cisco.com\/\">Cisco<\/a>), illustrated how challenging it is to sensitise employees to privacy.<\/p>\n<div class=\"lyte-wrapper\" style=\"width:420px;max-width:100%;margin:5px auto;\"><div class=\"lyMe\" id=\"WYL_N3080uXiUKE\"><div id=\"lyte_N3080uXiUKE\" data-src=\"https:\/\/www.hiig.de\/wp-content\/plugins\/wp-youtube-lyte\/lyteCache.php?origThumbUrl=%2F%2Fi.ytimg.com%2Fvi%2FN3080uXiUKE%2Fhqdefault.jpg\" class=\"pL\"><div class=\"tC\"><div class=\"tT\"><\/div><\/div><div class=\"play\"><\/div><div class=\"ctrl\"><div class=\"Lctrl\"><\/div><div class=\"Rctrl\"><\/div><\/div><\/div><noscript><a href=\"https:\/\/youtu.be\/N3080uXiUKE\" rel=\"nofollow\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.hiig.de\/wp-content\/plugins\/wp-youtube-lyte\/lyteCache.php?origThumbUrl=https%3A%2F%2Fi.ytimg.com%2Fvi%2FN3080uXiUKE%2F0.jpg\" alt=\"YouTube video thumbnail\" width=\"420\" height=\"216\" \/><br \/>Watch this video on YouTube<\/a><\/noscript><\/div><\/div><div class=\"lL\" style=\"max-width:100%;width:420px;margin:5px auto;\"><\/div><\/p>\n<blockquote><p>The most common privacy threat in companies arises when an employee accidentally sends personal information about somebody else to the wrong recipient. This may sound like a no-brainer, but in fact, it is one of the biggest challenges in implementing effective privacy protection policies within companies.<\/p>\n<p>There are two typical constellations that give rise to slightly different challenges for companies trying to mitigate this threat: In the first constellation, an employee uses an email client, and in the second constellation, he\/she grants access to a file depository. In both cases, an employee typically sends an email, or grants access to a repository, to the wrong recipient because the email client or repository incorrectly autocompletes the address based on the first few letters. The employee forgets to double-check the name and\u2026 oops, the information is sent to the wrong recipient. But there are differences between the cases: The differences between both cases refer to how such an employee can react. If the employee has granted access to a file repository, in principle, he or she can still restrict access retrospectively. In contrast, if the employee has sent an email, the information is definitely \u201cgone\u201d, and he or she can only ask the recipient not to read and\/or open the content. However, in both cases employees often do not react at all, or they do not appropriately, because they fear negative consequences if his or her colleagues or superior find out about it.<\/p><\/blockquote>\n<h3>Use case 3: Unraveling the anonymity paradox!<\/h3>\n<p><strong>Jonathan Fox<\/strong> (<a href=\"https:\/\/www.cisco.com\/\">Cisco<\/a>) demonstrated the challenges of data anonymisation in his keynote \u201cUnravel the anonymization paradox!\u201d.<\/p>\n<div class=\"lyte-wrapper\" style=\"width:420px;max-width:100%;margin:5px auto;\"><div class=\"lyMe\" id=\"WYL_CtReDBG8I2w\"><div id=\"lyte_CtReDBG8I2w\" data-src=\"https:\/\/www.hiig.de\/wp-content\/plugins\/wp-youtube-lyte\/lyteCache.php?origThumbUrl=%2F%2Fi.ytimg.com%2Fvi%2FCtReDBG8I2w%2Fhqdefault.jpg\" class=\"pL\"><div class=\"tC\"><div class=\"tT\"><\/div><\/div><div class=\"play\"><\/div><div class=\"ctrl\"><div class=\"Lctrl\"><\/div><div class=\"Rctrl\"><\/div><\/div><\/div><noscript><a href=\"https:\/\/youtu.be\/CtReDBG8I2w\" rel=\"nofollow\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.hiig.de\/wp-content\/plugins\/wp-youtube-lyte\/lyteCache.php?origThumbUrl=https%3A%2F%2Fi.ytimg.com%2Fvi%2FCtReDBG8I2w%2F0.jpg\" alt=\"YouTube video thumbnail\" width=\"420\" height=\"216\" \/><br \/>Watch this video on YouTube<\/a><\/noscript><\/div><\/div><div class=\"lL\" style=\"max-width:100%;width:420px;margin:5px auto;\"><\/div><\/p>\n<blockquote><p>If personal information were anonymized, all our privacy concerns would be gone! But what does \u201canonymized\u201d mean? This question is one of the hardest to resolve in the privacy debate. At present, privacy experts are grappling with the paradox that \u2013 in the big data era \u2013 there is no anonymous data anymore. All data can always be related to an individual by means of data analysis technologies. The reason for this is that data is only considered \u201canonymized\u201d if it cannot be related to an identified or even to an identifiable individual.<\/p>\n<p>In order to understand this paradox, imagine more than three million Berlin citizens \u2013 and another million tourists \u2013 are carrying around their personal devices every single day. Imagine that there is a Berlin-wide wifi system, which is publically available for all people who have switched on their devices\u2019 wifi by default. This wifi system collects the movement data of all these devices over a longer period of time. Can you imagine how useful this data would be for urban traffic management and many other innovations? But wouldn\u2019t it be creepy if this data could also be misused against an individual later on? Imagine that this data is thus anonymized in order to mitigate these risks. In the process all personal identifiers (i.e. the MAC address and IMEI) of the devices captured by the wifi system \u2013 which could in principle lead to an identification of the owner or even carrier of a device \u2013 are \u201chashed\u201d (i.e. substituted by a specific hash value for each identifier). This hash value does not, per se, contain information referring to the owner or carrier of the device. However, it is still possible to capture the device\u2019s movement pattern by referring to this hash. This movement pattern becomes more and more precise over time. Now imagine a person who gets access to that movement pattern (e.g. an employee of the provider of the wifi system or another data-driven company) and suddenly discovers that this device must be owned by somebody he knows very well. The reason for this is that this device \u201cleaves\u201d the building where he lives at the same time every morning and \u201cmoves\u201d to an address where only lawyers work: In terms of probability, that person must be his wife!<\/p>\n<p>This risk of re-identification of \u201canonymized\u201d data exists generally, where it is combined with further information. It is hard to say which information will be added and hard to say what the consequences of an identification are. It is hard to say under which conditions this risk is low enough in order to be socially acceptable.<\/p><\/blockquote>\n<blockquote class=\"twitter-tweet\" data-width=\"500\" data-dnt=\"true\">\n<p lang=\"en\" dir=\"ltr\">Brainstorming time! The teams are set up and already working on their ideas for the <a href=\"https:\/\/twitter.com\/hiig_berlin?ref_src=twsrc%5Etfw\">@hiig_berlin<\/a> <a href=\"https:\/\/twitter.com\/hashtag\/privacyjam?src=hash&amp;ref_src=twsrc%5Etfw\">#privacyjam<\/a> <a href=\"https:\/\/twitter.com\/hashtag\/GameJam?src=hash&amp;ref_src=twsrc%5Etfw\">#GameJam<\/a> <a href=\"https:\/\/t.co\/a5FDh03vkV\">pic.twitter.com\/a5FDh03vkV<\/a><\/p>\n<p>&mdash; Booster Space (@Booster_Space) <a href=\"https:\/\/twitter.com\/Booster_Space\/status\/916626137203314688?ref_src=twsrc%5Etfw\">October 7, 2017<\/a><\/p><\/blockquote>\n<p><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<blockquote class=\"twitter-tweet\" data-width=\"500\" data-dnt=\"true\">\n<p lang=\"en\" dir=\"ltr\"><a href=\"https:\/\/twitter.com\/hashtag\/PrivacyJam?src=hash&amp;ref_src=twsrc%5Etfw\">#PrivacyJam<\/a> <a href=\"https:\/\/twitter.com\/hashtag\/GameJam?src=hash&amp;ref_src=twsrc%5Etfw\">#GameJam<\/a> It takes a village, and beer, to build a data centric game. <a href=\"https:\/\/t.co\/CNJ1J65x1J\">pic.twitter.com\/CNJ1J65x1J<\/a><\/p>\n<p>&mdash; Michelle Finneran Dennedy, JD (@mdennedy) <a href=\"https:\/\/twitter.com\/mdennedy\/status\/916787900242591744?ref_src=twsrc%5Etfw\">October 7, 2017<\/a><\/p><\/blockquote>\n<p><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<blockquote class=\"twitter-tweet\" data-width=\"500\" data-dnt=\"true\">\n<p lang=\"en\" dir=\"ltr\">It&#39;s getting dark, but there&#39;s no time to waste and our Jamers are eager to go on! <a href=\"https:\/\/twitter.com\/hashtag\/privacyjam?src=hash&amp;ref_src=twsrc%5Etfw\">#privacyjam<\/a> <a href=\"https:\/\/twitter.com\/hashtag\/gamejam?src=hash&amp;ref_src=twsrc%5Etfw\">#gamejam<\/a> <a href=\"https:\/\/twitter.com\/hiig_berlin?ref_src=twsrc%5Etfw\">@hiig_berlin<\/a> <a href=\"https:\/\/t.co\/Yw2wetlkHy\">pic.twitter.com\/Yw2wetlkHy<\/a><\/p>\n<p>&mdash; Booster Space (@Booster_Space) <a href=\"https:\/\/twitter.com\/Booster_Space\/status\/916700100277174272?ref_src=twsrc%5Etfw\">October 7, 2017<\/a><\/p><\/blockquote>\n<p><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<blockquote class=\"twitter-tweet\" data-width=\"500\" data-dnt=\"true\">\n<p lang=\"en\" dir=\"ltr\">Full house <a href=\"https:\/\/twitter.com\/hashtag\/privacyjam?src=hash&amp;ref_src=twsrc%5Etfw\">#privacyjam<\/a> with <a href=\"https:\/\/twitter.com\/mdennedy?ref_src=twsrc%5Etfw\">@mdennedy<\/a> en vogue for a 48h ride. <a href=\"https:\/\/twitter.com\/hashtag\/gamejam?src=hash&amp;ref_src=twsrc%5Etfw\">#gamejam<\/a> <a href=\"https:\/\/twitter.com\/hashtag\/privacy?src=hash&amp;ref_src=twsrc%5Etfw\">#privacy<\/a> <a href=\"https:\/\/twitter.com\/hashtag\/nothingtohide?src=hash&amp;ref_src=twsrc%5Etfw\">#nothingtohide<\/a> <a href=\"https:\/\/twitter.com\/hashtag\/gaming?src=hash&amp;ref_src=twsrc%5Etfw\">#gaming<\/a> <a href=\"https:\/\/twitter.com\/hashtag\/love?src=hash&amp;ref_src=twsrc%5Etfw\">#love<\/a> <a href=\"https:\/\/twitter.com\/hashtag\/sweatergoals?src=hash&amp;ref_src=twsrc%5Etfw\">#sweatergoals<\/a> <a href=\"https:\/\/t.co\/EIIvXQjiAz\">pic.twitter.com\/EIIvXQjiAz<\/a><\/p>\n<p>&mdash; Katharina Beitz (@katharina_beitz) <a href=\"https:\/\/twitter.com\/katharina_beitz\/status\/917091957188546560?ref_src=twsrc%5Etfw\">October 8, 2017<\/a><\/p><\/blockquote>\n<p><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<blockquote class=\"twitter-tweet\" data-width=\"500\" data-dnt=\"true\">\n<p lang=\"en\" dir=\"ltr\">The winners are \u2026 \u2018the activists\u2019 <a href=\"https:\/\/twitter.com\/hiig_berlin?ref_src=twsrc%5Etfw\">@hiig_berlin<\/a> <a href=\"https:\/\/twitter.com\/Cisco_Germany?ref_src=twsrc%5Etfw\">@Cisco_Germany<\/a> <a href=\"https:\/\/twitter.com\/hashtag\/privacyjam?src=hash&amp;ref_src=twsrc%5Etfw\">#privacyjam<\/a> <a href=\"https:\/\/t.co\/Hg323bYZ4R\">pic.twitter.com\/Hg323bYZ4R<\/a><\/p>\n<p>&mdash; Klaus Lenssen (@klaus_lenssen) <a href=\"https:\/\/twitter.com\/klaus_lenssen\/status\/917093279304478720?ref_src=twsrc%5Etfw\">October 8, 2017<\/a><\/p><\/blockquote>\n<p><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<blockquote class=\"twitter-tweet\" data-width=\"500\" data-dnt=\"true\">\n<p lang=\"en\" dir=\"ltr\">The <a href=\"https:\/\/twitter.com\/hashtag\/end?src=hash&amp;ref_src=twsrc%5Etfw\">#end<\/a> of <a href=\"https:\/\/twitter.com\/hashtag\/privacyjam?src=hash&amp;ref_src=twsrc%5Etfw\">#privacyjam<\/a> thanks to @hiig <a href=\"https:\/\/t.co\/62aqIWSNxH\">pic.twitter.com\/62aqIWSNxH<\/a><\/p>\n<p>&mdash; Booster Space (@Booster_Space) <a href=\"https:\/\/twitter.com\/Booster_Space\/status\/917094486412550144?ref_src=twsrc%5Etfw\">October 8, 2017<\/a><\/p><\/blockquote>\n<p><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<h3>And the winners are&#8230;<\/h3>\n<p>Taking the perspective of an activist in a repressive state, the players of \u201cPieces of Data\u201d learn how data collected by their smartphones can harm them, and even other parties \u2013 and how to protect themselves against such threats. &#8220;Because this game was so advanced in its development, it won!&#8221;, Maximilian von Grafenstein states.<\/p>\n<table style=\"height: 81px; width: 527.122px;\">\n<tbody>\n<tr>\n<td style=\"width: 10px;\">This Game Jam was part of our research project\u00a0<a href=\"https:\/\/www.hiig.de\/en\/project\/gameathon\/\">Privacy by Design in Smart Cities.<\/a><\/td>\n<\/tr>\n<tr>\n<td style=\"width: 10px;\">This post represents the view of the author and does not necessarily represent the view of the institute itself. For more information about the topics of these articles and associated research projects, please contact\u00a0<a href=\"mailto:info@hiig.de\">info@hiig.de<\/a>.<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<div class=\"shariff shariff-align-flex-start shariff-widget-align-flex-start\"><ul class=\"shariff-buttons theme-round orientation-horizontal buttonsize-medium\"><li class=\"shariff-button linkedin shariff-nocustomcolor\" style=\"background-color:#1488bf\"><a href=\"https:\/\/www.linkedin.com\/sharing\/share-offsite\/?url=https%3A%2F%2Fwww.hiig.de%2Fen%2Fnothing-to-hide%2F\" title=\"Share on LinkedIn\" aria-label=\"Share on LinkedIn\" role=\"button\" rel=\"noopener nofollow\" class=\"shariff-link\" style=\"; background-color:#0077b5; color:#fff\" target=\"_blank\"><span class=\"shariff-icon\" style=\"\"><svg width=\"32px\" height=\"20px\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 27 32\"><path fill=\"#0077b5\" d=\"M6.2 11.2v17.7h-5.9v-17.7h5.9zM6.6 5.7q0 1.3-0.9 2.2t-2.4 0.9h0q-1.5 0-2.4-0.9t-0.9-2.2 0.9-2.2 2.4-0.9 2.4 0.9 0.9 2.2zM27.4 18.7v10.1h-5.9v-9.5q0-1.9-0.7-2.9t-2.3-1.1q-1.1 0-1.9 0.6t-1.2 1.5q-0.2 0.5-0.2 1.4v9.9h-5.9q0-7.1 0-11.6t0-5.3l0-0.9h5.9v2.6h0q0.4-0.6 0.7-1t1-0.9 1.6-0.8 2-0.3q3 0 4.9 2t1.9 6z\"\/><\/svg><\/span><\/a><\/li><li class=\"shariff-button bluesky shariff-nocustomcolor\" style=\"background-color:#84c4ff\"><a href=\"https:\/\/bsky.app\/intent\/compose?text=Nothing%20to%20hide%3F https%3A%2F%2Fwww.hiig.de%2Fen%2Fnothing-to-hide%2F  via @hiigberlin.bsky.social\" title=\"Share on Bluesky\" aria-label=\"Share on Bluesky\" role=\"button\" rel=\"noopener nofollow\" class=\"shariff-link\" style=\"; background-color:#0085ff; color:#fff\" target=\"_blank\"><span class=\"shariff-icon\" style=\"\"><svg width=\"20\" height=\"20\" version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 20 20\"><path class=\"st0\" d=\"M4.89,3.12c2.07,1.55,4.3,4.71,5.11,6.4.82-1.69,3.04-4.84,5.11-6.4,1.49-1.12,3.91-1.99,3.91.77,0,.55-.32,4.63-.5,5.3-.64,2.3-2.99,2.89-5.08,2.54,3.65.62,4.58,2.68,2.57,4.74-3.81,3.91-5.48-.98-5.9-2.23-.08-.23-.11-.34-.12-.25,0-.09-.04.02-.12.25-.43,1.25-2.09,6.14-5.9,2.23-2.01-2.06-1.08-4.12,2.57-4.74-2.09.36-4.44-.23-5.08-2.54-.19-.66-.5-4.74-.5-5.3,0-2.76,2.42-1.89,3.91-.77h0Z\"\/><\/svg><\/span><\/a><\/li><li class=\"shariff-button mailto shariff-nocustomcolor\" style=\"background-color:#a8a8a8\"><a href=\"mailto:?body=https%3A%2F%2Fwww.hiig.de%2Fen%2Fnothing-to-hide%2F&subject=Nothing%20to%20hide%3F\" title=\"Send by email\" aria-label=\"Send by email\" role=\"button\" rel=\"noopener nofollow\" class=\"shariff-link\" style=\"; background-color:#999; color:#fff\"><span class=\"shariff-icon\" style=\"\"><svg width=\"32px\" height=\"20px\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 32 32\"><path fill=\"#999\" d=\"M32 12.7v14.2q0 1.2-0.8 2t-2 0.9h-26.3q-1.2 0-2-0.9t-0.8-2v-14.2q0.8 0.9 1.8 1.6 6.5 4.4 8.9 6.1 1 0.8 1.6 1.2t1.7 0.9 2 0.4h0.1q0.9 0 2-0.4t1.7-0.9 1.6-1.2q3-2.2 8.9-6.1 1-0.7 1.8-1.6zM32 7.4q0 1.4-0.9 2.7t-2.2 2.2q-6.7 4.7-8.4 5.8-0.2 0.1-0.7 0.5t-1 0.7-0.9 0.6-1.1 0.5-0.9 0.2h-0.1q-0.4 0-0.9-0.2t-1.1-0.5-0.9-0.6-1-0.7-0.7-0.5q-1.6-1.1-4.7-3.2t-3.6-2.6q-1.1-0.7-2.1-2t-1-2.5q0-1.4 0.7-2.3t2.1-0.9h26.3q1.2 0 2 0.8t0.9 2z\"\/><\/svg><\/span><\/a><\/li><\/ul><\/div>","protected":false},"excerpt":{"rendered":"<p>In our interconnected and digitised society, personal data is the new gold. Therefore, we increasingly have to deal with complex matters like privacy and data protection. But how to explain these concepts? That\u2019s why developers, scientists, designers and artists came together at \u201cGame Jam: Unveil the Privacy Threat\u201d. The objective was to develop serious games&hellip;<\/p>\n","protected":false},"author":127,"featured_media":36576,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1579,224],"tags":[],"class_list":["post-36560","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-ftif-plattformen-governance","category-policy-and-law"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.6 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Nothing to hide? &#8211; Digital Society Blog<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.hiig.de\/en\/nothing-to-hide\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Nothing to hide? &#8211; Digital Society Blog\" \/>\n<meta property=\"og:description\" content=\"In our interconnected and digitised society, personal data is the new gold. Therefore, we increasingly have to deal with complex matters like privacy and data protection. But how to explain these concepts? That\u2019s why developers, scientists, designers and artists came together at \u201cGame Jam: Unveil the Privacy Threat\u201d. The objective was to develop serious games&hellip;\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.hiig.de\/en\/nothing-to-hide\/\" \/>\n<meta property=\"og:site_name\" content=\"HIIG\" \/>\n<meta property=\"article:published_time\" content=\"2017-10-18T08:54:05+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-06-02T10:30:34+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.hiig.de\/wp-content\/uploads\/2017\/10\/GameJam_16-9-Skater.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1600\" \/>\n\t<meta property=\"og:image:height\" content=\"901\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Katrin Werner\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Katrin Werner\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Nothing to hide? &#8211; Digital Society Blog","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.hiig.de\/en\/nothing-to-hide\/","og_locale":"en_US","og_type":"article","og_title":"Nothing to hide? &#8211; Digital Society Blog","og_description":"In our interconnected and digitised society, personal data is the new gold. Therefore, we increasingly have to deal with complex matters like privacy and data protection. But how to explain these concepts? That\u2019s why developers, scientists, designers and artists came together at \u201cGame Jam: Unveil the Privacy Threat\u201d. The objective was to develop serious games&hellip;","og_url":"https:\/\/www.hiig.de\/en\/nothing-to-hide\/","og_site_name":"HIIG","article_published_time":"2017-10-18T08:54:05+00:00","article_modified_time":"2023-06-02T10:30:34+00:00","og_image":[{"width":1600,"height":901,"url":"https:\/\/www.hiig.de\/wp-content\/uploads\/2017\/10\/GameJam_16-9-Skater.png","type":"image\/png"}],"author":"Katrin Werner","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Katrin Werner","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.hiig.de\/en\/nothing-to-hide\/#article","isPartOf":{"@id":"https:\/\/www.hiig.de\/en\/nothing-to-hide\/"},"author":{"name":"Katrin Werner","@id":"https:\/\/www.hiig.de\/#\/schema\/person\/e36886be9abf09ac12ff4fb4b1b7fcb5"},"headline":"Nothing to hide?","datePublished":"2017-10-18T08:54:05+00:00","dateModified":"2023-06-02T10:30:34+00:00","mainEntityOfPage":{"@id":"https:\/\/www.hiig.de\/en\/nothing-to-hide\/"},"wordCount":1289,"commentCount":0,"publisher":{"@id":"https:\/\/www.hiig.de\/#organization"},"image":{"@id":"https:\/\/www.hiig.de\/en\/nothing-to-hide\/#primaryimage"},"thumbnailUrl":"https:\/\/www.hiig.de\/wp-content\/uploads\/2023\/12\/post_generic.png","articleSection":["Ftif Platform governance","Policy and Law"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.hiig.de\/en\/nothing-to-hide\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.hiig.de\/en\/nothing-to-hide\/","url":"https:\/\/www.hiig.de\/en\/nothing-to-hide\/","name":"Nothing to hide? &#8211; Digital Society Blog","isPartOf":{"@id":"https:\/\/www.hiig.de\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.hiig.de\/en\/nothing-to-hide\/#primaryimage"},"image":{"@id":"https:\/\/www.hiig.de\/en\/nothing-to-hide\/#primaryimage"},"thumbnailUrl":"https:\/\/www.hiig.de\/wp-content\/uploads\/2023\/12\/post_generic.png","datePublished":"2017-10-18T08:54:05+00:00","dateModified":"2023-06-02T10:30:34+00:00","breadcrumb":{"@id":"https:\/\/www.hiig.de\/en\/nothing-to-hide\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.hiig.de\/en\/nothing-to-hide\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.hiig.de\/en\/nothing-to-hide\/#primaryimage","url":"https:\/\/www.hiig.de\/wp-content\/uploads\/2023\/12\/post_generic.png","contentUrl":"https:\/\/www.hiig.de\/wp-content\/uploads\/2023\/12\/post_generic.png","width":1600,"height":901},{"@type":"BreadcrumbList","@id":"https:\/\/www.hiig.de\/en\/nothing-to-hide\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.hiig.de\/en\/"},{"@type":"ListItem","position":2,"name":"Nothing to hide?"}]},{"@type":"WebSite","@id":"https:\/\/www.hiig.de\/#website","url":"https:\/\/www.hiig.de\/","name":"HIIG","description":"Alexander von Humboldt Institute for Internet and Society","publisher":{"@id":"https:\/\/www.hiig.de\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.hiig.de\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.hiig.de\/#organization","name":"HIIG","url":"https:\/\/www.hiig.de\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.hiig.de\/#\/schema\/logo\/image\/","url":"https:\/\/www.hiig.de\/wp-content\/uploads\/2019\/06\/hiig.png","contentUrl":"https:\/\/www.hiig.de\/wp-content\/uploads\/2019\/06\/hiig.png","width":320,"height":80,"caption":"HIIG"},"image":{"@id":"https:\/\/www.hiig.de\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.hiig.de\/#\/schema\/person\/e36886be9abf09ac12ff4fb4b1b7fcb5","name":"Katrin Werner"}]}},"_links":{"self":[{"href":"https:\/\/www.hiig.de\/en\/wp-json\/wp\/v2\/posts\/36560","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.hiig.de\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.hiig.de\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.hiig.de\/en\/wp-json\/wp\/v2\/users\/127"}],"replies":[{"embeddable":true,"href":"https:\/\/www.hiig.de\/en\/wp-json\/wp\/v2\/comments?post=36560"}],"version-history":[{"count":30,"href":"https:\/\/www.hiig.de\/en\/wp-json\/wp\/v2\/posts\/36560\/revisions"}],"predecessor-version":[{"id":36603,"href":"https:\/\/www.hiig.de\/en\/wp-json\/wp\/v2\/posts\/36560\/revisions\/36603"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.hiig.de\/en\/wp-json\/wp\/v2\/media\/36576"}],"wp:attachment":[{"href":"https:\/\/www.hiig.de\/en\/wp-json\/wp\/v2\/media?parent=36560"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.hiig.de\/en\/wp-json\/wp\/v2\/categories?post=36560"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.hiig.de\/en\/wp-json\/wp\/v2\/tags?post=36560"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}