SlideShare a Scribd company logo
Charles Mok | Internet Society | July 26 2023
Threats to the Internet
My brief background
A “multi-roles” stakeholder’s view
• Technical engineering background
• ISP entrepreneur
• Trade associations and civil
society (ISOC HK co-founder)
• Legislator
• Academia (Stanford Cyber Policy
Center)
• ISOC Trustee
• https://www.linkedin.com/in/charlesmok/
Threats to the Internet?
• Digital repression
• Surveillance & privacy protection
• Misinformation & disinformation
• Internet shutdowns
• Digital sovereignty
• Cybersecurity
• AI
• The Internet meets geopolitics
Whatever happened to: One World, One Internet?

Recommended for you

Internet of things
Internet of thingsInternet of things
Internet of things

This document provides an overview of the Internet of Things (IoT). It discusses the history and development of IoT from 1997 to present day. Key points covered include the extraordinary benefits of IoT such as status updates, diagnostics, upgrades, control/automation, and location mapping. The document also addresses security and privacy challenges with collecting and sharing personal data through connected devices. Example applications of IoT highlighted are in manufacturing, infrastructure, transportation, healthcare, and media/advertising. The future of IoT is predicted to focus on enterprise, home, and government sectors, with enterprise being the largest at an estimated 9.1 billion devices by 2019.

All The Things: Security, Privacy & Safety in a World of Connected Devices
All The Things: Security, Privacy & Safety in a World of Connected DevicesAll The Things: Security, Privacy & Safety in a World of Connected Devices
All The Things: Security, Privacy & Safety in a World of Connected Devices

Much of our technology today is connected to the Internet and communicating information about us, our homes and businesses, back to manufacturers in order to give us something of value in return. It is estimated that by 2025, there may be as many as 80 billion Internet of Things (IoT) devices connected to the Internet. As IoT becomes a normal part of our everyday lives, at home, on the road, and at the office, privacy, security and safety become paramount. This presentation will set the stage: What is IoT? How is it used today? How will it be used in the future? IoT provides both opportunities and risk to society, and IoT devices need to be secured as this world of connected devices become critical to how society functions.

connectedconsumercybersecurity
Internet of Things & Wearable Technology: Unlocking the Next Wave of Data-Dri...
Internet of Things & Wearable Technology: Unlocking the Next Wave of Data-Dri...Internet of Things & Wearable Technology: Unlocking the Next Wave of Data-Dri...
Internet of Things & Wearable Technology: Unlocking the Next Wave of Data-Dri...

"Internet of Things & Wearable Technology: Unlocking the Next Wave of Data-Driven Innovation." A presentation by Adam Thierer (Mercatus Center at George Mason University) made on September 11, 2014 at AEI-FCC Conference on "Regulating the Evolving Broadband Ecosystem."

thingsprivacyinnovation
All about fragmentation?
Data fragmentation
Data/cyber/digital sovereignty
Not to mention AI & the supply chain
Fragmentation of everything on/of/for the Internet
Regulatory fragmentation

Recommended for you

How Can Policymakers and Regulators Better Engage the Internet of Things?
How Can Policymakers and Regulators Better Engage the Internet of Things? How Can Policymakers and Regulators Better Engage the Internet of Things?
How Can Policymakers and Regulators Better Engage the Internet of Things?

The world today is seemingly always plugged into the Internet and technologies are constantly sharing data about our personal and professional lives. Device connectivity is on an upward trend with Cisco estimating that 50 billion devices will be connected to the Internet by 2020. Collection and data sharing by these devices introduces a host of new vulnerabilities, raising concerns about safety, security, and privacy for policymakers and regulators.

IoT-Where is the Money? - Chandrashekar Raman, Engagement Manager, IoT Strate...
IoT-Where is the Money? - Chandrashekar Raman, Engagement Manager, IoT Strate...IoT-Where is the Money? - Chandrashekar Raman, Engagement Manager, IoT Strate...
IoT-Where is the Money? - Chandrashekar Raman, Engagement Manager, IoT Strate...

“Internet of Things (IoT) – Where is the Money?” - This talk highlighted the need for innovative business and technical models. Top 5 key takeaways from the session: 1) Analyze business models from the perspective of targeting “control points” (allows disproportionate share of value e.g. platform), “network externalities” (users generate more users e.g. facebook) and “virtuous cycle” (self-propogating value system e.g. Twitter: tweets generating more, value, tweeters and users) 2) Fog computing (solutions at the edge of the network) should be considered for "time sensitive" or "mission critical" solutions 3) IoT Stats 2013: $1.7B funding, 186 deals, 30% up YOY, 75% up on exits, largely in platforms; Cisco estimates 50B connected devices by 2020, economic value of 19 trillion added in next decade 4) Manufacturing and Smart Cities most immediate opportunities in Enterprise space 5) Key Challenges are security and time-sensitive networking. In summary, IoT Startups focused in a hot space need to pick clever business models relative to the competition.

iot business technical models
Accessibility and Digital Identity
Accessibility and Digital IdentityAccessibility and Digital Identity
Accessibility and Digital Identity

Slides from talk Andrew Arch gave at the Digital Identity Show as part of the 2018 Tech in Government Conference

a11y identity accessibility authentication digital
Standards fragmentation
• Who sets the standards?
• IETF/IERF/IAB, IEEE,
W3C…
• Or the ITU?
• Multi-stakeholderism or
government control?
Infrastructure fragmentation
Undersea cables meet geopolitics
Regulatory fragmentation
But democracies wants backdoors too 🤦
Values fragmentation
Declaration for the Future of the Internet ~ US Summit for Democracy

Recommended for you

Accessibility and Digital Identity
Accessibility and Digital IdentityAccessibility and Digital Identity
Accessibility and Digital Identity

Accessibility and Digital Identity slides from talking at the Digital Identity Show 2018, part of the Tech in Government conference

a11y accessibility identity authentication digital
The New Industrial Revolution(s)? Exploring blockchains and the future of val...
The New Industrial Revolution(s)? Exploring blockchains and the future of val...The New Industrial Revolution(s)? Exploring blockchains and the future of val...
The New Industrial Revolution(s)? Exploring blockchains and the future of val...

Overview of blockchain technology from a historical and future perspective - what does this mean for value creation in society.

blockchainbitcoincryptocurrencies
Industrial IOT slides for everyone.ppt
Industrial IOT slides for everyone.pptIndustrial IOT slides for everyone.ppt
Industrial IOT slides for everyone.ppt

The document provides an overview and introduction to the Industrial Internet of Things (IIoT). It discusses that the IIoT involves devices that communicate and interact without direct human involvement, and reliability is important as failures can be catastrophic. The document outlines several major areas of IIoT development, including sensors, data analytics from large amounts of collected data, and autonomous machine-to-machine control without human intervention.

industrial iotiioti.i.o.t
Values fragmentation
World Internet Conference — China and friends
• Extending the Digital Silk
Road
• “Internationalization” of
Internet governance?
• “Cyberspace”
governance?
The authoritarians’ view of Internet governance?
Cybersecurity = Regime security
• China’s top diplomat has called for “fairness and
justice” in cyberspace, urging emerging economies
to jointly oppose all attempts at scienti
fi
c,
technological or internet dominance, and prevent
the web from being used to foment military
one-upmanship or “colour revolutions”.
• The meeting on cybersecurity included delegates
from Brazil, Russia, India, China and South Africa,
the emerging markets giving the informal bloc its
name. Representatives of several other countries
also attended, including Belarus, Iran, Saudi Arabia,
the United Arab Emirates, Kazakhstan, Egypt,
Burundi and Cuba.
Charles Mok
Visiting Scholar, Global Digital Policy
Incubator, Cyber Policy Center, Stanford
University
Trustee, Internet Society

More Related Content

Similar to Threats to the Internet

CRI "Lessons From The Front Lines" March 26th Dublin
CRI "Lessons From The Front Lines" March 26th Dublin CRI "Lessons From The Front Lines" March 26th Dublin
CRI "Lessons From The Front Lines" March 26th Dublin
OCTF Industry Engagement
 
Global Governance of Generative AI: The Right Way Forward
Global Governance of Generative AI: The Right Way ForwardGlobal Governance of Generative AI: The Right Way Forward
Global Governance of Generative AI: The Right Way Forward
Lilian Edwards
 
Introduction to the Internet of Things
Introduction to the Internet of ThingsIntroduction to the Internet of Things
Introduction to the Internet of Things
ardiri
 
Internet of things
Internet of thingsInternet of things
Internet of things
Rushana Bandara
 
All The Things: Security, Privacy & Safety in a World of Connected Devices
All The Things: Security, Privacy & Safety in a World of Connected DevicesAll The Things: Security, Privacy & Safety in a World of Connected Devices
All The Things: Security, Privacy & Safety in a World of Connected Devices
John D. Johnson
 
Internet of Things & Wearable Technology: Unlocking the Next Wave of Data-Dri...
Internet of Things & Wearable Technology: Unlocking the Next Wave of Data-Dri...Internet of Things & Wearable Technology: Unlocking the Next Wave of Data-Dri...
Internet of Things & Wearable Technology: Unlocking the Next Wave of Data-Dri...
Adam Thierer
 
How Can Policymakers and Regulators Better Engage the Internet of Things?
How Can Policymakers and Regulators Better Engage the Internet of Things? How Can Policymakers and Regulators Better Engage the Internet of Things?
How Can Policymakers and Regulators Better Engage the Internet of Things?
Mercatus Center
 
IoT-Where is the Money? - Chandrashekar Raman, Engagement Manager, IoT Strate...
IoT-Where is the Money? - Chandrashekar Raman, Engagement Manager, IoT Strate...IoT-Where is the Money? - Chandrashekar Raman, Engagement Manager, IoT Strate...
IoT-Where is the Money? - Chandrashekar Raman, Engagement Manager, IoT Strate...
Lounge47
 
Accessibility and Digital Identity
Accessibility and Digital IdentityAccessibility and Digital Identity
Accessibility and Digital Identity
Intopia
 
Accessibility and Digital Identity
Accessibility and Digital IdentityAccessibility and Digital Identity
Accessibility and Digital Identity
Andrew Arch
 
The New Industrial Revolution(s)? Exploring blockchains and the future of val...
The New Industrial Revolution(s)? Exploring blockchains and the future of val...The New Industrial Revolution(s)? Exploring blockchains and the future of val...
The New Industrial Revolution(s)? Exploring blockchains and the future of val...
Robin Teigland
 
Industrial IOT slides for everyone.ppt
Industrial IOT slides for everyone.pptIndustrial IOT slides for everyone.ppt
Industrial IOT slides for everyone.ppt
MuhammadHashamKhanBI
 
Privacy and Civil Rights Protection in the Digital Society
Privacy and Civil Rights Protection in the Digital SocietyPrivacy and Civil Rights Protection in the Digital Society
Privacy and Civil Rights Protection in the Digital Society
Thai Netizen Network
 
Iot privacy vs convenience
Iot privacy vs  convenienceIot privacy vs  convenience
Iot privacy vs convenience
Don Lovett
 
QUT Regulating Disinformation with AI Marsden 2024
QUT Regulating Disinformation with AI Marsden 2024QUT Regulating Disinformation with AI Marsden 2024
QUT Regulating Disinformation with AI Marsden 2024
Chris Marsden
 
Kijiji 160616
Kijiji 160616Kijiji 160616
Kijiji 160616
Carlos Chalico
 
Internet of Things (IoT) Security
Internet of Things (IoT) SecurityInternet of Things (IoT) Security
Internet of Things (IoT) Security
shiriskumar
 
ITA Internet of Things Summit 2014
ITA Internet of Things Summit 2014ITA Internet of Things Summit 2014
ITA Internet of Things Summit 2014
ILTechnologyAssoc
 
The Convergence of IT, Operational Technology and the Internet of Things (IoT)
The Convergence of IT, Operational Technology and the Internet of Things (IoT)The Convergence of IT, Operational Technology and the Internet of Things (IoT)
The Convergence of IT, Operational Technology and the Internet of Things (IoT)
Jackson Shaw
 
4.Jan Holler, Vlasios Tsiatsis, Catherine Mulligan, Stefan Avesand, Stamatis ...
4.Jan Holler, Vlasios Tsiatsis, Catherine Mulligan, Stefan Avesand, Stamatis ...4.Jan Holler, Vlasios Tsiatsis, Catherine Mulligan, Stefan Avesand, Stamatis ...
4.Jan Holler, Vlasios Tsiatsis, Catherine Mulligan, Stefan Avesand, Stamatis ...
huong Tran thu
 

Similar to Threats to the Internet (20)

CRI "Lessons From The Front Lines" March 26th Dublin
CRI "Lessons From The Front Lines" March 26th Dublin CRI "Lessons From The Front Lines" March 26th Dublin
CRI "Lessons From The Front Lines" March 26th Dublin
 
Global Governance of Generative AI: The Right Way Forward
Global Governance of Generative AI: The Right Way ForwardGlobal Governance of Generative AI: The Right Way Forward
Global Governance of Generative AI: The Right Way Forward
 
Introduction to the Internet of Things
Introduction to the Internet of ThingsIntroduction to the Internet of Things
Introduction to the Internet of Things
 
Internet of things
Internet of thingsInternet of things
Internet of things
 
All The Things: Security, Privacy & Safety in a World of Connected Devices
All The Things: Security, Privacy & Safety in a World of Connected DevicesAll The Things: Security, Privacy & Safety in a World of Connected Devices
All The Things: Security, Privacy & Safety in a World of Connected Devices
 
Internet of Things & Wearable Technology: Unlocking the Next Wave of Data-Dri...
Internet of Things & Wearable Technology: Unlocking the Next Wave of Data-Dri...Internet of Things & Wearable Technology: Unlocking the Next Wave of Data-Dri...
Internet of Things & Wearable Technology: Unlocking the Next Wave of Data-Dri...
 
How Can Policymakers and Regulators Better Engage the Internet of Things?
How Can Policymakers and Regulators Better Engage the Internet of Things? How Can Policymakers and Regulators Better Engage the Internet of Things?
How Can Policymakers and Regulators Better Engage the Internet of Things?
 
IoT-Where is the Money? - Chandrashekar Raman, Engagement Manager, IoT Strate...
IoT-Where is the Money? - Chandrashekar Raman, Engagement Manager, IoT Strate...IoT-Where is the Money? - Chandrashekar Raman, Engagement Manager, IoT Strate...
IoT-Where is the Money? - Chandrashekar Raman, Engagement Manager, IoT Strate...
 
Accessibility and Digital Identity
Accessibility and Digital IdentityAccessibility and Digital Identity
Accessibility and Digital Identity
 
Accessibility and Digital Identity
Accessibility and Digital IdentityAccessibility and Digital Identity
Accessibility and Digital Identity
 
The New Industrial Revolution(s)? Exploring blockchains and the future of val...
The New Industrial Revolution(s)? Exploring blockchains and the future of val...The New Industrial Revolution(s)? Exploring blockchains and the future of val...
The New Industrial Revolution(s)? Exploring blockchains and the future of val...
 
Industrial IOT slides for everyone.ppt
Industrial IOT slides for everyone.pptIndustrial IOT slides for everyone.ppt
Industrial IOT slides for everyone.ppt
 
Privacy and Civil Rights Protection in the Digital Society
Privacy and Civil Rights Protection in the Digital SocietyPrivacy and Civil Rights Protection in the Digital Society
Privacy and Civil Rights Protection in the Digital Society
 
Iot privacy vs convenience
Iot privacy vs  convenienceIot privacy vs  convenience
Iot privacy vs convenience
 
QUT Regulating Disinformation with AI Marsden 2024
QUT Regulating Disinformation with AI Marsden 2024QUT Regulating Disinformation with AI Marsden 2024
QUT Regulating Disinformation with AI Marsden 2024
 
Kijiji 160616
Kijiji 160616Kijiji 160616
Kijiji 160616
 
Internet of Things (IoT) Security
Internet of Things (IoT) SecurityInternet of Things (IoT) Security
Internet of Things (IoT) Security
 
ITA Internet of Things Summit 2014
ITA Internet of Things Summit 2014ITA Internet of Things Summit 2014
ITA Internet of Things Summit 2014
 
The Convergence of IT, Operational Technology and the Internet of Things (IoT)
The Convergence of IT, Operational Technology and the Internet of Things (IoT)The Convergence of IT, Operational Technology and the Internet of Things (IoT)
The Convergence of IT, Operational Technology and the Internet of Things (IoT)
 
4.Jan Holler, Vlasios Tsiatsis, Catherine Mulligan, Stefan Avesand, Stamatis ...
4.Jan Holler, Vlasios Tsiatsis, Catherine Mulligan, Stefan Avesand, Stamatis ...4.Jan Holler, Vlasios Tsiatsis, Catherine Mulligan, Stefan Avesand, Stamatis ...
4.Jan Holler, Vlasios Tsiatsis, Catherine Mulligan, Stefan Avesand, Stamatis ...
 

More from Charles Mok

Digital Repression and Techno-Authoritarianism
Digital Repression and Techno-AuthoritarianismDigital Repression and Techno-Authoritarianism
Digital Repression and Techno-Authoritarianism
Charles Mok
 
Cyber Risks in Hong Kong
Cyber Risks in Hong KongCyber Risks in Hong Kong
Cyber Risks in Hong Kong
Charles Mok
 
ICANN TWNIC TWIGF 2023: Compliance through Compulsion
ICANN TWNIC TWIGF 2023: Compliance through CompulsionICANN TWNIC TWIGF 2023: Compliance through Compulsion
ICANN TWNIC TWIGF 2023: Compliance through Compulsion
Charles Mok
 
全球數位威權趨勢及對台灣的挑戰和機遇
全球數位威權趨勢及對台灣的挑戰和機遇全球數位威權趨勢及對台灣的挑戰和機遇
全球數位威權趨勢及對台灣的挑戰和機遇
Charles Mok
 
HKU Tech for Good year2.pdf
HKU Tech for Good year2.pdfHKU Tech for Good year2.pdf
HKU Tech for Good year2.pdf
Charles Mok
 
Technology4democracy: The Potential of Web3 and Blockchain for Democracy
Technology4democracy: The Potential of Web3 and Blockchain for DemocracyTechnology4democracy: The Potential of Web3 and Blockchain for Democracy
Technology4democracy: The Potential of Web3 and Blockchain for Democracy
Charles Mok
 
APAC Data Center Infrastructure Observations
APAC Data Center Infrastructure ObservationsAPAC Data Center Infrastructure Observations
APAC Data Center Infrastructure Observations
Charles Mok
 
Chinese Digital Repression
Chinese Digital RepressionChinese Digital Repression
Chinese Digital Repression
Charles Mok
 
Technology, Data and Ethics
Technology, Data and EthicsTechnology, Data and Ethics
Technology, Data and Ethics
Charles Mok
 
全球數位威權趨勢對台灣的挑戰和機遇
全球數位威權趨勢對台灣的挑戰和機遇全球數位威權趨勢對台灣的挑戰和機遇
全球數位威權趨勢對台灣的挑戰和機遇
Charles Mok
 
台灣數位經濟及區塊鏈的機遇與挑戰.pdf
台灣數位經濟及區塊鏈的機遇與挑戰.pdf台灣數位經濟及區塊鏈的機遇與挑戰.pdf
台灣數位經濟及區塊鏈的機遇與挑戰.pdf
Charles Mok
 
Censorship, Surveillance and Cyber Threats in Hong Kong.pdf
Censorship, Surveillance and Cyber Threats in Hong Kong.pdfCensorship, Surveillance and Cyber Threats in Hong Kong.pdf
Censorship, Surveillance and Cyber Threats in Hong Kong.pdf
Charles Mok
 
HKU Tech for Good.pdf
HKU Tech for Good.pdfHKU Tech for Good.pdf
HKU Tech for Good.pdf
Charles Mok
 
Why open and interoperable Internet infrastructure is key to the Internet's c...
Why open and interoperable Internet infrastructure is key to the Internet's c...Why open and interoperable Internet infrastructure is key to the Internet's c...
Why open and interoperable Internet infrastructure is key to the Internet's c...
Charles Mok
 
Misinformation, Fake News and Harmful Content Laws in the World
Misinformation, Fake News and Harmful Content Laws in the WorldMisinformation, Fake News and Harmful Content Laws in the World
Misinformation, Fake News and Harmful Content Laws in the World
Charles Mok
 
From Re-Opening to Recovery: Post-COVID Security and Privacy Issues and Trends
From Re-Opening to Recovery: Post-COVID Security and Privacy Issues and TrendsFrom Re-Opening to Recovery: Post-COVID Security and Privacy Issues and Trends
From Re-Opening to Recovery: Post-COVID Security and Privacy Issues and Trends
Charles Mok
 
From Crypto to Trust and Identity
From Crypto to Trust and IdentityFrom Crypto to Trust and Identity
From Crypto to Trust and Identity
Charles Mok
 
Have you AI'ed today? A Reality Check
Have you AI'ed today? A Reality CheckHave you AI'ed today? A Reality Check
Have you AI'ed today? A Reality Check
Charles Mok
 
The Trouble with "Fake News" Laws
The Trouble with "Fake News" LawsThe Trouble with "Fake News" Laws
The Trouble with "Fake News" Laws
Charles Mok
 
2020-21 Budget -- New measures on I&T
2020-21 Budget -- New measures on I&T 2020-21 Budget -- New measures on I&T
2020-21 Budget -- New measures on I&T
Charles Mok
 

More from Charles Mok (20)

Digital Repression and Techno-Authoritarianism
Digital Repression and Techno-AuthoritarianismDigital Repression and Techno-Authoritarianism
Digital Repression and Techno-Authoritarianism
 
Cyber Risks in Hong Kong
Cyber Risks in Hong KongCyber Risks in Hong Kong
Cyber Risks in Hong Kong
 
ICANN TWNIC TWIGF 2023: Compliance through Compulsion
ICANN TWNIC TWIGF 2023: Compliance through CompulsionICANN TWNIC TWIGF 2023: Compliance through Compulsion
ICANN TWNIC TWIGF 2023: Compliance through Compulsion
 
全球數位威權趨勢及對台灣的挑戰和機遇
全球數位威權趨勢及對台灣的挑戰和機遇全球數位威權趨勢及對台灣的挑戰和機遇
全球數位威權趨勢及對台灣的挑戰和機遇
 
HKU Tech for Good year2.pdf
HKU Tech for Good year2.pdfHKU Tech for Good year2.pdf
HKU Tech for Good year2.pdf
 
Technology4democracy: The Potential of Web3 and Blockchain for Democracy
Technology4democracy: The Potential of Web3 and Blockchain for DemocracyTechnology4democracy: The Potential of Web3 and Blockchain for Democracy
Technology4democracy: The Potential of Web3 and Blockchain for Democracy
 
APAC Data Center Infrastructure Observations
APAC Data Center Infrastructure ObservationsAPAC Data Center Infrastructure Observations
APAC Data Center Infrastructure Observations
 
Chinese Digital Repression
Chinese Digital RepressionChinese Digital Repression
Chinese Digital Repression
 
Technology, Data and Ethics
Technology, Data and EthicsTechnology, Data and Ethics
Technology, Data and Ethics
 
全球數位威權趨勢對台灣的挑戰和機遇
全球數位威權趨勢對台灣的挑戰和機遇全球數位威權趨勢對台灣的挑戰和機遇
全球數位威權趨勢對台灣的挑戰和機遇
 
台灣數位經濟及區塊鏈的機遇與挑戰.pdf
台灣數位經濟及區塊鏈的機遇與挑戰.pdf台灣數位經濟及區塊鏈的機遇與挑戰.pdf
台灣數位經濟及區塊鏈的機遇與挑戰.pdf
 
Censorship, Surveillance and Cyber Threats in Hong Kong.pdf
Censorship, Surveillance and Cyber Threats in Hong Kong.pdfCensorship, Surveillance and Cyber Threats in Hong Kong.pdf
Censorship, Surveillance and Cyber Threats in Hong Kong.pdf
 
HKU Tech for Good.pdf
HKU Tech for Good.pdfHKU Tech for Good.pdf
HKU Tech for Good.pdf
 
Why open and interoperable Internet infrastructure is key to the Internet's c...
Why open and interoperable Internet infrastructure is key to the Internet's c...Why open and interoperable Internet infrastructure is key to the Internet's c...
Why open and interoperable Internet infrastructure is key to the Internet's c...
 
Misinformation, Fake News and Harmful Content Laws in the World
Misinformation, Fake News and Harmful Content Laws in the WorldMisinformation, Fake News and Harmful Content Laws in the World
Misinformation, Fake News and Harmful Content Laws in the World
 
From Re-Opening to Recovery: Post-COVID Security and Privacy Issues and Trends
From Re-Opening to Recovery: Post-COVID Security and Privacy Issues and TrendsFrom Re-Opening to Recovery: Post-COVID Security and Privacy Issues and Trends
From Re-Opening to Recovery: Post-COVID Security and Privacy Issues and Trends
 
From Crypto to Trust and Identity
From Crypto to Trust and IdentityFrom Crypto to Trust and Identity
From Crypto to Trust and Identity
 
Have you AI'ed today? A Reality Check
Have you AI'ed today? A Reality CheckHave you AI'ed today? A Reality Check
Have you AI'ed today? A Reality Check
 
The Trouble with "Fake News" Laws
The Trouble with "Fake News" LawsThe Trouble with "Fake News" Laws
The Trouble with "Fake News" Laws
 
2020-21 Budget -- New measures on I&T
2020-21 Budget -- New measures on I&T 2020-21 Budget -- New measures on I&T
2020-21 Budget -- New measures on I&T
 

Recently uploaded

一比一原版(mqu毕业证)麦考瑞大学毕业证如何办理
一比一原版(mqu毕业证)麦考瑞大学毕业证如何办理一比一原版(mqu毕业证)麦考瑞大学毕业证如何办理
一比一原版(mqu毕业证)麦考瑞大学毕业证如何办理
taqyea
 
Lincoln University degree offer diploma Transcript
Lincoln University degree offer diploma TranscriptLincoln University degree offer diploma Transcript
Lincoln University degree offer diploma Transcript
ubufe
 
PSD to Wordpress Service Providers in 2024
PSD to Wordpress Service Providers in 2024PSD to Wordpress Service Providers in 2024
PSD to Wordpress Service Providers in 2024
Bestdesign2hub
 
一比一原版(ubc毕业证书)英属哥伦比亚大学毕业证如何办理
一比一原版(ubc毕业证书)英属哥伦比亚大学毕业证如何办理一比一原版(ubc毕业证书)英属哥伦比亚大学毕业证如何办理
一比一原版(ubc毕业证书)英属哥伦比亚大学毕业证如何办理
taqyea
 
一比一原版(heriotwatt毕业证书)英国赫瑞瓦特大学毕业证如何办理
一比一原版(heriotwatt毕业证书)英国赫瑞瓦特大学毕业证如何办理一比一原版(heriotwatt毕业证书)英国赫瑞瓦特大学毕业证如何办理
一比一原版(heriotwatt毕业证书)英国赫瑞瓦特大学毕业证如何办理
taqyea
 
一比一原版(aber毕业证)亚伯大学毕业证如何办理
一比一原版(aber毕业证)亚伯大学毕业证如何办理一比一原版(aber毕业证)亚伯大学毕业证如何办理
一比一原版(aber毕业证)亚伯大学毕业证如何办理
taqyea
 
How to Choose the Right UIUX Design Service for Optimal Customer Experience
How to Choose the Right UIUX Design Service for Optimal Customer ExperienceHow to Choose the Right UIUX Design Service for Optimal Customer Experience
How to Choose the Right UIUX Design Service for Optimal Customer Experience
Serva AppLabs
 
Founders Of Digital World Social Media..
Founders Of Digital World Social Media..Founders Of Digital World Social Media..
Founders Of Digital World Social Media..
jom pom
 
Future Trends What's Next for UI UX Design on Websites
Future Trends What's Next for UI UX Design on WebsitesFuture Trends What's Next for UI UX Design on Websites
Future Trends What's Next for UI UX Design on Websites
Serva AppLabs
 
一比一原版(hull毕业证书)英国赫尔大学毕业证如何办理
一比一原版(hull毕业证书)英国赫尔大学毕业证如何办理一比一原版(hull毕业证书)英国赫尔大学毕业证如何办理
一比一原版(hull毕业证书)英国赫尔大学毕业证如何办理
taqyea
 
一比一原版(brunel毕业证书)英国布鲁内尔大学毕业证如何办理
一比一原版(brunel毕业证书)英国布鲁内尔大学毕业证如何办理一比一原版(brunel毕业证书)英国布鲁内尔大学毕业证如何办理
一比一原版(brunel毕业证书)英国布鲁内尔大学毕业证如何办理
taqyea
 
Massey University degree offer diploma Transcript
Massey University degree offer diploma TranscriptMassey University degree offer diploma Transcript
Massey University degree offer diploma Transcript
ubufe
 
seo proposal | Kiyado Innovations LLP pdf
seo proposal | Kiyado Innovations LLP  pdfseo proposal | Kiyado Innovations LLP  pdf
seo proposal | Kiyado Innovations LLP pdf
diyakiyado
 
202254.com全网最高清影视香蕉影视,热门电影推荐,热门电视剧在线观看,免费电影,电影在线,在线观看。球华人在线電視劇,免费点播,免费提供最新高清的...
202254.com全网最高清影视香蕉影视,热门电影推荐,热门电视剧在线观看,免费电影,电影在线,在线观看。球华人在线電視劇,免费点播,免费提供最新高清的...202254.com全网最高清影视香蕉影视,热门电影推荐,热门电视剧在线观看,免费电影,电影在线,在线观看。球华人在线電視劇,免费点播,免费提供最新高清的...
202254.com全网最高清影视香蕉影视,热门电影推荐,热门电视剧在线观看,免费电影,电影在线,在线观看。球华人在线電視劇,免费点播,免费提供最新高清的...
ffg01100
 
Cyber Security Course & Guide. X.GI. pdf
Cyber Security Course & Guide. X.GI. pdfCyber Security Course & Guide. X.GI. pdf
Cyber Security Course & Guide. X.GI. pdf
RohitRoshanBengROHIT
 
一比一原版美国休斯敦大学毕业证(uh毕业证书)如何办理
一比一原版美国休斯敦大学毕业证(uh毕业证书)如何办理一比一原版美国休斯敦大学毕业证(uh毕业证书)如何办理
一比一原版美国休斯敦大学毕业证(uh毕业证书)如何办理
taqyea
 
About Alibaba company and brief general information regarding how to trade on...
About Alibaba company and brief general information regarding how to trade on...About Alibaba company and brief general information regarding how to trade on...
About Alibaba company and brief general information regarding how to trade on...
Erkinjon Erkinov
 
Carrington degree offer diploma Transcript
Carrington degree offer diploma TranscriptCarrington degree offer diploma Transcript
Carrington degree offer diploma Transcript
ubufe
 
10th International Conference on Networks, Mobile Communications and Telema...
10th International Conference on Networks, Mobile Communications and   Telema...10th International Conference on Networks, Mobile Communications and   Telema...
10th International Conference on Networks, Mobile Communications and Telema...
ijp2p
 
一比一原版(city毕业证书)英国剑桥大学毕业证如何办理
一比一原版(city毕业证书)英国剑桥大学毕业证如何办理一比一原版(city毕业证书)英国剑桥大学毕业证如何办理
一比一原版(city毕业证书)英国剑桥大学毕业证如何办理
taqyea
 

Recently uploaded (20)

一比一原版(mqu毕业证)麦考瑞大学毕业证如何办理
一比一原版(mqu毕业证)麦考瑞大学毕业证如何办理一比一原版(mqu毕业证)麦考瑞大学毕业证如何办理
一比一原版(mqu毕业证)麦考瑞大学毕业证如何办理
 
Lincoln University degree offer diploma Transcript
Lincoln University degree offer diploma TranscriptLincoln University degree offer diploma Transcript
Lincoln University degree offer diploma Transcript
 
PSD to Wordpress Service Providers in 2024
PSD to Wordpress Service Providers in 2024PSD to Wordpress Service Providers in 2024
PSD to Wordpress Service Providers in 2024
 
一比一原版(ubc毕业证书)英属哥伦比亚大学毕业证如何办理
一比一原版(ubc毕业证书)英属哥伦比亚大学毕业证如何办理一比一原版(ubc毕业证书)英属哥伦比亚大学毕业证如何办理
一比一原版(ubc毕业证书)英属哥伦比亚大学毕业证如何办理
 
一比一原版(heriotwatt毕业证书)英国赫瑞瓦特大学毕业证如何办理
一比一原版(heriotwatt毕业证书)英国赫瑞瓦特大学毕业证如何办理一比一原版(heriotwatt毕业证书)英国赫瑞瓦特大学毕业证如何办理
一比一原版(heriotwatt毕业证书)英国赫瑞瓦特大学毕业证如何办理
 
一比一原版(aber毕业证)亚伯大学毕业证如何办理
一比一原版(aber毕业证)亚伯大学毕业证如何办理一比一原版(aber毕业证)亚伯大学毕业证如何办理
一比一原版(aber毕业证)亚伯大学毕业证如何办理
 
How to Choose the Right UIUX Design Service for Optimal Customer Experience
How to Choose the Right UIUX Design Service for Optimal Customer ExperienceHow to Choose the Right UIUX Design Service for Optimal Customer Experience
How to Choose the Right UIUX Design Service for Optimal Customer Experience
 
Founders Of Digital World Social Media..
Founders Of Digital World Social Media..Founders Of Digital World Social Media..
Founders Of Digital World Social Media..
 
Future Trends What's Next for UI UX Design on Websites
Future Trends What's Next for UI UX Design on WebsitesFuture Trends What's Next for UI UX Design on Websites
Future Trends What's Next for UI UX Design on Websites
 
一比一原版(hull毕业证书)英国赫尔大学毕业证如何办理
一比一原版(hull毕业证书)英国赫尔大学毕业证如何办理一比一原版(hull毕业证书)英国赫尔大学毕业证如何办理
一比一原版(hull毕业证书)英国赫尔大学毕业证如何办理
 
一比一原版(brunel毕业证书)英国布鲁内尔大学毕业证如何办理
一比一原版(brunel毕业证书)英国布鲁内尔大学毕业证如何办理一比一原版(brunel毕业证书)英国布鲁内尔大学毕业证如何办理
一比一原版(brunel毕业证书)英国布鲁内尔大学毕业证如何办理
 
Massey University degree offer diploma Transcript
Massey University degree offer diploma TranscriptMassey University degree offer diploma Transcript
Massey University degree offer diploma Transcript
 
seo proposal | Kiyado Innovations LLP pdf
seo proposal | Kiyado Innovations LLP  pdfseo proposal | Kiyado Innovations LLP  pdf
seo proposal | Kiyado Innovations LLP pdf
 
202254.com全网最高清影视香蕉影视,热门电影推荐,热门电视剧在线观看,免费电影,电影在线,在线观看。球华人在线電視劇,免费点播,免费提供最新高清的...
202254.com全网最高清影视香蕉影视,热门电影推荐,热门电视剧在线观看,免费电影,电影在线,在线观看。球华人在线電視劇,免费点播,免费提供最新高清的...202254.com全网最高清影视香蕉影视,热门电影推荐,热门电视剧在线观看,免费电影,电影在线,在线观看。球华人在线電視劇,免费点播,免费提供最新高清的...
202254.com全网最高清影视香蕉影视,热门电影推荐,热门电视剧在线观看,免费电影,电影在线,在线观看。球华人在线電視劇,免费点播,免费提供最新高清的...
 
Cyber Security Course & Guide. X.GI. pdf
Cyber Security Course & Guide. X.GI. pdfCyber Security Course & Guide. X.GI. pdf
Cyber Security Course & Guide. X.GI. pdf
 
一比一原版美国休斯敦大学毕业证(uh毕业证书)如何办理
一比一原版美国休斯敦大学毕业证(uh毕业证书)如何办理一比一原版美国休斯敦大学毕业证(uh毕业证书)如何办理
一比一原版美国休斯敦大学毕业证(uh毕业证书)如何办理
 
About Alibaba company and brief general information regarding how to trade on...
About Alibaba company and brief general information regarding how to trade on...About Alibaba company and brief general information regarding how to trade on...
About Alibaba company and brief general information regarding how to trade on...
 
Carrington degree offer diploma Transcript
Carrington degree offer diploma TranscriptCarrington degree offer diploma Transcript
Carrington degree offer diploma Transcript
 
10th International Conference on Networks, Mobile Communications and Telema...
10th International Conference on Networks, Mobile Communications and   Telema...10th International Conference on Networks, Mobile Communications and   Telema...
10th International Conference on Networks, Mobile Communications and Telema...
 
一比一原版(city毕业证书)英国剑桥大学毕业证如何办理
一比一原版(city毕业证书)英国剑桥大学毕业证如何办理一比一原版(city毕业证书)英国剑桥大学毕业证如何办理
一比一原版(city毕业证书)英国剑桥大学毕业证如何办理
 

Threats to the Internet

  • 1. Charles Mok | Internet Society | July 26 2023 Threats to the Internet
  • 2. My brief background A “multi-roles” stakeholder’s view • Technical engineering background • ISP entrepreneur • Trade associations and civil society (ISOC HK co-founder) • Legislator • Academia (Stanford Cyber Policy Center) • ISOC Trustee • https://www.linkedin.com/in/charlesmok/
  • 3. Threats to the Internet? • Digital repression • Surveillance & privacy protection • Misinformation & disinformation • Internet shutdowns • Digital sovereignty • Cybersecurity • AI • The Internet meets geopolitics
  • 4. Whatever happened to: One World, One Internet?
  • 7. Not to mention AI & the supply chain Fragmentation of everything on/of/for the Internet
  • 9. Standards fragmentation • Who sets the standards? • IETF/IERF/IAB, IEEE, W3C… • Or the ITU? • Multi-stakeholderism or government control?
  • 11. Regulatory fragmentation But democracies wants backdoors too 🤦
  • 12. Values fragmentation Declaration for the Future of the Internet ~ US Summit for Democracy
  • 13. Values fragmentation World Internet Conference — China and friends • Extending the Digital Silk Road • “Internationalization” of Internet governance? • “Cyberspace” governance?
  • 14. The authoritarians’ view of Internet governance? Cybersecurity = Regime security • China’s top diplomat has called for “fairness and justice” in cyberspace, urging emerging economies to jointly oppose all attempts at scienti fi c, technological or internet dominance, and prevent the web from being used to foment military one-upmanship or “colour revolutions”. • The meeting on cybersecurity included delegates from Brazil, Russia, India, China and South Africa, the emerging markets giving the informal bloc its name. Representatives of several other countries also attended, including Belarus, Iran, Saudi Arabia, the United Arab Emirates, Kazakhstan, Egypt, Burundi and Cuba.
  • 15. Charles Mok Visiting Scholar, Global Digital Policy Incubator, Cyber Policy Center, Stanford University Trustee, Internet Society