• Skip to main content
  • Skip to secondary menu
  • Skip to primary sidebar
  • Skip to footer
Montreal AI Ethics Institute

Montreal AI Ethics Institute

Democratizing AI ethics literacy

  • Articles
    • Public Policy
    • Privacy & Security
    • Human Rights
      • Ethics
      • JEDI (Justice, Equity, Diversity, Inclusion
    • Climate
    • Design
      • Emerging Technology
    • Application & Adoption
      • Health
      • Education
      • Government
        • Military
        • Public Works
      • Labour
    • Arts & Culture
      • Film & TV
      • Music
      • Pop Culture
      • Digital Art
  • Columns
    • AI Policy Corner
    • Recess
    • Tech Futures
  • The AI Ethics Brief
  • AI Literacy
    • Research Summaries
    • AI Ethics Living Dictionary
    • Learning Community
  • The State of AI Ethics Report
    • Volume 7 (November 2025)
    • Volume 6 (February 2022)
    • Volume 5 (July 2021)
    • Volume 4 (April 2021)
    • Volume 3 (Jan 2021)
    • Volume 2 (Oct 2020)
    • Volume 1 (June 2020)
  • About
    • Our Contributions Policy
    • Our Open Access Policy
    • Contact
    • Donate

The Social Metaverse: Battle for Privacy

May 18, 2022

🔬 Research summary by Connor Wright, our Partnerships Manager.

[Original paper by Ben Falchuk, Shoshana Loeb, and Ralph Neff]


Overview: Our lives now extend to both the physical and digital worlds. While we have given up some of our privacy for security reasons before, the metaverse asks for an even greater sacrifice.


Introduction

The metaverse offers an exciting challenge for the privacy space. The metaverse itself consists of a monitored virtual reality (VR) space populated by interactions between avatars (virtual characters). Here, we may be aware that observation is going on, but we are not always aware of what is being monitored and to what degree. While we give up some of our privacy for security measures, the development of VR applications means our movements can be known in greater detail than before. Hence, how does this affect our privacy?

Key Insights

To begin with, privacy can come in three different modes:

  • Privacy of personal information (such as medical history).
  • Privacy of behaviour (such as purchasing choices).
  • Privacy of communications (anything related to sending/receiving messages, calls etc.)

Given the extensive monitoring within the metaverse, all three of these modes can be intruded upon. Hence, how does the physics of the metaverse permit such intrusion?

The metaverse

The metaverse engine provides the compute that dictates the physics and appearance of the space. Consequently, actions are restricted to what the engine can offer, while all that is afforded by the engine is subject to analysis. This includes the three different modes of privacy.

In terms of actors, avatars can affect the world through creating and destroying objects, but they must always play by the rules of the metaverse. In doing so, data analytics will provide the metaverse developers with valuable information as to how their application is used and insights into the users themselves. Yet, not all data analysis is restricted to purely the developers. Instead, in-game harassment through observation is a real threat.

Harassment in the metaverse

Interaction within the digital space boasts the tricky element of how everything can be recorded. Hence, constant interaction within the metaverse raises the provider’s chance to know your preferences and tendencies, allowing them to better craft nudges that draw you to producing a particular outcome. Not only that, but different avatars could also arrive at such knowledge, allowing them to impersonate other agents. Consequently, practical solutions to this possibility are required.

Mechanisms to mitigate threats

The authors list potential mechanisms to help avoid threats within the metaverse. They elaborate on a “privacy plan” (p. 55) as a package of separate actions that avatars can undertake to mitigate any privacy harms they may encounter. This centres on creating confusion amongst other agents, mystifying the personal details that could be discovered about a particular avatar. These actions are as follows:

  • A “cloud of clones” (p. 55) – deploying multiple clones of your avatar with similar habits to confuse other surrounding agents. This could include assigning movement to confound any observers further.
  • Private Copy – establishing a personal space/copy of a part of the virtual world free from observation. This can later be deleted or added to the main fabric of the metaverse.
  • Mannequin – a singular avatar copy is manifested while the actual avatar is transported elsewhere.
  • Lockout – a part of the VR world is blocked off to other users for private use.
  • Disguise – the avatar can operate in the main fabric of the metaverse, but with a different external outlook.
  • Teleport – the user can opt to be teleported to a completely different location.
  • Invisibility – the avatar can operate without being seen/monitored by others.

All of these plans are not mutually exclusive; they can be combined. For example, a user could opt for deploying a mannequin while also wanting to be teleported to another location.

However, while these methods prove an interesting and valuable approach to mitigating privacy threats, there are ways around them. For example, should other avatars have a method of locking on to a particular avatar, they will still be able to track them. Hence, what actions the metaverse permits (such as being able to latch onto a specific agent) will prove crucial in the success of these mechanisms.

Between the lines

The metaverse will bring unique opportunities and disadvantages. The ways to protect privacy will prove innovative, but these are dependent on the metaverse itself. Furthermore, I believe it will also be difficult to stop the privacy-preserving mechanisms turning into opportunities for underground operations. The opportunity to rid yourself of any monitoring and conduct your business without anyone possibly knowing, I believe, would prove too lucrative to turn down for malicious actors. Hence, we enter into another privacy balancing act between intimacy and security. While the two spheres differ in terms of physics, they still bear this dilemma in common.

Want quick summaries of the latest research & reporting in AI ethics delivered to your inbox? Subscribe to the AI Ethics Brief. We publish bi-weekly.

Primary Sidebar

🔍 SEARCH

Spotlight

A network diagram with lots of little emojis, organised in clusters.

Tech Futures: AI For and Against Knowledge

A brightly coloured illustration which can be viewed in any direction. It has many elements to it working together: men in suits around a table, someone in a data centre, big hands controlling the scenes and holding a phone, people in a production line. Motifs such as network diagrams and melting emojis are placed throughout the busy vignettes.

Tech Futures: The Fossil Fuels Playbook for Big Tech: Part II

A rock embedded with intricate circuit board patterns, held delicately by pale hands drawn in a ghostly style. The contrast between the rough, metallic mineral and the sleek, artificial circuit board illustrates the relationship between raw natural resources and modern technological development. The hands evoke human involvement in the extraction and manufacturing processes.

Tech Futures: The Fossil Fuels Playbook for Big Tech: Part I

Close-up of a cat sleeping on a computer keyboard

Tech Futures: The threat of AI-generated code to the world’s digital infrastructure

The undying sun hangs in the sky, as people gather around signal towers, working through their digital devices.

Dreams and Realities in Modi’s AI Impact Summit

related posts

  • Characterizing, Detecting, and Predicting Online Ban Evasion

    Characterizing, Detecting, and Predicting Online Ban Evasion

  • When AI Ethics Goes Astray: A Case Study of Autonomous Vehicles

    When AI Ethics Goes Astray: A Case Study of Autonomous Vehicles

  • “A Proposal for Identifying and Managing Bias in Artificial Intelligence”. A draft from the NIST

    “A Proposal for Identifying and Managing Bias in Artificial Intelligence”. A draft from the NIST

  • Research summary: Warning Signs: The Future of Privacy and Security in the Age of Machine Learning

    Research summary: Warning Signs: The Future of Privacy and Security in the Age of Machine Learning

  • ChatGPT and the media in the Global South: How non-representative corpus in sub-Sahara Africa are en...

    ChatGPT and the media in the Global South: How non-representative corpus in sub-Sahara Africa are en...

  • Investing in AI for Social Good: An Analysis of European National Strategies

    Investing in AI for Social Good: An Analysis of European National Strategies

  • Adding Structure to AI Harm

    Adding Structure to AI Harm

  • Equal Improvability: A New Fairness Notion Considering the Long-term Impact

    Equal Improvability: A New Fairness Notion Considering the Long-term Impact

  • Participation and Division of Labor in User-Driven Algorithm Audits: How Do Everyday Users Work toge...

    Participation and Division of Labor in User-Driven Algorithm Audits: How Do Everyday Users Work toge...

  • Anthropomorphized AI as Capitalist Agents: The Price We Pay for Familiarity

    Anthropomorphized AI as Capitalist Agents: The Price We Pay for Familiarity

Partners

  •  
    U.S. Artificial Intelligence Safety Institute Consortium (AISIC) at NIST

  • Partnership on AI

  • The LF AI & Data Foundation

  • The AI Alliance

Footer


Articles

Columns

AI Literacy

The State of AI Ethics Report


 

About Us


Founded in 2018, the Montreal AI Ethics Institute (MAIEI) is an international non-profit organization equipping citizens concerned about artificial intelligence and its impact on society to take action.

Contact

Donate


  • © 2025 MONTREAL AI ETHICS INSTITUTE.
  • This work is licensed under a Creative Commons Attribution 4.0 International License.
  • Learn more about our open access policy here.
  • Creative Commons License

    Save hours of work and stay on top of Responsible AI research and reporting with our bi-weekly email newsletter.