web3privacy/theywonthave/Readme.md

52 řádky
3.3 KiB
Markdown
Surový Trvalý odkaz Normální zobrazení Historie

2022-12-28 15:18:15 +01:00
# What if... they won't have my data matrix
2022-12-28 15:27:34 +01:00
_**Prioritize and select your most privacy-centric use-case ideas!**_
2022-12-28 15:28:22 +01:00
![alt text](https://github.com/Msiusko/web3privacy/blob/main/theywonthave/img/Logo%20WI.png?raw=true)
2022-12-28 15:18:15 +01:00
2022-12-28 15:25:46 +01:00
![alt text](https://github.com/Msiusko/web3privacy/blob/main/theywonthave/img/What%20if...%20they%20won't%20have%20my%20data%20matrix.png?raw=true)
2022-12-28 16:15:03 +01:00
**PPTX version:** [open](https://github.com/Msiusko/web3privacy/blob/main/theywonthave/What%20if...%20they%20won't%20have%20my%20data%20matrix.pptx)
2022-12-28 15:25:46 +01:00
2022-12-28 15:29:07 +01:00
# **What is this for?**
2022-12-28 15:28:53 +01:00
2022-12-28 16:03:54 +01:00
Historically privacy in web3 & crypto is centred around financial use cases. But what if agency over privacy could lead to Facebook's business model disruption, drastically decrease government surveillance apparatus or force Nike to reduce consumerist pollution? That's what privacy & decentralisation could accomplish together.
The tool is to help you brainstorm & select practical ideas for privacy use-cases. Moreover, it will allow builders to expand their vision of where privacy matters & what role your data plays in redesigning a status quo between centralised & decentralised approaches.
2022-12-28 15:32:58 +01:00
2022-12-28 16:06:04 +01:00
The "**What if... they won't have my data**" matrix helps you categorize ideas according to:
2022-12-28 15:18:15 +01:00
2022-12-28 16:04:54 +01:00
- _Datasets_: what private data is involved in the cases
- _Threat actors_: what kind of threat actors (governments, corporates, hackers) are involved in data abuse
- _Available data abuses_: how these actors use your data
- _Unavailable data impact_: how data usage or approach changes when there's no data available
- _Privacy benefits_: how systems, relations, economies change after getting back control of your data
2022-12-28 15:18:15 +01:00
2022-12-28 15:28:53 +01:00
# **Step-by-step guide**
2022-12-28 15:18:15 +01:00
**Step 1**
2022-12-28 15:32:58 +01:00
Download matrix (use JPG, PPTX or print version). You can also draw the graph on a flipchart.
2022-12-28 15:18:15 +01:00
**Step 2**
2022-12-28 16:33:38 +01:00
Brainstorm ideas solo or with your team. Fill up matrix' blocks with your ideas:
- Datasets: try to add different examples of data, both online & offline
- Threat actors: try to use one type of the threat actor per matrix (where governments - 1; corporations - 1)
- Available data abuses: try to research what are the negative implications behind data mining, analysis, trading, surveillance
- Unavailable data impact: model situations when threat actors are forced to be pro-human by losing control over the data; be imaginative, and ask yourself how these actors would react positively (1-year, 3-year scenarios).
- Privacy benefits: try to highlight the biggest benefits for privacy & decentralisation of power relations
2022-12-28 15:18:15 +01:00
**Step 3**
Take 3 voting-dots for each person (or use a marker), and vote 3 favorite ideas. After the voting session, select the 3 ideas which received the most votes.
**Step 4**
Step back and analyze the privacy benefits. In an ideal scenario, your “unavailable data impact” and “benefits” fields should highlight the most feasible ideas for now – and the most impactful for the future.
2022-12-28 15:26:38 +01:00
# Government case study
![alt text](https://github.com/Msiusko/web3privacy/blob/main/theywonthave/img/What%20if...%20they%20won't%20have%20my%20data%20(government%20case).png?raw=true)
2022-12-28 15:58:02 +01:00
# Corporations case study
![alt text](https://github.com/Msiusko/web3privacy/blob/main/theywonthave/img/What%20if...%20they%20won't%20have%20my%20data%20(corporations%20case).png?raw=true)
2022-12-28 16:06:04 +01:00
# Use **What if... they won't have my data** matrix to expand your imagination of privacy-as-a-power!