Author: phobos Date: 2012-01-11 15:04:41 +0000 (Wed, 11 Jan 2012) New Revision: 25300
Added: projects/presentations/2012-01-11-usable-online-privacy.pdf projects/presentations/2012-01-11-usable-online-privacy.tex Log: add my UCL presentation.
Added: projects/presentations/2012-01-11-usable-online-privacy.pdf =================================================================== (Binary files differ)
Property changes on: projects/presentations/2012-01-11-usable-online-privacy.pdf ___________________________________________________________________ Added: svn:mime-type + application/octet-stream
Added: projects/presentations/2012-01-11-usable-online-privacy.tex =================================================================== --- projects/presentations/2012-01-11-usable-online-privacy.tex (rev 0) +++ projects/presentations/2012-01-11-usable-online-privacy.tex 2012-01-11 15:04:41 UTC (rev 25300) @@ -0,0 +1,203 @@ +\documentclass{beamer} +\mode<presentation> +\usetheme{Boadilla} +\title{Anonymity, Usability, and Humans. Pick Two.} +\author{Andrew Lewman \ andrew@torproject.org} +\date{11 Jan 2012} +\begin{document} + +\begin{frame} +\maketitle +\begin{center} +\includegraphics[height=3cm]{./images/2009-tor-logo} +\end{center} +\end{frame} + +\begin{frame} +\frametitle{What are we talking about?} +\begin{itemize} +\item Crash course on anonymous communications +\item Quick overview of Tor +\item Usability, Security, and Humans +\end{itemize} +\end{frame} + +\begin{frame} +\frametitle{The Tor Project, Inc.} +501(c)(3) non-profit organization dedicated to the research and development of technologies for online anonymity and privacy +\begin{center} +\includegraphics[height=5cm]{./images/2009-oval_sticker_new} +\end{center} +\end{frame} + + +\begin{frame} +\frametitle{Anonymous communication} +\begin{itemize} +\item People have to hide in a crowd of other people ("anonymity loves company") +\item The goal of the system is to make all users look as similar as possible, to give a bigger crowd +\item Hide who is communicating with whom +\item Layered encryption and random delays hide correlation between input traffic and output traffic +\end{itemize} +\end{frame} + +\begin{frame} +\frametitle{What is Tor?} +\begin{itemize} +\item online anonymity software and network +\pause \item open source, freely available (3-clause BSD license) +\pause \item active research environment: \ +Rice, UMN, NSF, NRL, Drexel, Waterloo, Cambridge UK, Bamberg Germany, Boston Univ, Harvard, MIT, RPI, Georgia Tech +\pause \item increasingly diverse toolset: \ +Tor, Torbutton, Tor Browser Bundle, TAILS Anonymous Operating System, Tor Weather, Tor auto-responder, Secure Updater, Orbot, Torora, Tor Check, Arm, Nymble, Tor Control, Tor Wall, TorVM +\end{itemize} +\end{frame} + +\begin{frame} +\frametitle{Other Systems} +\begin{itemize} +\item VPN - Virtual Private Network, 1 to 1 connection, can redirect all traffic, generally encrypted +\pause \item Proxy - 1 to 1 connection, per application traffic redirection, sometimes encrypted +\pause \item I2P - Garlic routing, closed network, anonymity and reputation +\pause \item Freenet - closed network, anonymity, distributed file storage and sharing +\pause \item GNUnet - closed network, anonymity, distributed file storage and sharing +\end{itemize} +\end{frame} + +\begin{frame} +\frametitle{How is Tor different from other systems?} +\begin{overlayarea}{9cm}{6cm} +\only<1>{\includegraphics[height=7cm]{./images/single_hop_relay}} +\only<2>{\includegraphics[height=7cm]{./images/evil_single_hop_relay}} +\only<3>{\includegraphics[height=7cm]{./images/data_snooping_single_hop_relay}} +\end{overlayarea} +\end{frame} + +\begin{frame} +\frametitle{Who uses Tor?} +\parbox{8cm}{\sloppy +\setbeamercolor{background}[\includegraphics[scale=0.35]{./images/anonymousman}} +\parbox{3cm}{\sloppy +\begin{flushleft} +\begin{itemize} +\begin{small} +\item Normal people +\item Law Enforcement +\item Human Rights Activists +\item Business Execs +\item Abuse Victims +\item Militaries +\end{small} +\end{itemize} +\end{flushleft} +} +\end{frame} + +\begin{frame} +\frametitle{Who uses Tor?} +\begin{itemize} +\item <1> \textit{Normal users} \ linking sensitive information to their current identities, online advertising networks, search engines, censorship circumvention +\item <2> \textit{Law enforcement}\ accidental disclosure to targets, family and friend concerns, separating work from home life +\item <3> \textit{Rights Activists}\ Personal safety, family safety, narrowly-defined publicity, censorship circumvention +\item <4> \textit{Business Execs}\ separating work from home life, competitor research, censorship circumvention +\item <5> \textit{Abuse Victims and Survivors}\ complete separation of past abuse and current life, finding help and safety, need to help others anonymously +\item <6> \textit{Militaries}\ intelligence gathering, separating work from home life, other activities +\end{itemize} +\end{frame} + +\begin{frame} +\frametitle{estimated 400k to 800k daily users} +\setbeamercolor{background}[\includegraphics[scale=0.4]{./images/huge-crowd}] +\end{frame} + +\begin{frame} +\frametitle{Online and Offline change happens} +\includegraphics[scale=0.5]{./images/egypt} +\end{frame} + +\begin{frame} +\frametitle{...spring is in the air...} +\begin{center} +\includegraphics[scale=1.2]{./images/paco-primera-pagina-oleo-lienzo-110-x-150-cms-2008-red} +\end{center} +\end{frame} + +\begin{frame} +\frametitle{Tor hidden services} +\includegraphics[scale=0.5]{./images/hidden-federalist} +\end{frame} + +\begin{frame} +\frametitle{Tor hidden services} +\includegraphics[scale=1.0]{./images/hidden-federalist-zoom} +\end{frame} + +\begin{frame} +\frametitle{Anonymity, Usability, and Humans} +\begin{itemize} +\item Allow the user to fully configure Tor rather than manually searching for and opening text files. +\item Let users learn about the current state of their Tor connection, and configure or find out whether any of their applications are using it. +\item Make alerts and error conditions visible to the user. +\item Run on Windows, Linux, and OS X, Android, iOS, on normal computers and phones. +\end{itemize} +\end{frame} + +\begin{frame} +\frametitle{First iteration: command line} +\includegraphics[scale=0.8]{./images/tor-cli-start} +\end{frame} + +\begin{frame} +\frametitle{Second iteration: GUI controller contest} +%http://replay.web.archive.org/20081220230929/http://www.torproject.org/gui/i... +\includegraphics[scale=0.6]{./images/tor-gui-competition-webpage} +\end{frame} + +\begin{frame} +\frametitle{TorK} +%http://replay.web.archive.org/20081222193036/http://anonymityanywhere.com/to... +\includegraphics[scale=0.6]{./images/tork-osd-thumb} +\end{frame} + +\begin{frame} +\frametitle{April3rd} +%http://replay.web.archive.org/20081228051332/http://www.april3rd.com/tor/ +\includegraphics[scale=0.4]{./images/april3rd-torgui-main_open_text_annotated} +\end{frame} + +\begin{frame} +\frametitle{Vidalia} +\includegraphics[scale=0.3]{./images/vidalia-network-map} +\end{frame} + +\begin{frame} +\frametitle{Experience so far} +\begin{itemize} +\item Our web site is confusing to users and not technical enough for researchers. +\pause \item Concepts of anonymity and its threats escape most users.\"I want my Youtube!" "I use tor to organize on facebook." +\pause \item Cultural differences and their expectations of software, usability, anonymity, privacy, and what tor provides. +\pause \item Software leaks data all over the place. Stopping these leaks leads to unexpected user experiences. +\pause \item Six years since we last dabbled in Usability. +\end{itemize} +\end{frame} + +\begin{frame} +\frametitle{Next steps} +Visit \url{https://www.torproject.org/%7D for more information, links, and ideas. +\end{frame} + +\begin{frame} +\frametitle{Time for a demo} +Demonstration of Tor Browser Bundle +\end{frame} + +\begin{frame} +\frametitle{Copyright} +\begin{itemize} +\item who uses tor? \url{http://www.flickr.com/photos/mattw/2336507468/siz%7D, Matt Westervelt, CC-BY-SA. +\item 500k, \url{http://www.flickr.com/photos/lukaskracic/334850378/sizes/l/%7D, Luka Skracic, used with permission. +\item spring is in the air, Paco Pomet, http://pacopomet.wordpress.com/ +\end{itemize} +\end{frame} + +\end{document}
Property changes on: projects/presentations/2012-01-11-usable-online-privacy.tex ___________________________________________________________________ Added: svn:mime-type + text/x-tex
tor-commits@lists.torproject.org