YOUR PRIVACY IS LEAKING
智能算法是否比你更了解你自己?
大数据时代下的人们还有隐私吗?
Do intelligent algorithms know yourself better than you do?
Do people still have privacy in the era of big data?
本项目以当前智能时代的隐私泄露现象为背景,考察隐私泄露的步骤,以及不同人对大数据和智能推送的看法和担忧。 YOUR PRIVACY IS LEAKING 是一款展示智能生活背后的隐私是如何泄露的设备。 我希望通过展览,让更多的人意识到他们正在丧失对自己隐私的控制权,智能算法正在彻底地改变我们的生活。
This project takes the phenomenon of privacy leakage in the current era of intelligence as the background, and examines the steps of privacy leakage, as well as different people's views and concerns about big data and intelligent push. YOUR PRIVACY IS LEAKING is a device that shows how the privacy behind smart living is leaked. I hope that through the exhibition, more people will realize that they are losing control over their privacy and that intelligent algorithms are completely changing our lives.
YOUR PRIVACY IS LEAKING allows participants to simulate multiple situations that will lead to privacy leakage, and gradually show the apparent benefits that each step will bring to participants and the privacy selling chain behind it. Through the objective presentation of real information, participants can choose their own attitude towards privacy in their future lives.

你是否知道这些简单的行为可能造成隐私泄露?
Did you know that these simple actions can lead to privacy leaks?
当你认清这些后果后是否还会继续你的行为?
Will you continue your behavior when you recognize the consequences?


YOUR PRIVACY IS LEAKING 让参与者模拟多个会导致隐私泄露的情况,并逐步展现每个步骤会给参与者带来的表面利益和背后的隐私贩卖链。通过真实信息的客观展现,参与者可以在未来的生活中自己选择对待隐私的态度。
BACKGROUND & RESEARCH
Background & Observation & Questionnaire & Persona


Analysis Of the Privacy Leaking Process
在对于隐私泄露原因的调查中发现,由于隐私的非实体性,人们很难意识到自己行为带来的后果。
同时,隐私在一次泄露后会被多次转卖并对人们造成持续的困扰。
In the investigation of the reasons for privacy leakage, it was found that due to the non-substantial nature of privacy, it is difficult for people to realize the consequences of their actions.
At the same time, privacy can be resold multiple times after a single breach and cause constant distress to people.

Design Opinion
通过让参与者模拟日常的无意识行为来揭示其背后不可见的隐私泄露和贩卖过程。以此引发参与者对隐私,大数据,智能算法的思考。
By asking participants to simulate everyday unconscious behaviors, the invisible privacy leaks and trafficking processes behind them are revealed. In this way, participants will think about privacy, big data, and intelligent algorithms.
DESIGN PROCESS
Sketch & Model Test & Technology

Sketch

Final Design
卡片插入——屏幕关键词显示——各个平台展现使用流程——用户得到的表象信息 / 隐私泄露流程图
Card insertion - Keyword display on the screen - Display of the usage process on each platform - Appearance information obtained by the user / Privacy leak flow chart

Card Design & Ticket Design
根据问卷中最有可能泄露隐私的6个信息源,制作信息卡片。
Based on the 6 information sources that are most likely to reveal privacy in the questionnaire, information cards were created.
按照时间顺序,两张印好的纸分别展示了现实生活中隐私泄露的影响和出售隐私信息的过程。
According to the chronological order, the two pieces of printed paper respectively display the impact of privacy leaks in real life and the process of selling private information.

Model Test
通过改变装置结构(倾斜角度和出口设置)为参与者提供更清晰且便于理解的装置指引。
Provides participants with clearer and easier-to-understand device guidance by changing the device structure (tilt angle and exit settings).


Technical Support
模型爆炸图 / Arduino
Exploded diagram / Arduino
FINAL DESIGN
最终模型由一个卡口入口、一个屏幕、一个显示空间和两个信息出口组成。 同时在其旁边放置信息卡片,形成系列产品。
The final model consists of a bayonet inlet, a screen, a display space and two information outlets. At the same time, information cards are placed beside them to form a series of products.

Step 1: select the information card
代表不同信息的卡片放在桌子上供参观者选择。
Cards representing different information are placed on the table for visitors to choose.

Step 2: insert information card
根据屏幕上的信息插入选中的卡,等待卡被识别。
Insert the selected card according to the information on the screen, and wait for the card to be recognized.

Step 3: drop the labeled words
中间区域会不断掉落机器识别并处理的关键词。 访问者可以根据关键字逐步了解他们的信息是如何确定和处理的。
The middle area will continuously drop keywords recognized and processed by the machine. Visitors can learn how their information is determined and processed step by step based on keywords.

Step 4: privacy record generation
两个出口会同时输出用户在信息泄露后得到的反馈以及相应反馈中大数据的处理过程。
Two exits will simultaneously output the feedback that the user will get after the information is leaked and the processing process of the big data in the corresponding feedback.
EXHIBITION
XJTLU Design Building
