Underexposed Header Image

When you use a smart gadget or give your data to the cloud, how do you know it's trustworthy? In an era where our home appliances have joined the Internet of Things and our every action is being analyzed by an artificial intelligence, what role does design play in making sure these devices behave ethically?

Join designers, hackers, makers, and thinkers in considering this and other issues at the intersection of design and trust. This year Underexposed features an evening salon, which is open to the public, in addition to a day-long invitational workshop.


Underexposed Salon: Trust & Design

About the Salon

November 8th 2017, 7-9pm, doors open at 6:30pm


Mozilla Offices on the Banks of the Spree
Schlesische Straße 27
Gebäude 3, 3. Obergeschoss
10997 Berlin Germany

Register here

Co-hosted by IF as part of their Trust & Design meetup series.


Salon panelists include

Sarah Gold: Trust and Design
Sarah is a designer interested in privacy, security and networks in the public domain. She founded IF in 2015 to work on ambitious projects involving accountability, machine learning and digital rights. A NESTA New Radical and Forbes 30 under 30 awardee, Sarah sits on the practitioner panel for the Research Institute in the Science of Cyber Security.

The salon is co-hosted by IF and is the latest instalment of their Trust & Design meet up series. Sarah will be talking about their work building tools to help teams make better decisions about consent.

Cennydd Bowles: The Shadows of Data
Cennydd is a London-based designer and writer focusing on the ethics of future technologies. He has worked with companies including Twitter, Samsung, and the BBC, and is a popular speaker at technology and design events worldwide. His second book 'Future Ethics' will be released in 2018. The Shadows of Data: The data-driven economy is here to stay. Datafication is in the ideological ascendancy, and the promises of an artificially intelligent world will require us to share our intimate secrets. Algorithmic decisions will increasingly be tied to our data shadows. In a landscape of black-box obfuscation, diminished user agency, and diluted moral responsibility, can designers be sure they are empowering rather than disenfranchising?

Tijmen Schep: Social Cooling – Communicating the Why of Privacy Design
Tijmen is a technology critic and privacy designer. As a critic he works on the question of how to increase audience demand for privacy enhancing technologies, which has become focused on the concept of "social cooling", the data version of global warming. As a privacy designer he explores cloudless alternatives to popular smart products. His book Design My Privacy is used by design schools across the Netherlands. He also helped found the critical "ubicomp design" course at the Amsterdam University of Applied Sciences, and through the SETUP medialab was a driving force behind several humorous design fictions that explore the darker side of the internet of things.


Invitation-Only Workshop

Space at the workshop is limited, and we are at capacity. If you are interested in attending but don't already have an invitation, please contact us. Learn more →


Partners, supporters, and friends

Ford Foundation

Mozilla Foundation

Projects By IF

Prototype Fund

Things Con

Least Authority

BED Meetup

Simply Secure is a not-for-profit organization and relies on support from the public to hold events like Underexposed. If you would like to support this event and our other work, please consider making a donation via PayPal or by contacting us at donations@simplysecure.org.



Code of Conduct

We are committed to providing a harassment-free event experience for everyone.

Harassment includes but is not limited to offensive verbal comments related to gender, gender identity and expression, age, sexual orientation, disability, physical appearance, body size, race, ethnicity, religion, technology choices, sexual images in public spaces, deliberate intimidation, stalking, following, harassing photography or recording, sustained disruption of talks or other events, inappropriate physical contact, and unwelcome sexual attention.

Participants asked to stop any harassing behavior are expected to comply immediately. If a participant engages in harassing behavior, the workshop organizers may take any action they deem appropriate, including warning or expelling the offender.

If you are being harassed, notice that someone else is being harassed, or have any other concerns, please contact Scout or Ame, who will introduce themselves at the start of the workshop. We will work with you to take appropriate action, up to and including contacting venue security or local law enforcement if necessary. We value your attendance and want you to feel safe.

We expect participants to follow these rules at the workshop and associated events.


Contact

Questions? Concerns? Contact us at underexposed@simplysecure.org.

Rope bridge image CC-licensed by John5199