27 \end{center} |
26 \end{center} |
28 |
27 |
29 \end{frame} |
28 \end{frame} |
30 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% |
29 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% |
31 |
30 |
32 |
|
33 |
|
34 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% |
|
35 \mode<presentation>{ |
|
36 \begin{frame}[c] |
|
37 \frametitle{Man-in-the-Middle} |
|
38 |
|
39 \begin{itemize} |
|
40 \item Border Gateway Protocol (BGP) --- routers believe their neighbours |
|
41 \item it is possible to advertise bad routes |
|
42 \item can be done over continents\bigskip |
|
43 \end{itemize} |
|
44 |
|
45 \hfill\footnotesize\url{http://www.renesys.com/2013/11/mitm-internet-hijacking/} |
|
46 \end{frame}} |
|
47 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% |
|
48 |
|
49 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% |
31 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% |
50 \begin{frame}[t] |
32 \begin{frame}[t] |
51 \frametitle{Facebook Privacy} |
33 \frametitle{Facebook Privacy} |
52 |
34 |
53 \begin{itemize} |
35 \begin{itemize} |
54 \item \large Who has a Facebook account?\pause\medskip |
36 \item \large Who has a Facebook account?\pause\medskip |
55 |
37 |
56 \item \large Who keeps the list of friends private?\pause\medskip |
38 \item \large Who keeps the list of friends private?\pause\medskip |
57 |
39 |
58 \item \large Who knows that this is completely pointless? |
40 \item \large Who knows that this is completely pointless? |
59 {\small (at least at the end of 2013)}\pause\medskip |
41 \textcolor{gray}{\small (at least at the end of 2013)}\pause\medskip |
60 \end{itemize} |
42 \end{itemize} |
61 |
43 |
62 \only<4>{ Create a fake account. Send a friend request. |
44 \only<4>{Create a fake account. Send a friend-request. |
63 Facebook answers with ``People you may know'' feature. |
45 Facebook answers with ``People you may know'' feature. |
64 Conveniently it has also a ``see all'' button. } |
46 Conveniently, it has also a ``see all'' button.} |
65 |
47 |
66 \only<5>{\small\it ``Our policies explain that changing the |
48 \only<5>{\small\it ``Our policies explain that changing the |
67 visibility of people on your friend list controls how they |
49 visibility of people on your friend list controls how they |
68 appear on your Timeline, and that your friends may be visible |
50 appear on your Timeline, and that your friends may be visible |
69 on other parts of the site, such as in News Feed, Search and |
51 on other parts of the site, such as in News Feed, Search and |
72 |
54 |
73 \end{frame} |
55 \end{frame} |
74 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% |
56 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% |
75 |
57 |
76 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% |
58 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% |
77 \mode<presentation>{ |
59 \begin{frame} |
|
60 \frametitle{UCAS} |
|
61 \mbox{}\\[-15mm]\mbox{} |
|
62 \small |
|
63 \begin{quote} |
|
64 The Universities and Colleges Admissions Service received more |
|
65 than \pounds{12m} last year in return for sending targeted advertising |
|
66 to subscribers as young as 16. |
|
67 |
|
68 The service, which controls admissions to UK universities and |
|
69 attracts 700,000 new applicants each year, sells the access |
|
70 via its commercial arm, Ucas Media. |
|
71 |
|
72 Vodafone, O2, Microsoft and the private university |
|
73 accommodation provider Pure Student Living are among those who |
|
74 have marketed through Ucas, which offers access to over a |
|
75 million student email addresses\ldots |
|
76 |
|
77 Applicants can opt out of receiving direct marketing, but only |
|
78 at the cost of missing out on education and careers mailings |
|
79 as well.\bigskip\\ |
|
80 \footnotesize\hfill The Guardian, 12 March 2014 |
|
81 \end{quote} |
|
82 |
|
83 |
|
84 \end{frame} |
|
85 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% |
|
86 |
|
87 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% |
|
88 \begin{frame} |
|
89 \frametitle{Verizon} |
|
90 \mbox{}\\[-23mm]\mbox{} |
|
91 |
|
92 \begin{center} |
|
93 \includegraphics[scale=0.21]{../pics/verizon.png} |
|
94 \end{center} |
|
95 \vfill\footnotesize |
|
96 \url{http://webpolicy.org/2014/10/24/how-verizons-advertising-header-works} |
|
97 \end{frame} |
|
98 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% |
|
99 |
|
100 |
|
101 |
|
102 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% |
78 \begin{frame}[c] |
103 \begin{frame}[c] |
79 \frametitle{Privacy, Anonymity et al} |
104 \frametitle{Privacy, Anonymity et al} |
80 |
105 |
81 Some terminology: |
106 Some terminology: |
82 |
107 |
92 \item \alert{privacy} is the ability or right to protect your personal secrets |
117 \item \alert{privacy} is the ability or right to protect your personal secrets |
93 (secrecy for the benefit of an individual) |
118 (secrecy for the benefit of an individual) |
94 |
119 |
95 \end{itemize} |
120 \end{itemize} |
96 |
121 |
97 \end{frame}} |
122 \end{frame} |
98 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% |
123 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% |
99 |
124 |
100 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% |
125 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% |
101 \mode<presentation>{ |
|
102 \begin{frame}[t] |
126 \begin{frame}[t] |
103 \frametitle{Privacy vs Anonymity} |
127 \frametitle{Privacy vs Anonymity} |
104 |
128 |
105 \begin{itemize} |
129 \begin{itemize} |
106 \item everybody agrees that anonymity has its uses (e.g., voting, whistleblowers, peer-review, exams) |
130 \item everybody agrees that anonymity has its uses (e.g., voting, whistleblowers, peer-review, exams) |
111 |
135 |
112 ``You have zero privacy anyway. Get over it.''\\ |
136 ``You have zero privacy anyway. Get over it.''\\ |
113 \hfill{}Scott Mcnealy (CEO of Sun)\bigskip\\ |
137 \hfill{}Scott Mcnealy (CEO of Sun)\bigskip\\ |
114 |
138 |
115 |
139 |
116 If you have nothing to hide, you have nothing to fear. |
140 ``If you have nothing to hide, you have nothing to fear.'' |
117 |
141 |
118 \end{frame}} |
142 \end{frame} |
119 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% |
143 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% |
120 |
144 |
121 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% |
145 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% |
122 \mode<presentation>{ |
|
123 \begin{frame}[t] |
146 \begin{frame}[t] |
124 \frametitle{Privacy} |
147 \frametitle{Privacy} |
125 |
148 |
126 private data can be often used against me |
149 Private data can be often used against me |
127 |
150 |
128 \begin{itemize} |
151 \begin{itemize} |
129 \item if my location data becomes public, thieves will switch off their phones and help themselves in my home |
152 \item if my location data becomes public, thieves will switch off their phones and help themselves in my home |
130 \item if supermarkets can build a profile of what I buy, they can use it to their advantage (banks - mortgages) |
153 \item if supermarkets can build a profile of what I buy, they can use it to their advantage (banks - mortgages) |
131 \item my employer might not like my opinions\bigskip\pause |
154 \item my employer might not like my opinions\bigskip\pause |
132 |
155 |
133 \item one the other hand, Freedom-of-Information Act |
156 \item one the other hand, Freedom-of-Information Act |
134 \item medical data should be private, but medical research needs data |
157 \item medical data should be private, but medical research needs data |
135 \end{itemize} |
158 \end{itemize} |
136 |
159 |
137 \end{frame}} |
160 \end{frame} |
138 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% |
161 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% |
139 |
162 |
140 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% |
163 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% |
141 \mode<presentation>{ |
|
142 \begin{frame}[t] |
164 \begin{frame}[t] |
143 \frametitle{Privacy Problems} |
165 \frametitle{Privacy Problems} |
144 |
166 |
145 \begin{itemize} |
167 \begin{itemize} |
146 \item Apple takes note of every dictation (send over the Internet to Apple) |
168 \item Apple takes note of every Siri dictation (sent over the |
|
169 Internet to Apple; retained for 2 years) |
147 \item markets often only work, if data is restricted (to build trust) |
170 \item markets often only work, if data is restricted (to build trust) |
148 \item Social network can reveal data about you |
171 \item social networks can reveal data about you |
149 \item have you tried the collusion (lightbeam?) extension for FireFox? |
172 \item have you tried the collusion (lightbeam?) extension for FireFox? |
150 \item I do use Dropbox, store cards |
173 \item I do use Dropbox, store cards |
151 \end{itemize} |
174 \end{itemize} |
152 |
175 |
153 \begin{textblock}{5}(12,9.9) |
176 \begin{textblock}{5}(12,9.9) |
154 \includegraphics[scale=0.2]{../pics/gattaca.jpg}\\ |
177 \includegraphics[scale=0.2]{../pics/gattaca.jpg}\\ |
155 \small Gattaca (1997) |
178 \small Gattaca (1997) |
156 \end{textblock} |
179 \end{textblock} |
157 |
180 |
158 \end{frame}} |
181 \end{frame} |
159 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% |
182 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% |
160 |
183 |
161 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% |
184 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% |
162 \mode<presentation>{ |
|
163 \begin{frame}[t] |
185 \begin{frame}[t] |
164 \frametitle{Privacy} |
186 \frametitle{Privacy} |
165 |
187 |
166 \begin{minipage}{1.05\textwidth} |
188 \begin{minipage}{1.05\textwidth} |
167 \begin{itemize} |
189 \begin{itemize} |
172 (identity theft) |
194 (identity theft) |
173 \end{itemize}\pause |
195 \end{itemize}\pause |
174 |
196 |
175 {\bf ``The reality'':} |
197 {\bf ``The reality'':} |
176 \only<2>{\begin{itemize} |
198 \only<2>{\begin{itemize} |
177 \item London Health Programmes lost in June two years unencrypted details of more than 8 million people |
199 \item London Health Programmes lost in 2011 unencrypted |
178 (no names, but postcodes and details such as gender, age and ethnic origin) |
200 details of more than 8 million people (no names, but |
|
201 postcodes and details such as gender, age and ethnic |
|
202 origin) |
179 \end{itemize}} |
203 \end{itemize}} |
|
204 |
180 \only<3>{\begin{itemize} |
205 \only<3>{\begin{itemize} |
181 \item also in June two years ago, Sony got hacked: over 1M users' personal information, including passwords, email addresses, home addresses, dates of birth, and all Sony opt-in data associated with their accounts. |
206 \item also in 2011, Sony got hacked: over 1M users' personal |
|
207 information, including passwords, email addresses, home |
|
208 addresses, dates of birth, and all Sony opt-in data |
|
209 associated with their accounts. |
|
210 \end{itemize}} |
|
211 |
|
212 \only<4>{\begin{itemize} |
|
213 \item in 2007, Gordon Brown needed to apologise for the loss |
|
214 of tax data of 25M people |
182 \end{itemize}} |
215 \end{itemize}} |
183 \end{minipage} |
216 \end{minipage} |
184 |
217 |
185 \end{frame}} |
218 \end{frame} |
186 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% |
219 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% |
187 |
220 |
188 |
221 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% |
189 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% |
|
190 \mode<presentation>{ |
|
191 \begin{frame}[c] |
222 \begin{frame}[c] |
192 \frametitle{Privacy and Big Data} |
223 \frametitle{Privacy and Big Data} |
193 \mbox{}\\[-16mm]\mbox{} |
224 \mbox{}\\[-16mm]\mbox{} |
194 |
225 |
195 Selected sources of ``Big Data'':\smallskip{} |
226 Selected sources of ``Big Data'':\smallskip{} |
552 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% |
583 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% |
553 |
584 |
554 |
585 |
555 |
586 |
556 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% |
587 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% |
557 \mode<presentation>{ |
588 \begin{frame}[c] |
558 \begin{frame}[c] |
589 \frametitle{Take Home Point} |
559 \frametitle{\begin{tabular}{@{}c@{}}Take Home Point\end{tabular}} |
|
560 |
590 |
561 According to Ross Anderson: \bigskip |
591 According to Ross Anderson: \bigskip |
562 \begin{itemize} |
592 \begin{itemize} |
563 \item Creating large databases of sensitive personal information is intrinsically |
593 \item Creating large databases of sensitive personal information is intrinsically |
564 hazardous (NHS)\bigskip |
594 hazardous (NHS)\bigskip |
565 |
595 |
566 |
596 |
567 \item Privacy in a big hospital is just about doable.\medskip |
597 \item Privacy in a big hospital is just about doable.\medskip |
568 \item How do you enforce privacy in something as big as Google |
598 \item How do you enforce privacy in something as big as Google |
569 or complex as Facebook? No body knows.\bigskip |
599 or complex as Facebook? Nobody knows.\bigskip |
570 |
600 |
571 Similarly, big databases imposed by government |
601 Similarly, big databases imposed by government. |
572 \end{itemize} |
602 \end{itemize} |
573 |
603 |
574 |
604 \end{frame} |
575 \end{frame}} |
|
576 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% |
605 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% |
577 |
606 |
578 |
607 |
579 \end{document} |
608 \end{document} |
580 |
609 |