Author: phobos Date: 2014-04-04 10:52:19 +0000 (Fri, 04 Apr 2014) New Revision: 26691
Added: projects/presentations/2014-02-09-Cryptoparty-Boston.pdf projects/presentations/2014-02-09-Cryptoparty-Boston.tex projects/presentations/2014-02-12-MIT-codesign-presentation.txt projects/presentations/2014-03-19-MIT-codesign-presentation.pdf projects/presentations/2014-03-19-MIT-codesign-presentation.txt projects/presentations/2014-04-03-CivilRightsDefenders-Workshop.pdf projects/presentations/2014-04-03-CivilRightsDefenders-Workshop.txt projects/presentations/images/2014-02-17-iranian-circumvention-tools.png Log: add recent presentations
Added: projects/presentations/2014-02-09-Cryptoparty-Boston.pdf =================================================================== (Binary files differ)
Property changes on: projects/presentations/2014-02-09-Cryptoparty-Boston.pdf ___________________________________________________________________ Added: svn:mime-type + application/octet-stream
Added: projects/presentations/2014-02-09-Cryptoparty-Boston.tex =================================================================== --- projects/presentations/2014-02-09-Cryptoparty-Boston.tex (rev 0) +++ projects/presentations/2014-02-09-Cryptoparty-Boston.tex 2014-04-04 10:52:19 UTC (rev 26691) @@ -0,0 +1,196 @@ +\documentclass{beamer} +\mode<presentation> +\usetheme{Boadilla} +\title{Cryptoparty Boston} +\author{Andrew Lewman \ andrew@torproject.org} +\date{09 February 2014} +\begin{document} + +\begin{frame} +\maketitle +\begin{center} +\includegraphics[height=3cm]{./images/2009-tor-logo} +\end{center} +\end{frame} + +\begin{frame}[plain] + \begin{centering} + \pgfimage[height=\paperheight]{./images/1984first} + \par + \end{centering} +\end{frame} + +\begin{frame} +\frametitle{George Orwell was an optimist} +\begin{quotation} +\noindent \includegraphics[width=1cm]{./images/opquo}\quad Who controls the past, controls the future: who controls the present controls the past +\end{quotation} +\flushright --- George Orwell, Nineteen Eighty Four, 1949 +\end{frame} + +\begin{frame} +\frametitle{Internet Surveillance is getting more advanced} +\begin{center} +\includegraphics<1>[scale=0.5]{./images/procera-evolved-dpi} +\includegraphics<2>[scale=0.5]{./images/iran-ssl-dpi-26-seconds-to-death} +\includegraphics<3>[scale=0.6]{./images/2011-infoweek-comodo-hacker} +\includegraphics<4>[scale=0.6]{./images/2011-06-08-china-net-censorship-piracy-porn} +\includegraphics<5>[scale=0.6]{./images/2011-10-arstechnica-major-isps-usa-6strikes} +\includegraphics<6>[scale=0.4]{./images/dataflow-futureprivacychart} +\includegraphics<7>[scale=0.6]{./images/2009-knowprivacy-report-webbug-domains} +\includegraphics<8>[scale=0.3]{./images/mediacom-ad-injection-apple} +\includegraphics<9>[scale=0.3]{./images/mediacom-ad-injection-google} +\end{center} +\end{frame} + +\begin{frame} +\frametitle{Twitter in Iran: Good.} +\includegraphics[scale=0.5]{./images/twitter-iran-protests-time} +\flushright{\tiny From http://www.time.com/time/world/article/0,8599,1905125,00.html%7D +\end{frame} + +\begin{frame} +\frametitle{Twitter in USA: Bad.} +\includegraphics[scale=0.45]{./images/twitter-g20-pittsburgh-gothamist} +\flushright{\tiny from http://gothamist.com/2009/10/05/fbi%5C_raids%5C_queens%5C_home%5C_in%5C_g20%... +\end{frame} + +\begin{frame}[plain] + \begin{centering} + \pgfimage[height=\paperheight]{./images/paco-primera-pagina-oleo-lienzo-110-x-150-cms-2008-red} + \par + \end{centering} +\end{frame} + +\begin{frame} +\frametitle{The Tor Project, Inc.} +501(c)(3) non-profit organization dedicated to the research and development of technologies for online anonymity and privacy +\begin{center} +\includegraphics[height=5cm]{./images/2009-oval_sticker_new} +\end{center} +\end{frame} + +\begin{frame} +\frametitle{What is Tor?} +\begin{itemize} +\item online anonymity software and network +\pause \item open source, freely available (3-clause BSD license) +\pause \item active research environment: \ +Drexel, Univ of Waterloo, Georgia Tech, Princeton, Boston University, University College London, Univ of Minnesota, National Science Foundation, Naval Research Labs, Cambridge UK, Bamberg Germany, MIT, NORDUnet... +\pause \item increasingly diverse toolset: \ +Tor, Tor Browser Bundle, Tails LiveCD, Pluggable Transports, Tor Weather, Tor auto-responder, Secure Updater, Orbot, Gibberbot, Arm and so on. +\end{itemize} +\end{frame} + +\begin{frame} +\frametitle{Why Tor?} +\begin{overlayarea}{9cm}{6cm} +\only<1>{\includegraphics[scale=0.5]{./images/first-rule-of-privacy.jpg}} +\only<2>{\includegraphics[scale=0.5]{./images/internet-venn-diagram.jpg}} +\end{overlayarea} +\end{frame} + +\begin{frame} +\frametitle{Who uses Tor?} +\parbox{8cm}{\sloppy \setbeamercolor{background}[\includegraphics[scale=0.35]{./images/anonymousman}} +\parbox{3cm}{\sloppy +\begin{flushleft} +\begin{itemize} +\begin{small} +\item Normal people +\item Law Enforcement +\item Human Rights Activists +\item Business Execs +\item Militaries +\item Abuse Victims +\end{small} +\end{itemize} +\end{flushleft} +} +\end{frame} + +\begin{frame} +\frametitle{Online and Offline change happens} +\includegraphics[scale=0.5]{./images/egypt} +\end{frame} + +\begin{frame} +\frametitle{You missed a use case} +\includegraphics<1>[scale=0.4]{./images/hidden-service-takedown-warning.jpg} +\includegraphics<2>[scale=0.8]{./images/ScreenHunter_03_Jun_26_18_11} +\includegraphics<3>[scale=1.0]{./images/tripoli-internet-monitoring-room-sign} +\end{frame} + +\begin{frame}[plain] +\frametitle{estimated 1 million daily users} +\includegraphics[scale=0.4]{./images/huge-crowd} +\end{frame} + +\begin{frame} +\frametitle{How is Tor different from other systems?} +\begin{overlayarea}{9cm}{6cm} +\only<1>{\includegraphics[height=7cm]{./images/single_hop_relay}} +\only<2>{\includegraphics[height=7cm]{./images/evil_single_hop_relay}} +\only<3>{\includegraphics[height=7cm]{./images/data_snooping_single_hop_relay}} +\end{overlayarea} +\end{frame} + +\begin{frame} +\frametitle{Tor hides communication patterns by relaying data through volunteer servers} +\begin{center} +\begin{overlayarea}{9cm}{6cm} +\only<1>{\includegraphics[width=9cm]{./images/tor-network}} +\only<2>{\includegraphics[width=9cm]{./images/tor-safe-selection}} +\only<3>{\includegraphics[width=9cm]{./images/tor-safe-path}} +\only<4>{\includegraphics[width=9cm]{./images/tor-keys1}} +\end{overlayarea} +\flushright{\tiny Diagram: Robert Watson} +\end{center} +\end{frame} + +\begin{frame} +\frametitle{Vidalia Network Map} +\includegraphics[scale=0.4]{./images/vidalia-network-map} +\end{frame} + +\begin{frame} +\frametitle{Metrics} +\begin{itemize} +\item Measuring metrics anonymously +\item NSF research grant +\item Archive of hourly consensus, ExoneraTor, VisiTor +\item Metrics portal: \ \url{https://metrics.torproject.org/%7D +\end{itemize} +\end{frame} + +\begin{frame} +\frametitle{Tor hidden services allow privacy enhanced hosting} +\includegraphics[scale=0.5]{./images/hidden-federalist} +\end{frame} + +\begin{frame} +\frametitle{dot onion you say?} +\includegraphics[scale=0.6]{./images/hidden-federalist-zoom} +\end{frame} + +\begin{frame} +\frametitle{Thanks!} +\includegraphics[scale=0.6]{./images/thankyou_img} +\flushright +Visit \url{https://www.torproject.org/%7D for more information, links, and ideas. +\end{frame} + +\begin{frame} +\frametitle{Credits & Thanks} +\begin{itemize} +\item applied theory, third image: Information Week,2011-04-09, http://www.informationweek.com/news/security/attacks/229400850 +\item applied theory, fourth image: Al Jazeera, February 2011 +\item six strikes, ars technica, \url{http://arstechnica.com/tech-policy/news/2011/07/major-isps-agree-to-six-stri... +\item spring is in the air, Paco Pomet, http://pacopomet.wordpress.com/ +\item who uses tor? \url{http://www.flickr.com/photos/mattw/2336507468/siz%7D, Matt Westervelt, CC-BY-SA. +\item danger!, \url{http://flickr.com/photos/hmvh/58185411/sizes/o/%7D, hmvh, CC-BY-SA. +\item 1 Million, \url{http://www.flickr.com/photos/lukaskracic/334850378/sizes/l/%7D, Luka Skracic, used with permission. +\end{itemize} +\end{frame} + +\end{document}
Property changes on: projects/presentations/2014-02-09-Cryptoparty-Boston.tex ___________________________________________________________________ Added: svn:mime-type + text/x-tex
Added: projects/presentations/2014-02-12-MIT-codesign-presentation.txt =================================================================== --- projects/presentations/2014-02-12-MIT-codesign-presentation.txt (rev 0) +++ projects/presentations/2014-02-12-MIT-codesign-presentation.txt 2014-04-04 10:52:19 UTC (rev 26691) @@ -0,0 +1,70 @@ +% Domestic Violence, Technology, and You +% Andrew Lewman, andrew@torproject.org +% 12 February 2014 + +# Who is this guy? + +501(c)(3) non-profit organization dedicated to the research and development of technologies for online anonymity and privacy. + +[https://www.torproject.org%5D(https://www.torproject.org) + +\begin{center} +\includegraphics[keepaspectratio,width=\textwidth, height=.8\textheight]{images/2009-oval_sticker_new} +\end{center} + +# Victims of Abuse + +Working with victims of infectious surveillance and trafficking. + +Provide anonymity and control of identity for the victims. + +Consult with law enforcement, advocacy organizations, and others to understand technology capabilities and usage in trafficking situations. + +# Infectious Surveillance + + - What is it? + +# Infectious Surveillance + + - 100 bucks is all it takes to ruin a life and those trying to help + +# Infectious Surveillance + + - Draft clean communications protocol, [https://wiki.tpo.is/%5D(https://wiki.tpo.is/) + +# Working with Advocates + + - Working with NNEDV, [https://blog.torproject.org/blog/ending-domestic-violence-nnedv-and-tor%5D(h...) + - Transition House, [http://www.transitionhouse.org/%5D(http://www.transitionhouse.org/) + - Emerge, [http://emergedv.com/%5D(http://emergedv.com/) + - REACH Beyond Domestic Violence, [http://reachma.org%5D(http://reachma.org) + +# Working with Law Enforcement + + - FBI, [https://blog.torproject.org/blog/trip-report-october-fbi-conference%5D(https...) + - UK SOCA, [https://blog.torproject.org/blog/meeting-soca-london%5D(https://blog.torproj...) + - DHS, ICE, DoJ, and others. + +# Success + +See 2 case studies at [https://wiki.tpo.is/Case%20Studies%5D(https://wiki.tpo.is/Case%20Studies) + + - Elderly worker + - Adult performer + +Fuerza [http://fuerza.is%5D(http://fuerza.is) mobile app to help diagnose stalking/surveillance + +# Challenges + +Lack of data on technology and DV + +Lack of awareness that "cyber" stalking/harassment is trauma inducing like physical abuse + +Relevant tech help for victims + + +# Thanks! + +\begin{center} +\includegraphics[keepaspectratio,width=\textwidth, height=.8\textheight]{images/thankyou_img} +\end{center} \ No newline at end of file
Property changes on: projects/presentations/2014-02-12-MIT-codesign-presentation.txt ___________________________________________________________________ Added: svn:eol-style + native Added: svn:mime-type + text/plain
Added: projects/presentations/2014-03-19-MIT-codesign-presentation.pdf =================================================================== (Binary files differ)
Property changes on: projects/presentations/2014-03-19-MIT-codesign-presentation.pdf ___________________________________________________________________ Added: svn:mime-type + application/octet-stream
Added: projects/presentations/2014-03-19-MIT-codesign-presentation.txt =================================================================== --- projects/presentations/2014-03-19-MIT-codesign-presentation.txt (rev 0) +++ projects/presentations/2014-03-19-MIT-codesign-presentation.txt 2014-04-04 10:52:19 UTC (rev 26691) @@ -0,0 +1,70 @@ +% Domestic Violence, Technology, and You +% Andrew Lewman, andrew@torproject.org +% 19 March 2014 + +# Who is this guy? + +501(c)(3) non-profit organization dedicated to the research and development of technologies for online anonymity and privacy. + +[https://www.torproject.org%5D(https://www.torproject.org) + +\begin{center} +\includegraphics[keepaspectratio,width=\textwidth, height=.8\textheight]{images/2009-oval_sticker_new} +\end{center} + +# Victims of Abuse + +Working with victims of infectious surveillance and trafficking. + +Provide anonymity and control of identity for the victims. + +Consult with law enforcement, advocacy organizations, and others to understand technology capabilities and usage in trafficking situations. + +# Infectious Surveillance + + - What is it? + +# Infectious Surveillance + + - 100 bucks is all it takes to ruin a life and those trying to help + +# Infectious Surveillance + + - Draft clean communications protocol, [https://wiki.ipvtech.is/%5D(https://wiki.ipvtech.is/) + +# Working with Advocates + + - Working with NNEDV, [https://blog.torproject.org/blog/ending-domestic-violence-nnedv-and-tor%5D(h...) + - Transition House, [http://www.transitionhouse.org/%5D(http://www.transitionhouse.org/) + - Emerge, [http://emergedv.com/%5D(http://emergedv.com/) + - REACH Beyond Domestic Violence, [http://reachma.org%5D(http://reachma.org) + +# Working with Law Enforcement + + - FBI, [https://blog.torproject.org/blog/trip-report-october-fbi-conference%5D(https...) + - UK SOCA, [https://blog.torproject.org/blog/meeting-soca-london%5D(https://blog.torproj...) + - DHS, ICE, DoJ, and others. + +# Success + +See 2 case studies at [https://wiki.ipvtech.is/Case%20Studies%5D(https://wiki.ipvtech.is/Case%20Stu...) + + - Elderly worker + - Adult performer + +Fuerza [http://fuerza.is%5D(http://fuerza.is) mobile app to help diagnose stalking/surveillance + +# Challenges + +Lack of data on technology and DV + +Lack of awareness that "cyber" stalking/harassment is trauma inducing like physical abuse + +Relevant tech help for victims + + +# Thanks! + +\begin{center} +\includegraphics[keepaspectratio,width=\textwidth, height=.8\textheight]{images/thankyou_img} +\end{center} \ No newline at end of file
Property changes on: projects/presentations/2014-03-19-MIT-codesign-presentation.txt ___________________________________________________________________ Added: svn:eol-style + native Added: svn:mime-type + text/plain
Added: projects/presentations/2014-04-03-CivilRightsDefenders-Workshop.pdf =================================================================== (Binary files differ)
Property changes on: projects/presentations/2014-04-03-CivilRightsDefenders-Workshop.pdf ___________________________________________________________________ Added: svn:mime-type + application/octet-stream
Added: projects/presentations/2014-04-03-CivilRightsDefenders-Workshop.txt =================================================================== --- projects/presentations/2014-04-03-CivilRightsDefenders-Workshop.txt (rev 0) +++ projects/presentations/2014-04-03-CivilRightsDefenders-Workshop.txt 2014-04-04 10:52:19 UTC (rev 26691) @@ -0,0 +1,182 @@ +% Civil Rights Defenders, Defender's Days +% Andrew Lewman andrew@torproject.org +% 03 April 2014 + +# Crash course + + - Anonymity Online + - Internet Freedom + - Tor and Tails + - Download Tor Browser & Use it + - Try tails (for non-Macs) + - Try Orbot, Firefox, Proxymob + +# Who is this guy? + +501(c)(3) non-profit organization dedicated to the research and development of technologies for online anonymity and privacy + +[https://www.torproject.org%5D(https://www.torproject.org) + +\begin{center} +\includegraphics[keepaspectratio,width=\textwidth, height=.8\textheight]{images/2009-oval_sticker_new} +\end{center} + +# Who wants anonymity online? + +\parbox{7cm}{\sloppy \setbeamercolor{background}[\includegraphics[scale=0.35]{./images/anonymousman}} +\parbox{3cm}{\sloppy +\begin{itemize} +\begin{small} +\item Normal people +\item Law Enforcement +\item Human Rights Activists +\item Business Execs +\item Militaries +\item Abuse Victims +\end{small} +\end{itemize} +} + +# How many people want anonymity? + +No idea. We're an anonymity system. + +However, the National Science Foundation has funded us to learn more: + +[https://metrics.torproject.org/%5D(https://metrics.torproject.org/) + +# Tor hides communication patterns by relaying data through volunteer servers + + \begin{center} + \begin{overlayarea}{9cm}{6cm} + \only<1>{\includegraphics[width=9cm]{./images/tor-network}} + \only<2>{\includegraphics[width=9cm]{./images/tor-safe-selection}} + \only<3>{\includegraphics[width=9cm]{./images/tor-safe-path}} + \only<4>{\includegraphics[width=9cm]{./images/tor-keys1}} + \end{overlayarea} + \flushright + \tiny Diagram: Robert Watson + \end{center} + +# Internet Freedom + +> Governments of the Industrial World, you weary giants of flesh and steel, I come from Cyberspace, the new home of Mind. On behalf of the future, I ask you of the past to leave us alone. You are not welcome among us. You have no sovereignty where we gather. + +> — John Perry Barlow, "A Declaration of the Independence of Cyberspace" + +> February 8, 1996 + +# ...applied theory... +\begin{center} +\includegraphics<1>[keepaspectratio,width=\textwidth, height=.8\textheight]{./images/2011-06-08-china-net-censorship-piracy-porn-crop} +\includegraphics<2>[keepaspectratio,width=\textwidth, height=.8\textheight]{./images/cropped-saudi-arabia-filter-message} +\includegraphics<3>[keepaspectratio,width=\textwidth, height=.8\textheight]{./images/wikipedia-internet-blackholes.pdf} +\includegraphics<4>[keepaspectratio,width=\textwidth, height=.8\textheight]{./images/procera-evolved-dpi} +\includegraphics<5>[keepaspectratio,width=\textwidth, height=.8\textheight]{./images/2011-10-arstechnica-major-isps-usa-6strikes} +\includegraphics<6>[keepaspectratio,width=\textwidth, height=.8\textheight]{./images/iran-ssl-dpi-26-seconds-to-death} +\includegraphics<7>[keepaspectratio,width=\textwidth, height=.8\textheight]{./images/2009-knowprivacy-report-webbug-domains} +\includegraphics<8>[keepaspectratio,width=\textwidth, height=.8\textheight]{./images/dataflow-futureprivacychart} +\end{center} + +# ...spring is in the air... +\begin{center} +\includegraphics[[keepaspectratio,width=\textwidth, height=.8\textheight]{./images/paco-primera-pagina-oleo-lienzo-110-x-150-cms-2008-red} +\end{center} + +# An example from Iran +\begin{center} +\includegraphics<1>[keepaspectratio,width=\textwidth, height=.8\textheight]{./images/2014-02-17-iranian-circumvention-tools.png} +\end{center} + +# Software + +We write a lot of free software. + +About half is GPLv2 and the other half 3-Clause BSD. + +# Software + +We write in C, C++, python, ruby, shell, javascript, java, perl, and whatever else I forgot. + +All our code is available at Tor's gitweb, https://gitweb.torproject.org + +or our old svn server, https://svn.torproject.org/. + +# Software - People + +33 core people. 6 female and 27 male. + +12 countries. Virtual team, virtual office. + +we talk via email, IRC, and XMPP. + +5,000+ volunteers, 85 countries. + +See what we've done in the past few years in our 2012 Annual Report + +[https://www.torproject.org/about/findoc/2012-TorProject-Annual-Report.pdf%5D...) + +# Software - Products + +We focus on six main products: + + - tor browser, [https://www.torproject.org/projects/torbrowser%5D(https://www.torproject.org...) + - arm, [http://www.atagar.com/arm/%5D(http://www.atagar.com/arm/) + - atlas/compass/metrics, https://(atlas%7Ccompass%7Cmetrics).torproject.org + - Pluggable Transpors, [https://www.torproject.org/docs/pluggable-transports.html.en%5D(https://www....) + - tor cloud, [https://cloud.torproject.org%5D(https://cloud.torproject.org) and + - tor itself. + +# Software - Tor Ecosystem + +Growing ecosystem of products: + + - tails, [https://tails.boum.org%5D(https://tails.boum.org) + - orbot, [https://guardianproject.info%5D(https://guardianproject.info) + - torchat, [https://github.com/prof7bit/TorChat%5D(https://github.com/prof7bit/TorChat) + - TorTV, [http://www.dyne.org/software/tortv/%5D(http://www.dyne.org/software/tortv/) + - Torouter, [https://trac.torproject.org/projects/tor/wiki/doc/Torouter%5D(https://trac.t...) + - Onion Browser, [https://mike.tig.as/onionbrowser/%5D(https://mike.tig.as/onionbrowser/) + +# Anonymous Operating System - Tails + +Tails is a live DVD or live USB that aims at preserving your privacy and anonymity. + +It's based on Debian Stable. + +# Anonymous Operating System - Tails + +It's used in 94 countries with an average client boot seen every 24 seconds around the clock. + +We sponsor Tails. + +We're doing a bug bounty program. This will fix a lot of bugs/feature requests in upstream. + +# Tails + +\includegraphics[keepaspectratio,width=\textwidth, height=.8\textheight]{./images/2013-02-19-tails-bootscreen.png} + +# Company + +The Tor Project, Inc runs on free software. + +We believe in transparency and sharing. Our code, designs, and content are all freely licensed (3-Clause BSD, GPL, or CC-BY-3.0) + +We publish our tickets, discussions, and contract details with the world on our wiki, [https://wiki.torproject.org%5D(https://wiki.torproject.org). + +# Thanks! + +\begin{center} +\includegraphics[keepaspectratio,width=\textwidth, height=.8\textheight]{images/thankyou_img} +\end{center} + +Visit [https://www.torproject.org%5D(https://www.torproject.org) for more information, links, and ideas. + +# Copyrights +\begin{itemize} +\item applied theory, first image: Reporters without Borders, http://www.rsf.org +\item applied theory, second image: Tor Project, Inc, https://blog.torproject.org/blog/update-internet-censorship-iran +\item applied theory, third image: Information Week,2011-04-09, http://www.informationweek.com/news/security/attacks/229400850 +\item applied theory, fourth image: Al Jazeera, February 2011 +\item spring is in the air, Paco Pomet, http://pacopomet.wordpress.com/ +\end{itemize}
Property changes on: projects/presentations/2014-04-03-CivilRightsDefenders-Workshop.txt ___________________________________________________________________ Added: svn:eol-style + native Added: svn:mime-type + text/plain
Added: projects/presentations/images/2014-02-17-iranian-circumvention-tools.png =================================================================== (Binary files differ)
Property changes on: projects/presentations/images/2014-02-17-iranian-circumvention-tools.png ___________________________________________________________________ Added: svn:mime-type + image/png
tor-commits@lists.torproject.org