full transcript
From the Ted Talk "Alessandro Acquisti: What will a future without secrets look like?"

Unscramble the Blue Letters

Now I have to admit that this talk so far may sound exceedingly gloomy, but that is not my point. In fact, I want to share with you the fact that there are eslraatenivt. The way we are doing things now is not the only way they can done, and certainly not the best way they can be done. When someone tells you, "People don't eacr about privacy," consider whether the game has been designed and rigged so that they cannot care about privacy, and coming to the realization that these manipulations occur is already halfway through the process of being able to protect yourself. When someone tells you that privacy is incompatible with the benefits of big data, consider that in the last 20 years, researchers have created technologies to allow virtually any eioctlncer transactions to take place in a more privacy-preserving manner. We can swrboe the Internet anonymously. We can send emails that can only be read by the intended recipient, not even the NSA. We can have even privacy-preserving data mining. In other words, we can have the benefits of big tdaa while protecting privacy. Of course, these glienteshooc pmiyl a shifting of otsc and revenues between data holders and data subjects, which is why, perhaps, you don't hear more about them.

Open Cloze

Now I have to admit that this talk so far may sound exceedingly gloomy, but that is not my point. In fact, I want to share with you the fact that there are ____________. The way we are doing things now is not the only way they can done, and certainly not the best way they can be done. When someone tells you, "People don't ____ about privacy," consider whether the game has been designed and rigged so that they cannot care about privacy, and coming to the realization that these manipulations occur is already halfway through the process of being able to protect yourself. When someone tells you that privacy is incompatible with the benefits of big data, consider that in the last 20 years, researchers have created technologies to allow virtually any __________ transactions to take place in a more privacy-preserving manner. We can ______ the Internet anonymously. We can send emails that can only be read by the intended recipient, not even the NSA. We can have even privacy-preserving data mining. In other words, we can have the benefits of big ____ while protecting privacy. Of course, these ____________ _____ a shifting of ____ and revenues between data holders and data subjects, which is why, perhaps, you don't hear more about them.

Solution

  1. browse
  2. data
  3. alternatives
  4. imply
  5. cost
  6. technologies
  7. electronic
  8. care

Original Text

Now I have to admit that this talk so far may sound exceedingly gloomy, but that is not my point. In fact, I want to share with you the fact that there are alternatives. The way we are doing things now is not the only way they can done, and certainly not the best way they can be done. When someone tells you, "People don't care about privacy," consider whether the game has been designed and rigged so that they cannot care about privacy, and coming to the realization that these manipulations occur is already halfway through the process of being able to protect yourself. When someone tells you that privacy is incompatible with the benefits of big data, consider that in the last 20 years, researchers have created technologies to allow virtually any electronic transactions to take place in a more privacy-preserving manner. We can browse the Internet anonymously. We can send emails that can only be read by the intended recipient, not even the NSA. We can have even privacy-preserving data mining. In other words, we can have the benefits of big data while protecting privacy. Of course, these technologies imply a shifting of cost and revenues between data holders and data subjects, which is why, perhaps, you don't hear more about them.

ngrams of length 2

collocation frequency
social media 5
personal information 5
big data 5
sensitive information 3

Important Words

  1. admit
  2. alternatives
  3. anonymously
  4. benefits
  5. big
  6. browse
  7. care
  8. coming
  9. cost
  10. created
  11. data
  12. designed
  13. electronic
  14. emails
  15. exceedingly
  16. fact
  17. game
  18. gloomy
  19. halfway
  20. hear
  21. holders
  22. imply
  23. incompatible
  24. intended
  25. internet
  26. manipulations
  27. manner
  28. mining
  29. nsa
  30. occur
  31. place
  32. point
  33. privacy
  34. process
  35. protect
  36. protecting
  37. read
  38. realization
  39. recipient
  40. researchers
  41. revenues
  42. rigged
  43. send
  44. share
  45. shifting
  46. sound
  47. subjects
  48. talk
  49. technologies
  50. tells
  51. transactions
  52. virtually
  53. words
  54. years