 Welcome back. And welcome to our next vlog. We're at the second day of Divock push-to-talk and it's going to be chaotic because we've got many guests already. This is going to be an interactive format. We have a large room and we have our representatives who will be in in a minute we hope. So we've got many participants and if you want to participate go to the wiki and to the Divock page and there's a link to the page and you will also find a link to the blue button room so that you can join us here. Our topic today is I've got nothing to hide right? This is something you often hear because many people think if you don't do anything bad no harm should come your way but we will talk about how the internet knows so much more than we think it does and we're going to try and make it visible using images for different target groups and now our presenters are going to introduce themselves. Hi. I'm working at Cyber for EDU and we want to create images in people's head about the topic we're talking about today and we are a relatively new association and I would like to introduce the association to you. Cyber for EDU is an initiative an initiative that has been founded on the last congress in Leipzig and our idea was to repair digital education and this is what we still want to do. So we're a group of people, nerds, scientists, data protectors who are closely connected to the software foundation, pre-software foundation Europe and we're trying to we make available information on data protection and we also have other cooperation partners and technical infrastructure that we can offer and we also work together with NextCloud so that we can provide alternatives to Zoom and other critical apps in terms of data protection. So if you want to get to know us better, your quarterly invited to our talk at 9 in the evening and you can also find our website on the slide. Well, so what are we going to talk about? I'm sure that you all know the problem. When you get out of the chaos bubble, you often have to explain to people what data protection is about and why we need it and it's not always easy because you always get these deadbeat arguments like I've got nothing to hide and this isn't helpful. What we want to do is talk about it in workshops, in conferences like Big Blue Button and we want to try and create images. Creating images is a very old tool. We've done it for thousands of years actually and we've had a lot of success creating images and we want to create images that help people visualize topics like data protection and privacy because normally you don't often visualize these things and it is also for education purposes. We have different target audiences whether it's school children or university students, parents and teachers, those people who decide what information is made available to children. It's about the tools we're using whether it's Microsoft Teams or Big Blue Button, which is a very important decision and it's about trying to find ways out of our close-knit community and trying to inform people outside of that bubble. Michael is going to explain the time schedule and after that we would like to empty your brains so that we have space for creative imagination. Michael. Well, this talk has a rather complex schedule because we are going to get into dialogue with the other participants soon and sorry I was distracted. We're going to start working in small groups. So far all participants in the stream I will give you an introduction on this data protection topic during the workshops in groups. I will do a little presentation that I also often hold at schools and I've compressed it a little bit and I'm going to try and give you the highlights in 30 minutes so that we have content for those who are watching the stream and not working in groups and then for a bit of untightening we have some activities. So let's look at the next slide. I would like to go back because we just became aware that you couldn't see the slides before and I like them so much that I would still like to present them to you but those who are on the stream and who are thinking about participating in the workshops you are warmly invited to join us on Big Blue Button and the link should be available in the on the wiki under the event and the same goes for the game which we're going to play so you're invited to join the Big Blue Button we've got 25 participants so far but we've got room for more so our creative exercise which we're going to do it's about refreshing your memory we're going to give you four terms and you have 30 seconds and we're going to ask you to write your associations with that term in the chat so there's no good or bad or right or wrong answers of course there's good answers but there aren't any bad answers there's just better answers we're going to try this and see what we end up with in 30 seconds maybe we should explain the exact procedure the idea is that you can look at the public chat on Big Blue Button and you're all invited to jot down your associations your ideas on the term so after that we will have the term and then your participation now it would be wonderful if the chat could be included in the screen i can't see it at the moment so for those who are just looking at the stream i have no idea what you're seeing but maybe this isn't bad now let's start with the first term michael i need your help for a second because i can't see it okay thanks the first term is in the chat and it's kangaroo boxing australia funny jumps cyber eggs pouch funny climate change civil categories australia australia pro creation outback zoo i like your participations already and if you've heard my alarm clocks the time is out so in order to continue we'll have the next we'll have the next term after the dash matrix the next term is matrix red pill film green film chat error in the matrix glitch in the matrix chat protocol sunglasses cat fantasy neo maths code screensaver i think that laptops in the future will have a camera behind the screen okay time's out this has worked perfectly so there's people who don't like maths apparently okay losing up okay let's continue with the next funny term it's data garden stealing my austerity autobahn important zero and one memory reasons encryption files oil secure lu interesting associations and because this was so nice and funny we've got one last term so let please make a break in this chat and we'll have the last term apple bite fruit cake pear yummy tree world garden iphone pear warm red cake sin tree apple thank you to everyone who participated it's very nice to see so many participants and so many creative and funny answers even if it sounds funny i have to interject for those who are watching us on the screen stream stream we are hearing each others and the direction so i've got many voices on my headphones and we will notify you if we need help at this point we would like to continue with the creative phase we're going to split we have eight groups on the topics which you can hopefully see on the slides i'll read them data protection room one room two personal rights room three open source room four metadata room five data security room six central decentral room seven big data room eight organizations for each room we have a moderator a presenter who is going to help you find rooms and before we start we would like to have an estimation of how many people would like to join which room so that we have a roughly equal number of participants in each room so michael please go to the public chat and look at the poll we've made a poll in the chat where you can answer which group you would like to join so please enter your preference and if we see that the participation numbers are very unbalanced we will do a random distribution but we hope that it distributes equally by itself so i'm happy to see that people are participating this is very nice to see and i hope that the names will be matched with the names in the chat in the poll so please in the poll use your name from the chat of course we don't care about your real name but please use the name that you use in big move out and for the poll so that you have the same name and we can assign you correctly also thank you to our assistant team you're doing a great job so far we've got nine participants there's a trend already to be seen did we set a time limit no but we're seeing a clear trend so there's a big trend are you seeing the results it's very interesting because we've got nearly all of the participants in groups one and two there's one person for all governments but the rest is pretty clearly interested in data protection and personal rights no it wasn't clear to me because if you try to explain open source to non-nerds normally you get answers like this is the this kind of shitty work by notes that never works so you see that it's very clear that you still have to explain open source so we've got 13 participants in the poll so far that doesn't match with the 38 chat participants so not everyone has completed the poll yet so we would like to ask you to complete the poll don't be afraid we've got a very nice team that will guide you so don't be afraid to join nothing bad will happen and you don't have to present the results in the end don't make false promises i'm not joking i just noticed that you can't see my t-shirt this is so bad because it's so cool thank you for those cool t-shirts but for the webcam the logo has to be directly under the neck maybe even a face mask so what to do we've got 13 participants 15 meanwhile so we're going to give you another minute on my computer clock which is the central clock for all activities concerned today and then i would like to ask all assistants to distribute the participants equally because we want everyone to be happy in the end from youth work i know that the saying all children play all games so if if you're interested in the topic we're talking about you're going to be happy in all of the groups and michael's the only person who will remain without group membership i thought we were talking metadata or something you'll have to give a presentation you know that right no no my assistant will give the presentation i use this glove to transport my webcam today i did explain the job all right so is the minute over yet yeah it's over we've got 15 participants so open source is a good topic but difficult to explain somebody's saying in the chat we didn't choose those the topics you'd have wanted maybe but talking about open source i'm not going to moderate this group but yeah i think there's many interesting aspects here we're not going to talk about it further here but i have a book recommendation anarchy of hackers by richard solman it's a great book where i learned a lot even though i thought i knew everything about the topics and i felt like it was an eye opener for us it seems so normal but it isn't to be taken for granted so i would like to leave you about now but i need a little more help from money is there anything we have to do now or will you just assign rooms everyone joins the groups on their own and raff is creating the rooms at the moment so for those who haven't worked with this feature yet you get a drop down list of rooms and the first room you see is not necessarily the room you have been assigned to you so i'm going to read the room names again room one data protection room two personal rights room three open source room room four letter data room five data security room six central decentral room seven big data room eight all of them so thank you i'm going to say goodbye at this point and leave you alone with my car okay yeah because you cannot participate in a creative part you have the pleasure to listen to me so it says chaos nach schule so chaos the school i derived this is talk from the chaos the school talk with the mixtape from that it's a talk we offer to Berlin schools what's chaos the school chaos my shoulder chaos the school is an initiative that's active all over germany it's uh it's not all members of the ccc but it's close to the ccc and they do in the free time they offer to give talks to children but they usually not treated enough in school all right usually we have a slide what's the ccc i think everybody here knows what that is and i talk here mostly as a chaos the school activists in berlin what we do is we offer schools to visit them there's really two lessons so two hour lessons and we have two talks that are requested very often that's one is that what the internet where we element mostly address elementary school children and the other is struck from the net with more for children from the eighth form or the last few years these can be done quite deep the idea of the talk is to to give you a few ideas in process how you can that you can use to how you can you know leave tracks in the network when you use it in everyday use that you do not want to leave behind i start with photos so this is a part i usually do interactively with the pupils when i ask them to try to extract information from that picture at what can you learn from this photo about the person who made the photo you let them look where the photo what can you see there's a roof it's a the huge empty room that somebody probably doesn't have a smaller flat and then can just look at the picture and derive things from the picture but that's not the most interested part in this thing in this context the more interesting is what i should know other information or in this image and this gets us to this so-called metadata with the descriptive data that every picture that comes from a digital camera or a telephone it contains and they are stored with the image on the telephone and people usually do not see that the point of those data are attached to the photo the actual file this is sent a photo by mail or in chat all these information are distributed to and here i want to show you a little tool where i where i uploaded the photo we've seen the presentation but the tool is nothing really really special no telephone no hacker tool any telephone any image management program can extract and show these metadata from any photo and here you get an impression what there are in there is about the person who made the photo and especially about the device he used to receive it's a Huawei device you see the exposure we see when the photo was made we see where the photo was made and because in the moment the photo was made the location function of the phone was active and so the viewer of the photo does know where the where the photo was made with a position that's enough to actually locate the house of the flat you see all the information that's in a photo it's quite a lot it's a very long list it's contains a speed direction of view and allows quite a lot of conclusions where one should be aware of before you share a photo in any medium and probably tell the recipients of the photo things you don't want to tell them another thing what you can interesting is you can conclude from the descriptive information and you can see in which direction the camera was facing so you know the direction the image is a simple way to avoid that is to at least the location information away is to make sure that whenever you make a photo on your telephone that the or any digital camera but those are used doesn't last so the important thing is to make sure that the location information is switched off or to use tools that remove all those information but for example the message is signal does if you send a picture via messenger signal removes all those metadata so to protect the data of the photographer now I want to stay for a moment with the topic of metadata so no no no I want to stay with the topic of pictures so I want to stay with the topic of pictures there's another aspect to come back to the actual content of the photo that are even with the possibility of a telephone office you can do quite a lot of evaluating of those photos maybe you know it if you take a photo and the newer telephones or produce these boxes you can see in this example here and that usually says that the telephone knows where on the phone there are faces so a telephone can quite directly in real time analyze the motive in the digital viewfinder can it detect faces watch for that's a camera's quite an achievement because for such a computer picture is nothing but a bunch of pixels with different colors the concept of a face or human or hair or teeth is nothing that a computer knows about it's easy for us to recognize well computer that is not that easy but we are so far come so far that sorry wrong tab we see we see here here I show you how simple such a picture analysis is today I just show you some examples the tool that amazon offers not because I want to emphasize amazon it's just because amazon makes it quite easy to free to do picture to test picture analysis for free here's a picture for class that I found in the net and an upload it is and what you can see here is that the algorithm is quite quite exact to recognize every single face in all these mouth of faces that can see from all the boxes you can see here and then gives me the possibility to click every face in the picture and then I get a detailed information about the algorithm thing so for 99 percent of things it's a face it's quite sure that it's a female face and things it's between 18 and 30 years it's not quite sure about if it's laughing or not but it's not very agressive quite reliable here on the left you see many other possibilities quite based solution from amazon office there's a funny possibility you can to look for celebrities in pictures this is of course celebrities and press and this is the press targeted it's a nice feature for a journalist or something but nothing there's not much behind this but a list of faces and names and the possibility to what actually let me recognize them here you can see here johnny duck with random person I can load a random image and it works quite well this is just a special case it could be a database with non-prominent people off behind this the thing is it's quite reliably can detect if somebody's in the image and that does also work with several in person in the image yeah the the delay is mostly because the image must be uploaded from my computer not the actual analysis so it's not actually there on the machine where the algorithm is running you can sort of things like object and scene recognition here's a quite interesting here's a photo you can see the algorithm can detect cars with a human as a person as a person it's probably also a human and so you can analyze the images by many criteria and it's quite easy a bit scary about the thing is that this can be done with several thousand pictures in a second there are customers of amazon that use this solution to do real-time analysis of pictures of surveillance cameras or cameras that are installed in the public space to send them there and the solution like the solution from microsoft or ibm or facebook all all large providers have solutions of this kind so you can process many images in parallel very short time and yeah that's we have to think about this so we look at a picture and recognize what's on it but in that quantity at 24 hours a day seven days a week there are suddenly many new possibilities so something what i just want to sketch a bit the same thing works with videos so if you upload a film here on the algorithm recognize people like the same thing we did with the pictures the same things that i said work with pictures work quite as well as videos and you can have the timestamps where in the video who appears no there's no difference if you're moving pictures or you have static photos these kind of solutions work with both things quite as well it's a bit weird to do this talk without any interaction with the audience but i haven't done that before so maybe usually people are sitting in front of me who look interested so it's sometimes a bit weird so i'm not quite sure what to do one one one thing i haven't shown it's a variant that you can the space scenery so kind of system can say this is an interior room a library and then there are books so a short jump here looked at the topic of pictures and what you can do what you kind of what information you can get out of an image and so if you're working with pictures and images and ask a few you should ask a few more questions and ask a source if there are do not want to share about information in some situations but now we do a jump it's again the topic of metadata as an example is whatsapp whatsapp is quite a lot of criticism of whatsapp for data protection and whatsapp also has an online function that scientists have looked at closer and this function that looks quite attractive to users that allows you to see of your contacts in your telephone book if they are available for chat or not can or could at least i don't know maybe at what still could be queried automatically next to that scientists have done scientists have done with a group of about a thousand students have tracked the online status continuously for one time so those thousand telephone numbers were continuously every few minutes queried and the data were aggregated and then would be analyzed this was all anonymized until you can see online activity by day of the week so you can see that the person behind this number obviously was was constantly active until thursday then on friday and saturday less active and then on sunday we're starting again to use whatsapp here you see the same person another view this is by the 24 hours of the day so from midnight to midnight you see here yeah you see gets really interesting because can find surprisingly many profiles where you ask when do you do these people sleep what do they do over the day you obviously will see the activity does only go down between one and two o'clock then there's a period of rest of course there are some measurement errors the online status is not always correlated with the eyes being open or closed but there are some correlations between an activity and that status and so you can really ask though this this window of rest is quite short and then it starts again in the morning quite early and think this is a person who's sitting in a lecture or somebody who's just working or a teacher who's just teaching maths or some other topic and still has still a constantly high online status over the day and then stuff that and then in the evening it starts to get even more active it's quite quite interesting over the day and you can click into this study and look at many people of course there are some who use the bless we have somebody who is at low rest at night but here again the day is quite active you know what's happening in parallel there you can only ask yourself what is it and that's an interesting part about this I think this information is collected and stored it's not only in the connection in the context of this study and I think that these information can be quite interested by other parties who collect it and store it and maybe this person will be sitting in an interview in a job interview and then somebody will get a bad attention scoring and nobody knows why and the reason could be such kind of studies which sound harmless today but it can be quite difficult like in the context of a job interview because you cannot be sure and be sure that you will not be directly will directly see this study but you will just come and look at the store and you really do not know why this where this bad score come from or you cannot do anything about this how can do anything to change this bad evaluation because you do not know where the data come from and who actually collected and stored here these information there are good questions to think if you really want to use this big centralistic american companies give if you want to give them your data or not because today is now is one thing but what might happen with this data in the future is a different thing okay so so much for metadata and what i would like to emphasize that although i do not like whatsapp this isn't primarily a whatsapp problem whatsapp of course is a very large system because many people use it and it can also use data from other apps and of course you have to get into a dialogue with the providers of these solutions of course it's important for the app to know other factors than just the name but you should definitely be careful about which information is shared with the apps that you're using because you can be sure that they will be monitors monetarized at some point and there are apps that don't do that now i would like to make a quick excursion on this topic of course it's a large gap between whatsapp and facebook facebook is secondary in what i want to talk about the primary information is that somebody gave us their account to analyze and the point in the middle is the person mail and they provided us with our account to evaluate and if you have developer access you can get information from this account and make this kind of network graph where you can see how the the clustering of the profile looks like the blue dots if you look at it closely there's many male participants and it's actually a football club and there's just one woman who might be i don't know the physical assistant or something like that but it's almost uniquely male and then on the right side we have the colleagues of that person and as you see it was very easy to isolate the colleague group and those are and in the family of this person there are more women than men because obviously women have a larger probability to get older than men so you see that if you use algorithms on data you can learn things and you don't even have to do much to learn those things so this is also an example which would be possible externally because as you see facebook has all of this data available to them at all times and they're using this in order to create advertisement content that is relevant to your interests and this is how facebook gains the ability to have a high quality of advertisement placement because they get all of that information for free from its users so in this context we should also talk about this evaluation about likes a study that is linked below has shown how many likes make up a good picture of a person so how does how much does facebook know about us from likes purely so on average you can say that if a person has 10 likes that means that the system can estimate that person as well as a colleague or as a fellow student and from 70 likes facebook can estimate your personality better than a good friend from 150 likes better than your family and from 300 likes better than anyone ah we're seeing that the participants are returning from the workshops all right direction is telling me that the group work has finished i would have had two more slides but i would do those two slides continue you're free to continue all right then i'm going to continue with two slides another interesting topic or an interesting event was Cambridge Analytica who managed quite a long time ago to give apps to facebook users to more than 270 million users they gave them apps by pretending to have a lottery that you can win or other types of little games which you can play on facebook and 270 000 people clicked those links and a bug on facebook resulted in the profile data of those 270 000 people being compromised and it wasn't just those 270 000 people but also their friends and in the end 87 million contacts were forwarded to Cambridge Analytica so if you compare that to Berlin this is an entire part of the city in an entire quarter so if you imagine that one part of Berlin like one quarter the city played the games all of Germany became compromised and those people didn't even know probably what they were doing to people on their network so concluding i would like to show you a tool which i haven't prepared entirely obviously so i would like to show you this is a pyfox browser in which i've installed a plugin called light beam and this plugin is able to show me which websites i open in my browser and how those websites interact so i opened a few links so i'll just click them through and load the content and i think those are web pages that many german people use every day and what you see here is two clusters so that means i've visited seven sites freenet, gmx, webde, a few german newspapers so seven websites were opened actively and the tool shows that passively i've been on 121 third party websites and this is because providers use other services like javascript and technical components that is normal and legitimate but it is interesting that they are linked to each other normally those are providers of advertisement content and they have two advantages when this they can provide advertisement and they also get information and can transport them between the websites so if i clicked a few links on freenet or maybe read my mail i can assume that the content i've viewed are forwarded to t online and the same goes for the newspapers which are the three nodes over there so maybe the content i'm looking at in the newspaper is linked to what i read in my emails and vice versa and you have those little helpers those little pages that are necessary to provide the website content but also collect information on us and it is useful to have an ad filter let's see if i can do that spontaneously so i'll close those i'll reset the tree and i hope that i didn't make a mistake and that i will be able to show you the effect of an ad blocker so let's reload the pages and look at the graph okay it didn't work so well we reduced the number of third party sites to 86 but you can definitely say that by using filters ad filters have been able to reduce the number of visited third party sites so if you put more work into this and also use different kind of blockers and add-ons then you can get better results i forgot to activate no script so just this one little experiment and then i'm going to free up the stream so it really hasn't gotten better so i'll have to practice that again so and then if you're done let's go back i don't know how you felt about it but the time was very short so we weren't able to agree on how to continue so i hope that one group will volunteer here i was in group two and i would just suggest that group one will start presenting so please someone from group one would you talk about what you did hi that was me um i've been in group one so if somebody from group ones wants to join discussion you're welcome to so we were talking about what data protection means and what problems we're facing with it so on one hand it became clear that data protection is important but sometimes irritating because you have to make a lot of effort in order to be able to use content from large content providers so there's many laws and regulations you have to understand and stay ahead of and also if i work in a company often you don't know what kind of metadata you produce um and sometimes you leave information you're not conscious of so for example if i call a friend from work um that means that they could get the information or for example if i have a time tracking software and i track how many conversations with customers i have had that day sometimes i take longer when solving a problem and then um i'll be getting in trouble because i've had less customers than i should have had maybe so this kind of meta information can be compromising and can get you in a bad spot so if you have an email address at a provider and then suddenly you have data loss and data gets publicized because we've had those data leaks maybe they didn't want to publish the data but um then information is available about me for example about who i called so it is very important to stay ahead and be conscious of what data and what made metadata you leave on your journey through the internet and it is also too important to protect other people because metadata is just it's not about just me but also about other people that's it sorry i just put myself on mute thank you yeah thank you then group two anyone who wants to present what we did in group two just go ahead and talk no i can do it all right thank you the idea we were talking about was why is it okay that sometimes i grant permission to my data and sometimes i'm adamant on leaving them keeping them private for example i don't want to use microsoft teams and we relatively quickly agreed on like the picture of a traffic light sometimes it makes sense to just have a red light for example if you're a teacher who's going on a field trip with their students of course they're going to stop at every red light even if there's no car in sight and the same person might behave very differently if there's no children around so normally you can estimate if a car will come or not but it's more difficult if you're 15 years old and going on facebook or twitter and sharing content which might be very embarrassing a few years later and if i'm a four-year-old and if i have a four-year-old with me of course i'll hold on tight to its hand because a four-year-old is not able to estimate the danger and of course if i see that there's a speed trap i'll stop at the red light and maybe and of course this makes a difference because you behave differently if you're on camera so what i understand from this explaining to a child why people behave differently at traffic lights why do teachers always stop at traffic lights or police officers and why do random people often ignore red traffic lights this is something you have to explain to children because it does make a difference and this you have to explain this to kids so thank you for taking over now i would like to continue with group three two things we didn't talk about this we will further develop this and you're free to join us on cyberforedu.org at nine in the evening and we will continue our discussions then we saw in the polls if you say um we can't have a real result because we were so few people in the group you can say this and it's okay then i would like to continue with group three open source hi we were four people in the group we had one presenter and three normal participants and we were talking about open source so we started with brainstorming which you probably all did and we thought about what does open source mean to us and we had many terms our words that were said that data sovereignty i don't want to name all the keywords but for example we talked about how effective is open source software and then we had one term which led us to another topic which was help in the household and we would like to join up the presentations paul do you know how we continue well we were talking about household help because you have many apps that have different purposes and we had the idea that if you have a whole help in the household or a mechanic you are very careful about giving out your key for example or leaving them alone in your apartment so how do you decide who you leave your house key to and why is it different in terms of our personal data in terms of the data we have on our smartphones so the idea would be that leaving your personal data open to app providers would be like leaving your house key to a household help yeah because they do use a lot of our personal data and our personal space um of course our mobile phones have become personal spaces okay we continued the image and we concluded that as paul said it's about trust and if you have a help in the household you have trust or if you know the mechanic that you're employing you have trust and in the end we had the image of a village where everyone knows everyone and we help each other out all the time and the open source community also tries to establish this kind of trust which you have within a community and in the end we had this little village analogy and this was almost before time was up so yeah that was the image we concluded with a village as I trusted community yeah that's it this sounds very interesting and good when I was doing youth work and people told me what do I care about nsa or stuff I asked them if you don't care about that would you give your parents access to what's to your whatsapp and of course they said oh no no I wouldn't never so why would you give the nsa access to that data all right thank you and thank you for your brilliant ideas which you brought into this talk metadata didn't take place but data security did so who would like to present and hi we were a relatively small group and at first we thought about the image of a safe but then we decided against it because it's a relatively well it's too easy for a relatively complex issue so we decided in favor of this picture which is the house and the idea was when the house is being built well it's being built you don't have um a say in um how it's built is imagine your parents are building the house and you as a child you don't have a say in how the house is built and later when you get older you have options like for example installing a curtain or blinds and the same goes for the internet looking at the internet is like looking out of your window and you can also decide in favor of putting down the blinds or pulling a curtain or having a semi transparent curtain maybe just to just another aspect was um security if you start building the house you have a naked foundation and the first thing you usually build as soon as you have the walls is doors and windows which doesn't really match with how we um do data security but um we couldn't add encryption into this image i'm just imagining two houses one conventional house with doors and windows and all of that and one unconventional house with no windows no curtains or just open wall where would you you would ask ask yourself why would you have that kind of house but you would open your door right you want to house without doors and windows no but i want my door to be able to be closed and secured yeah so the analogy would be would you like to have a house without windows or doors so do you want to continue using facebook for example or would you go the matrix way i think this would be worth additional discussion because it's a nice image thank you this would also fit with the image of the household help so this is all coming together which is great thank you let's continue with central decentral who would like to present there were no participants unfortunately because obviously the topic was chosen very complex and maybe we can talk about the aspect in the overall picture all right moving on to big data yeah we were a small group but i think we have a nice result so we talked about what is big data and what kind of image could you use and an image that is often used in the upload filter debate you have many pictures that are being used in those they are fascinating so as the next point of discussion we had this so what is a big big data pool this is private insurance like a company that um gorgeous um how um what what your credibility is like so um if you combine this with um data i think we were discussing on so this would lead to dystopia sorry i didn't quite understand what he was saying so we had other topics that were mentioned um we have large containers of data slash pools of data like facebook or google and then we have open source tools that um rely on the community in order to be built up so big data we have data that are not easy to be linked and then we have technological possibilities to combine images and we um agreed on the image of a tattoo because um you have a tattoo for a lifetime and the more you participate in online um forums or in online media the bigger the tattoo gets because um it creates a bigger image of who you are to the worldwide web and if this tattoo is combined with um health data for example or private data or problems you should really think about whether you want this kind of tattoo because if you say i've got nothing to hide and i'm not interesting what in what's going to happen in 20 years the tattoo is a fitting image because um many people are actually ashamed of tattoos they've gotten 20 years ago and you can't do a laser therapy for a big data tattoo so it's permanent branding i'm just imagining a body full of facebook and twitter icons and this is all linked to information like your social security number this is getting really interesting so you're kind of tattooing data about yourself on your body so maybe what is written on your body isn't even true so before you get your tattoo you should really think about what do you want tattooed because if i go when i go out now and decide on a tattoo i can actually decide on which image but with facebook actually i can't always decide so those would be those drunk tattoos i think not everyone who has a tattoo really chose their tattoo so you should really be aware of who brands you so let's get to the last topic algorithms did we have a group on algorithms yeah we do and we made a nice image but yeah here we have it now i think this will look quite confusing and i'll have to explain it i like it i get it as a tattoo so i think that could be worse tattoos but maybe i would have a design professionally well you can choose it so our thought was that algorithms are very abstract as a concept so most people don't understand what an algorithm is and what the random implications are for our everyday life so we thought about how to visualize what an algorithm does because a computer doesn't really see or understand us as a human person so we are essentially passed through a number of wheels which you see here a person comes in at the beginning and then it's taken apart by the wheels and separated into little chunks and then those chunks are built back together but whatever is parsed together from the pieces of information about us doesn't represent us doesn't represent what went in on the other side so we have a corrupted image of ourselves in the end so it should be important to us how we are represented by algorithms and how algorithms see us and if that is the way we want to be seen and to well this image is a bit brutal but this is also what we wanted to show because algorithms can be brutal they can rip our lives apart and press it into some kind of cookie cutter shape so algorithms learn but they don't learn like in a soft kind of way but they actually like sharpen their knives and sharpen their gears in order to crush and separate us more precisely wow this is a very complex image so it's definitely a secondary school I love it it's great thank you it's not an easy task to say thank you now you've seen me most of the time during this talk but this would be a false representation because many people have participated in and preparing this talk and the activities and I hope that I don't forget anyone so we've had many background helpers which I've just named who helped prepare this workshop so we are pretty good on time so Micha if you would like to add anything you can use the rest of the time to do that okay I would be happy if there's questions and also maybe we could have a final statement from the participants in the chat how did you like this activity and the talk what could we do differently next time we would be very interested in that this has been a big experiment from our side now we have the question if maybe more people would like to get on camera to make a little bit more real just as an idea questions and answers and then feedback hi we've got the first camera image so are there any questions comments just open the mic and speak we have a question from the chat how do we develop these ideas further you can visit our website and we will develop these ideas further it's cyber4edu.org so for those on the stream yeah just one thing if you don't know the whiteboard thing we have here it's it's a color feature because you can actually people can paint on the presentation on the slide this can be very interesting so before I pass the mic to the herald I would like to announce the last chance for questions so from my side I had a lot of fun today it was stress of course I think everyone had a little bit of stress in their own form and I think that anyone would agree that we should do that again there's these kind of the central big blue button formats are very interesting we've never had this kind of interactive workshop remotely maybe a fun fact would be we only had the idea of me giving the talk as a fellow like the day before yesterday because we didn't want an empty stream or the auger team then want an empty stream and ask us to fill it so this did add some stress but in the end I think we did something good and we all had fun now we're having a nice party participative image in the slide okay then thank you from our side and now we're going to pass the mic to the herald back to the studio what did I always say no questions comments from the audience okay too bad herald bring forth the herald I would like to activate my camera but I can be a replacement herald I've got a replacement herald here hi I'm the herald you have to find the button just a second yeah splendid I'm impressed I've never seen that many speakers and participants and everything this is really impressive and thank you for your participation this has been really interesting as an experiment and I think it's the most essential and chaotic event we've had this weekend so far I think it was very fascinating the kind of results we had and I hope that in your groups and in your workshop discussions you had a lot of fun and I love this kind of participative result so and I also liked your presentation even though it was just meant as a filler it was a very good way to do this and then just last words close your windows close your doors and be careful who you let into your house just one last question is there anything you can do to support kais at school so this is your advertisement space yes kais at school has got a website just google chaos macht schule and you will find links to the regional hubs all over Germany it's not just Berlin but we also have other groups just search for us on the web and you'll find us it's a little bit difficult at the moment because corona and schools are closed and all that but it's going to get better and we're also working on offering other formats so you're very welcome to participate and help us the same goes for cyber for edu which has a bit of a broader foundation you're very much welcome to participate and maybe we can also help you find other groups where you could give valuable input there's also groups that are more focused on hardware ones that are focused on software for example you have edulabs where you have a meetup next week as well and we're talking about oer for example and maybe we'll meet again at one of these places maybe you can participate and meet other people who are participating because who will do it if we don't do it imagine people are watching right now but um they don't know how they could participate so what would be a typical way to participate i would say there's no fashion in which you wouldn't be able to help oh make it specific well as a lawyer i do my part we've got teachers we've got people who write and proof read texts we've also got parents who participate with their view as parents students would also be welcome to participate so i don't think there's a way in which which would be completely useless to us anything is helpful we've got different working groups in different areas so and those are going to get bigger rather than smaller students is an interesting idea because this would be a very interesting angle of view to you because um as adults would tend to think that we know all the answers and know what we should teach students but um this view can be very different from the students point of view so chaos at school shouldn't just be from adults for students but also should include the feedback from students and just one little thing you were talking about online learning and that um personal visits at schools aren't possible at the moment so is there anything you need at the moment well in berlin we're actually facing the challenge of organizing schools um we're using video conference formats like big blue button so one challenge is support for users because we've noticed that technology isn't the only aspect that is important but it's also important to support um participants personally so support and materials visualizing diagrams anything you can hand to people would be helpful in order to make it more graspable and to use it really um at school because just setting the frame isn't the final solution and maybe um there could also be new or crazy ideas that would be helpful because this for example has been an experiment right now and it's it would be boring if we just continue the way we did always so we have a broad set of challenges that we're facing right now so your participation is always welcome whatever it looks like so you can see it as kind of a playground to test new ideas and aspects yeah absolutely because there's many schools and teachers who are willing to participate and it's always possible to find classes or teachers who would like to try out new things so we do have a playground of sorts our vision is to be able to say corona has been a catastrophe on the human scale but in terms of education we did learn and we did find new ways of offering education so what we have right now is not just a crisis but an opportunity to find new ways and possibilities what a nice conclusion so thank you to all participants thank you to our instructors and presenters you did a great job and remember close the windows take your belongings with you don't smoke in the glass classroom well