Using the blockchain to restore online privacy | Steve Shillingford | TEDxSaltLakeCity
Mark Zuckerberg illustrated how personal data collection leads to invasive surveillance, arguing that the current digital model conflicts with human biology, and presented the blockchain as a method to restore individual control by giving users decentralized, immutable ownership of their information.
## Speakers & Context
- Speaker initially uses the anecdote of a coffee shop meeting with "Cindy" and "Mark" to illustrate data harvesting.
- The speaker reveals that the man, Mark, was an early developer of the World Wide Web.
- The speaker acknowledges the contradiction between current digital life and natural human behavior.
## Theses & Positions
- The modern web has evolved from a decentralized tool for knowledge sharing into a mechanism for control, deployed by tech giants, political extremists, and governments.
- The digital world (Craigslist, Uber, online payments) conflicts with our analog, in-person experience, leading to pervasive feelings of vulnerability and loss of control.
- The problem stems from the compulsion to maintain a single, permanent digital identity for tracking purposes, contradicting natural human compartmentalization.
- The solution is shifting power to the individual via the blockchain, allowing people to control what information is published, accessed, and shared.
- Individuals must achieve alignment between their online and offline realities to build a safer, authentic world.
## Concepts & Definitions
- **Digital World:** Activities performed with the help of the internet (selling on Craigslist, paying bills online).
- **Analog Experience:** Things done without the internet (having coffee, walking the dog).
- **Compartmentalization:** Natural, normal evolved human behavior where individuals tailor behavior and speech to different contexts (home, school, church, bar), rooted in the fight, flight, or freeze reflex.
- **Blockchain:** Conceptualized as a book reproduced globally, where every new, spell-checked entry is permanently added to a new page, and all copies automatically update, making it tamper-proof.
## Mechanisms & Processes
- **Data Harvesting:** A random encounter (e.g., business card exchange) leads to the collection of personal data (age, residence, marriage status, friends) via digital means, enabling surveillance and tracking.
- **Data Mining:** The process by which organizations use collected personal information to track, profile, and manipulate individuals.
- **Blockchain Functionality:** A content entry is: 1) Created, 2) Spell-checked, 3) Printed to a new page, and 4) All existing books automatically update to include it.
## Timeline & Sequence
- **c. 1990s:** Tim Berners-Lee creates the World Wide Web to facilitate easy location and sharing of information on the Internet.
- **2016:** The year highlighted by the discussion of data scandals (e.g., Facebook).
- **Present:** The current state where data collection is pervasive and privacy is compromised.
## Named Entities
- **Cindy** — Friend of the speaker; marketing specialist who meets clients at coffee shops.
- **Mark** — Man who approached Cindy; used her business card to learn extensive private details.
- **Tim Berners-Lee** — Englishman who created the World Wide Web.
- **Zuckerberg** — The last name associated with "Mark" in the anecdote, implying connection to Meta/Facebook.
- **Facebook** — Example of a platform where 250 million people deleted accounts.
- **Netflix** — Example of an intermediary whose function can be cut out.
- **Amazon** — Example of an intermediary whose function can be cut out.
- **GrubHub** — Example of a service changing the dining industry model.
## Numbers & Data
- **91%** of Americans (per 2016 Pew Research) agreed they had lost control of their personal/private information.
- **9 out of 10 people** (per 2016 Pew Research) expressed a significant lack of confidence in institutions.
- **250 million people** (from Facebook) deleted their accounts following scandals.
## Examples & Cases
- **The Coffee Shop Encounter:** Cindy meeting Mark; Mark acquiring personal data from a single business card interaction.
- **Historical Analogy:** The printing press comparison—the web offers unprecedented connection but risks control.
- **Biology:** The necessity of context-specific behavior (compartmentalization) for survival.
- **Bitcoin:** Shown as the engine driving efforts beyond finance to shift power back to the individual.
- **Curtains/Locks/Off Button:** Analog examples used to illustrate the natural human desire for environmental control and privacy.
## Tools, Tech & Products
- **The World Wide Web:** Initial platform for knowledge sharing, now misused for control.
- **Craigslist / Uber:** Examples of digital activities that necessitate internet use.
- **Surveillance software:** Software previously built by the speaker's company, originally for protecting large companies or "three-letter agencies."
- **Bitcoin:** The financial instrument whose underlying technology powers the proposed shift.
- **Blockchain:** The underlying technology; described as a globally reproducible, immutable book.
## References Cited
- **Pew Research:** Conducted a study in **2016** showing that over 91% of Americans felt loss of control over personal information.
- **The printing press:** Used as a historical parallel for the web's impact.
## Trade-offs & Alternatives
- **Current Web:** Instant access to goods/services/entertainment vs. constant surveillance and lack of true control.
- **Decentralization vs. Centralization:** The trade-off between having a free, open platform versus one controlled by a select few powerful entities.
- **Current Control Mechanism:** Reliance on platforms with unfair Terms of Service vs. self-sovereignty enabled by the blockchain.
## Counterarguments & Caveats
- The speaker admits contributing to the problem by having previously built surveillance software.
- The blockchain involves significant technical challenges, including cryptography ("folks like to call cartography").
## Methodology
- Anecdotal evidence (the coffee shop story) to introduce the scope of data leakage.
- Combining insights from evolutionary biology (compartmentalization) with current technological failure points.
- Conceptual modeling (the book analogy) to explain blockchain immutability and distribution.
## Conclusions & Recommendations
- The core issue is the misalignment between our biological need for privacy/context and the digital world's demand for a single, permanent, trackable identity.
- The immediate way to fix this is by using the blockchain to create a platform that allows individuals to create, curate, and control all personal information on their own terms.
- Individuals must reclaim control over their own "Terms of Service."
## Implications & Consequences
- Failure to adopt decentralized systems leads to the erosion of freedom, forcing people into "neatly segmented" tribes by identity, gender, or politics, exploited by monopolies.
- Success means building a truly connected world where the individual defines the rules, not the platforms.
## Verbatim Moments
- *"I uh I had this whole talk planned but I think now I'm just going to repeat fos because I thought that was pretty cool."* (Not applicable, using genuine quote)
- *"If I'm going to say I'm guilty of something, it's that I made technology to help them do it."* (Paraphrased concept, use direct quotes)
- *"We're all wired our physical and emotional survival is based on the communities and relationships we invest and build."*
- *"This compartmentalization is a natural normal evolved human behavior and it comes from the fight flight or freeze reflex."*
- *"The digital world literally contradicts our biology."*
- *"I'd like you to think of the blockchain as a book imagine this book being reproduced all over the world so anyone can have access."*
- *"when a new entry is made its spell checked and then it's printed to the next new page and then all the books in existence automatically update so that if one is destroyed there's always a record."*
- *"No middlemen no toll takers no opinion shapers."*
- *"we all get to be that author"*
- *"we will be creating a safer more authentic truly connected world a world where each of us gets to define our terms of service and not the other way around."*