full transcript

From the Ted Talk by Alessandro Acquisti: What will a future without secrets look like?

Unscramble the Blue Letters

Now I have to admit that this talk so far may sunod exceedingly gloomy, but that is not my pniot. In fact, I want to share with you the fact that there are alternatives. The way we are doing things now is not the only way they can done, and certainly not the best way they can be done. When someone tlels you, "People don't care about privacy," consider whether the game has been dngseied and rigged so that they cannot care about privacy, and coming to the realization that these manipulations occur is already halfway through the process of being able to protect yourself. When someone tells you that privacy is incompatible with the benefits of big data, consider that in the last 20 years, researchers have created technologies to allow virtually any eecontlirc transactions to take pacle in a more privacy-preserving manner. We can bwsore the intneret anonymously. We can send emails that can only be read by the intended recipient, not even the NSA. We can have even privacy-preserving data mining. In other words, we can have the btenfeis of big data while protecting pciravy. Of course, these technologies imply a shifting of cost and revenues between data holders and data subjects, which is why, perhaps, you don't hear more about them.

Open Cloze

Now I have to admit that this talk so far may _____ exceedingly gloomy, but that is not my _____. In fact, I want to share with you the fact that there are alternatives. The way we are doing things now is not the only way they can done, and certainly not the best way they can be done. When someone _____ you, "People don't care about privacy," consider whether the game has been ________ and rigged so that they cannot care about privacy, and coming to the realization that these manipulations occur is already halfway through the process of being able to protect yourself. When someone tells you that privacy is incompatible with the benefits of big data, consider that in the last 20 years, researchers have created technologies to allow virtually any __________ transactions to take _____ in a more privacy-preserving manner. We can ______ the ________ anonymously. We can send emails that can only be read by the intended recipient, not even the NSA. We can have even privacy-preserving data mining. In other words, we can have the ________ of big data while protecting _______. Of course, these technologies imply a shifting of cost and revenues between data holders and data subjects, which is why, perhaps, you don't hear more about them.

Solution

  1. place
  2. benefits
  3. privacy
  4. tells
  5. point
  6. electronic
  7. internet
  8. browse
  9. sound
  10. designed

Original Text

Now I have to admit that this talk so far may sound exceedingly gloomy, but that is not my point. In fact, I want to share with you the fact that there are alternatives. The way we are doing things now is not the only way they can done, and certainly not the best way they can be done. When someone tells you, "People don't care about privacy," consider whether the game has been designed and rigged so that they cannot care about privacy, and coming to the realization that these manipulations occur is already halfway through the process of being able to protect yourself. When someone tells you that privacy is incompatible with the benefits of big data, consider that in the last 20 years, researchers have created technologies to allow virtually any electronic transactions to take place in a more privacy-preserving manner. We can browse the Internet anonymously. We can send emails that can only be read by the intended recipient, not even the NSA. We can have even privacy-preserving data mining. In other words, we can have the benefits of big data while protecting privacy. Of course, these technologies imply a shifting of cost and revenues between data holders and data subjects, which is why, perhaps, you don't hear more about them.

Frequently Occurring Word Combinations

ngrams of length 2

collocation frequency
social media 5
personal information 3
big data 3
sensitive information 2
billion photos 2

Important Words

  1. admit
  2. alternatives
  3. anonymously
  4. benefits
  5. big
  6. browse
  7. care
  8. coming
  9. cost
  10. created
  11. data
  12. designed
  13. electronic
  14. emails
  15. exceedingly
  16. fact
  17. game
  18. gloomy
  19. halfway
  20. hear
  21. holders
  22. imply
  23. incompatible
  24. intended
  25. internet
  26. manipulations
  27. manner
  28. mining
  29. nsa
  30. occur
  31. place
  32. point
  33. privacy
  34. process
  35. protect
  36. protecting
  37. read
  38. realization
  39. recipient
  40. researchers
  41. revenues
  42. rigged
  43. send
  44. share
  45. shifting
  46. sound
  47. subjects
  48. talk
  49. technologies
  50. tells
  51. transactions
  52. virtually
  53. words
  54. years