full transcript
"From the Ted Talk by Alessandro Acquisti: What will a future without secrets look like?"

Unscramble the Blue Letters

Now I have to admit that this talk so far may sound exceedingly golmoy, but that is not my point. In fact, I want to share with you the fact that there are aeitevlntras. The way we are doing things now is not the only way they can done, and certainly not the best way they can be done. When someone tells you, "People don't care about privacy," consider whether the game has been desegind and rigged so that they cannot care about privacy, and coming to the realization that these manipulations occur is already halfway through the porcses of being able to pcerott yourself. When someone tells you that privacy is ibpmticoanle with the benefits of big data, consider that in the last 20 years, rsarheerces have created technologies to allow virtually any electronic transactions to take place in a more privacy-preserving manner. We can browse the inentert anonymously. We can send emails that can only be read by the intended recipient, not even the NSA. We can have even privacy-preserving data mnniig. In other words, we can have the benefits of big data while protecting privacy. Of course, these technologies imply a sinfthig of cost and revenues between data holders and data subjects, which is why, perhaps, you don't hear more about them.

Open Cloze

Now I have to admit that this talk so far may sound exceedingly ______, but that is not my point. In fact, I want to share with you the fact that there are ____________. The way we are doing things now is not the only way they can done, and certainly not the best way they can be done. When someone tells you, "People don't care about privacy," consider whether the game has been ________ and rigged so that they cannot care about privacy, and coming to the realization that these manipulations occur is already halfway through the _______ of being able to _______ yourself. When someone tells you that privacy is ____________ with the benefits of big data, consider that in the last 20 years, ___________ have created technologies to allow virtually any electronic transactions to take place in a more privacy-preserving manner. We can browse the ________ anonymously. We can send emails that can only be read by the intended recipient, not even the NSA. We can have even privacy-preserving data ______. In other words, we can have the benefits of big data while protecting privacy. Of course, these technologies imply a ________ of cost and revenues between data holders and data subjects, which is why, perhaps, you don't hear more about them.

Solution

  1. mining
  2. designed
  3. shifting
  4. researchers
  5. process
  6. incompatible
  7. protect
  8. internet
  9. alternatives
  10. gloomy

Original Text

Now I have to admit that this talk so far may sound exceedingly gloomy, but that is not my point. In fact, I want to share with you the fact that there are alternatives. The way we are doing things now is not the only way they can done, and certainly not the best way they can be done. When someone tells you, "People don't care about privacy," consider whether the game has been designed and rigged so that they cannot care about privacy, and coming to the realization that these manipulations occur is already halfway through the process of being able to protect yourself. When someone tells you that privacy is incompatible with the benefits of big data, consider that in the last 20 years, researchers have created technologies to allow virtually any electronic transactions to take place in a more privacy-preserving manner. We can browse the Internet anonymously. We can send emails that can only be read by the intended recipient, not even the NSA. We can have even privacy-preserving data mining. In other words, we can have the benefits of big data while protecting privacy. Of course, these technologies imply a shifting of cost and revenues between data holders and data subjects, which is why, perhaps, you don't hear more about them.

ngrams of length 2

collocation frequency
personal information 5
big data 5
social media 5
sensitive information 3

Important Words

  1. admit
  2. alternatives
  3. anonymously
  4. benefits
  5. big
  6. browse
  7. care
  8. coming
  9. cost
  10. created
  11. data
  12. designed
  13. electronic
  14. emails
  15. exceedingly
  16. fact
  17. game
  18. gloomy
  19. halfway
  20. hear
  21. holders
  22. imply
  23. incompatible
  24. intended
  25. internet
  26. manipulations
  27. manner
  28. mining
  29. nsa
  30. occur
  31. place
  32. point
  33. privacy
  34. process
  35. protect
  36. protecting
  37. read
  38. realization
  39. recipient
  40. researchers
  41. revenues
  42. rigged
  43. send
  44. share
  45. shifting
  46. sound
  47. subjects
  48. talk
  49. technologies
  50. tells
  51. transactions
  52. virtually
  53. words
  54. years