Author: phobos Date: 2012-11-19 15:55:44 +0000 (Mon, 19 Nov 2012) New Revision: 25895
Added: projects/presentations/2012-11-16-EADV-Tech-Stalking-Advice.odp projects/presentations/2012-11-16-EADV-Tech-Stalking-Advice.pdf projects/presentations/images/2012-09-27-top-10-country-table.png projects/presentations/images/direct-users-2009-09-27-off-300-2012-09-27-all.png projects/presentations/images/grand-mosque-du-paris.jpg projects/presentations/images/grandma-at-computer.jpg projects/presentations/images/networksize-2009-09-27-300-2012-09-27.png projects/presentations/images/porn-star.jpg projects/presentations/images/save-the-corps.jpg projects/presentations/images/stalker-2.jpg Removed: projects/presentations/technical-solutions-to-internet-surveillance.tex Log: add my EADV presentation, remove the old tech pres we never use
Added: projects/presentations/2012-11-16-EADV-Tech-Stalking-Advice.odp =================================================================== (Binary files differ)
Property changes on: projects/presentations/2012-11-16-EADV-Tech-Stalking-Advice.odp ___________________________________________________________________ Added: svn:mime-type + application/octet-stream
Added: projects/presentations/2012-11-16-EADV-Tech-Stalking-Advice.pdf =================================================================== (Binary files differ)
Property changes on: projects/presentations/2012-11-16-EADV-Tech-Stalking-Advice.pdf ___________________________________________________________________ Added: svn:mime-type + application/octet-stream
Added: projects/presentations/images/2012-09-27-top-10-country-table.png =================================================================== (Binary files differ)
Property changes on: projects/presentations/images/2012-09-27-top-10-country-table.png ___________________________________________________________________ Added: svn:mime-type + image/png
Added: projects/presentations/images/direct-users-2009-09-27-off-300-2012-09-27-all.png =================================================================== (Binary files differ)
Property changes on: projects/presentations/images/direct-users-2009-09-27-off-300-2012-09-27-all.png ___________________________________________________________________ Added: svn:mime-type + image/png
Added: projects/presentations/images/grand-mosque-du-paris.jpg =================================================================== (Binary files differ)
Property changes on: projects/presentations/images/grand-mosque-du-paris.jpg ___________________________________________________________________ Added: svn:mime-type + image/jpeg
Added: projects/presentations/images/grandma-at-computer.jpg =================================================================== (Binary files differ)
Property changes on: projects/presentations/images/grandma-at-computer.jpg ___________________________________________________________________ Added: svn:mime-type + image/jpeg
Added: projects/presentations/images/networksize-2009-09-27-300-2012-09-27.png =================================================================== (Binary files differ)
Property changes on: projects/presentations/images/networksize-2009-09-27-300-2012-09-27.png ___________________________________________________________________ Added: svn:mime-type + image/png
Added: projects/presentations/images/porn-star.jpg =================================================================== (Binary files differ)
Property changes on: projects/presentations/images/porn-star.jpg ___________________________________________________________________ Added: svn:mime-type + image/jpeg
Added: projects/presentations/images/save-the-corps.jpg =================================================================== (Binary files differ)
Property changes on: projects/presentations/images/save-the-corps.jpg ___________________________________________________________________ Added: svn:mime-type + image/jpeg
Added: projects/presentations/images/stalker-2.jpg =================================================================== (Binary files differ)
Property changes on: projects/presentations/images/stalker-2.jpg ___________________________________________________________________ Added: svn:mime-type + image/jpeg
Deleted: projects/presentations/technical-solutions-to-internet-surveillance.tex =================================================================== --- projects/presentations/technical-solutions-to-internet-surveillance.tex 2012-11-18 20:54:03 UTC (rev 25894) +++ projects/presentations/technical-solutions-to-internet-surveillance.tex 2012-11-19 15:55:44 UTC (rev 25895) @@ -1,428 +0,0 @@ -\documentclass{beamer} -\mode<presentation> -\usetheme{Pittsburgh} -\usecolortheme{beaver} -\title{Technical Solutions to Internet Surveillance} -\author{Andrew Lewman \ andrew@torproject.org \ https://torproject.org%7D -\date{\today} -\begin{document} - -% General flow: -% internet is becoming centralized; good: cheaper to deploy, easier to manage; bad: control points, surveillance points -% govt wants data, see total info awareness (wow, look at that logo or how to freak out your population) (give credit to moxie) -% wiretapping the internet: mention some countries with programs about wiretapping, show nsa-room in AT&T San Fran -% here's a better way to collect vast amounts of data about your population: show facebook logo -% want more than just social interactions? show google logo, look at all of this data, email, instant messaging, topics of interest (search queries, results clicked, ads shown/clicked) -% is absence of signal enough to arouse suspicion? cell phone location data, google services, facebook accounts? -% how do you hide in a crowd without arousing suspicion? show tor headed liberty bell pic, don't be this guy -% - -\begin{frame} - \maketitle - \begin{center} - \includegraphics[height=3cm]{./images/2009-tor-logo} - \hspace{1cm} - \includegraphics[height=3cm]{./images/TIA-logo} - \end{center} -\end{frame} - -\begin{frame} -\frametitle{Internet architecture is becoming centralized} -\includegraphics[width=10cm]{./images/cnmap} -\flushright -\tiny Diagram: China Internet Network Information Center -\end{frame} - -\begin{frame} -\frametitle{Internet surveillance is pervasive} - - \begin{columns}[t] - \column{7cm} -\begin{itemize} -\item Conventional surveillance methods had to be targeted -\item Internet censorship is capable of monitoring everyone, all of the time -\item Governments are increasing monitoring: SORM (Russia), Golden Shield (China), Data Retention Directive (EU), and Interception Modernisation Programme (UK), Warrantless Wiretapping (USA) -\item 1 in 7 East German citizens worked for the Stasi. Today we can achieve the same results with a fraction of the cost -\end{itemize} - - \column{5cm} - \vbox{} - \parbox{5cm}{\includegraphics[width=4.5cm]{./images/nsa-room}} - \end{columns} - -\end{frame} - -\begin{frame} -\frametitle{Traffic data surveillance} - -\begin{itemize} -\item Traffic data (who talks to whom, how often and for how long) is the core of intelligence capabilities -\item This information is cheaper to record and store, compared to full content -\item Because it can be easily processed by computer, data mining techniques can be used to understand social structures -\end{itemize} - -\begin{quotation} -\noindent \includegraphics[width=1cm]{./images/opquo}\quad No government of any colour is to be trusted with such a roadmap to our souls -\end{quotation} -\flushright --- Sir Ken Macdonald, former director of public prosecutions, on the UK Interception Modernisation Program - -\end{frame} - -\begin{frame} - \frametitle{Importantly, information on social networks can be derived} - \begin{columns}[t] - \column{4.5cm} - \vspace{0cm} - - {\color{red}$\bullet$} Communities\newline - {\color{blue}$\bullet$} People - \column{7cm} - \vbox{} - - \includegraphics[clip, trim=5cm 12cm 2cm 5cm,width=7cm]{./images/network} - \end{columns} - \flushright{\tiny From "The Economics of Mass Surveillance" by George Danezis and Bettina Wittneben} - \end{frame} - -\begin{frame} -\frametitle{Search Engine results are censored} -\includegraphics[width=11cm]{./images/tiananmen} -\begin{center} -Searching for "Tiananmen Square" on Google.com and Google.cn -\end{center} -\end{frame} - -\begin{frame} -\frametitle{Sweden's iPRED experience} -\includegraphics[scale=1]{./images/netnodnov} -\end{frame} - -\begin{frame} -\frametitle{Incentives} -\noindent \includegraphics[width=1cm]{./images/opquo}\quad Our analysis shows that consumers increasingly want to decide for themselves when to watch and from which screen. Unfortunately, many have become adept at circumventing the IPRED legislation. -\flushright --- Jens Heron, Mediavision -\end{frame} - -\begin{frame} -\frametitle{Resisting Internet censorship} - -\begin{quotation} -\noindent \includegraphics[width=1cm]{./images/opquo}\quad The Net interprets censorship as damage and routes around it. -\end{quotation} -\flushright --- John Gilmore, 1993 - -\flushleft - -No longer true on a technical level: censorship is in the routers. -\medskip - -Remains true on a social level: when material is censored, people distribute copies and draw attention to them -\medskip - -But what if people are too afraid to do this? -\end{frame} - -\begin{frame} -\frametitle{Twitter in Iran: Good.} -\includegraphics[scale=0.5]{./images/twitter-iran-protests-time} -\flushright{\tiny From http://www.time.com/time/world/article/0,8599,1905125,00.html%7D -\end{frame} - -\begin{frame} -\frametitle{Twitter in USA: Bad.} -\includegraphics[scale=0.45]{./images/twitter-g20-pittsburgh-gothamist} -\flushright{\tiny from http://gothamist.com/2009/10/05/fbi%5C_raids%5C_queens%5C_home%5C_in%5C_g20%... -\end{frame} - - \begin{frame} - \frametitle{The Transparent Society} - - \begin{columns}[t] - \column{7cm} -\begin{itemize} -\item David Brin proposed that in a world of pervasive surveillance, balance could be maintained by allowing everyone to monitor everyone else -\item Bruce Schneier retorted that surveillance amplifies existing powers -\item Many countries restrict anonymous speech (e.g.\ Germany and China) -\item It is easy for those in power to call on the weak to link their names to opinions -\end{itemize} - - \column{5cm} - \vbox{} - \parbox{5cm}{\includegraphics[width=4.5cm]{./images/namesheet}} - -\flushright{\tiny Photo: Manos Simonides} - \end{columns} -\end{frame} - -\begin{frame} -\frametitle{Censorship resistance systems} -\begin{itemize} -\item Software to resist censorship should -\begin{itemize} - \item have a diverse set of users - \item work where you are without special steps - \item be sustainable (what if the company goes broke?) - \item be decentralized (swapping censors doesn't help you) - \item protect you by default - \item have accessible standards and published designs (black box vs. glass box) - \item be fast enough that you'll use it daily - \item doesn't promise perfect everything including a fully encrypted Internet -\end{itemize} -\item<1-> These properties should be maintained even if the censorship resistance system is partially compromised -\end{itemize} -\end{frame} - -\begin{frame} -\frametitle{Blocking with technology} -\begin{itemize} -\item When a country's government controls international connectivity, they can block requests for banned websites and destinations -\item There are a number of different approaches (DNS blocking, IP address blocking, etc.) -\item Software may be produced in-country, but often is an adapted commercial product -\item These companies not only make the software, but provide a continuously updated list of websites to be blocked -\end{itemize} -\end{frame} - - \begin{frame} - \frametitle{Normal web browsing} - - \begin{centering} - \vbox{} - - \includegraphics[clip, trim=1cm 4cm 1cm 2.2cm, width=10cm]{./images/no-proxy} - \end{centering} - -\vspace{-1cm} - - \flushright - - \tiny Diagram: Jane Gowan - - \end{frame} - - \begin{frame} - \frametitle{DNS tampering} - - \begin{centering} - \vbox{} - - \includegraphics[clip, trim=1cm 4cm 1cm 2.2cm, width=10cm]{./images/dns} - \end{centering} - -\vspace{-1cm} - - \flushright - - \tiny Diagram: Jane Gowan - - \end{frame} - - \begin{frame} - \frametitle{IP blocking} - - \begin{centering} - \vbox{} - - \includegraphics[clip, trim=1cm 4cm 1cm 2.2cm, width=10cm]{./images/ip} - \end{centering} - -\vspace{-1cm} - - \flushright - - \tiny Diagram: Jane Gowan - - \end{frame} - - \begin{frame} -\frametitle{Trade-offs in blocking systems} -\begin{itemize} -\item<1-> DNS blocking -\begin{itemize} -\item Easy and cheap to implement -\item Blocks at domain name granularity -- over blocks protocols, web pages -\item Trivial to bypass -\end{itemize} -\item<2-> IP blocking -\begin{itemize} -\item Easy and cheap to implement -\item Blocks at IP address (perhaps port) -- over-blocks virtual hosting -\end{itemize} -\item<3-> Proxy blocking -\begin{itemize} -\item Expensive to implement -\item Blocks at webpage level -- low over-blocking -\end{itemize} -\item<4-> Hybrid blocking -- IP based redirection to proxy -\begin{itemize} -\item Tricky to get right, but cheap -\item Has some vulnerabilities -\item Blocks at webpage level -- low over-blocking -\end{itemize} -\end{itemize} -\end{frame} - -\begin{frame} -\frametitle{Who wants online privacy?} -\begin{itemize} -\item<1-> Ordinary people -\begin{itemize} -\item To avoid personal information being sold to marketers -\item Protect themselves when researching sensitive topics -\end{itemize} -\item<2-> Military and Law Enforcement -\begin{itemize} -\item To carry out intelligence gathering -\item Protect undercover field agents -\item Offer anonymous tip lines -\end{itemize} -\item<3-> Journalists -\begin{itemize} -\item To protect sources, such as whistle blowers -\end{itemize} -\item<4-> Human rights workers -\begin{itemize} -\item To publicize abuses and protect themselves from surveillance -\item Blogging about controversial subjects -\end{itemize} -\item<5-> Businesses -\begin{itemize} -\item To observe their competition and build anonymous collaborations -\end{itemize} -\end{itemize} -\end{frame} - -\begin{frame} -\frametitle{Anonymous communication} -\begin{itemize} -\item People have to hide in a crowd of other people ("anonymity loves company") -\item The goal of the system is to make all users look as similar as possible, to give a bigger crowd -\item Hide who is communicating with whom -\item Layered encryption and random delays hide correlation between input traffic and output traffic -\end{itemize} -\end{frame} - -\begin{frame} -\frametitle{Tor is a low-latency anonymity system} -\begin{itemize} -\item<1-> Based on technology developed in the Onion Routing project -\item<2-> Privacy by design, not by policy (no data collected) -\item<3-> Commonly used for web browsing and instant messaging (works for any TCP traffic) -\item<4-> Originally built as a pure anonymity system (hides who is talking to whom) -\item<5-> Now designed to resist censorship too (hides whether someone is using the system at all) -\item<6-> Centralized directory authorities publish a list of all servers; client doesn't trust the network by design -\end{itemize} - -\begin{center} -\includegraphics[height=3cm]{./images/2009-tor-logo} -\end{center} - -\end{frame} - - \begin{frame} - \frametitle{Tor hides communication patterns by relaying data through volunteer servers} - \begin{center} - \begin{overlayarea}{9cm}{6cm} - \only<1>{\includegraphics[width=9cm]{./images/tor-network}} - \only<2>{\includegraphics[width=9cm]{./images/tor-safe-selection}} - \only<3>{\includegraphics[width=9cm]{./images/tor-safe-path}} - \end{overlayarea} - \flushright - - \tiny Diagram: Robert Watson - \end{center} - \end{frame} - -\begin{frame} -\frametitle{Tor hidden services allow censorship resistant services} -\includegraphics[scale=0.5]{./images/wikileaks} -\end{frame} - -\begin{frame} -\frametitle{How is Tor different from other systems?} -\[1cm] -\begin{center} -\only<1>{\includegraphics[height=7cm]{./images/single_hop_relay}} -\only<2>{\includegraphics[height=7cm]{./images/evil_single_hop_relay}} -\only<3>{\includegraphics[height=7cm]{./images/data_snooping_single_hop_relay}} -\end{center} -\end{frame} - -\begin{frame} -\frametitle{Limitations of censorship resistance} -\begin{itemize} -\item Censorship resistance is thought controversial -- especially by the censors -\item There is something for everyone to like, and something for everyone to dislike, going on with censorship resistance systems -\item Bad people do use them to do bad things (for many different definitions of bad people) -\item It is impossible to block bad uses, even if we could come up with a common definition of bad content -\item The systems are not perfect, so it is possible some people will be caught -\end{itemize} -\end{frame} - -\begin{frame} -\frametitle{Conclusions} - \begin{columns}[t] - \column{7cm} - \begin{itemize} - \item The Internet and centralisation can both improve and harm freedom of speech - \item Slogans regarding the borderless nature and inherent freedoms of the Internet are frequently wrong - \item Technical details matter: how a system is implemented can make a radical difference - \item Technologies can be used to resist censorship and improve privacy - \item However, policies must be changed too and pressure is needed on legislators - \end{itemize} - \column{5cm} - \vbox{} - \begin{overlayarea}{5cm}{10cm} - \resizebox{5cm}{!}{\includegraphics{./images/collage}} - \end{overlayarea} - \end{columns} -\end{frame} - -\begin{frame} -\frametitle{One Version of the Future} -\begin{quotation} -\noindent \includegraphics[width=1cm]{./images/opquo}\quad I'd like to change the design of the Internet by introducing -regulation--Internet passports, Internet police and international -agreement--about following Internet standards. And if some countries -don't agree with or don't pay attention to the agreement, just cut -them off. -\end{quotation} -\flushright --- Eugene Kaspersky, Co-Founder & CEO of Kaspersky Labs -\end{frame} - -\begin{frame} -\frametitle{A better version of the future} -\textbf{Internet Access as a Human Right} -\medskip -\begin{quotation} -\noindent \includegraphics[width=1cm]{./images/opquo}\quad -We think it's something you cannot live without in modern society. Like banking services or water or electricity, you need an Internet connection -\end{quotation} -\flushright --- Laura Vilkkonen, Ministry of Transport and Communications, Finland - -\bigskip -\textbf{Tor Project's Mission} -\medskip -\begin{quotation} -\noinent \includegraphics[width=1cm]{./images/opquo}\quad We remain committed to defending online privacy and anonymity as a human right. -\end{quotation} -\end{frame} - -\begin{frame} -\frametitle{How to get there} -\begin{itemize} -\item Increased funding of research and development for privacy, circumvention, and anti-censorship technologies -\item Policy and Legal frameworks for free access, free speech, and anonymity -%\item Mobile devices and telco innovation -%\item Ambient connectivity -\end{itemize} -\end{frame} - -\begin{frame} -\frametitle{Credits} -\begin{itemize} -\item Thank you to Steven J. Murdoch, \url{http://www.cl.cam.ac.uk/users/sjm217/%7D, for the research and basis for this presentation. \ -\item Photographer and Diagram credits as listed throughout the presentation. -\end{itemize} -\end{frame} - -\end{document}
tor-commits@lists.torproject.org