|
1 \documentclass[dvipsnames,14pt,t]{beamer} |
|
2 \usepackage{proof} |
|
3 \usepackage{beamerthemeplainculight} |
|
4 \usepackage[T1]{fontenc} |
|
5 \usepackage[latin1]{inputenc} |
|
6 \usepackage{mathpartir} |
|
7 \usepackage{isabelle} |
|
8 \usepackage{isabellesym} |
|
9 \usepackage[absolute,overlay]{textpos} |
|
10 \usepackage{ifthen} |
|
11 \usepackage{tikz} |
|
12 \usepackage{courier} |
|
13 \usepackage{listings} |
|
14 \usetikzlibrary{arrows} |
|
15 \usetikzlibrary{positioning} |
|
16 \usetikzlibrary{calc} |
|
17 \usepackage{graphicx} |
|
18 \usetikzlibrary{shapes} |
|
19 \usetikzlibrary{shadows} |
|
20 \usetikzlibrary{plotmarks} |
|
21 |
|
22 |
|
23 \isabellestyle{rm} |
|
24 \renewcommand{\isastyle}{\rm}% |
|
25 \renewcommand{\isastyleminor}{\rm}% |
|
26 \renewcommand{\isastylescript}{\footnotesize\rm\slshape}% |
|
27 \renewcommand{\isatagproof}{} |
|
28 \renewcommand{\endisatagproof}{} |
|
29 \renewcommand{\isamarkupcmt}[1]{#1} |
|
30 |
|
31 % Isabelle characters |
|
32 \renewcommand{\isacharunderscore}{\_} |
|
33 \renewcommand{\isacharbar}{\isamath{\mid}} |
|
34 \renewcommand{\isasymiota}{} |
|
35 \renewcommand{\isacharbraceleft}{\{} |
|
36 \renewcommand{\isacharbraceright}{\}} |
|
37 \renewcommand{\isacharless}{$\langle$} |
|
38 \renewcommand{\isachargreater}{$\rangle$} |
|
39 \renewcommand{\isasymsharp}{\isamath{\#}} |
|
40 \renewcommand{\isasymdots}{\isamath{...}} |
|
41 \renewcommand{\isasymbullet}{\act} |
|
42 |
|
43 |
|
44 |
|
45 \definecolor{javared}{rgb}{0.6,0,0} % for strings |
|
46 \definecolor{javagreen}{rgb}{0.25,0.5,0.35} % comments |
|
47 \definecolor{javapurple}{rgb}{0.5,0,0.35} % keywords |
|
48 \definecolor{javadocblue}{rgb}{0.25,0.35,0.75} % javadoc |
|
49 |
|
50 \lstset{language=Java, |
|
51 basicstyle=\ttfamily, |
|
52 keywordstyle=\color{javapurple}\bfseries, |
|
53 stringstyle=\color{javagreen}, |
|
54 commentstyle=\color{javagreen}, |
|
55 morecomment=[s][\color{javadocblue}]{/**}{*/}, |
|
56 numbers=left, |
|
57 numberstyle=\tiny\color{black}, |
|
58 stepnumber=1, |
|
59 numbersep=10pt, |
|
60 tabsize=2, |
|
61 showspaces=false, |
|
62 showstringspaces=false} |
|
63 |
|
64 \lstdefinelanguage{scala}{ |
|
65 morekeywords={abstract,case,catch,class,def,% |
|
66 do,else,extends,false,final,finally,% |
|
67 for,if,implicit,import,match,mixin,% |
|
68 new,null,object,override,package,% |
|
69 private,protected,requires,return,sealed,% |
|
70 super,this,throw,trait,true,try,% |
|
71 type,val,var,while,with,yield}, |
|
72 otherkeywords={=>,<-,<\%,<:,>:,\#,@}, |
|
73 sensitive=true, |
|
74 morecomment=[l]{//}, |
|
75 morecomment=[n]{/*}{*/}, |
|
76 morestring=[b]", |
|
77 morestring=[b]', |
|
78 morestring=[b]""" |
|
79 } |
|
80 |
|
81 \lstset{language=Scala, |
|
82 basicstyle=\ttfamily, |
|
83 keywordstyle=\color{javapurple}\bfseries, |
|
84 stringstyle=\color{javagreen}, |
|
85 commentstyle=\color{javagreen}, |
|
86 morecomment=[s][\color{javadocblue}]{/**}{*/}, |
|
87 numbers=left, |
|
88 numberstyle=\tiny\color{black}, |
|
89 stepnumber=1, |
|
90 numbersep=10pt, |
|
91 tabsize=2, |
|
92 showspaces=false, |
|
93 showstringspaces=false} |
|
94 |
|
95 % beamer stuff |
|
96 \renewcommand{\slidecaption}{APP 09, King's College London, 27 November 2012} |
|
97 \newcommand{\dn}{\stackrel{\mbox{\scriptsize def}}{=}}% for definitions |
|
98 \newcommand{\bl}[1]{\textcolor{blue}{#1}} |
|
99 |
|
100 \begin{document} |
|
101 |
|
102 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% |
|
103 \mode<presentation>{ |
|
104 \begin{frame}<1>[t] |
|
105 \frametitle{% |
|
106 \begin{tabular}{@ {}c@ {}} |
|
107 \\ |
|
108 \LARGE Access Control and \\[-3mm] |
|
109 \LARGE Privacy Policies (9)\\[-6mm] |
|
110 \end{tabular}}\bigskip\bigskip\bigskip |
|
111 |
|
112 %\begin{center} |
|
113 %\includegraphics[scale=1.3]{pics/barrier.jpg} |
|
114 %\end{center} |
|
115 |
|
116 \normalsize |
|
117 \begin{center} |
|
118 \begin{tabular}{ll} |
|
119 Email: & christian.urban at kcl.ac.uk\\ |
|
120 Of$\!$fice: & S1.27 (1st floor Strand Building)\\ |
|
121 Slides: & KEATS (also homework is there)\\ |
|
122 \end{tabular} |
|
123 \end{center} |
|
124 |
|
125 \end{frame}} |
|
126 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% |
|
127 |
|
128 |
|
129 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% |
|
130 \mode<presentation>{ |
|
131 \begin{frame}[c] |
|
132 \frametitle{Last Week} |
|
133 |
|
134 Recall, the Schroeder-Needham (1978) protocol is vulnerable to replay attacks. |
|
135 |
|
136 \begin{center} |
|
137 \begin{tabular}{@{}r@ {\hspace{1mm}}l@{}} |
|
138 \bl{$A \rightarrow S :$} & \bl{$A, B, N_A$}\\ |
|
139 \bl{$S \rightarrow A :$} & \bl{$\{N_A, B, K_{AB},\{K_{AB}, A\}_{K_{BS}} \}_{K_{AS}}$}\\ |
|
140 \bl{$A \rightarrow B :$} & \bl{$\{K_{AB}, A\}_{K_{BS}} $}\\ |
|
141 \bl{$B \rightarrow A :$} & \bl{$\{N_B\}_{K_{AB}}$}\\ |
|
142 \bl{$A \rightarrow B :$} & \bl{$\{N_B-1\}_{K_{AB}}$}\\ |
|
143 \end{tabular} |
|
144 \end{center}\pause |
|
145 |
|
146 Fix: Replace messages 2 and 3 to include a timestamp:\bigskip |
|
147 |
|
148 \begin{minipage}{1.1\textwidth} |
|
149 \begin{center} |
|
150 \begin{tabular}{@{\hspace{-2mm}}r@ {\hspace{1mm}}l@{}} |
|
151 \bl{$S \rightarrow A :$} & \bl{$\{B, K_{\!AB}, T_S, \!\{K_{\!AB}, A, T_S\}_{K_{BS}} \}_{K_{AS}}$}\\ |
|
152 \bl{$A \rightarrow B :$} & \bl{$\{K_{AB}, A, T_S\}_{K_{BS}} $}\\ |
|
153 \end{tabular} |
|
154 \end{center} |
|
155 \end{minipage} |
|
156 |
|
157 \end{frame}} |
|
158 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% |
|
159 |
|
160 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% |
|
161 \mode<presentation>{ |
|
162 \begin{frame}[t] |
|
163 \frametitle{Denning-Sacco Fix} |
|
164 |
|
165 Denning-Sacco (1981) suggested to add the timestamp, but omit the handshake:\bigskip |
|
166 |
|
167 \begin{minipage}{1.1\textwidth} |
|
168 \begin{center} |
|
169 \begin{tabular}{@{\hspace{-2mm}}r@ {\hspace{1mm}}l@{}} |
|
170 \bl{$A \rightarrow S :$} & \bl{$A, B$}\\ |
|
171 \bl{$S \rightarrow A :$} & \bl{$\{B, K_{\!AB}, T_S, \!\{K_{\!AB}, A, T_S\}_{K_{BS}} \}_{K_{AS}}$}\\ |
|
172 \bl{$A \rightarrow B :$} & \bl{$\{K_{AB}, A, T_S\}_{K_{BS}} $}\\ |
|
173 \textcolor{lightgray}{$B \rightarrow A :$} & \textcolor{lightgray}{$\{N_B\}_{K_{AB}}$}\\ |
|
174 \textcolor{lightgray}{$A \rightarrow B :$} & \textcolor{lightgray}{$\{N_B-1\}_{K_{AB}}$}\\ |
|
175 \end{tabular} |
|
176 \end{center} |
|
177 \end{minipage}\bigskip |
|
178 |
|
179 they argue \bl{$A$} and \bl{$B$} can check that the messages are not replays of earlier |
|
180 runs, by checking the time difference with when the protocol is last used |
|
181 \end{frame}} |
|
182 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% |
|
183 |
|
184 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% |
|
185 \mode<presentation>{ |
|
186 \begin{frame}[t] |
|
187 \frametitle{\begin{tabular}{@{}c@{}}Denning-Sacco-Lowe Fix of Fix\end{tabular}} |
|
188 |
|
189 Lowe (1997) disagreed and said the handshake should be kept, |
|
190 otherwise:\bigskip |
|
191 |
|
192 \begin{minipage}{1.1\textwidth} |
|
193 \begin{center} |
|
194 \begin{tabular}{@{\hspace{-7mm}}r@ {\hspace{1mm}}l@{}} |
|
195 \bl{$A \rightarrow S :$} & \bl{$A, B$}\\ |
|
196 \bl{$S \rightarrow A :$} & \bl{$\{B, K_{\!AB}, T_S, \!\{K_{\!AB}, A, T_S\}_{K_{BS}} \}_{K_{AS}}$}\\ |
|
197 \bl{$A \rightarrow B :$} & \bl{$\{K_{AB}, A, T_S\}_{K_{BS}} $}\\ |
|
198 \bl{$I(A) \rightarrow B :$} & \bl{$\{K_{AB}, A, T_S\}_{K_{BS}} $}\hspace{5mm}\textcolor{black}{replay}\\ |
|
199 \end{tabular} |
|
200 \end{center} |
|
201 \end{minipage}\bigskip |
|
202 |
|
203 When is this a problem?\pause\medskip |
|
204 |
|
205 Assume \bl{$B$} is a bank and the message is ``Draw \pounds{1000} from \bl{$A$}'s |
|
206 account and transfer it to \bl{$I$}.'' |
|
207 \end{frame}} |
|
208 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% |
|
209 |
|
210 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% |
|
211 \mode<presentation>{ |
|
212 \begin{frame}[t] |
|
213 \frametitle{Privacy} |
|
214 |
|
215 \begin{minipage}{1.05\textwidth} |
|
216 \begin{itemize} |
|
217 \item we \alert{do} want that government data is made public (free maps for example) |
|
218 \item we \alert{do not} want that medical data becomes public (similarly tax data, school |
|
219 records, job offers)\bigskip |
|
220 \item personal information can potentially lead to fraud |
|
221 (identity theft) |
|
222 \end{itemize}\pause |
|
223 |
|
224 {\bf ``The reality'':} |
|
225 \only<2>{\begin{itemize} |
|
226 \item London Health Programmes lost in June unencrypted details of more than 8 million people |
|
227 (no names, but postcodes and details such as gender, age and ethnic origin) |
|
228 \end{itemize}} |
|
229 \only<3>{\begin{itemize} |
|
230 \item also in June Sony, got hacked: over 1M users' personal information, including passwords, email addresses, home addresses, dates of birth, and all Sony opt-in data associated with their accounts. |
|
231 \end{itemize}} |
|
232 \end{minipage} |
|
233 |
|
234 \end{frame}} |
|
235 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% |
|
236 |
|
237 |
|
238 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% |
|
239 \mode<presentation>{ |
|
240 \begin{frame}[c] |
|
241 \frametitle{Privacy and Big Data} |
|
242 |
|
243 Selected sources of ``Big Data'':\smallskip{} |
|
244 |
|
245 \begin{itemize} |
|
246 \item Facebook |
|
247 \begin{itemize} |
|
248 \item 40+ Billion photos (100 PB) |
|
249 \item 6 Billion messages daily (5 - 10 TB) |
|
250 \item 900 Million users |
|
251 \end{itemize} |
|
252 \item Common Crawl |
|
253 \begin{itemize} |
|
254 \item covers 3.8 Billion webpages (2012 dataset) |
|
255 \item 50 TB of data |
|
256 \end{itemize} |
|
257 \item Google |
|
258 \begin{itemize} |
|
259 \item 20 PB daily (2008) |
|
260 \end{itemize} |
|
261 \item Twitter |
|
262 \begin{itemize} |
|
263 \item 7 Million users in the UK |
|
264 \item a company called Datasift is allowed to mine all tweets since 2010 |
|
265 \item they charge 10k per month for other companies to target advertisement |
|
266 \end{itemize} |
|
267 \end{itemize}\pause |
|
268 |
|
269 |
|
270 \end{frame}} |
|
271 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% |
|
272 |
|
273 |
|
274 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% |
|
275 \mode<presentation>{ |
|
276 \begin{frame}[c] |
|
277 \frametitle{Cookies\ldots} |
|
278 |
|
279 ``We have published a new cookie policy. It explains what cookies are |
|
280 and how we use them on our site. To learn more about cookies and |
|
281 their benefits, please view our cookie policy.\medskip |
|
282 |
|
283 If you'd like to disable cookies on this device, please view our information |
|
284 pages on 'How to manage cookies'. Please be aware that parts of the |
|
285 site will not function correctly if you disable cookies. \medskip |
|
286 |
|
287 By closing this |
|
288 message, you consent to our use of cookies on this device in accordance |
|
289 with our cookie policy unless you have disabled them.'' |
|
290 |
|
291 |
|
292 \end{frame}} |
|
293 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% |
|
294 |
|
295 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% |
|
296 \mode<presentation>{ |
|
297 \begin{frame}[c] |
|
298 \frametitle{Scare Tactics} |
|
299 |
|
300 The actual policy reads:\bigskip |
|
301 |
|
302 ``As we explain in our Cookie Policy, cookies help you to get the most |
|
303 out of our websites.\medskip |
|
304 |
|
305 If you do disable our cookies you may find that certain sections of our |
|
306 website do not work. For example, you may have difficulties logging in |
|
307 or viewing articles.'' |
|
308 |
|
309 |
|
310 |
|
311 |
|
312 \end{frame}} |
|
313 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% |
|
314 |
|
315 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% |
|
316 \mode<presentation>{ |
|
317 \begin{frame}[c] |
|
318 \frametitle{Netflix Prize} |
|
319 |
|
320 Anonymity is \alert{necessary} for privacy, but \alert{not} enough!\bigskip |
|
321 |
|
322 \begin{itemize} |
|
323 \item Netflix offered in 2006 (and every year until 2010) a 1 Mio \$ prize for improving their movie rating algorithm |
|
324 \item dataset contained 10\% of all Netflix users (appr.~500K) |
|
325 \item names were removed, but included numerical ratings as well as times of rating |
|
326 \item some information was \alert{perturbed} (i.e., slightly modified) |
|
327 \end{itemize} |
|
328 |
|
329 \hfill{\bf\alert{All OK?}} |
|
330 |
|
331 \end{frame}} |
|
332 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% |
|
333 |
|
334 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% |
|
335 \mode<presentation>{ |
|
336 \begin{frame}[c] |
|
337 \frametitle{Re-identification Attack} |
|
338 |
|
339 Two researchers analysed the data: |
|
340 |
|
341 \begin{itemize} |
|
342 \item with 8 ratings (2 of them can be wrong) and corresponding dates that can have a margin 14-day error, 98\% of the |
|
343 records can be identified |
|
344 \item for 68\% only two ratings and dates are sufficient (for movie ratings outside the top 500)\bigskip\pause |
|
345 \item they took 50 samples from IMDb (where people can reveal their identity) |
|
346 \item 2 of them uniquely identified entries in the Netflix database (either by movie rating or by dates) |
|
347 \end{itemize} |
|
348 |
|
349 \end{frame}} |
|
350 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% |
|
351 |
|
352 |
|
353 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% |
|
354 \mode<presentation>{ |
|
355 \begin{frame}[c] |
|
356 \frametitle{} |
|
357 |
|
358 \begin{itemize} |
|
359 \item Birth data, postcode and gender (unique for\\ 87\% of the US population) |
|
360 \item Preferences in movies (99\% of 500K for 8 ratings) |
|
361 \end{itemize}\bigskip |
|
362 |
|
363 Therefore best practices / or even law (HIPAA, EU): |
|
364 |
|
365 \begin{itemize} |
|
366 \item only year dates (age group for 90 years or over), |
|
367 \item no postcodes (sector data is OK, similarly in the US)\\ |
|
368 \textcolor{gray}{no names, addresses, account numbers, licence plates} |
|
369 \item disclosure information needs to be retained for 5 years |
|
370 \end{itemize} |
|
371 |
|
372 \end{frame}} |
|
373 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% |
|
374 |
|
375 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% |
|
376 \mode<presentation>{ |
|
377 \begin{frame}[c] |
|
378 \frametitle{How to Safely Disclose Information?} |
|
379 |
|
380 \only<1>{ |
|
381 \begin{itemize} |
|
382 \item Assume you make a survey of 100 randomly chosen people. |
|
383 \item Say 99\% of the surveyed people in the 10 - 40 age group have seen the |
|
384 Gangnam video on youtube.\bigskip |
|
385 |
|
386 \item What can you infer about the rest of the population? |
|
387 \end{itemize}} |
|
388 \only<2>{ |
|
389 \begin{itemize} |
|
390 \item Is it possible to re-identify data later, if more data is released. \bigskip\bigskip\pause |
|
391 |
|
392 \item Not even releasing only aggregate information prevents re-identification attacks. |
|
393 (GWAS was a public database of gene-frequency studies linked to diseases; |
|
394 you only needed partial DNA information in order |
|
395 to identify whether an individual was part of the study --- DB closed in 2008) |
|
396 \end{itemize}} |
|
397 |
|
398 \end{frame}} |
|
399 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% |
|
400 |
|
401 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% |
|
402 \mode<presentation>{ |
|
403 \begin{frame}[c] |
|
404 \frametitle{Differential Privacy} |
|
405 |
|
406 \begin{center} |
|
407 User\;\;\;\; |
|
408 \begin{tabular}{c} |
|
409 tell me \bl{$f(x)$} $\Rightarrow$\\ |
|
410 $\Leftarrow$ \bl{$f(x) + \text{noise}$} |
|
411 \end{tabular} |
|
412 \;\;\;\;\begin{tabular}{@{}c} |
|
413 Database\\ |
|
414 \bl{$x_1, \ldots, x_n$} |
|
415 \end{tabular} |
|
416 \end{center} |
|
417 |
|
418 |
|
419 \begin{itemize} |
|
420 \item \bl{$f(x)$} can be released, if \bl{$f$} is insensitive to |
|
421 individual entries \bl{$x_1, \ldots, x_n$}\\ |
|
422 \item Intuition: whatever is learned from the dataset would be learned regardless of whether |
|
423 \bl{$x_i$} participates\bigskip\pause |
|
424 |
|
425 \item Noised needed in order to prevent queries:\\ Christian's salary $=$ |
|
426 \begin{center} |
|
427 \bl{\large$\Sigma$} all staff $-$ \bl{\large$\Sigma$} all staff $\backslash$ Christian |
|
428 \end{center} |
|
429 \end{itemize} |
|
430 |
|
431 \end{frame}} |
|
432 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% |
|
433 |
|
434 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% |
|
435 \mode<presentation>{ |
|
436 \begin{frame}[c] |
|
437 \frametitle{Adding Noise} |
|
438 |
|
439 Adding noise is not as trivial as one would wish: |
|
440 |
|
441 \begin{itemize} |
|
442 \item If I ask how many of three have seen the Gangnam video and get a result |
|
443 as follows |
|
444 |
|
445 \begin{center} |
|
446 \begin{tabular}{l|c} |
|
447 Alice & yes\\ |
|
448 Bob & no\\ |
|
449 Charlie & yes\\ |
|
450 \end{tabular} |
|
451 \end{center} |
|
452 |
|
453 then I have to add a noise of \bl{$1$}. So answers would be in the |
|
454 range of \bl{$1$} to \bl{$3$} |
|
455 |
|
456 \bigskip |
|
457 \item But if I ask five questions for all the dataset (has seen Gangnam video, is male, below 30, \ldots), |
|
458 then one individual can change the dataset by \bl{$5$} |
|
459 \end{itemize} |
|
460 |
|
461 \end{frame}} |
|
462 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% |
|
463 |
|
464 |
|
465 |
|
466 |
|
467 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% |
|
468 \mode<presentation>{ |
|
469 \begin{frame}[t] |
|
470 \frametitle{\begin{tabular}{@{}c@{}}Tor, Anonymous Webbrowsing\end{tabular}} |
|
471 |
|
472 \begin{itemize} |
|
473 \item initially developed by US Navy Labs, but then opened up to the world |
|
474 \item network of proxy nodes |
|
475 \item a Tor client establishes a ``random'' path to the destination server (you cannot trace back where the information came from)\bigskip\pause |
|
476 \end{itemize} |
|
477 |
|
478 \only<2>{ |
|
479 \begin{itemize} |
|
480 \item malicious exit node attack: someone set up 5 Tor exit nodes and monitored the traffic: |
|
481 \begin{itemize} |
|
482 \item a number of logons and passwords used by embassies (Usbekistan `s1e7u0l7c', while |
|
483 Tunesia `Tunesia' and India `1234') |
|
484 \end{itemize} |
|
485 \end{itemize}} |
|
486 \only<3>{ |
|
487 \begin{itemize} |
|
488 \item bad apple attack: if you have one insecure application, your IP can be tracked through Tor |
|
489 \begin{itemize} |
|
490 \item background: 40\% of traffic on Tor is generated by BitTorrent |
|
491 \end{itemize} |
|
492 \end{itemize}} |
|
493 |
|
494 |
|
495 \end{frame}} |
|
496 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% |
|
497 |
|
498 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% |
|
499 \mode<presentation>{ |
|
500 \begin{frame}[t] |
|
501 \frametitle{\begin{tabular}{@{}c@{}}Skype Secure Communication\end{tabular}} |
|
502 |
|
503 \begin{itemize} |
|
504 \item Skype used to be known as a secure online communication (encryption cannot be disabled), |
|
505 but \ldots\medskip |
|
506 |
|
507 \item it is impossible to verify whether crypto algorithms are correctly used, or whether there are backdoors.\bigskip |
|
508 |
|
509 \item recently someone found out that you can reset the password of somebody else's |
|
510 account, only knowing their email address (needed to suspended the password reset feature temporarily) |
|
511 \end{itemize} |
|
512 |
|
513 |
|
514 \end{frame}} |
|
515 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% |
|
516 |
|
517 |
|
518 |
|
519 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% |
|
520 \mode<presentation>{ |
|
521 \begin{frame}[c] |
|
522 \frametitle{\begin{tabular}{@{}c@{}}Take Home Point\end{tabular}} |
|
523 |
|
524 According to Ross Anderson: \bigskip |
|
525 \begin{itemize} |
|
526 \item Privacy in a big hospital is just about doable.\medskip |
|
527 \item How do you enforce privacy in something as big as Google |
|
528 or complex as Facebook? No body knows.\bigskip |
|
529 |
|
530 Similarly, big databases imposed by government |
|
531 \end{itemize} |
|
532 |
|
533 |
|
534 \end{frame}} |
|
535 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% |
|
536 |
|
537 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% |
|
538 \mode<presentation>{ |
|
539 \begin{frame}[c] |
|
540 \frametitle{\begin{tabular}{@{}c@{}}Next Week\end{tabular}} |
|
541 |
|
542 Homework: Which areas should I focus on? |
|
543 |
|
544 |
|
545 \end{frame}} |
|
546 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% |
|
547 |
|
548 \end{document} |
|
549 |
|
550 %%% Local Variables: |
|
551 %%% mode: latex |
|
552 %%% TeX-master: t |
|
553 %%% End: |
|
554 |