--- a/slides/slides08.tex Tue Nov 26 06:33:31 2013 +0000
+++ b/slides/slides08.tex Tue Nov 26 13:36:39 2013 +0000
@@ -133,7 +133,11 @@
\begin{frame}[c]
\frametitle{Man-in-the-Middle}
-
+\begin{itemize}
+\item Border Gateway Protocol (BGP) --- routers believe their neighbours
+\item it is possible to advertise bad routes
+\item can be done over continents\bigskip
+\end{itemize}
\hfill\footnotesize\url{http://www.renesys.com/2013/11/mitm-internet-hijacking/}
\end{frame}}
@@ -141,9 +145,24 @@
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
\mode<presentation>{
-\begin{frame}[c]
+\begin{frame}[t]
\frametitle{Facebook Privacy}
+\begin{itemize}
+\item \large Who has a Facebook account?\pause\medskip
+
+\item \large Who keeps the list of friends private?\pause\medskip
+
+\item \large Who knows that this is completely pointless?\pause\medskip
+\end{itemize}
+
+\only<4>{
+Create a fake account. Send a friend request. Facebook answers with
+``People you may know'' feature. Conveniently it has also a ``see all'' button.
+}
+\only<5>{\small\it
+``Our policies explain that changing the visibility of people on your friend list controls how they appear on your Timeline, and that your friends may be visible on other parts of the site, such as in News Feed, Search and on other people's Timelines. This behavior is something we'll continue to evaluate to make sure we're providing clarity.''
+}
\end{frame}}
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
@@ -157,12 +176,12 @@
\begin{itemize}
\item \alert{secrecy} is the mechanism used to limit the number of
-principals with access to information (eg, cryptography or access controls)
+principals with access to information (e.g., cryptography or access controls)
\item \alert{confidentiality} is the obligation to protect the secrets of other people
or organizations (secrecy for the benefit of an organisation)
-\item \alert{anonymity} is the ability to leave no evidence of an activity (eg, sharing a secret)
+\item \alert{anonymity} is the ability to leave no evidence of an activity (e.g., sharing a secret)
\item \alert{privacy} is the ability or right to protect your personal secrets
(secrecy for the benefit of an individual)
@@ -178,7 +197,7 @@
\frametitle{Privacy vs Anonymity}
\begin{itemize}
-\item everybody agrees that anonymity has its uses (e.g., voting, whistleblowers, peer-review)
+\item everybody agrees that anonymity has its uses (e.g., voting, whistleblowers, peer-review, exams)
\end{itemize}\bigskip\bigskip\pause
@@ -222,12 +241,11 @@
\item markets often only work, if data is restricted (to build trust)
\item Social network can reveal data about you
\item have you tried the collusion extension for FireFox?
-\item I do use Dropbox, store cards\bigskip
-\item next week: anonymising data
+\item I do use Dropbox, store cards
\end{itemize}
-\begin{textblock}{5}(12,8.9)
-\includegraphics[scale=0.3]{pics/gattaca.jpg}\\
+\begin{textblock}{5}(12,9.9)
+\includegraphics[scale=0.2]{pics/gattaca.jpg}\\
\small Gattaca (1997)
\end{textblock}
@@ -361,7 +379,7 @@
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
\mode<presentation>{
\begin{frame}[c]
-\frametitle{Re-identification Attack}
+\frametitle{Re-identification Attacks}
Two researchers analysed the data:
@@ -376,6 +394,22 @@
\end{frame}}
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
+%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
+\mode<presentation>{
+\begin{frame}[c]
+\frametitle{Re-identification Attacks}
+
+
+\begin{itemize}
+\item in 1990 insurance databases were made public with names removed, but birth dates,
+gender, ZIP-code were retained\medskip
+\item could be cross referenced with public voter registration data in order to find out what the
+medical record of the governor of Massachusetts was
+\end{itemize}
+
+\end{frame}}
+%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
+
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
\mode<presentation>{
@@ -424,6 +458,21 @@
\end{frame}}
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
+%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
+\mode<presentation>{
+\begin{frame}<2>[c]
+\frametitle{Differential Privacy}
+
+\begin{itemize}
+\item Goal: Nothing about an individual should be learnable from the database that
+cannot be learned without access to the database.\pause\bigskip
+
+\item Differential privacy is a protocol which you run on some dataset \bl{$X$} producing
+some output \bl{$O(X)$}.
+\end{itemize}
+
+\end{frame}}
+%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
\mode<presentation>{