Binary file slides/slides08.pdf has changed
--- a/slides/slides08.tex Tue Nov 26 13:51:46 2013 +0000
+++ b/slides/slides08.tex Tue Nov 26 14:59:45 2013 +0000
@@ -240,7 +240,7 @@
\item Apple takes note of every dictation (send over the Internet to Apple)
\item markets often only work, if data is restricted (to build trust)
\item Social network can reveal data about you
-\item have you tried the collusion extension for FireFox?
+\item have you tried the collusion (lightbeam?) extension for FireFox?
\item I do use Dropbox, store cards
\end{itemize}
@@ -457,6 +457,23 @@
\end{frame}}
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
+
+%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
+\mode<presentation>{
+\begin{frame}<2>[c]
+\frametitle{We cannot exclude all Harm}
+
+\begin{itemize}
+\item Analysis of a given data set teaches us that smoking causes cancer.
+Mary, a smoker, is harmed by this analysis: her insurance premiums rise.
+Mary’s premiums rise whether or not her data are in the data set. In other words,
+Mary is harmed by the finding “smoking causes cancer.\bigskip
+
+\item \ldots of course she is also helped, she might quit smoking
+\end{itemize}
+
+\end{frame}}
+%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
\mode<presentation>{
@@ -467,8 +484,10 @@
\item Goal: Nothing about an individual should be learnable from the database that
cannot be learned without access to the database.\pause\bigskip
-\item Differential privacy is a protocol which you run on some dataset \bl{$X$} producing
-some output \bl{$O(X)$}.
+\item Differential privacy is a ``protocol'' which you run on some dataset \bl{$X$} producing
+some output \bl{$O(X)$}.\bigskip
+
+\item You want to achieve \alert{forward privacy}
\end{itemize}
\end{frame}}
@@ -561,7 +580,7 @@
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
\mode<presentation>{
\begin{frame}[t]
-\frametitle{\begin{tabular}{@{}c@{}}Tor\end{tabular}}
+\frametitle{\begin{tabular}{@{}c@{}}Tor (private web browsing)\end{tabular}}
\begin{itemize}
\item initially developed by US Navy Labs, but then opened up to the world
@@ -591,6 +610,23 @@
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
\mode<presentation>{
+\begin{frame}[c]
+\frametitle{Tor Nodes}
+
+Dan Egerstad wrote:\bigskip
+
+\it ``If you actually look in to where these Tor nodes are hosted and how big they are, some of these nodes cost thousands of dollars each month just to host because they're using lots of bandwidth, they're heavy-duty servers and so on. Who would pay for this and be anonymous?"
+
+
+\end{frame}}
+%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
+
+
+
+
+
+%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
+\mode<presentation>{
\begin{frame}[t]
\frametitle{\begin{tabular}{@{}c@{}}Skype\end{tabular}}
@@ -617,6 +653,10 @@
According to Ross Anderson: \bigskip
\begin{itemize}
+\item Creating large databases of sensitive personal information is intrinsically
+hazardous (NHS)\bigskip
+
+
\item Privacy in a big hospital is just about doable.\medskip
\item How do you enforce privacy in something as big as Google
or complex as Facebook? No body knows.\bigskip