420 \item \bl{$f(x)$} can be released, if \bl{$f$} is insensitive to |
420 \item \bl{$f(x)$} can be released, if \bl{$f$} is insensitive to |
421 individual entries \bl{$x_1, \ldots, x_n$}\\ |
421 individual entries \bl{$x_1, \ldots, x_n$}\\ |
422 \item Intuition: whatever is learned from the dataset would be learned regardless of whether |
422 \item Intuition: whatever is learned from the dataset would be learned regardless of whether |
423 \bl{$x_i$} participates\bigskip\pause |
423 \bl{$x_i$} participates\bigskip\pause |
424 |
424 |
425 \item Noised needed in order to prevent:\\ Christian's salary $=$ |
425 \item Noised needed in order to prevent queries:\\ Christian's salary $=$ |
426 \begin{center} |
426 \begin{center} |
427 \bl{\large$\Sigma$} all staff $-$ \bl{\large$\Sigma$} all staff $\backslash$ Christian |
427 \bl{\large$\Sigma$} all staff $-$ \bl{\large$\Sigma$} all staff $\backslash$ Christian |
428 \end{center} |
428 \end{center} |
429 \end{itemize} |
429 \end{itemize} |
430 |
430 |
464 |
464 |
465 |
465 |
466 |
466 |
467 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% |
467 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% |
468 \mode<presentation>{ |
468 \mode<presentation>{ |
469 \begin{frame}[c] |
469 \begin{frame}[t] |
470 \frametitle{\begin{tabular}{@{}c@{}}Tor, Anonymous Webbrowsing\end{tabular}} |
470 \frametitle{\begin{tabular}{@{}c@{}}Tor, Anonymous Webbrowsing\end{tabular}} |
471 |
471 |
472 \begin{itemize} |
472 \begin{itemize} |
473 \item initially developed by US Navy Labs, but then opened up to the world |
473 \item initially developed by US Navy Labs, but then opened up to the world |
474 \item network of proxy nodes |
474 \item network of proxy nodes |
475 \end{itemize} |
475 \item a Tor client establishes a ``random'' path to the destination server (you cannot trace back where the information came from)\bigskip\pause |
476 |
476 \end{itemize} |
477 \end{frame}} |
477 |
478 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% |
478 \only<2>{ |
479 |
479 \begin{itemize} |
|
480 \item malicious exit node attack: someone set up 5 Tor exit nodes and monitored the traffic: |
|
481 \begin{itemize} |
|
482 \item a number of logons and passwords used by embassies (Usbekistan `s1e7u0l7c', while |
|
483 Tunesia `Tunesia' and India `1234') |
|
484 \end{itemize} |
|
485 \end{itemize}} |
|
486 \only<3>{ |
|
487 \begin{itemize} |
|
488 \item bad apple attack: if you have one insecure application, your IP can be tracked through Tor |
|
489 \begin{itemize} |
|
490 \item background: 40\% of traffic on Tor is generated by BitTorrent |
|
491 \end{itemize} |
|
492 \end{itemize}} |
|
493 |
|
494 |
|
495 \end{frame}} |
|
496 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% |
|
497 |
|
498 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% |
|
499 \mode<presentation>{ |
|
500 \begin{frame}[t] |
|
501 \frametitle{\begin{tabular}{@{}c@{}}Take Home Point\end{tabular}} |
|
502 |
|
503 According to Ross Anderson: \bigskip |
|
504 \begin{itemize} |
|
505 \item Privacy in a big hospital is just about doable.\medskip |
|
506 \item How do you enforce privacy in something as big as Google |
|
507 or complex as Facebook? No body knows. |
|
508 \end{itemize} |
|
509 |
|
510 |
|
511 \end{frame}} |
|
512 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% |
480 |
513 |
481 |
514 |
482 |
515 |
483 \end{document} |
516 \end{document} |
484 |
517 |