web3privacy/theywonthave
Mykola Siusko 0e74696f40
Update Readme.md
2022-12-28 16:33:38 +01:00
..
img Add files via upload 2022-12-28 15:57:15 +01:00
Readme.md Update Readme.md 2022-12-28 16:33:38 +01:00
What if... they won't have my data matrix.pptx Add files via upload 2022-12-28 16:12:57 +01:00

Readme.md

What if... they won't have my data matrix

Prioritize and select your most privacy-centric use-case ideas! alt text

alt text

PPTX version: open

What is this for?

Historically privacy in web3 & crypto is centred around financial use cases. But what if agency over privacy could lead to Facebook's business model disruption, drastically decrease government surveillance apparatus or force Nike to reduce consumerist pollution? That's what privacy & decentralisation could accomplish together.

The tool is to help you brainstorm & select practical ideas for privacy use-cases. Moreover, it will allow builders to expand their vision of where privacy matters & what role your data plays in redesigning a status quo between centralised & decentralised approaches.

The "What if... they won't have my data" matrix helps you categorize ideas according to:

  • Datasets: what private data is involved in the cases
  • Threat actors: what kind of threat actors (governments, corporates, hackers) are involved in data abuse
  • Available data abuses: how these actors use your data
  • Unavailable data impact: how data usage or approach changes when there's no data available
  • Privacy benefits: how systems, relations, economies change after getting back control of your data

Step-by-step guide

Step 1 Download matrix (use JPG, PPTX or print version). You can also draw the graph on a flipchart.

Step 2 Brainstorm ideas solo or with your team. Fill up matrix' blocks with your ideas:

  • Datasets: try to add different examples of data, both online & offline
  • Threat actors: try to use one type of the threat actor per matrix (where governments - 1; corporations - 1)
  • Available data abuses: try to research what are the negative implications behind data mining, analysis, trading, surveillance
  • Unavailable data impact: model situations when threat actors are forced to be pro-human by losing control over the data; be imaginative, and ask yourself how these actors would react positively (1-year, 3-year scenarios).
  • Privacy benefits: try to highlight the biggest benefits for privacy & decentralisation of power relations

Step 3 Take 3 voting-dots for each person (or use a marker), and vote 3 favorite ideas. After the voting session, select the 3 ideas which received the most votes.

Step 4 Step back and analyze the privacy benefits. In an ideal scenario, your “unavailable data impact” and “benefits” fields should highlight the most feasible ideas for now – and the most impactful for the future.

Government case study

alt text

Corporations case study

alt text

Use What if... they won't have my data matrix to expand your imagination of privacy-as-a-power!