updated
authorChristian Urban <christian dot urban at kcl dot ac dot uk>
Mon, 10 Nov 2014 23:21:24 +0000
changeset 300 9aeb88f8cbec
parent 299 82906b148ff5
child 301 e9c07bff61d4
updated
slides/slides07.pdf
slides/slides07.tex
Binary file slides/slides07.pdf has changed
--- a/slides/slides07.tex	Mon Nov 10 05:57:10 2014 +0000
+++ b/slides/slides07.tex	Mon Nov 10 23:21:24 2014 +0000
@@ -16,7 +16,6 @@
   \LARGE Privacy Policies (7)\\[-6mm] 
   \end{tabular}}\bigskip\bigskip\bigskip
 
-
   \normalsize
   \begin{center}
   \begin{tabular}{ll}
@@ -29,23 +28,6 @@
 \end{frame}
 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%     
 
-
-
-%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
-\mode<presentation>{
-\begin{frame}[c]
-\frametitle{Man-in-the-Middle}
-
-\begin{itemize}
-\item Border Gateway Protocol (BGP) --- routers believe their neighbours
-\item it is possible to advertise bad routes
-\item can be done over continents\bigskip 
-\end{itemize}
-
-\hfill\footnotesize\url{http://www.renesys.com/2013/11/mitm-internet-hijacking/}
-\end{frame}}
-%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% 
-
 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
 \begin{frame}[t]
 \frametitle{Facebook Privacy}
@@ -56,12 +38,12 @@
 \item \large Who keeps the list of friends private?\pause\medskip
 
 \item \large Who knows that this is completely pointless?
-{\small (at least at the end of 2013)}\pause\medskip
+\textcolor{gray}{\small (at least at the end of 2013)}\pause\medskip
 \end{itemize}
 
-\only<4>{ Create a fake account. Send a friend request.
+\only<4>{Create a fake account. Send a friend-request.
 Facebook answers with ``People you may know'' feature.
-Conveniently it has also a ``see all'' button. }
+Conveniently, it has also a ``see all'' button.}
 
 \only<5>{\small\it ``Our policies explain that changing the
 visibility of people on your friend list controls how they
@@ -74,7 +56,50 @@
 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% 
 
 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
-\mode<presentation>{
+\begin{frame}
+\frametitle{UCAS}
+\mbox{}\\[-15mm]\mbox{} 
+\small
+\begin{quote}
+The Universities and Colleges Admissions Service received more
+than \pounds{12m} last year in return for sending targeted advertising
+to subscribers as young as 16.
+
+The service, which controls admissions to UK universities and
+attracts 700,000 new applicants each year, sells the access
+via its commercial arm, Ucas Media.
+
+Vodafone, O2, Microsoft and the private university
+accommodation provider Pure Student Living are among those who
+have marketed through Ucas, which offers access to over a
+million student email addresses\ldots 
+
+Applicants can opt out of receiving direct marketing, but only
+at the cost of missing out on education and careers mailings
+as well.\bigskip\\
+\footnotesize\hfill The Guardian, 12 March 2014
+\end{quote}
+
+
+\end{frame}
+%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% 
+
+%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
+\begin{frame}
+\frametitle{Verizon}
+\mbox{}\\[-23mm]\mbox{} 
+
+\begin{center}
+\includegraphics[scale=0.21]{../pics/verizon.png}
+\end{center}
+\vfill\footnotesize
+\url{http://webpolicy.org/2014/10/24/how-verizons-advertising-header-works}
+\end{frame}
+%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% 
+
+
+
+%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
 \begin{frame}[c]
 \frametitle{Privacy, Anonymity et al}
 
@@ -94,11 +119,10 @@
 
 \end{itemize}
 
-\end{frame}}
+\end{frame}
 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% 
 
 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
-\mode<presentation>{
 \begin{frame}[t]
 \frametitle{Privacy vs Anonymity}
 
@@ -113,17 +137,16 @@
 \hfill{}Scott Mcnealy (CEO of Sun)\bigskip\\
 
 
-If you have nothing to hide, you have nothing to fear.
+``If you have nothing to hide, you have nothing to fear.''
 
-\end{frame}}
+\end{frame}
 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% 
 
 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
-\mode<presentation>{
 \begin{frame}[t]
 \frametitle{Privacy}
 
-private data can be often used against me
+Private data can be often used against me
 
 \begin{itemize}
 \item if my location data becomes public, thieves will switch off their phones and help themselves in my home
@@ -134,18 +157,18 @@
 \item medical data should be private, but medical research needs data
 \end{itemize}
 
-\end{frame}}
+\end{frame}
 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% 
 
 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
-\mode<presentation>{
 \begin{frame}[t]
 \frametitle{Privacy Problems}
 
 \begin{itemize}
-\item Apple takes note of every dictation (send over the Internet to Apple)
+\item Apple takes note of every Siri dictation (sent over the 
+  Internet to Apple; retained for 2 years)
 \item markets often only work, if data is restricted (to build trust)
-\item Social network can reveal data about you 
+\item social networks can reveal data about you 
 \item have you tried the collusion (lightbeam?) extension for FireFox?
 \item I do use Dropbox, store cards
 \end{itemize}
@@ -155,11 +178,10 @@
 \small Gattaca (1997)
 \end{textblock}
 
-\end{frame}}
+\end{frame}
 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% 
 
 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
-\mode<presentation>{
 \begin{frame}[t]
 \frametitle{Privacy}
 
@@ -174,20 +196,29 @@
 
 {\bf ``The reality'':}
 \only<2>{\begin{itemize}
-\item London Health Programmes lost in June two years unencrypted details of more than 8 million people
-(no names, but postcodes and details such as gender, age and ethnic origin)
+\item London Health Programmes lost in 2011 unencrypted
+      details of more than 8 million people (no names, but
+      postcodes and details such as gender, age and ethnic
+      origin)
 \end{itemize}}
+
 \only<3>{\begin{itemize}
-\item also in June two years ago, Sony got hacked: over 1M users' personal information, including passwords, email addresses, home addresses, dates of birth, and all Sony opt-in data associated with their accounts.
+\item also in 2011, Sony got hacked: over 1M users' personal
+      information, including passwords, email addresses, home
+      addresses, dates of birth, and all Sony opt-in data
+      associated with their accounts.
+\end{itemize}}
+
+\only<4>{\begin{itemize}
+\item in 2007, Gordon Brown needed to apologise for the loss
+      of tax data of 25M  people
 \end{itemize}}
 \end{minipage}
 
-\end{frame}}
+\end{frame}
 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% 
 
-   
 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
-\mode<presentation>{
 \begin{frame}[c]
 \frametitle{Privacy and Big Data}
 \mbox{}\\[-16mm]\mbox{}
@@ -212,7 +243,7 @@
 \end{itemize}
 \item Twitter
 \begin{itemize}
-\item 7 Million users in the UK
+\item 15 Million active users in the UK; 500M Teets per day
 \item a company called Datasift is allowed to mine all tweets since 2010
 \item they charge 10k per month for other companies to target advertisement
 \end{itemize}
@@ -554,9 +585,8 @@
 
      
 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
-\mode<presentation>{
 \begin{frame}[c]
-\frametitle{\begin{tabular}{@{}c@{}}Take Home Point\end{tabular}}
+\frametitle{Take Home Point}
 
 According to Ross Anderson: \bigskip
 \begin{itemize}
@@ -566,13 +596,12 @@
 
 \item Privacy in a big hospital is just about doable.\medskip
 \item How do you enforce privacy  in something as big as Google
-or complex as Facebook? No body knows.\bigskip
+or complex as Facebook? Nobody knows.\bigskip
 
-Similarly, big databases imposed by government
+Similarly, big databases imposed by government.
 \end{itemize}
 
-
-\end{frame}}
+\end{frame}
 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%