slides09.tex
changeset 86 ac94033f220a
parent 85 d817bb2f80e5
child 87 e0908dc30b7c
equal deleted inserted replaced
85:d817bb2f80e5 86:ac94033f220a
   420 \item \bl{$f(x)$} can be released, if \bl{$f$} is insensitive to
   420 \item \bl{$f(x)$} can be released, if \bl{$f$} is insensitive to
   421 individual entries  \bl{$x_1, \ldots, x_n$}\\
   421 individual entries  \bl{$x_1, \ldots, x_n$}\\
   422 \item Intuition: whatever is learned from the dataset would be learned regardless of whether
   422 \item Intuition: whatever is learned from the dataset would be learned regardless of whether
   423 \bl{$x_i$} participates\bigskip\pause 
   423 \bl{$x_i$} participates\bigskip\pause 
   424 
   424 
   425 \item Noised needed in order to prevent:\\ Christian's salary $=$ 
   425 \item Noised needed in order to prevent queries:\\ Christian's salary $=$ 
   426 \begin{center}
   426 \begin{center}
   427 \bl{\large$\Sigma$} all staff $-$  \bl{\large$\Sigma$} all staff $\backslash$ Christian
   427 \bl{\large$\Sigma$} all staff $-$  \bl{\large$\Sigma$} all staff $\backslash$ Christian
   428 \end{center} 
   428 \end{center} 
   429 \end{itemize}
   429 \end{itemize}
   430 
   430 
   464 
   464 
   465 
   465 
   466 
   466 
   467 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
   467 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
   468 \mode<presentation>{
   468 \mode<presentation>{
   469 \begin{frame}[c]
   469 \begin{frame}[t]
   470 \frametitle{\begin{tabular}{@{}c@{}}Tor, Anonymous Webbrowsing\end{tabular}}
   470 \frametitle{\begin{tabular}{@{}c@{}}Tor, Anonymous Webbrowsing\end{tabular}}
   471 
   471 
   472 \begin{itemize}
   472 \begin{itemize}
   473 \item initially developed by US Navy Labs, but then opened up to the world 
   473 \item initially developed by US Navy Labs, but then opened up to the world 
   474 \item network of proxy nodes
   474 \item network of proxy nodes
   475 \end{itemize}
   475 \item a Tor client establishes a ``random'' path to the destination server (you cannot trace back where the information came from)\bigskip\pause
   476 
   476 \end{itemize}
   477 \end{frame}}
   477 
   478 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% 
   478 \only<2>{
   479 
   479 \begin{itemize}
       
   480 \item malicious exit node attack: someone set up 5 Tor exit nodes and monitored the traffic:
       
   481 \begin{itemize}
       
   482 \item a number of logons and passwords used by embassies (Usbekistan `s1e7u0l7c', while
       
   483 Tunesia `Tunesia' and India `1234')
       
   484 \end{itemize}
       
   485 \end{itemize}}
       
   486 \only<3>{
       
   487 \begin{itemize}
       
   488 \item bad apple attack: if you have one insecure application, your IP can be tracked through Tor
       
   489 \begin{itemize}
       
   490 \item background: 40\% of traffic on Tor is generated by BitTorrent
       
   491 \end{itemize}
       
   492 \end{itemize}}
       
   493 
       
   494 
       
   495 \end{frame}}
       
   496 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% 
       
   497 
       
   498 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
       
   499 \mode<presentation>{
       
   500 \begin{frame}[t]
       
   501 \frametitle{\begin{tabular}{@{}c@{}}Take Home Point\end{tabular}}
       
   502 
       
   503 According to Ross Anderson: \bigskip
       
   504 \begin{itemize}
       
   505 \item Privacy in a big hospital is just about doable.\medskip
       
   506 \item How do you enforce privacy  in something as big as Google
       
   507 or complex as Facebook? No body knows.
       
   508 \end{itemize}
       
   509 
       
   510 
       
   511 \end{frame}}
       
   512 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% 
   480 
   513 
   481 
   514 
   482 
   515 
   483 \end{document}
   516 \end{document}
   484 
   517