Intel Buzz Workshop Poznan – play DOOM with John Romero

We’re ready to go. Check out our speakers Intel Buzz Workshop at October 7 during the GIC in Poznan.

Yes, he’s coming. John Romero, father of DOOM and Quake and the whole flipping FPS genre. In a fireside chat with Michael Liebe (11.30-12.30) he’ll be talking about the good ole’ times when he got to ID Software, about level design and creativity management. Also: get the chance to play DOOM with him.

Game Jam – Use Case No.3: Unraveling the anonymity paradox!

image

Unveil the Privacy Threat – that’s how we named the Game Jam (October 7, 2017) we’re going to host together with the Alexander von Humboldt Institute for Internet and Society – will be fun and serious. And we want you to be part of it.

We will present to you three different use cases with a direct connection to data security and privacy by design. We have invited prominent experts to talk about the importance of data privacy, advise and inspire the participants of the Game Jam. What are the use cases, who are the experts? This is use case No 3.

Use case 3: Unraveling the anonymity paradox!

image

What sounds like the title of a 60′s psycho thriller B-Movie for mathematicians is in fact a modern day horror story. Here’s why.

If personal information were anonymized, all our privacy concerns would be gone! But what does “anonymized” mean?

This question is one of the hardest to resolve in the privacy debate. At present, privacy experts are grappling with the paradox that – in the big data era – there is no anonymous data anymore. 

All data can always be related to an individual  by means of data analysis technologies. The reason for this is that data is only considered “anonymized” if it cannot be related to an identified or even to an identifiable individual.

In order to understand this paradox, imagine this:

More than three million Berlin citizens – and another million tourists – are carrying around their personal devices every single day. There’s a Berlin-wide wifi system, which is publicly available for all people who have switched on their devices’ wifi by default. This wifi system collects the movement data of all these devices over a longer period of time.

Guess how useful this data would be for urban traffic management and many other innovations. But wouldn’t it be creepy if this data could also be misused against an individual later on?

This data is thus anonymized in order to mitigate these risks. In the process all personal identifiers (i.e. the MAC address and IMEI) of the devices captured by the wifi system – which could in principle lead to an identification of the owner or even carrier of a device – are “hashed” (i.e. substituted by a specific hash value for each identifier).

This hash value does not per se contain information referring to the owner or carrier of the device. However, it is still possible to capture the device’s movement pattern by referring to this hash. This movement pattern becomes more and more precise over time.

A person who gets access to that movement pattern (e.g. an employee of the provider of the wifi system or another data-driven company) might suddenly discover that this device must be owned by somebody he knows very well. 

The reason for this is that this device “leaves” the building where he lives at the same time every morning and “moves” to an address where only lawyers work: In terms of probability, that person must be his wife!

This risk of re-identification of “anonymized” data exists generally, where it is combined with further information. 

It is hard to say which information will be added and hard to say what the consequences of an identification are. It is hard to say under which conditions this risk is low enough in order to be socially acceptable.

Assignment

The goal of this use case is to develop an engaging game concept that helps people to understand the anonymity paradox. One target group are people working in companies specifically dealing with anonymized data (e.g. such as the provider of the wifi system described).

Want to join the Unveil the Privacy Threat Game Jam on October 7, 2017 in Berlin? Register here for free.

The best game idea will be awarded by an expert jury with an exciting prize – a weekend trip to London for the whole winning team including a visit of The Crystal, the world’s largest museum on the future of (smart) cities – sponsored by Siemens. Furthermore, amongst all participants, we give away two one-year-memberships of Adobe Creative Cloud sponsored by Adobe.*

*without possibility of recourse to legal action

Text by Max von Grafenstein

Game Jam – Use Case No.2: Oops… wrong recipient ?

image

Unveil the Privacy Threat – that’s how we named the Game Jam (October 7, 2017) we’re going to host together with the Alexander von Humboldt Institute for Internet and Society. It will be fun and serious. And we want you to be part of it.

We will present to you three different use cases with a direct connection to data security and privacy by design. We have invited prominent experts to talk about the importance of data privacy, advise and inspire the participants of the Game Jam. What are the use cases, who are the experts? This is use case No 2.

Use Case 2: Oops… wrong recipient ?

The most common privacy threat in companies arises when an employee accidentally sends personal information about somebody else to the wrong recipient.

This may sound like a no-brainer, but in fact, it is one of the biggest challenges in implementing effective privacy protection policies within companies.

There are two typical constellations that give rise to slightly different challenges for companies trying to mitigate this threat:

In the first constellation, an employee uses an email client, and in the second constellation, he/she grants access to a file depository.

In both cases, an employee typically sends an email or grants access to a repository to the wrong recipient – because the email client or repository incorrectly autocompletes the address based on the first few letters.

The employee forgets to double-check the name and… oops, the information is sent to the wrong recipient.

But there are differences between the cases: They refer to how such an employee can react. If the employee has granted access to a file repository, in principle, he or she can still restrict access retrospectively.

image

In contrast, if the employee has sent an email, the information is definitely “gone”, and he or she can only ask the recipient not to read and/or open the content.

However, in both cases employees often do not react at all, or they do not appropriately, because they fear negative consequences if his or her colleagues or superior find out about it.

 

Assignment

The goal of this use case is to develop an engaging game concept that reduces the privacy threat as a result of sending personal information to the wrong recipient, in a playful manner. One target group of such a game are employees in companies dealing with personal data in general.

Want to join the Unveil the Privacy Threat Game Jam on October 7, 2017 in Berlin? Register here for free.

 

The best game idea will be awarded by an expert jury with an exciting prize – a weekend trip to London for the whole winning team including a visit of The Crystal, the world’s largest museum on the future of (smart) cities – sponsored by Siemens. Furthermore, amongst all participants, we give away two one-year-memberships of Adobe Creative Cloud sponsored by Adobe.*

*without possibility of recourse to legal action

Text by Max von Grafenstein

Register to win a 1-year-membership of Adobe’s Creative Cloud

image

Maybe you’ve heard about it: We’re hosting a Game Jam with a dedicated topic. Unveil the Privacy Threat covers data privacy and privacy by design. We’re still looking for participants. And we’re giving away a 1-year-membership for Adobe’s Creative Cloud. The whole package, including stock photos and all the useful tools for digital creatives. How?

We will draw the winner of the Adobe Creative Cloud membership among every sincere registration for the Game Jam Unveil the Privacy Threat.*

What you have to do? Simply follow THIS LINK and fill out the registration form on the website of the Alexander von Humboldt Institute for Internet and Society (HIIG).

The institute is our partner and came up with the idea of hosting this Game Jam in the first place.

image

Find out more about the details of the package worth more than 1000 Euros HERE.

Again we would like to thank Adobe for the uncomplicated provision of this generous price.

*without possibility of recourse to legal action

Game Jam – Use Case No.1: I’ve got nothing to hide!

image

Unveil the Privacy Threat – that’s how we named the Game Jam (October 7, 2017) we’re going to host together with the Alexander von Humboldt Institute for Internet and Society – will be fun and serious. And we want you to be part of it. 

We will present to you three different use cases with a direct connection to data security and privacy by design. We have invited prominent experts to talk about the importance of data privacy, advise and inspire the participants of the Game Jam. What are the use cases, who are the experts? This is use case No 1.

Use Case 1: I’ve got nothing to hide!

Many people think they’ve got nothing to hide and thus do not need to protect their privacy. The reasoning behind this is that only people who have done something illegal would want to conceal their behavior. But, so the thinking goes, there’s no social need for protection for illegal behavior! Or is there?

This only relates to a tiny part of privacy protection. In fact, privacy laws doesn’t just protect those (allegedly) engaged in “illegal” behavior. Privacy also protects a person against the loss of reputation that can occur when information is disclosed and/or used in the wrong context.

As early as the 17th century, the French high priest and statesman Cardinal Richelieu stated:

“Give me a letter of six sentences written by the most honorable man, and I will find something sufficient to hang him.”

image

Henri Motte’s depiction of Cardinal Richelieu at the Siege of La Rochelle.

At least in Germany we don’t hang people anymore. However, what this kind of reasoning indicates is that there can always be somebody who wants to use personal information against someone. It’s this misuse of personal information that privacy seeks to protect against.

Some people even say that it actually doesn’t matter what you may have to hide; what matters is your ability to decide whether to hide something or not. This ability is guaranteed by privacy.

Privacy is hence an essential precondition for the enrollment of an autonomous personality.

Assignment

The goal of this use case is to develop an engaging game concept that challenges the “nothing-to-hide” argument in a playful manner. Ideally, such a game could be played anywhere, at any time, in a very limited period of time. Just like a quick-fire schoolyard debate.

A Wikipedia article for basic information about the Nothing to Hide argument.

An EFF guide to how to respond to the Nothing to Hide argument.

One of many useful YouTube videos about this topic.

Want to join the Unveil the Privacy Threat Game Jam on October 7, 2017 in Berlin? Register here for free.The best game idea will be awarded by an expert jury with an exciting prize – a weekend trip to London for the whole winning team including a visit of The Crystal, the world’s largest museum on the future of (smart) cities – sponsored by Siemens. 

Furthermore, amongst all participants, we give away two one-year-memberships of Adobe Creative Cloud sponsored by Adobe.*

*without possibility of recourse to legal action

Text by Max von Grafenstein

Everybody is a goldmine –A Game Jam to implement privacy and security by design

image

If we want tech to be more human, we’ll need to create awareness about privacy in the age of smart cities and IoT. That’s why we’re going to host a Game Jam about this subject, together with the Humboldt Institute for Internet and Society and INNOVATION & LAW. And you can apply.  

Private data is the number one resource of our time. It’s what gold and oil have been in the past centuries. Our user behavior – including the tiniest subconscious decisions we make when we use smart devices and browser interfaces – is a fine but steady load that’s been mined for many years now.

To stick with this simple analogy: right now heavy machinery is invented to drill deeper. Thanks to the IoT the monitored behavior isn’t reduced to hardware we use deliberately.

The whole city will become a computer. Sensors are going to be everywhere in the smart cities of the near future. And with great data comes great responsibility.

We have to ask ourselves how we want to handle data protection and privacy in a society that seems to be dependent on progress by information.

How can we establish awareness, not only among political activists and digital rights experts but people who engineer software, plan parking lots or open networks for the public benefit?

For our partners Alexander von Humboldt Institute for Internet and Society and INNOVATION AND LAW, we’re going to host a Game Jam.

The outcome we’re hoping for? Interactive and fun approaches on why data privacy and security is something we have to think of while developing a service or product.

This awareness will have two effects: Privacy by design or privacy by default will become a standard for on the one side – and more trust in tech and progress on the other side.

GAME JAM – UNVEIL THE PRIVACY THREAD Implementing privacy and security through games 

will take place on the weekend of 7-8 October at the premises of the Alexander von Humboldt Institute for Internet and Society in Berlin. There’ll be impulse talks by experts for inspiration and knowledge extension.

Right now you can apply by simply writing an email to hi@booster-space.com. Please explain in two, three sentences why you apply / how you want to contribute.

5 reasons why…the gamescom congress excites us

image

“What’s the gamescom congress?” 

– a question that people ask me all the time, people working from within the industry. It’s funny that so many still don’t know this conference in its 8th year now. Time to make a change.

The gamescom congress (23 August in Cologne, Congress Center North of koelnmesse) is one of the best video game conferences at all. Why? Well, of course this is a very subjective matter.

1) It’s not a developer’s conference
There are many developer’s conferences. gamescon congress is different to all of them. There are the big ones like GDC and Casual Connect. In Germany we’ve got Quo Vadis in Berlin, devcom in Cologne or the Germandevdays in Frankfurt. Respawn became part of the devcom this year. Others like Next Level Conference in Düsseldorf and Play in Hamburg have a strong connection to video game culture / education. But they’re unlike the gamescom congress.

2) It’s a conference about games & society…
Games are mainstream. It’s a terrible phrase, but it explains the many angles on it and the weight of the medium. With the support of the mothership gamescom, the embedded congress is able to reflect on the true social impact of video games: gamified manufacturing. The debate about games in schools. Gamers as voters. How games touch isms and how they’re turned over by them. What the rise of eSports means to physical sports. How games contribute to modern storytelling. Youth protection. Norms and European legislation. Ontology.

3) …with speakers you don’t find on other gaming conferences
Speakers come from different directions. Teachers, advertisers and marketers, representatives of car manufacturers, the music industry and strategists of communication companies. Even philosophers – and many others. Take a look for yourself at more than 65 speakers.

4) It’s interdisciplinary 
With five dedicated tracks, covering education, business, gamification, legal and a core topic called “life”, gamescom congress is truly interdisciplinary. Latter one includes exciting stories and persons who contribute to the congress, but don’t necessarily fit into the prior categories. You will find something interesting for sure, regardless why you come and where from (there are sessions in English and German).

5) It’s our baby, sort of
Booster Space Program Director Tim Rittmann makes the gamescom congress program on behalf of the BIU. That’s the acronym for “Bundesverband Interaktive Unterhaltungssoftware”, the association of Germany’s video game industry. He’s responsible for content and choice of speakers. That’s the reason we’re also a little biased.

If you’re curious now, check out the website. Buy a ticket, whether you’re a trade visitor or privately interested.