top of page

YOUR PRIVACY IS LEAKING

智能算法是否比你更了解你自己?
大数据时代下的人们还有隐私吗?

Do intelligent algorithms know yourself better than you do?
Do people still have privacy in the era of big data?

本项目以当前智能时代的隐私泄露现象为背景,考察隐私泄露的步骤,以及不同人对大数据和智能推送的看法和担忧。 YOUR PRIVACY IS LEAKING 是一款展示智能生活背后的隐私是如何泄露的设备。 我希望通过展览,让更多的人意识到他们正在丧失对自己隐私的控制权,智能算法正在彻底地改变我们的生活。

This project takes the phenomenon of privacy leakage in the current era of intelligence as the background, and examines the steps of privacy leakage, as well as different people's views and concerns about big data and intelligent push. YOUR PRIVACY IS LEAKING is a device that shows how the privacy behind smart living is leaked. I hope that through the exhibition, more people will realize that they are losing control over their privacy and that intelligent algorithms are completely changing our lives.

YOUR PRIVACY IS LEAKING allows participants to simulate multiple situations that will lead to privacy leakage, and gradually show the apparent benefits that each step will bring to participants and the privacy selling chain behind it. Through the objective presentation of real information, participants can choose their own attitude towards privacy in their future lives.

4.1.jpg

你是否知道这些简单的行为可能造成隐私泄露?

Did you know that these simple actions can lead to privacy leaks?

当你认清这些后果后是否还会继续你的行为?

Will you continue your behavior when you recognize the consequences?

4.1.jpg
4.2.jpg

YOUR PRIVACY IS LEAKING 让参与者模拟多个会导致隐私泄露的情况,并逐步展现每个步骤会给参与者带来的表面利益和背后的隐私贩卖链。通过真实信息的客观展现,参与者可以在未来的生活中自己选择对待隐私的态度。


BACKGROUND & RESEARCH

Background & Observation & Questionnaire & Persona

Analysis Of the Privacy Leaking Process

  • 在对于隐私泄露原因的调查中发现,由于隐私的非实体性,人们很难意识到自己行为带来的后果。

  • 同时,隐私在一次泄露后会被多次转卖并对人们造成持续的困扰。​

  • In the investigation of the reasons for privacy leakage, it was found that due to the non-substantial nature of privacy, it is difficult for people to realize the consequences of their actions.

  • At the same time, privacy can be resold multiple times after a single breach and cause constant distress to people.

lal.jpg

Design Opinion

通过让参与者模拟日常的无意识行为来揭示其背后不可见的隐私泄露和贩卖过程。以此引发参与者对隐私,大数据,智能算法的思考。​

By asking participants to simulate everyday unconscious behaviors, the invisible privacy leaks and trafficking processes behind them are revealed. ​​In this way, participants will think about privacy, big data, and intelligent algorithms.

DESIGN PROCESS

Sketch & Model Test & Technology

lal2.jpg

Sketch

  

4.6.jpg

Final Design

卡片插入——屏幕关键词显示——各个平台展现使用流程——用户得到的表象信息 / 隐私泄露流程图

​​Card insertion - Keyword display on the screen - Display of the usage process on each platform - Appearance information obtained by the user / Privacy leak flow chart

4.7.jpg

Card Design & Ticket Design

根据问卷中最有可能泄露隐私的6个信息源,制作信息卡片。

Based on the 6 information sources that are most likely to reveal privacy in the questionnaire, information cards were created.

按照时间顺序,两张印好的纸分别展示了现实生活中隐私泄露的影响和出售隐私信息的过程。

According to the chronological order, the two pieces of printed paper respectively display the impact of privacy leaks in real life and the process of selling private information.

4.8.jpg

Model Test

通过改变装置结构(倾斜角度和出口设置)为参与者提供更清晰且便于理解的装置指引。

​​Provides participants with clearer and easier-to-understand device guidance by changing the device structure (tilt angle and exit settings).

lal3.jpg

Technical Support

模型爆炸图 / Arduino
Exploded diagram / Arduino

FINAL DESIGN

最终模型由一个卡口入口、一个屏幕、一个显示空间和两个信息出口组成。 同时在其旁边放置信息卡片,形成系列产品。

The final model consists of a bayonet inlet, a screen, a display space and two information outlets. At the same time, information cards are placed beside them to form a series of products.

4.9.jpg

Step 1: select the information card

代表不同信息的卡片放在桌子上供参观者选择。

Cards representing different information are placed on the table for visitors to choose.

4.10.jpg

Step 2: insert information card

根据屏幕上的信息插入选中的卡,等待卡被识别。

Insert the selected card according to the information on the screen, and wait for the card to be recognized.

4.11.jpg

Step 3: drop the labeled words

中间区域会不断掉落机器识别并处理的关键词。 访问者可以根据关键字逐步了解他们的信息是如何确定和处理的。

The middle area will continuously drop keywords recognized and processed by the machine. Visitors can learn how their information is determined and processed step by step based on keywords.

4.12.jpg

Step 4: privacy record generation

两个出口会同时输出用户在信息泄露后得到的反馈以及相应反馈中大数据的处理过程。

Two exits will simultaneously output the feedback that the user will get after the information is leaked and the processing process of the big data in the corresponding feedback.

EXHIBITION

XJTLU Design Building

Haowen Yang

一开始我不明白这个设备是什么,但是当每个关键词落在中间区域时,我感觉自己被机器一步步锁定了。 这种直观的感觉会让我重新思考我的在线信息安全。

At first I didn't understand what this device was, but when each keyword fell in the middle area, I felt that I was locked step by step by the machine. This intuitive feeling will make me rethink my information security online.

4.13.jpg
bottom of page