slides/slides09.tex
changeset 90 d1d07f05325a
parent 87 e0908dc30b7c
child 145 279fa5a06231
equal deleted inserted replaced
89:be35ff24cccc 90:d1d07f05325a
       
     1 \documentclass[dvipsnames,14pt,t]{beamer}
       
     2 \usepackage{proof}
       
     3 \usepackage{beamerthemeplainculight}
       
     4 \usepackage[T1]{fontenc}
       
     5 \usepackage[latin1]{inputenc}
       
     6 \usepackage{mathpartir}
       
     7 \usepackage{isabelle}
       
     8 \usepackage{isabellesym}
       
     9 \usepackage[absolute,overlay]{textpos}
       
    10 \usepackage{ifthen}
       
    11 \usepackage{tikz}
       
    12 \usepackage{courier}
       
    13 \usepackage{listings}
       
    14 \usetikzlibrary{arrows}
       
    15 \usetikzlibrary{positioning}
       
    16 \usetikzlibrary{calc}
       
    17 \usepackage{graphicx} 
       
    18 \usetikzlibrary{shapes}
       
    19 \usetikzlibrary{shadows}
       
    20 \usetikzlibrary{plotmarks}
       
    21 
       
    22 
       
    23 \isabellestyle{rm}
       
    24 \renewcommand{\isastyle}{\rm}%
       
    25 \renewcommand{\isastyleminor}{\rm}%
       
    26 \renewcommand{\isastylescript}{\footnotesize\rm\slshape}%
       
    27 \renewcommand{\isatagproof}{}
       
    28 \renewcommand{\endisatagproof}{}
       
    29 \renewcommand{\isamarkupcmt}[1]{#1}
       
    30 
       
    31 % Isabelle characters
       
    32 \renewcommand{\isacharunderscore}{\_}
       
    33 \renewcommand{\isacharbar}{\isamath{\mid}}
       
    34 \renewcommand{\isasymiota}{}
       
    35 \renewcommand{\isacharbraceleft}{\{}
       
    36 \renewcommand{\isacharbraceright}{\}}
       
    37 \renewcommand{\isacharless}{$\langle$}
       
    38 \renewcommand{\isachargreater}{$\rangle$}
       
    39 \renewcommand{\isasymsharp}{\isamath{\#}}
       
    40 \renewcommand{\isasymdots}{\isamath{...}}
       
    41 \renewcommand{\isasymbullet}{\act}
       
    42 
       
    43 
       
    44 
       
    45 \definecolor{javared}{rgb}{0.6,0,0} % for strings
       
    46 \definecolor{javagreen}{rgb}{0.25,0.5,0.35} % comments
       
    47 \definecolor{javapurple}{rgb}{0.5,0,0.35} % keywords
       
    48 \definecolor{javadocblue}{rgb}{0.25,0.35,0.75} % javadoc
       
    49 
       
    50 \lstset{language=Java,
       
    51 	basicstyle=\ttfamily,
       
    52 	keywordstyle=\color{javapurple}\bfseries,
       
    53 	stringstyle=\color{javagreen},
       
    54 	commentstyle=\color{javagreen},
       
    55 	morecomment=[s][\color{javadocblue}]{/**}{*/},
       
    56 	numbers=left,
       
    57 	numberstyle=\tiny\color{black},
       
    58 	stepnumber=1,
       
    59 	numbersep=10pt,
       
    60 	tabsize=2,
       
    61 	showspaces=false,
       
    62 	showstringspaces=false}
       
    63 
       
    64 \lstdefinelanguage{scala}{
       
    65   morekeywords={abstract,case,catch,class,def,%
       
    66     do,else,extends,false,final,finally,%
       
    67     for,if,implicit,import,match,mixin,%
       
    68     new,null,object,override,package,%
       
    69     private,protected,requires,return,sealed,%
       
    70     super,this,throw,trait,true,try,%
       
    71     type,val,var,while,with,yield},
       
    72   otherkeywords={=>,<-,<\%,<:,>:,\#,@},
       
    73   sensitive=true,
       
    74   morecomment=[l]{//},
       
    75   morecomment=[n]{/*}{*/},
       
    76   morestring=[b]",
       
    77   morestring=[b]',
       
    78   morestring=[b]"""
       
    79 }
       
    80 
       
    81 \lstset{language=Scala,
       
    82 	basicstyle=\ttfamily,
       
    83 	keywordstyle=\color{javapurple}\bfseries,
       
    84 	stringstyle=\color{javagreen},
       
    85 	commentstyle=\color{javagreen},
       
    86 	morecomment=[s][\color{javadocblue}]{/**}{*/},
       
    87 	numbers=left,
       
    88 	numberstyle=\tiny\color{black},
       
    89 	stepnumber=1,
       
    90 	numbersep=10pt,
       
    91 	tabsize=2,
       
    92 	showspaces=false,
       
    93 	showstringspaces=false}
       
    94 
       
    95 % beamer stuff 
       
    96 \renewcommand{\slidecaption}{APP 09, King's College London, 27 November 2012}
       
    97 \newcommand{\dn}{\stackrel{\mbox{\scriptsize def}}{=}}% for definitions
       
    98 \newcommand{\bl}[1]{\textcolor{blue}{#1}}
       
    99 
       
   100 \begin{document}
       
   101 
       
   102 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
       
   103 \mode<presentation>{
       
   104 \begin{frame}<1>[t]
       
   105 \frametitle{%
       
   106   \begin{tabular}{@ {}c@ {}}
       
   107   \\
       
   108   \LARGE Access Control and \\[-3mm] 
       
   109   \LARGE Privacy Policies (9)\\[-6mm] 
       
   110   \end{tabular}}\bigskip\bigskip\bigskip
       
   111 
       
   112   %\begin{center}
       
   113   %\includegraphics[scale=1.3]{pics/barrier.jpg}
       
   114   %\end{center}
       
   115 
       
   116 \normalsize
       
   117   \begin{center}
       
   118   \begin{tabular}{ll}
       
   119   Email:  & christian.urban at kcl.ac.uk\\
       
   120   Of$\!$fice: & S1.27 (1st floor Strand Building)\\
       
   121   Slides: & KEATS (also homework is there)\\
       
   122   \end{tabular}
       
   123   \end{center}
       
   124 
       
   125 \end{frame}}
       
   126  %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%     
       
   127 
       
   128 
       
   129 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
       
   130 \mode<presentation>{
       
   131 \begin{frame}[c]
       
   132 \frametitle{Last Week}
       
   133 
       
   134 Recall, the Schroeder-Needham (1978) protocol is vulnerable to replay attacks.
       
   135 
       
   136 \begin{center}
       
   137 \begin{tabular}{@{}r@ {\hspace{1mm}}l@{}}
       
   138 \bl{$A \rightarrow S :$} & \bl{$A, B, N_A$}\\
       
   139 \bl{$S \rightarrow A :$} & \bl{$\{N_A, B, K_{AB},\{K_{AB}, A\}_{K_{BS}} \}_{K_{AS}}$}\\
       
   140 \bl{$A \rightarrow B :$} & \bl{$\{K_{AB}, A\}_{K_{BS}} $}\\
       
   141 \bl{$B \rightarrow A :$} & \bl{$\{N_B\}_{K_{AB}}$}\\
       
   142 \bl{$A \rightarrow B :$} & \bl{$\{N_B-1\}_{K_{AB}}$}\\
       
   143 \end{tabular}
       
   144 \end{center}\pause
       
   145 
       
   146 Fix: Replace messages 2 and 3 to include a timestamp:\bigskip
       
   147 
       
   148 \begin{minipage}{1.1\textwidth}
       
   149 \begin{center}
       
   150 \begin{tabular}{@{\hspace{-2mm}}r@ {\hspace{1mm}}l@{}}
       
   151 \bl{$S \rightarrow A :$} & \bl{$\{B, K_{\!AB}, T_S, \!\{K_{\!AB}, A, T_S\}_{K_{BS}} \}_{K_{AS}}$}\\
       
   152 \bl{$A \rightarrow B :$} & \bl{$\{K_{AB}, A, T_S\}_{K_{BS}} $}\\
       
   153 \end{tabular}
       
   154 \end{center}
       
   155 \end{minipage}
       
   156 
       
   157 \end{frame}}
       
   158 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%   
       
   159 
       
   160 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
       
   161 \mode<presentation>{
       
   162 \begin{frame}[t]
       
   163 \frametitle{Denning-Sacco Fix}
       
   164 
       
   165 Denning-Sacco (1981) suggested to add the timestamp, but omit the handshake:\bigskip
       
   166 
       
   167 \begin{minipage}{1.1\textwidth}
       
   168 \begin{center}
       
   169 \begin{tabular}{@{\hspace{-2mm}}r@ {\hspace{1mm}}l@{}}
       
   170 \bl{$A \rightarrow S :$} & \bl{$A, B$}\\
       
   171 \bl{$S \rightarrow A :$} & \bl{$\{B, K_{\!AB}, T_S, \!\{K_{\!AB}, A, T_S\}_{K_{BS}} \}_{K_{AS}}$}\\
       
   172 \bl{$A \rightarrow B :$} & \bl{$\{K_{AB}, A, T_S\}_{K_{BS}} $}\\
       
   173 \textcolor{lightgray}{$B \rightarrow A :$} & \textcolor{lightgray}{$\{N_B\}_{K_{AB}}$}\\
       
   174 \textcolor{lightgray}{$A \rightarrow B :$} & \textcolor{lightgray}{$\{N_B-1\}_{K_{AB}}$}\\
       
   175 \end{tabular}
       
   176 \end{center}
       
   177 \end{minipage}\bigskip
       
   178 
       
   179 they argue \bl{$A$} and \bl{$B$} can check that the messages are not replays of earlier 
       
   180 runs, by checking the time difference with when the protocol is last used
       
   181 \end{frame}}
       
   182 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%   
       
   183 
       
   184 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
       
   185 \mode<presentation>{
       
   186 \begin{frame}[t]
       
   187 \frametitle{\begin{tabular}{@{}c@{}}Denning-Sacco-Lowe Fix of Fix\end{tabular}}
       
   188 
       
   189 Lowe (1997) disagreed and said the handshake should be kept, 
       
   190 otherwise:\bigskip 
       
   191 
       
   192 \begin{minipage}{1.1\textwidth}
       
   193 \begin{center}
       
   194 \begin{tabular}{@{\hspace{-7mm}}r@ {\hspace{1mm}}l@{}}
       
   195 \bl{$A \rightarrow S :$} & \bl{$A, B$}\\
       
   196 \bl{$S \rightarrow A :$} & \bl{$\{B, K_{\!AB}, T_S, \!\{K_{\!AB}, A, T_S\}_{K_{BS}} \}_{K_{AS}}$}\\
       
   197 \bl{$A \rightarrow B :$} & \bl{$\{K_{AB}, A, T_S\}_{K_{BS}} $}\\
       
   198 \bl{$I(A) \rightarrow B :$} & \bl{$\{K_{AB}, A, T_S\}_{K_{BS}} $}\hspace{5mm}\textcolor{black}{replay}\\
       
   199 \end{tabular}
       
   200 \end{center}
       
   201 \end{minipage}\bigskip
       
   202 
       
   203 When is this a problem?\pause\medskip
       
   204 
       
   205 Assume \bl{$B$} is a bank and the message is ``Draw \pounds{1000} from \bl{$A$}'s
       
   206 account and transfer it to \bl{$I$}.''
       
   207 \end{frame}}
       
   208 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%   
       
   209 
       
   210 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
       
   211 \mode<presentation>{
       
   212 \begin{frame}[t]
       
   213 \frametitle{Privacy}
       
   214 
       
   215 \begin{minipage}{1.05\textwidth}
       
   216 \begin{itemize}
       
   217 \item we \alert{do} want that government data is made public (free maps for example)
       
   218 \item we \alert{do not} want that medical data becomes public (similarly tax data, school 
       
   219 records, job offers)\bigskip
       
   220 \item personal information can potentially lead to fraud 
       
   221 (identity theft)
       
   222 \end{itemize}\pause
       
   223 
       
   224 {\bf ``The reality'':}
       
   225 \only<2>{\begin{itemize}
       
   226 \item London Health Programmes lost in June unencrypted details of more than 8 million people
       
   227 (no names, but postcodes and details such as gender, age and ethnic origin)
       
   228 \end{itemize}}
       
   229 \only<3>{\begin{itemize}
       
   230 \item also in June Sony, got hacked: over 1M users' personal information, including passwords, email addresses, home addresses, dates of birth, and all Sony opt-in data associated with their accounts.
       
   231 \end{itemize}}
       
   232 \end{minipage}
       
   233 
       
   234 \end{frame}}
       
   235 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% 
       
   236 
       
   237    
       
   238 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
       
   239 \mode<presentation>{
       
   240 \begin{frame}[c]
       
   241 \frametitle{Privacy and Big Data}
       
   242 
       
   243 Selected sources of ``Big Data'':\smallskip{}
       
   244 
       
   245 \begin{itemize}
       
   246 \item Facebook 
       
   247 \begin{itemize}
       
   248 \item 40+ Billion photos (100 PB)
       
   249 \item 6 Billion messages daily (5 - 10 TB)
       
   250 \item 900 Million users  
       
   251 \end{itemize}
       
   252 \item Common Crawl
       
   253 \begin{itemize}
       
   254 \item covers 3.8 Billion webpages (2012 dataset)
       
   255 \item 50 TB of data
       
   256 \end{itemize}
       
   257 \item Google
       
   258 \begin{itemize}
       
   259 \item 20 PB daily (2008)
       
   260 \end{itemize}
       
   261 \item Twitter
       
   262 \begin{itemize}
       
   263 \item 7 Million users in the UK
       
   264 \item a company called Datasift is allowed to mine all tweets since 2010
       
   265 \item they charge 10k per month for other companies to target advertisement
       
   266 \end{itemize}
       
   267 \end{itemize}\pause
       
   268 
       
   269 
       
   270 \end{frame}}
       
   271 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% 
       
   272 
       
   273 
       
   274 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
       
   275 \mode<presentation>{
       
   276 \begin{frame}[c]
       
   277 \frametitle{Cookies\ldots}
       
   278 
       
   279 ``We have published a new cookie policy. It explains what cookies are 
       
   280 and how we use them on our site. To learn more about cookies and 
       
   281 their benefits, please view our cookie policy.\medskip
       
   282 
       
   283 If you'd like to disable cookies on this device, please view our information 
       
   284 pages on 'How to manage cookies'. Please be aware that parts of the 
       
   285 site will not function correctly if you disable cookies. \medskip
       
   286 
       
   287 By closing this 
       
   288 message, you consent to our use of cookies on this device in accordance 
       
   289 with our cookie policy unless you have disabled them.''
       
   290 
       
   291 
       
   292 \end{frame}}
       
   293 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% 
       
   294 
       
   295 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
       
   296 \mode<presentation>{
       
   297 \begin{frame}[c]
       
   298 \frametitle{Scare Tactics}
       
   299 
       
   300 The actual policy reads:\bigskip
       
   301 
       
   302 ``As we explain in our Cookie Policy, cookies help you to get the most 
       
   303 out of our websites.\medskip
       
   304 
       
   305 If you do disable our cookies you may find that certain sections of our 
       
   306 website do not work. For example, you may have difficulties logging in 
       
   307 or viewing articles.''
       
   308 
       
   309 
       
   310 
       
   311 
       
   312 \end{frame}}
       
   313 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% 
       
   314 
       
   315 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
       
   316 \mode<presentation>{
       
   317 \begin{frame}[c]
       
   318 \frametitle{Netflix Prize}
       
   319 
       
   320 Anonymity is \alert{necessary} for privacy, but \alert{not} enough!\bigskip
       
   321 
       
   322 \begin{itemize}
       
   323 \item Netflix offered in 2006 (and every year until 2010) a 1 Mio \$ prize for improving their movie rating algorithm
       
   324 \item dataset contained 10\% of all Netflix users (appr.~500K)
       
   325 \item names were removed, but included numerical ratings as well as times of rating
       
   326 \item some information was \alert{perturbed} (i.e., slightly modified)
       
   327 \end{itemize}
       
   328 
       
   329 \hfill{\bf\alert{All OK?}}
       
   330 
       
   331 \end{frame}}
       
   332 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% 
       
   333 
       
   334 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
       
   335 \mode<presentation>{
       
   336 \begin{frame}[c]
       
   337 \frametitle{Re-identification Attack}
       
   338 
       
   339 Two researchers analysed the data: 
       
   340 
       
   341 \begin{itemize}
       
   342 \item with 8 ratings (2 of them can be wrong) and corresponding dates that can have a margin 14-day error, 98\% of the
       
   343 records can be identified
       
   344 \item for 68\% only two ratings and dates are sufficient (for movie ratings outside the top 500)\bigskip\pause
       
   345 \item they took 50 samples from IMDb (where people can reveal their identity)
       
   346 \item 2 of them uniquely identified entries in the Netflix database (either by movie rating or by dates)
       
   347 \end{itemize}
       
   348 
       
   349 \end{frame}}
       
   350 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% 
       
   351 
       
   352 
       
   353 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
       
   354 \mode<presentation>{
       
   355 \begin{frame}[c]
       
   356 \frametitle{}
       
   357 
       
   358 \begin{itemize}
       
   359 \item Birth data, postcode and gender (unique for\\ 87\% of the US population)
       
   360 \item Preferences in movies (99\% of 500K for 8 ratings)
       
   361 \end{itemize}\bigskip
       
   362 
       
   363 Therefore best practices / or even law (HIPAA, EU): 
       
   364 
       
   365 \begin{itemize}
       
   366 \item only year dates (age group for 90 years or over), 
       
   367 \item no postcodes (sector data is OK, similarly in the US)\\
       
   368 \textcolor{gray}{no names, addresses, account numbers, licence plates}
       
   369 \item disclosure information needs to be retained for 5 years
       
   370 \end{itemize}
       
   371 
       
   372 \end{frame}}
       
   373 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% 
       
   374 
       
   375 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
       
   376 \mode<presentation>{
       
   377 \begin{frame}[c]
       
   378 \frametitle{How to Safely Disclose Information?}
       
   379 
       
   380 \only<1>{
       
   381 \begin{itemize}
       
   382 \item Assume you make a survey of 100 randomly chosen people.
       
   383 \item Say 99\% of the surveyed people in the 10 - 40 age group have seen the
       
   384 Gangnam video on youtube.\bigskip
       
   385 
       
   386 \item What can you infer about the rest of the population? 
       
   387 \end{itemize}}
       
   388 \only<2>{
       
   389 \begin{itemize}
       
   390 \item Is it possible to re-identify data later, if more data is released. \bigskip\bigskip\pause
       
   391 
       
   392 \item Not even releasing only  aggregate information prevents re-identification attacks.
       
   393 (GWAS was a public database of gene-frequency studies linked to diseases;
       
   394 you only needed partial DNA information  in order
       
   395 to identify whether an individual was part of the study --- DB closed in 2008) 
       
   396 \end{itemize}}
       
   397 
       
   398 \end{frame}}
       
   399 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% 
       
   400 
       
   401 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
       
   402 \mode<presentation>{
       
   403 \begin{frame}[c]
       
   404 \frametitle{Differential Privacy}
       
   405 
       
   406 \begin{center}
       
   407 User\;\;\;\;    
       
   408 \begin{tabular}{c}
       
   409 tell me \bl{$f(x)$} $\Rightarrow$\\
       
   410 $\Leftarrow$ \bl{$f(x) + \text{noise}$}
       
   411 \end{tabular}
       
   412 \;\;\;\;\begin{tabular}{@{}c}
       
   413 Database\\
       
   414 \bl{$x_1, \ldots, x_n$}
       
   415 \end{tabular}
       
   416 \end{center}
       
   417 
       
   418 
       
   419 \begin{itemize}
       
   420 \item \bl{$f(x)$} can be released, if \bl{$f$} is insensitive to
       
   421 individual entries  \bl{$x_1, \ldots, x_n$}\\
       
   422 \item Intuition: whatever is learned from the dataset would be learned regardless of whether
       
   423 \bl{$x_i$} participates\bigskip\pause 
       
   424 
       
   425 \item Noised needed in order to prevent queries:\\ Christian's salary $=$ 
       
   426 \begin{center}
       
   427 \bl{\large$\Sigma$} all staff $-$  \bl{\large$\Sigma$} all staff $\backslash$ Christian
       
   428 \end{center} 
       
   429 \end{itemize}
       
   430 
       
   431 \end{frame}}
       
   432 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% 
       
   433 
       
   434 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
       
   435 \mode<presentation>{
       
   436 \begin{frame}[c]
       
   437 \frametitle{Adding Noise}
       
   438 
       
   439 Adding noise is not as trivial as one would wish:
       
   440 
       
   441 \begin{itemize}
       
   442 \item If I ask how many of three have seen the Gangnam video and get a result
       
   443 as follows 
       
   444 
       
   445 \begin{center}
       
   446 \begin{tabular}{l|c}
       
   447 Alice & yes\\
       
   448 Bob & no\\
       
   449 Charlie & yes\\
       
   450 \end{tabular}
       
   451 \end{center}
       
   452 
       
   453 then I have to add a noise of \bl{$1$}. So answers would be in the
       
   454 range of \bl{$1$} to \bl{$3$}
       
   455 
       
   456 \bigskip
       
   457 \item But if I ask five questions for all the dataset (has seen Gangnam video, is male, below 30, \ldots),
       
   458 then one individual can change the dataset by \bl{$5$}
       
   459 \end{itemize}
       
   460 
       
   461 \end{frame}}
       
   462 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% 
       
   463 
       
   464 
       
   465 
       
   466 
       
   467 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
       
   468 \mode<presentation>{
       
   469 \begin{frame}[t]
       
   470 \frametitle{\begin{tabular}{@{}c@{}}Tor, Anonymous Webbrowsing\end{tabular}}
       
   471 
       
   472 \begin{itemize}
       
   473 \item initially developed by US Navy Labs, but then opened up to the world 
       
   474 \item network of proxy nodes
       
   475 \item a Tor client establishes a ``random'' path to the destination server (you cannot trace back where the information came from)\bigskip\pause
       
   476 \end{itemize}
       
   477 
       
   478 \only<2>{
       
   479 \begin{itemize}
       
   480 \item malicious exit node attack: someone set up 5 Tor exit nodes and monitored the traffic:
       
   481 \begin{itemize}
       
   482 \item a number of logons and passwords used by embassies (Usbekistan `s1e7u0l7c', while
       
   483 Tunesia `Tunesia' and India `1234')
       
   484 \end{itemize}
       
   485 \end{itemize}}
       
   486 \only<3>{
       
   487 \begin{itemize}
       
   488 \item bad apple attack: if you have one insecure application, your IP can be tracked through Tor
       
   489 \begin{itemize}
       
   490 \item background: 40\% of traffic on Tor is generated by BitTorrent
       
   491 \end{itemize}
       
   492 \end{itemize}}
       
   493 
       
   494 
       
   495 \end{frame}}
       
   496 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% 
       
   497 
       
   498 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
       
   499 \mode<presentation>{
       
   500 \begin{frame}[t]
       
   501 \frametitle{\begin{tabular}{@{}c@{}}Skype Secure Communication\end{tabular}}
       
   502 
       
   503 \begin{itemize}
       
   504 \item Skype used to be known as a secure online communication (encryption cannot be disabled), 
       
   505 but \ldots\medskip
       
   506 
       
   507 \item it is impossible to verify whether crypto algorithms are correctly used, or whether  there are backdoors.\bigskip
       
   508  
       
   509 \item recently someone found out that you can reset the password of somebody else's
       
   510 account, only knowing their email address (needed to suspended the password reset feature temporarily)
       
   511 \end{itemize}
       
   512 
       
   513 
       
   514 \end{frame}}
       
   515 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% 
       
   516 
       
   517 
       
   518 
       
   519 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
       
   520 \mode<presentation>{
       
   521 \begin{frame}[c]
       
   522 \frametitle{\begin{tabular}{@{}c@{}}Take Home Point\end{tabular}}
       
   523 
       
   524 According to Ross Anderson: \bigskip
       
   525 \begin{itemize}
       
   526 \item Privacy in a big hospital is just about doable.\medskip
       
   527 \item How do you enforce privacy  in something as big as Google
       
   528 or complex as Facebook? No body knows.\bigskip
       
   529 
       
   530 Similarly, big databases imposed by government
       
   531 \end{itemize}
       
   532 
       
   533 
       
   534 \end{frame}}
       
   535 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% 
       
   536 
       
   537 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
       
   538 \mode<presentation>{
       
   539 \begin{frame}[c]
       
   540 \frametitle{\begin{tabular}{@{}c@{}}Next Week\end{tabular}}
       
   541 
       
   542 Homework: Which areas should I focus on?
       
   543 
       
   544 
       
   545 \end{frame}}
       
   546 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% 
       
   547 
       
   548 \end{document}
       
   549 
       
   550 %%% Local Variables:  
       
   551 %%% mode: latex
       
   552 %%% TeX-master: t
       
   553 %%% End: 
       
   554