{"guid":"7ab308d4-9655-483e-95b0-710daa377a1a","title":"Privacy Design Strategies ","subtitle":"Doing well is good enough","slug":"SHA2017-335-privacy_design_strategies","link":"https://c3voc.de","description":"Privacy laws are complex and vague. They offer little concrete guidelines for engineers. Privacy design strategies address this issue. They translate vague legal norms into concrete design goals. These can be used to start the conversation on how to design your system in a privacy friendly way from the very start. The outcome is a system that addresses privacy well, but may not be perfect. But that is good enough!\n\n#Privacy","original_language":"eng","persons":["Jaap-Henk Hoepman"],"tags":["SHA2017","335"],"view_count":193,"promoted":false,"date":"2017-08-05T00:00:00.000+02:00","release_date":"2017-08-05T02:00:00.000+02:00","updated_at":"2026-04-01T16:30:04.351+02:00","length":3174,"duration":3174,"thumb_url":"https://static.media.ccc.de/media/events/SHA2017/335-hd.jpg","poster_url":"https://static.media.ccc.de/media/events/SHA2017/335-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/events/SHA2017/7ab308d4-9655-483e-95b0-710daa377a1a-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/events/SHA2017/7ab308d4-9655-483e-95b0-710daa377a1a-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/SHA2017-335-privacy_design_strategies","url":"https://api.media.ccc.de/public/events/7ab308d4-9655-483e-95b0-710daa377a1a","conference_title":"SHA2017: Still Hacking Anyway","conference_url":"https://api.media.ccc.de/public/conferences/SHA2017","related":[{"event_id":4226,"event_guid":"996095a3-d8e6-4b28-af88-8516048a8acc","weight":7},{"event_id":4235,"event_guid":"e914d37b-16a4-4529-890d-654a4b22b054","weight":6},{"event_id":4238,"event_guid":"9ea86f2f-b236-431f-9027-8b31c0b2ad56","weight":8},{"event_id":4240,"event_guid":"dec63dd2-d66b-419d-863d-c20fd5ce91dd","weight":11},{"event_id":4241,"event_guid":"ac03e1c8-09ea-4063-aea5-a83461ad79e6","weight":9},{"event_id":4247,"event_guid":"2dd16bb3-657b-41b6-bdec-987ada3f285c","weight":7},{"event_id":4249,"event_guid":"98f8267c-cad1-4d04-8a52-f7e979e68c00","weight":6},{"event_id":4257,"event_guid":"9f3c556d-5cb0-4b17-a099-3c4626a7e83b","weight":6},{"event_id":4261,"event_guid":"3852e448-f6cf-4bfe-8b14-12d590075bd6","weight":12},{"event_id":4273,"event_guid":"abd8b143-a3d8-4655-bd1c-a355a0bd5d8d","weight":7},{"event_id":4288,"event_guid":"6e5a6877-3a72-464f-bf47-4bbd103b41fe","weight":9},{"event_id":4290,"event_guid":"d3c6e873-4426-4c4e-a89d-49c9573f61d1","weight":7},{"event_id":4361,"event_guid":"54fd6dc6-c0c7-46d5-b122-4b94ec8ba635","weight":9}],"recordings":[{"size":399,"length":3174,"mime_type":"video/mp4","language":"eng","filename":"SHA2017-335-eng-Privacy_Design_Strategies_hd.mp4","state":"new","folder":"h264-hd","high_quality":true,"width":1920,"height":1080,"updated_at":"2017-08-05T13:54:54.108+02:00","recording_url":"https://cdn.media.ccc.de/events/SHA2017/h264-hd/SHA2017-335-eng-Privacy_Design_Strategies_hd.mp4","url":"https://api.media.ccc.de/public/recordings/17500","event_url":"https://api.media.ccc.de/public/events/7ab308d4-9655-483e-95b0-710daa377a1a","conference_url":"https://api.media.ccc.de/public/conferences/SHA2017"},{"size":35,"length":3159,"mime_type":"audio/opus","language":"eng","filename":"SHA2017-335-eng-Privacy_Design_Strategies.opus","state":"new","folder":"opus","high_quality":false,"width":0,"height":0,"updated_at":"2017-08-05T14:09:14.011+02:00","recording_url":"https://cdn.media.ccc.de/events/SHA2017/opus/SHA2017-335-eng-Privacy_Design_Strategies.opus","url":"https://api.media.ccc.de/public/recordings/17505","event_url":"https://api.media.ccc.de/public/events/7ab308d4-9655-483e-95b0-710daa377a1a","conference_url":"https://api.media.ccc.de/public/conferences/SHA2017"},{"size":48,"length":3159,"mime_type":"audio/mpeg","language":"eng","filename":"SHA2017-335-eng-Privacy_Design_Strategies.mp3","state":"new","folder":"mp3","high_quality":false,"width":0,"height":0,"updated_at":"2017-08-05T14:09:58.344+02:00","recording_url":"https://cdn.media.ccc.de/events/SHA2017/mp3/SHA2017-335-eng-Privacy_Design_Strategies.mp3","url":"https://api.media.ccc.de/public/recordings/17506","event_url":"https://api.media.ccc.de/public/events/7ab308d4-9655-483e-95b0-710daa377a1a","conference_url":"https://api.media.ccc.de/public/conferences/SHA2017"},{"size":122,"length":3174,"mime_type":"video/mp4","language":"eng","filename":"SHA2017-335-eng-Privacy_Design_Strategies_sd.mp4","state":"new","folder":"h264-sd","high_quality":false,"width":720,"height":576,"updated_at":"2017-08-05T14:12:03.407+02:00","recording_url":"https://cdn.media.ccc.de/events/SHA2017/h264-sd/SHA2017-335-eng-Privacy_Design_Strategies_sd.mp4","url":"https://api.media.ccc.de/public/recordings/17507","event_url":"https://api.media.ccc.de/public/events/7ab308d4-9655-483e-95b0-710daa377a1a","conference_url":"https://api.media.ccc.de/public/conferences/SHA2017"},{"size":163,"length":3174,"mime_type":"video/webm","language":"eng","filename":"SHA2017-335-eng-Privacy_Design_Strategies_webm-sd.webm","state":"new","folder":"webm-sd","high_quality":false,"width":720,"height":576,"updated_at":"2017-08-05T14:28:39.788+02:00","recording_url":"https://cdn.media.ccc.de/events/SHA2017/webm-sd/SHA2017-335-eng-Privacy_Design_Strategies_webm-sd.webm","url":"https://api.media.ccc.de/public/recordings/17511","event_url":"https://api.media.ccc.de/public/events/7ab308d4-9655-483e-95b0-710daa377a1a","conference_url":"https://api.media.ccc.de/public/conferences/SHA2017"},{"size":483,"length":3174,"mime_type":"video/webm","language":"eng","filename":"SHA2017-335-eng-Privacy_Design_Strategies_webm-hd.webm","state":"new","folder":"webm-hd","high_quality":true,"width":1920,"height":1080,"updated_at":"2017-08-05T16:00:59.110+02:00","recording_url":"https://cdn.media.ccc.de/events/SHA2017/webm-hd/SHA2017-335-eng-Privacy_Design_Strategies_webm-hd.webm","url":"https://api.media.ccc.de/public/recordings/17539","event_url":"https://api.media.ccc.de/public/events/7ab308d4-9655-483e-95b0-710daa377a1a","conference_url":"https://api.media.ccc.de/public/conferences/SHA2017"}]}