[or-cvs] r22219: {} Share all of our presentations, source files, and included i (in projects: . presentations presentations/images)

Andrew Lewman andrew at torproject.org
Wed Apr 21 19:00:45 UTC 2010


Author: phobos
Date: 2010-04-21 19:00:45 +0000 (Wed, 21 Apr 2010)
New Revision: 22219

Added:
   projects/presentations/
   projects/presentations/2008-07-17-NNEDV-Presentation.odp
   projects/presentations/2008-07-17-NNEDV-Presentation.pdf
   projects/presentations/2008-08-Defcon-TorPresentation.pdf
   projects/presentations/2009-01-21-MIT-MEDIA-Presentation.odp
   projects/presentations/2009-01-21-MIT-MEDIA-Presentation.pdf
   projects/presentations/2009-06-03-CFP2009-Tor-QuickTake.odp
   projects/presentations/2009-08-28-Tor Trifold in PP.odp
   projects/presentations/2009-10-26-PbD-Panel-Presentation.odp
   projects/presentations/2009-10-26-PbD-Panel-Presentation.pdf
   projects/presentations/2009-11-04-CASCON-Presentation.pdf
   projects/presentations/2009-11-04-CASCON-Presentation.tex
   projects/presentations/2009-Censorship-HighLevel-Presentation.pdf
   projects/presentations/2009-FBI-Online-Anonymity-with-Tor.odp
   projects/presentations/2009-FBI-Online-Anonymity-with-Tor.pdf
   projects/presentations/2009-General-Background-on-Tor-Project-Inc.odp
   projects/presentations/2009-General-Online-Anonymity-with-Tor.odp
   projects/presentations/2009-NED-Tor-Iran-Panel.odp
   projects/presentations/2010-FOSDEM-Freespeech-opensource-onlineprivacy.pdf
   projects/presentations/2010-FOSDEM-Freespeech-opensource-onlineprivacy.tex
   projects/presentations/2010-itsg-tor-overview.pdf
   projects/presentations/2010-itsg-tor-overview.tex
   projects/presentations/Anonymity-Online-Presentation.pdf
   projects/presentations/Anonymity-Online-Presentation.tex
   projects/presentations/Censorship-HighLevel-Presentation.pdf
   projects/presentations/Censorship-HighLevel-Presentation.tex
   projects/presentations/Defcon_Presentation.pdf
   projects/presentations/FBI-Online-Anonymity-with-Tor.odp
   projects/presentations/FBI-Online-Anonymity-with-Tor.pdf
   projects/presentations/amnesty09freedom.pdf
   projects/presentations/cl08security-anon.pdf
   projects/presentations/general-anonymity-presentation.odp
   projects/presentations/iccs-fordham-jan09.odp
   projects/presentations/images/
   projects/presentations/images/1513071722_0cf9da3d33.jpg
   projects/presentations/images/167234088_08f07f0dbe_o.jpg
   projects/presentations/images/2007-tor-funding-pie-chart.png
   projects/presentations/images/2008-funding-chart.png
   projects/presentations/images/2009-10-12-china-bridge-usage.png
   projects/presentations/images/2009-10-12-china-dirreq-trusted.png
   projects/presentations/images/2009-oval_sticker_new.png
   projects/presentations/images/2009-tor-logo.png
   projects/presentations/images/2124665370_420_1.jpg
   projects/presentations/images/288531950_8ec4c4c057.jpg
   projects/presentations/images/771997673_ef1f763d99.jpg
   projects/presentations/images/800px-Decryption_mix_net.png
   projects/presentations/images/93915772_3cac42d9f4_o.jpg
   projects/presentations/images/Blue-question-mark.jpg
   projects/presentations/images/Fixedfreeweb.png
   projects/presentations/images/Horizontal_RGB_600.png
   projects/presentations/images/P7100001.jpg
   projects/presentations/images/PNS1-CK-1555_520x345x90.jpg
   projects/presentations/images/PbDlogo-web.jpg
   projects/presentations/images/ScreenHunter_03 Jun. 26 18.11.gif
   projects/presentations/images/Screenshot-24 June 2009 Tehran Election Protests - Google Maps - Iceweasel.png
   projects/presentations/images/Screenshot-CBC.ca - Canadian News Sports Entertainment Kids Docs Radio TV - Mozilla Firefox-1.png
   projects/presentations/images/Screenshot-CBC.ca - Canadian News Sports Entertainment Kids Docs Radio TV - Mozilla Firefox.png
   projects/presentations/images/Screenshot-PageInfo-www.privacybydesign.ca.png
   projects/presentations/images/Screenshot-Privacy by Design.ca - Mozilla Firefox.png
   projects/presentations/images/Screenshot-Whois record for 71.174.247.46 - Mozilla Firefox-ZOOMED.png
   projects/presentations/images/Screenshot-Whois record for 71.174.247.46 - Mozilla Firefox.png
   projects/presentations/images/Screenshot-WinXP-Play [Running] - Sun VirtualBox-1.png
   projects/presentations/images/Screenshot-WinXP-Play [Running] - Sun VirtualBox.png
   projects/presentations/images/anonbib-screenshot.png
   projects/presentations/images/anonymousman.jpg
   projects/presentations/images/berlin-large-crowd.jpg
   projects/presentations/images/chacha.jpg
   projects/presentations/images/chimage.php.gif
   projects/presentations/images/cnmap.jpg
   projects/presentations/images/collage.png
   projects/presentations/images/cropped-anon-man.png
   projects/presentations/images/cropped-hijack-sign-south-africa.jpg
   projects/presentations/images/danger-sign.jpg
   projects/presentations/images/data_snooping_single_hop_relay.jpg
   projects/presentations/images/dns.pdf
   projects/presentations/images/encryption-cc-by-sa.png
   projects/presentations/images/evil-single-hop-proxy.png
   projects/presentations/images/evil_single_hop_relay.jpg
   projects/presentations/images/gfw-topology.svg
   projects/presentations/images/google_tracking.jpg
   projects/presentations/images/guardian-crop.png
   projects/presentations/images/guardian-search.png
   projects/presentations/images/head_logo.png
   projects/presentations/images/hijack-sign-south-africa.jpg
   projects/presentations/images/hrichina.png
   projects/presentations/images/huge-crowd.jpg
   projects/presentations/images/images_pic-large-27489-In_the_future.jpg
   projects/presentations/images/ip.pdf
   projects/presentations/images/ir-firewall-port-filters.jpg
   projects/presentations/images/ir-outages.jpg
   projects/presentations/images/ir.png
   projects/presentations/images/iran-internet-connectivity-TAE-14.gif
   projects/presentations/images/iran-protest-cc-by.jpg
   projects/presentations/images/irc-image-cc-nc-sa.jpg
   projects/presentations/images/islameyat.png
   projects/presentations/images/kareem.jpg
   projects/presentations/images/mix.pdf
   projects/presentations/images/murray.jpg
   projects/presentations/images/namesheet.jpg
   projects/presentations/images/netmap_mac.png
   projects/presentations/images/netnodnov.jpg
   projects/presentations/images/network.pdf
   projects/presentations/images/no-proxy.pdf
   projects/presentations/images/nsa-room.jpg
   projects/presentations/images/observer.png
   projects/presentations/images/opquo.png
   projects/presentations/images/orangemen.jpg
   projects/presentations/images/playboy.png
   projects/presentations/images/remailer.pdf
   projects/presentations/images/renesys-ir-proxycount.png
   projects/presentations/images/rigby-anonymity.html
   projects/presentations/images/security.png
   projects/presentations/images/single-hop-proxy.png
   projects/presentations/images/single_hop_relay.jpg
   projects/presentations/images/steganography-cc-by-sa.jpg
   projects/presentations/images/tiananmen.png
   projects/presentations/images/tor-keys1.pdf
   projects/presentations/images/tor-keys2.pdf
   projects/presentations/images/tor-keys3.pdf
   projects/presentations/images/tor-lines-of-code-by-language.png
   projects/presentations/images/tor-network.pdf
   projects/presentations/images/tor-safe-path.pdf
   projects/presentations/images/tor-safe-selection.pdf
   projects/presentations/images/totalLong.png
   projects/presentations/images/twitter-g20-pittsburgh-gothamist.png
   projects/presentations/images/twitter-iran-protests-time.png
   projects/presentations/images/wikileaks-cropped.png
   projects/presentations/images/wikileaks.png
   projects/presentations/images/yellow-crowd.jpg
   projects/presentations/pugwash08censorship.pdf
   projects/presentations/slides-24c3.odp
   projects/presentations/slides-24c3.pdf
   projects/presentations/slides-26c3.pdf
   projects/presentations/slides-bh07.odp
   projects/presentations/slides-bh07.pdf
   projects/presentations/slides-csf.odp
   projects/presentations/slides-fbi-sep09.odp
   projects/presentations/slides-fbi-sep09.pdf
   projects/presentations/slides-gv08.odp
   projects/presentations/slides-twitter.pdf
Log:
Share all of our presentations, source files, and included images with
the world.  ta da.


Added: projects/presentations/2008-07-17-NNEDV-Presentation.odp
===================================================================
(Binary files differ)


Property changes on: projects/presentations/2008-07-17-NNEDV-Presentation.odp
___________________________________________________________________
Added: svn:mime-type
   + application/octet-stream

Added: projects/presentations/2008-07-17-NNEDV-Presentation.pdf
===================================================================
(Binary files differ)


Property changes on: projects/presentations/2008-07-17-NNEDV-Presentation.pdf
___________________________________________________________________
Added: svn:mime-type
   + application/octet-stream

Added: projects/presentations/2008-08-Defcon-TorPresentation.pdf
===================================================================
(Binary files differ)


Property changes on: projects/presentations/2008-08-Defcon-TorPresentation.pdf
___________________________________________________________________
Added: svn:mime-type
   + application/octet-stream

Added: projects/presentations/2009-01-21-MIT-MEDIA-Presentation.odp
===================================================================
(Binary files differ)


Property changes on: projects/presentations/2009-01-21-MIT-MEDIA-Presentation.odp
___________________________________________________________________
Added: svn:mime-type
   + application/octet-stream

Added: projects/presentations/2009-01-21-MIT-MEDIA-Presentation.pdf
===================================================================
(Binary files differ)


Property changes on: projects/presentations/2009-01-21-MIT-MEDIA-Presentation.pdf
___________________________________________________________________
Added: svn:mime-type
   + application/octet-stream

Added: projects/presentations/2009-06-03-CFP2009-Tor-QuickTake.odp
===================================================================
(Binary files differ)


Property changes on: projects/presentations/2009-06-03-CFP2009-Tor-QuickTake.odp
___________________________________________________________________
Added: svn:mime-type
   + application/octet-stream

Added: projects/presentations/2009-08-28-Tor Trifold in PP.odp
===================================================================
(Binary files differ)


Property changes on: projects/presentations/2009-08-28-Tor Trifold in PP.odp
___________________________________________________________________
Added: svn:mime-type
   + application/octet-stream

Added: projects/presentations/2009-10-26-PbD-Panel-Presentation.odp
===================================================================
(Binary files differ)


Property changes on: projects/presentations/2009-10-26-PbD-Panel-Presentation.odp
___________________________________________________________________
Added: svn:mime-type
   + application/octet-stream

Added: projects/presentations/2009-10-26-PbD-Panel-Presentation.pdf
===================================================================
(Binary files differ)


Property changes on: projects/presentations/2009-10-26-PbD-Panel-Presentation.pdf
___________________________________________________________________
Added: svn:mime-type
   + application/octet-stream

Added: projects/presentations/2009-11-04-CASCON-Presentation.pdf
===================================================================
(Binary files differ)


Property changes on: projects/presentations/2009-11-04-CASCON-Presentation.pdf
___________________________________________________________________
Added: svn:mime-type
   + application/octet-stream

Added: projects/presentations/2009-11-04-CASCON-Presentation.tex
===================================================================
--- projects/presentations/2009-11-04-CASCON-Presentation.tex	                        (rev 0)
+++ projects/presentations/2009-11-04-CASCON-Presentation.tex	2010-04-21 19:00:45 UTC (rev 22219)
@@ -0,0 +1,165 @@
+\documentclass{beamer}
+\mode<presentation>
+\usetheme{Pittsburgh}
+\usecolortheme{beaver}
+\title{Tor Research and Development}
+\author{Andrew Lewman \\ andrew at torproject.org}
+\date{November 4, 2009}
+\begin{document}
+
+\begin{frame}
+\maketitle  
+\begin{center}
+\includegraphics[height=3cm]{2009-tor-logo}
+\end{center}
+\end{frame}
+
+\begin{frame}
+\frametitle{The Tor Project, Inc.}
+501(c)(3) non-profit organization dedicated to the research and development of technologies for online anonymity and privacy
+\begin{center}
+\includegraphics[height=5cm]{2009-oval_sticker_new}
+\end{center}
+\end{frame}
+
+\begin{frame}
+\frametitle{What is Tor?}
+\begin{itemize}
+\item online anonymity software and network
+\pause \item open source, freely available (3-clause BSD license)
+\pause \item active research environment: \\
+Rice, UMN, NSF, NRL, Drexel, Waterloo, Cambridge UK, Bamberg Germany, Boston U, Harvard, MIT, RPI, GaTech
+\pause \item increasingly diverse toolset: \\
+Tor, Torbutton, Tor Browser Bundle, TorVM, Incognito LiveCD, Tor Weather, Tor auto-responder, Secure Updater, Orbot, TorFox, Torora, Portable Tor, Tor Check, Arm, Nymble, Tor Control, Tor Wall
+\end{itemize}
+\end{frame}
+
+\begin{frame}
+\frametitle{estimated 300,000 daily users}
+\setbeamercolor{background}[\includegraphics[height=9cm]{huge-crowd}]
+\end{frame}
+
+\begin{frame}
+\frametitle{Who funds Tor?}
+\setbeamercolor{background}[\includegraphics[height=5cm]{2008-funding-chart}
+\end{frame}
+
+\begin{frame}
+\frametitle{Who uses Tor?}
+\parbox{5cm}{\sloppy \setbeamercolor{background}[\includegraphics[height=7cm]{anonymousman}}
+\parbox{5cm}{\sloppy 
+\begin{itemize}
+\begin{small}
+\item Normal people
+\item Law Enforcement
+\item Human Rights Activists
+\item Business Execs
+\item Militaries
+\item Abuse Victims
+\end{small}
+\end{itemize}
+}
+\end{frame}
+
+\begin{frame}
+\frametitle{\url{http://freehaven.net/anonbib/}}
+\setbeamercolor{background}[\includegraphics[height=7cm]{anonbib-screenshot}]
+\end{frame}
+
+\begin{frame}
+\frametitle{Performance}
+\begin{itemize}
+\item Circuit Latency
+\item Relay capacity estimation
+\item bandwidth authorities
+\item cell sizing
+\end{itemize}
+\end{frame}
+
+\begin{frame}
+\frametitle{Metrics}
+\begin{itemize}
+\item Measuring metrics anonymously
+\pause \item NSF grant to find out
+\pause \item Metrics portal: \\ \url{https://www.torproject.org/projects/metrics}
+\end{itemize}
+\end{frame}
+
+\begin{frame}
+\frametitle{Bridge Distribution Strategies}
+\begin{itemize}
+\item Websites, email, social media tools are working well. 
+\pause \begin{itemize}
+	\item bridges at torproject.org
+	\item https://bridges.torproject.org
+	\item Twitter, QQ, Wordpress Plugin
+	\end{itemize} 
+\pause \item Bootstrapping problem.
+\end{itemize}
+\end{frame}
+
+\begin{frame}
+\frametitle{Censorship Resistance}
+\begin{itemize}
+\item Theoretical blocking strategies from the censors?
+\pause (Cryptographers can dream up some pretty fancy strategies)
+\pause \item Applied blocking to date
+\pause \begin{itemize}
+		\item dns blocking
+		\item ip address blocking
+		\item blocking or throttling all SSL
+		\end{itemize}
+\pause \item Blocking resistant strategies
+\end{itemize}
+\end{frame}
+
+\begin{frame}
+\frametitle{Operating Systems leak info like a sieve}
+\parbox{5cm}{\sloppy \setbeamercolor{background}[\includegraphics[height=7cm]{cropped-hijack-sign-south-africa}}
+\parbox{5cm}{\begin{itemize}
+\item Applications, network stacks, plugins, oh my....
+\pause some call this "sharing"
+\pause \item Did you know Microsoft Word and OpenOffice Writer are browsers?
+\pause \item \url{http://www.decloak.net/} is a fine test
+\end{itemize}
+}
+\end{frame}
+
+\begin{frame}
+\frametitle{Mobile Operating Systems}
+\begin{itemize}
+\item Entirely new set of challenges for something designed to know where you are
+\pause \item Orbot:  Tor on Android.  \url{http://openideals.com/2009/10/22/orbot-proxy/}
+\pause \item iphone, maemo, symbian, etc
+\pause \item Tor on Windows CE, \url{http://www.gsmk.de} as an example.
+\end{itemize}
+\end{frame}
+
+\begin{frame}
+\frametitle{Anonymity Online Research}
+\framesubtitle{or attacks galore}
+\begin{itemize}
+\item Website fingerprinting attacks
+\pause \item Traffic confirmation attacks
+\pause \item Timing attacks
+\pause \item Routing zones/Autonomous System attacks
+\pause \item Denial of Service resistance
+\pause \item Parititioning/DHT/Shared Consensus Attacks
+\end{itemize}
+\end{frame}
+
+\begin{frame}
+\frametitle{Next steps}
+Visit \url{https://www.torproject.org/volunteer\#Research} for more information, links, and ideas.
+\end{frame}
+
+\begin{frame}
+\frametitle{Credits \& Thanks}
+\begin{itemize}
+\item who uses tor? \url{http://www.flickr.com/photos/mattw/2336507468/siz}, Matt Westervelt, CC-­BY-­SA.
+\item danger!, \url{http://flickr.com/photos/hmvh/58185411/sizes/o/}, hmvh, CC-­BY-­SA.
+\item 300k, \url{http://www.flickr.com/photos/lukaskracic/334850378/sizes/l/}, Luka Skracic, used with permission.
+\end{itemize}
+\end{frame}
+
+\end{document}


Property changes on: projects/presentations/2009-11-04-CASCON-Presentation.tex
___________________________________________________________________
Added: svn:mime-type
   + text/x-tex

Added: projects/presentations/2009-Censorship-HighLevel-Presentation.pdf
===================================================================
(Binary files differ)


Property changes on: projects/presentations/2009-Censorship-HighLevel-Presentation.pdf
___________________________________________________________________
Added: svn:mime-type
   + application/octet-stream

Added: projects/presentations/2009-FBI-Online-Anonymity-with-Tor.odp
===================================================================
(Binary files differ)


Property changes on: projects/presentations/2009-FBI-Online-Anonymity-with-Tor.odp
___________________________________________________________________
Added: svn:mime-type
   + application/octet-stream

Added: projects/presentations/2009-FBI-Online-Anonymity-with-Tor.pdf
===================================================================
(Binary files differ)


Property changes on: projects/presentations/2009-FBI-Online-Anonymity-with-Tor.pdf
___________________________________________________________________
Added: svn:mime-type
   + application/octet-stream

Added: projects/presentations/2009-General-Background-on-Tor-Project-Inc.odp
===================================================================
(Binary files differ)


Property changes on: projects/presentations/2009-General-Background-on-Tor-Project-Inc.odp
___________________________________________________________________
Added: svn:mime-type
   + application/octet-stream

Added: projects/presentations/2009-General-Online-Anonymity-with-Tor.odp
===================================================================
(Binary files differ)


Property changes on: projects/presentations/2009-General-Online-Anonymity-with-Tor.odp
___________________________________________________________________
Added: svn:mime-type
   + application/octet-stream

Added: projects/presentations/2009-NED-Tor-Iran-Panel.odp
===================================================================
(Binary files differ)


Property changes on: projects/presentations/2009-NED-Tor-Iran-Panel.odp
___________________________________________________________________
Added: svn:mime-type
   + application/octet-stream

Added: projects/presentations/2010-FOSDEM-Freespeech-opensource-onlineprivacy.pdf
===================================================================
(Binary files differ)


Property changes on: projects/presentations/2010-FOSDEM-Freespeech-opensource-onlineprivacy.pdf
___________________________________________________________________
Added: svn:mime-type
   + application/octet-stream

Added: projects/presentations/2010-FOSDEM-Freespeech-opensource-onlineprivacy.tex
===================================================================
--- projects/presentations/2010-FOSDEM-Freespeech-opensource-onlineprivacy.tex	                        (rev 0)
+++ projects/presentations/2010-FOSDEM-Freespeech-opensource-onlineprivacy.tex	2010-04-21 19:00:45 UTC (rev 22219)
@@ -0,0 +1,320 @@
+\documentclass{beamer}
+\mode<presentation>
+\usetheme{Pittsburgh}
+\usecolortheme{beaver}
+\title{Understanding, Growing, \& Extending Online Anonymity with Tor}
+\author{Andrew Lewman \\ andrew at torproject.org}
+\date{07 Feb 2010}
+\begin{document}
+
+\begin{frame}
+\maketitle  
+\begin{center}
+\includegraphics[height=3cm]{2009-tor-logo}
+\hspace{1cm} 
+\includegraphics[height=3cm]{../Marketing/mullah}
+\end{center}
+\end{frame}
+  
+\begin{frame}
+\frametitle{What is anonymity?}
+\includegraphics[width=10cm]{../Marketing/2llg3ts}
+\end{frame}
+
+\begin{frame}
+\frametitle{Anonymity isn't cryptography}
+\begin{itemize}
+\item Cryptography protects the contents in transit
+\item You still know who is talking to whom, how often, and how much data is sent.
+\end{itemize}
+\begin{center}
+\includegraphics[width=5cm]{encryption-cc-by-sa}
+\end{center}
+\end{frame}
+
+\begin{frame}
+\frametitle{Anonymity isn't steganography}
+Attacker can tell Alice is talking to someone, how often, and how much data is sent.
+\bigskip
+
+\begin{center}
+\includegraphics[width=5cm]{steganography-cc-by-sa}
+\end{center}
+\end{frame}
+
+\begin{frame}
+\frametitle{Anonymity isn't just wishful thinking...}
+\begin{itemize}
+\item "You can't prove it was me!"
+\pause \item "Promise you won't look"
+\pause \item "Promise you won't remember"
+\pause \item "Promise you won't tell"
+\pause \item "I didn't write my name on it!"
+\pause \item "Isn't the Internet already anonymous?"
+\end{itemize}
+\end{frame}
+
+\begin{frame}
+\frametitle{..since "weak" isn't anonymity.}
+\begin{itemize}
+\item \textit{"You can't prove it was me!"}  Proof is a very \textbf{strong} word.  Statistical analysis allows suspicion to become certainty.
+\pause \item \textit{"Promise you won't look/remember/tell"}  Will other parties have the abilities and incentives to keep these promises?
+\pause \item \textit{"I didn't write my name on it!"}  Not what we're talking about.
+\pause \item \textit{"Isn't the Internet already anonymous?"}  Nope!
+\end{itemize}
+\end{frame}
+
+\begin{frame}
+\frametitle{Who wants anonymity online?}
+\begin{itemize}
+\item Ordinary people
+	\begin{itemize}
+	\item To avoid personal information being sold to marketers
+	\item Protect themselves when researching sensitive topics
+	\end{itemize}
+\item Militaries and law enforcement
+	\begin{itemize}
+	\item To carry out intelligence gathering
+	\item Protect undercover field agents
+	\item Offer anonymous tip lines
+	\end{itemize}
+\item Journalists
+	\begin{itemize}
+	\item To protect sources, such as whistle blowers
+	\end{itemize}
+\item Human rights workers
+	\begin{itemize}
+	\item To publicize abuses and protect themselves from surveillance
+	\item Blogging about controversial subjects
+	\end{itemize}
+\item Businesses
+	\begin{itemize}
+	\item To observe their competition and build anonymous collaborations
+	\end{itemize}
+\end{itemize}
+\end{frame}
+
+\begin{frame}
+\frametitle{Anonymous communication}
+\begin{itemize}
+\item People have to hide in a crowd of other people ("anonymity loves company")
+\item The goal of the system is to make all users look as similar as possible, to give a bigger crowd
+\item Hide who is communicating with whom
+\item Layered encryption and random delays hide correlation between input traffic and output traffic
+\end{itemize}
+\end{frame}
+
+\begin{frame}
+\frametitle{Low versus High-latency anonymous communication systems}
+\begin{itemize}
+\item Tor is not the first system; ZKS, mixmaster, single-hop proxies, Crowds, Java Anon Proxy.
+\item Low-latency systems are vulnerable to end-to-end correlation attacks.
+\item High-latency systems are more resistant to end-to-end correlation attacks, but by definition, less interactive.
+\end{itemize}
+\end{frame}
+
+\begin{frame}
+\frametitle{Low-latency systems are generally more attractive to today's user}
+\begin{itemize}
+\item Interactive apps: web, instant messaging, VOIP, ssh, X11, cifs/nfs, video streaming (millions of users)
+\item Multi-hour delays: email, nntp, blog posting? (tens of thousands of users?)
+\pause \item \begin{center}\begin{Large}And if anonymity loves company...\end{Large}\end{center}
+\end{itemize}
+\end{frame}
+
+\begin{frame}
+\frametitle{What is Tor?}
+\begin{itemize}
+\item online anonymity, circumvention software and network
+\item open source, free software (BSD 3-clause \& GPLv2 licenses)
+\pause \item active research environment: \\
+Rice, UMN, NSF, NRL, Drexel, Waterloo, Cambridge UK, Bamberg Germany, Boston U, Harvard, MIT, RPI, GaTech
+\pause \item increasingly diverse toolset: \\
+Tor, Torbutton, Tor Browser Bundle, TorVM, Incognito LiveCD, Tor Weather, Tor auto-responder, Secure Updater, Orbot, TorFox, Torora, Portable Tor, Tor Check, Arm, Nymble, Tor Control, Tor Wall
+\end{itemize}
+\end{frame}
+
+\begin{frame}
+\frametitle{Who is The Tor Project, Inc?}
+\begin{columns}[c]
+\column{5cm}
+\includegraphics[height=4.5cm]{2009-oval_sticker_new}
+\column{5cm}
+The 501(c)(3) non-profit organization dedicated to the research and development of tools for online anonymity and privacy
+\end{columns}
+\end{frame}
+
+\begin{frame}
+\frametitle{Tor is a low-latency anonymity system}
+\begin{itemize}
+\item Based on technology developed in the Onion Routing project
+\item Privacy by design, not by policy (no data collected)
+\item Commonly used for web browsing and instant messaging (works for any TCP traffic)
+\item Originally built as a pure anonymity system (hides who is talking to whom)
+\item Now designed to resist censorship too (hides whether someone is using the system at all)
+\item Centralized directory authorities publish a list of all servers
+\end{itemize}
+
+\begin{center}
+\includegraphics[height=3cm]{2009-tor-logo}
+\end{center}
+\end{frame}
+
+\begin{frame}
+\frametitle{Tor code stats}
+\includegraphics[width=10.5cm]{tor-lines-of-code-by-language}
+\flushright \tiny stats from ohloh.net
+\end{frame}
+
+\begin{frame}
+\frametitle{Tor hides communication patterns by relaying data through volunteer servers}
+\begin{center}
+\begin{overlayarea}{9cm}{6cm}
+      \only<1>{\includegraphics[width=9cm]{tor-network}}
+      \only<2>{\includegraphics[width=9cm]{tor-safe-selection}}
+      \only<3>{\includegraphics[width=9cm]{tor-safe-path}}
+      \end{overlayarea}
+      \flushright
+
+      \tiny Diagram: Robert Watson
+    \end{center}
+  \end{frame}
+
+\begin{frame}
+\frametitle{How many people use Tor?}
+It's an anonymity system. \\[1cm]
+\pause http://metrics.torproject.org/ for an idea.
+\end{frame}
+
+\begin{frame}
+\frametitle{How many people use Tor?}
+\begin{flushleft}
+\includegraphics[width=12cm]{../Marketing/2009-12-16-mozilla-stats}
+\end{flushleft}
+\end{frame}
+
+\begin{frame}
+\frametitle{Tor hidden services allow privacy enhanced hosting of services}
+\includegraphics[scale=0.5]{wikileaks}
+\end{frame}
+  
+\begin{frame}
+\frametitle{How is Tor different from other systems?}
+\begin{overlayarea}{9cm}{6cm}
+\only<1>{\includegraphics[height=7cm]{single_hop_relay}}
+\only<2>{\includegraphics[height=7cm]{evil_single_hop_relay}}
+\only<3>{\includegraphics[height=7cm]{data_snooping_single_hop_relay}}
+\end{overlayarea}
+\end{frame}
+
+\begin{frame}
+\frametitle{Universal Declaration of Human Rights}
+\textbf{Article 19}
+\medskip
+\begin{quotation}
+\noindent \includegraphics[width=1cm]{opquo}\quad Everyone has the right to freedom of opinion and expression; this right includes freedom to hold opinions without interference and to seek, receive and impart information and ideas through any media and regardless of frontiers.
+\end{quotation}
+
+\bigskip
+\textbf{Article 20}
+\medskip
+\begin{quotation}
+\noindent \includegraphics[width=1cm]{opquo}\quad Everyone has the right to freedom of peaceful assembly and association.
+\end{quotation}
+\end{frame}
+
+\begin{frame}
+\frametitle{George Orwell was an optimist}
+\begin{quotation}
+\noindent \includegraphics[width=1cm]{opquo}\quad Who controls the past, controls the future: who controls the present controls the past
+\end{quotation}
+\flushright --- George Orwell, Nineteen Eighty Four, 1949
+
+\flushleft
+The re-writing of history is now much more efficient than when George Orwell imagined armies of Winston Smiths cutting holes in newspaper archives.
+\end{frame}
+
+\begin{frame}
+\frametitle{Resisting Internet censorship}
+
+\begin{quotation}
+\noindent \includegraphics[width=1cm]{opquo}\quad The Net interprets censorship as damage and routes around it.
+\end{quotation}
+\flushright --- John Gilmore, 1993
+
+\flushleft
+No longer true on a technical level: censorship is in the routers.
+\medskip
+
+Remains true on a social level: when material is censored, people distribute copies and draw attention to them
+\medskip
+
+But what if people are too afraid to do this?
+\end{frame}
+
+\begin{frame}
+  \frametitle{Internet surveillance is pervasive}
+     \begin{columns}[t]
+      \column{7cm}
+\begin{itemize}
+\item Conventional surveillance methods had to be targeted
+\item Internet censorship is capable of monitoring everyone, all of the time
+\item Governments are increasing monitoring: SORM (Russia), Golden Shield (China), Data Retention Directive (EU), and Interception Modernisation Programme (UK)
+\item 1 in 7 East German citizens worked for the Stasi. Today we can achieve the same results with a fraction of the cost
+\end{itemize}
+
+      \column{5cm}
+     \vbox{}
+    \parbox{5cm}{\includegraphics[width=4.5cm]{nsa-room}}
+    \end{columns}
+\end{frame}
+
+\begin{frame}
+\frametitle{Traffic data surveillance}
+\begin{itemize}
+\item Traffic data (who talks to whom, how often and for how long) is the core of intelligence capabilities
+\item This information is cheaper to record and store, compared to full content
+\item Because it can be easily processed by computer, data mining techniques can be used to understand social structures
+\end{itemize}
+
+\begin{quotation}
+\noindent \includegraphics[width=1cm]{opquo}\quad No government of any colour is to be trusted with such a roadmap to our souls
+\end{quotation}
+\flushright --- Sir Ken Macdonald, former director of public prosecutions, on the UK Interception Modernisation Program
+\end{frame}
+
+\begin{frame}
+\frametitle{Importantly, information on social networks can be derived}
+\begin{columns}[t]
+\column{4.5cm}
+\vspace{0cm}
+\noindent {\color{red}$\bullet$} Communities\newline
+{\color{blue}$\bullet$} People
+\column{7cm}
+\vbox{}
+\includegraphics[clip, trim=5cm 12cm 2cm 5cm,width=7cm]{network}
+\end{columns}
+\flushright{\tiny From "The Economics of Mass Surveillance" by George Danezis and Bettina Wittneben}
+\end{frame}
+
+\begin{frame}
+\frametitle{Supporters}
+\includegraphics[scale=.5]{167234088_08f07f0dbe_o}
+\end{frame}
+
+\begin{frame}
+\frametitle{How to get involved}
+\begin{center}
+\begin{huge}https://torproject.org/volunteer\end{huge}
+\end{center}
+\end{frame}
+  
+\begin{frame}
+\frametitle{Credits}
+\begin{itemize}
+\item Thank you to Steven J. Murdoch, \url{http://www.cl.cam.ac.uk/users/sjm217/}, for the research and basis for the latter parts of the presentation. \\
+\item Photographer and Diagram credits as listed throughout the presentation.
+\end{itemize}
+\end{frame}
+
+\end{document}


Property changes on: projects/presentations/2010-FOSDEM-Freespeech-opensource-onlineprivacy.tex
___________________________________________________________________
Added: svn:mime-type
   + text/x-tex

Added: projects/presentations/2010-itsg-tor-overview.pdf
===================================================================
(Binary files differ)


Property changes on: projects/presentations/2010-itsg-tor-overview.pdf
___________________________________________________________________
Added: svn:mime-type
   + application/octet-stream

Added: projects/presentations/2010-itsg-tor-overview.tex
===================================================================
--- projects/presentations/2010-itsg-tor-overview.tex	                        (rev 0)
+++ projects/presentations/2010-itsg-tor-overview.tex	2010-04-21 19:00:45 UTC (rev 22219)
@@ -0,0 +1,138 @@
+\documentclass{beamer}
+\mode<presentation>
+\usetheme{Boadilla}
+%\usetheme{Pittsburgh}
+\usecolortheme{beaver}
+\title{ITSG Tor Overview}
+\author{Andrew Lewman \\ andrew at torproject.org}
+\date{\today}
+\begin{document}
+
+\begin{frame}
+\maketitle  
+\begin{center}
+\includegraphics[height=3cm]{2009-tor-logo}
+\end{center}
+\end{frame}
+
+\begin{frame}
+\frametitle{The Tor Project, Inc.}
+501(c)(3) non-profit organization dedicated to the research and development of technologies for online anonymity and privacy
+\begin{center}
+\includegraphics[height=5cm]{2009-oval_sticker_new}
+\end{center}
+\end{frame}
+
+\begin{frame}
+\frametitle{What is Tor?}
+\begin{itemize}
+\item online anonymity software and network
+\pause \item open source, freely available (3-clause BSD license)
+\pause \item active research environment: \\
+Rice, UMN, NSF, NRL, Drexel, Waterloo, Cambridge UK, Bamberg Germany, Boston U, Harvard, MIT, RPI, GaTech
+\pause \item increasingly diverse toolset: \\
+Tor, Torbutton, Tor Browser Bundle, TorVM, Incognito LiveCD, Tor Weather, Tor auto-responder, Secure Updater, Orbot, TorFox, Torora, Portable Tor, Tor Check, Arm, Nymble, Tor Control, Tor Wall
+\end{itemize}
+\end{frame}
+
+\begin{frame}
+\frametitle{estimated 500,000 daily users}
+\setbeamercolor{background}[\includegraphics[scale=0.4]{huge-crowd}]
+\end{frame}
+
+\begin{frame}
+\frametitle{Twitter in Iran: Good.}
+\includegraphics[scale=0.5]{twitter-iran-protests-time}
+\flushright{\tiny From http://www.time.com/time/world/article/0,8599,1905125,00.html}
+\end{frame}
+
+\begin{frame}
+\frametitle{Twitter in USA: Bad.}
+\includegraphics[scale=0.45]{twitter-g20-pittsburgh-gothamist}
+\flushright{\tiny from http://gothamist.com/2009/10/05/fbi\_raids\_queens\_home\_in\_g20\_protes.php}
+\end{frame}
+
+\begin{frame}
+\frametitle{Who uses Tor?}
+\parbox{8cm}{\sloppy \setbeamercolor{background}[\includegraphics[scale=0.35]{anonymousman}}
+\parbox{3cm}{\sloppy 
+\begin{itemize}
+\begin{small}
+\item Normal people
+\item Law Enforcement
+\item Human Rights Activists
+\item Business Execs
+\item Militaries
+\item Abuse Victims
+\end{small}
+\end{itemize}
+}
+\end{frame}
+
+\begin{frame}
+\frametitle{Tor hides communication patterns by relaying data through volunteer servers}
+\begin{center}
+\begin{overlayarea}{9cm}{6cm}
+  {\includegraphics[width=9cm]{tor-safe-path}}
+\end{overlayarea}
+\flushright
+\tiny Diagram: Robert Watson
+\end{center}
+\end{frame}
+
+\begin{frame}
+\frametitle{Tor}
+\includegraphics[scale=0.45]{netmap_mac}
+\end{frame}
+
+\begin{frame}
+\frametitle{Metrics}
+\begin{itemize}
+\item Measuring metrics anonymously
+\item NSF grant to find out
+\item Metrics portal: \\ \url{https://www.torproject.org/projects/metrics}
+\end{itemize}
+\end{frame}
+
+\begin{frame}
+\frametitle{Tor hidden services allow privacy enhanced hosting of services}
+\includegraphics[scale=0.5]{wikileaks}
+\end{frame}
+
+\begin{frame}
+\frametitle{Operating Systems leak info like a sieve}
+\parbox{5cm}{\sloppy \setbeamercolor{background}[\includegraphics[height=7cm]{cropped-hijack-sign-south-africa}}
+\parbox{5cm}{\begin{itemize}
+\item Applications, network stacks, plugins, oh my....
+\pause some call this "sharing"
+\pause \item Did you know Microsoft Word and OpenOffice Writer are browsers?
+\pause \item \url{http://www.decloak.net/} is a fine test
+\end{itemize}
+}
+\end{frame}
+
+\begin{frame}
+\frametitle{Mobile Operating Systems}
+\begin{itemize}
+\item Entirely new set of challenges for something designed to know where you are
+\item Orbot:  Tor on Android.  \url{http://openideals.com/2009/10/22/orbot-proxy/}
+\item iphone, maemo, symbian, etc
+\item Tor on Windows CE, \url{http://www.gsmk.de} as an example.
+\end{itemize}
+\end{frame}
+
+\begin{frame}
+\frametitle{Next steps}
+Visit \url{https://www.torproject.org/} for more information, links, and ideas.
+\end{frame}
+
+\begin{frame}
+\frametitle{Credits \& Thanks}
+\begin{itemize}
+\item who uses tor? \url{http://www.flickr.com/photos/mattw/2336507468/siz}, Matt Westervelt, CC-­BY-­SA.
+\item danger!, \url{http://flickr.com/photos/hmvh/58185411/sizes/o/}, hmvh, CC-­BY-­SA.
+\item 500k, \url{http://www.flickr.com/photos/lukaskracic/334850378/sizes/l/}, Luka Skracic, used with permission.
+\end{itemize}
+\end{frame}
+
+\end{document}


Property changes on: projects/presentations/2010-itsg-tor-overview.tex
___________________________________________________________________
Added: svn:mime-type
   + text/x-tex

Added: projects/presentations/Anonymity-Online-Presentation.pdf
===================================================================
(Binary files differ)


Property changes on: projects/presentations/Anonymity-Online-Presentation.pdf
___________________________________________________________________
Added: svn:mime-type
   + application/octet-stream

Added: projects/presentations/Anonymity-Online-Presentation.tex
===================================================================
--- projects/presentations/Anonymity-Online-Presentation.tex	                        (rev 0)
+++ projects/presentations/Anonymity-Online-Presentation.tex	2010-04-21 19:00:45 UTC (rev 22219)
@@ -0,0 +1,281 @@
+\documentclass{beamer}
+\mode<presentation>
+\usetheme{Pittsburgh}
+\usecolortheme{beaver}
+\title{Online Anonymity}
+\author{Andrew Lewman \\ andrew at torproject.org}
+\date{\today}
+\begin{document}
+
+\begin{frame}
+\maketitle  
+\begin{center}
+\includegraphics[height=3cm]{2009-tor-logo}
+\hspace{1cm} 
+\includegraphics[height=3cm]{chacha}
+\end{center}
+\end{frame}
+  
+\begin{frame}
+\frametitle{George Orwell was an optimist}
+\begin{quotation}
+\noindent \includegraphics[width=1cm]{opquo}\quad Who controls the past, controls the future: who controls the present controls the past
+\end{quotation}
+\flushright --- George Orwell, Nineteen Eighty Four, 1949
+
+\flushleft
+The re-writing of history is now much more efficient than when George Orwell imagined armies of Winston Smiths cutting holes in newspaper archives
+\end{frame}
+
+\begin{frame}
+\frametitle{Internet architecture allows surveillance}
+\includegraphics[width=10cm]{cnmap}
+\flushright
+\tiny Diagram: China Internet Network Information Center
+\end{frame}
+
+\begin{frame}
+\frametitle{Sweden's iPRED experience}
+\includegraphics[scale=1]{netnodnov}
+\end{frame}
+
+\begin{frame}
+\frametitle{Incentives}
+\noindent \includegraphics[width=1cm]{opquo}\quad Our analysis shows that consumers increasingly want to decide for themselves when to watch and from which screen. Unfortunately, many have become adept at circumventing the IPRED legislation. 
+\flushright --- Jens Heron, Mediavision
+\end{frame}
+
+\begin{frame}
+\frametitle{Resisting Internet censorship}
+\begin{quotation}
+\noindent \includegraphics[width=1cm]{opquo}\quad The Net interprets censorship as damage and routes around it.
+\end{quotation}
+\flushright --- John Gilmore, 1993
+
+\flushleft
+No longer true on a technical level: censorship is in the routers.
+\medskip
+Remains true on a social level: when material is censored, people distribute copies and draw attention to them
+\medskip
+But what if people are too afraid to do this?
+\end{frame}
+
+\begin{frame}
+\frametitle{Freedom of speech and anonymity}
+
+\textbf{United States Constitution: 1st Amendment}
+
+\begin{quotation}
+\noindent \includegraphics[width=1cm]{opquo}\quad Congress shall make no law respecting an establishment of religion, or prohibiting the free exercise thereof; or abridging the freedom of speech, or of the press; or the right of the people peaceably to assemble, and to petition the Government for a redress of grievances.
+\end{quotation}
+
+\textbf{McIntyre v. Ohio Elections Commission}
+
+\begin{quotation}
+\noindent \includegraphics[width=1cm]{opquo}\quad Protections for anonymous speech are vital to democratic discourse. Allowing dissenters to shield their identities frees them to express critical, minority views \ldots Anonymity is a shield from the tyranny of the majority \ldots It thus exemplifies the purpose behind the Bill of Rights, and of the First Amendment in particular
+\end{quotation}
+\end{frame}
+
+\begin{frame}
+\frametitle{Twitter in Iran: Good.}
+\includegraphics[scale=0.5]{twitter-iran-protests-time}
+\flushright{\tiny From http://www.time.com/time/world/article/0,8599,1905125,00.html}
+\end{frame}
+
+\begin{frame}
+\frametitle{Twitter in USA: Bad.}
+\includegraphics[scale=0.45]{twitter-g20-pittsburgh-gothamist}
+\flushright{\tiny from http://gothamist.com/2009/10/05/fbi\_raids\_queens\_home\_in\_g20\_protes.php}
+\end{frame}
+
+\begin{frame}
+\frametitle{Internet surveillance is pervasive}
+     \begin{columns}[t]
+      \column{7cm}
+\begin{itemize}
+\item Conventional surveillance methods had to be targeted
+\item Internet censorship is capable of monitoring everyone, all of the time
+\item Governments are increasing monitoring: SORM (Russia), Golden Shield (China), Data Retention Directive (EU), and Interception Modernisation Programme (UK), Warrantless Wiretapping (USA)
+\item 1 in 7 East German citizens worked for the Stasi. Today we can achieve the same results with a fraction of the cost
+\end{itemize}
+     \column{5cm}
+     \vbox{}
+    \parbox{5cm}{\includegraphics[width=4.5cm]{nsa-room}}
+    \end{columns}
+\end{frame}
+
+\begin{frame}
+\frametitle{Traffic data surveillance}
+\begin{itemize}
+\item Traffic data (who talks to whom, how often and for how long) is the core of intelligence capabilities
+\item This information is cheaper to record and store, compared to full content
+\item Because it can be easily processed by computer, data mining techniques can be used to understand social structures
+\end{itemize}
+
+\begin{quotation}
+\noindent \includegraphics[width=1cm]{opquo}\quad No government of any colour is to be trusted with such a roadmap to our souls
+\end{quotation}
+\flushright --- Sir Ken Macdonald, former director of public prosecutions, on the UK Interception Modernisation Program
+\end{frame}
+
+\begin{frame}
+    \frametitle{Importantly, information on social networks can be derived}
+    \begin{columns}[t]
+      \column{4.5cm}
+      \vspace{0cm}
+      
+             {\color{red}$\bullet$} Communities\newline
+             {\color{blue}$\bullet$} People
+             \column{7cm}
+             \vbox{}
+             
+             \includegraphics[clip, trim=5cm 12cm 2cm 5cm,width=7cm]{network}
+    \end{columns}
+    \flushright{\tiny From "The Economics of Mass Surveillance" by George Danezis and Bettina Wittneben}
+  \end{frame}
+ 
+\begin{frame}
+\frametitle{The Transparent Society}
+
+   \begin{columns}[t]
+   \column{7cm}
+\begin{itemize}
+\item David Brin proposed that in a world of pervasive surveillance, balance could be maintained by allowing everyone to monitor everyone else
+\item Bruce Schneier retorted that surveillance amplifies existing powers
+\item Many countries restrict anonymous speech (e.g.\ Germany and China)
+\item It is easy for those in power to call on the weak to link their names to opinions
+\end{itemize}
+
+      \column{5cm}
+     \vbox{}
+    \parbox{5cm}{\includegraphics[width=4.5cm]{namesheet}}
+
+\flushright{\tiny Photo: Manos Simonides}
+    \end{columns}
+\end{frame}
+
+\begin{frame}
+\frametitle{Who wants online privacy?}
+\begin{columns}[t]
+\begin{column}{5cm}
+\begin{overprint}
+\includegraphics[scale=0.38]{cropped-anon-man}
+\end{overprint}
+\vspace{3cm} 
+\end{column}
+\begin{column}{5cm}
+\begin{itemize}
+\item Ordinary people
+\item Military and Law Enforcement
+\item Journalists
+\item Human rights workers
+\item Businesses
+\end{itemize}
+\end{column}
+\end{columns}
+\end{frame}
+
+\begin{frame}
+\frametitle{Anonymous communication}
+\begin{itemize}
+\item People have to hide in a crowd of other people ("anonymity loves company")
+\item The goal of the system is to make all users look as similar as possible, to give a bigger crowd
+\item Hide who is communicating with whom
+\item Layered encryption and random delays hide correlation between input traffic and output traffic
+\end{itemize}
+\end{frame}
+
+\begin{frame}
+\frametitle{Tor is a low-latency anonymity system}
+\begin{itemize}
+\item<1-> Based on technology developed in the Onion Routing project
+\item<2-> Privacy by design, not by policy (no data collected)
+\item<3-> Commonly used for web browsing and instant messaging (works for any TCP traffic)
+\item<4-> Originally built as a pure anonymity system (hides who is talking to whom)
+\item<5-> Now designed to resist censorship too (hides whether someone is using the system at all)
+\end{itemize}
+
+\begin{center}
+\includegraphics[height=3cm]{2009-tor-logo}
+\end{center}
+
+\end{frame}
+
+  \begin{frame}
+    \frametitle{Tor hides communication patterns by relaying data through volunteer servers}
+    \begin{center}
+      \begin{overlayarea}{9cm}{6cm}
+      \only<1>{\includegraphics[width=9cm]{tor-network}}
+      \only<2>{\includegraphics[width=9cm]{tor-safe-selection}}
+      \only<3>{\includegraphics[width=9cm]{tor-safe-path}}
+      \end{overlayarea}
+      \flushright
+
+      \tiny Diagram: Robert Watson
+    \end{center}
+  \end{frame}
+
+\begin{frame}
+\frametitle{Tor hidden services allow censorship resistant services}
+\includegraphics[scale=0.5]{wikileaks}
+\end{frame}
+  
+\begin{frame}
+\frametitle{How is Tor different from other systems?}
+\\[1cm]
+\begin{center}
+\only<1>{\includegraphics[height=7cm]{single_hop_relay}}
+\only<2>{\includegraphics[height=7cm]{evil_single_hop_relay}}
+\only<3>{\includegraphics[height=7cm]{data_snooping_single_hop_relay}}
+\end{center}
+\end{frame}
+  
+\begin{frame}
+\frametitle{Limitations of anonymous communication}
+\begin{itemize}
+\item There is something for everyone to like, and something for everyone to dislike, going on with online anonymity systems
+\item Bad people do use them to do bad things (for many different definitions of bad people)
+\item It is impossible to block bad uses, even if we could come up with a common definition of bad content
+\item The systems are not perfect, so it is possible some people will be caught
+\end{itemize}
+\end{frame}
+
+\begin{frame}
+\frametitle{Conclusions}
+\begin{itemize}
+\item The Internet and centralisation can both improve and harm freedom of speech
+\item Slogans regarding the borderless nature and inherent freedoms of the Internet are frequently wrong
+\item Technical details matter: how a system is implemented can make a radical difference
+\item Technologies are tools, they can be used for good and bad
+\item However, policies must be changed too and pressure is needed on legislators
+\end{itemize}
+\end{frame}
+
+\begin{frame}
+\frametitle{One Version of the Future}
+\begin{quotation}
+\noindent \includegraphics[width=1cm]{opquo}\quad 
+I'd like to change the design of the Internet by introducing regulation--Internet passports, Internet police and international agreement--about following Internet standards. And if some countries don't agree with or don't pay attention to the agreement, just cut them off.
+\end{quotation}
+\flushright --- Eugene Kaspersky, Co-Founder \& CEO of Kaspersky Labs
+\end{frame}
+
+\begin{frame}
+\frametitle{Another version of the future}
+\begin{quotation}
+\noindent \includegraphics[width=1cm]{opquo}\quad
+Universal identification is impossible. Even attribution -- knowing who is responsible for particular Internet packets -- is impossible. Attempting to build such a system is futile, and will only give criminals and hackers new ways to hide.
+\end{quotation}
+\flushright --- Bruce Schneier, Security Technologist \& Chief Security Technology Officer of BT
+\flushright{\tiny from http://www.schneier.com/blog/archives/2010/02/anonymity_and_t_3.html}
+\end{frame}
+
+\begin{frame}
+\frametitle{Credits}
+\begin{itemize}
+\item Thank you to Steven J. Murdoch, \url{http://www.cl.cam.ac.uk/users/sjm217/}, for the research and basis for this presentation. \\
+\item Photographer and Diagram credits as listed throughout the presentation.
+\end{itemize}
+\end{frame}
+
+\end{document}


Property changes on: projects/presentations/Anonymity-Online-Presentation.tex
___________________________________________________________________
Added: svn:mime-type
   + text/x-tex

Added: projects/presentations/Censorship-HighLevel-Presentation.pdf
===================================================================
(Binary files differ)


Property changes on: projects/presentations/Censorship-HighLevel-Presentation.pdf
___________________________________________________________________
Added: svn:mime-type
   + application/octet-stream

Added: projects/presentations/Censorship-HighLevel-Presentation.tex
===================================================================
--- projects/presentations/Censorship-HighLevel-Presentation.tex	                        (rev 0)
+++ projects/presentations/Censorship-HighLevel-Presentation.tex	2010-04-21 19:00:45 UTC (rev 22219)
@@ -0,0 +1,549 @@
+\documentclass{beamer}
+\mode<presentation>
+\usetheme{Pittsburgh}
+\usecolortheme{beaver}
+\title{Freedom of Expression, Censorship, \& The Internet}
+\author{Andrew Lewman \\ andrew at torproject.org}
+\date{\today}
+\begin{document}
+
+\begin{frame}
+	\maketitle  
+	\begin{center}
+		\includegraphics[height=3cm]{2009-tor-logo}
+		\hspace{1cm} 
+		\includegraphics[height=3cm]{chacha}
+	\end{center}
+\end{frame}
+  
+\begin{frame}
+\frametitle{Universal Declaration of Human Rights}
+\textbf{Article 19}
+\medskip
+	\begin{quotation}
+	\noindent \includegraphics[width=1cm]{opquo}\quad Everyone has the right to freedom of opinion and expression; this right includes freedom to hold opinions without interference and to
+seek, receive and impart information and ideas through any media and
+regardless of frontiers.
+	\end{quotation}
+
+\bigskip
+\textbf{Article 20}
+\medskip
+	\begin{quotation}
+	\noindent \includegraphics[width=1cm]{opquo}\quad Everyone has the
+right to freedom of peaceful assembly and association.
+	\end{quotation}
+\end{frame}
+
+\begin{frame}
+\frametitle{George Orwell was an optimist}
+\begin{quotation}
+\noindent \includegraphics[width=1cm]{opquo}\quad Who controls the past, controls the future: who controls the present controls the past
+\end{quotation}
+\flushright --- George Orwell, Nineteen Eighty Four, 1949
+
+\flushleft
+The re-writing of history is now much more efficient than when George
+Orwell imagined armies of Winston Smiths cutting holes in newspaper
+archives
+
+\end{frame}
+
+\begin{frame}
+\frametitle{Online archives are easily censored}
+\begin{center}
+\includegraphics<1>[height=7.5cm]{observer}
+\includegraphics<2>[height=6.5cm]{guardian-crop}
+\end{center}
+\end{frame}
+
+\begin{frame}
+\frametitle{The Internet facilitates centralization}
+
+     \begin{columns}[t]
+      \column{7cm}
+\begin{itemize}
+\item Centralized systems work better: cheaper, more versatile, and more efficient
+\item By eliminating distance, the Internet allows greater centralization
+\item Centralized archiving of physical newspapers is awkward, but online archiving works well
+\item This makes life easier for readers, and censors too
+\item Many libraries are now dropping archiving of paper in favor of electronic subscriptions
+\end{itemize}
+      \column{5cm}
+     \vbox{}
+    \parbox{5cm}{\includegraphics[width=4.5cm]{observer}}
+    \bigskip
+
+    \parbox{5cm}{\includegraphics[width=4.5cm]{guardian-crop}}
+    \end{columns}
+
+\end{frame}
+
+\begin{frame}
+\frametitle{The Internet eases publication too}
+     \begin{columns}[t]
+      \column{7.5cm}
+\begin{itemize}
+\item "The Catholic Orangemen of Togo", by Craig Murray, was dropped by its publisher due to libel threats
+\item Even the Cambridge University Press pulped a book, "Alms for Jihad" by J. Millard Burr and Robert O. Collins, following legal action
+\item The lack of support from a publisher and network of book shops would previously be devastating
+\item However, the Internet facilitates self-publishing and marketing
+\end{itemize}
+      \column{6cm}
+     \vbox{}
+     \begin{overlayarea}{6cm}{6cm}
+     \parbox{6cm}{\includegraphics<1>[width=5cm]{orangemen}
+       \includegraphics<2>[width=5cm]{murray}}
+     \end{overlayarea}
+    \end{columns}
+\end{frame}
+
+\begin{frame}
+\frametitle{Internet architecture allows censorship}
+\includegraphics[width=10cm]{cnmap}
+\flushright
+\tiny Diagram: China Internet Network Information Center
+\end{frame}
+
+ \begin{frame}
+    \frametitle{What is being blocked, and why}
+    \begin{columns}[t]
+      \column{7cm}
+     \setbeamercovered{transparent}
+
+      \begin{itemize}
+      \item According to the Open Net Initiative, at least 70 countries filter the Internet in some way; from Asia, to Europe, to the Americas.
+      \item The types of material censored varied depending on country, e.g.:
+        \begin{itemize}
+        \item<1-> Human Rights (blocked in China)
+        \item<2-> Religion (blocked in Saudi Arabia, UAE, Iran, Bahrain)
+        \item<3-> Pornography (blocked in Saudi Arabia, UAE, Iran, Bahrain, Singapore, Burma, \ldots)
+        \end{itemize}
+      \item Other issues censored include: military and militant websites; sex education, alcohol/drugs, music; gay and lesbian websites; news
+      \end{itemize}
+      \setbeamercovered{invisible}
+      \column{5cm}
+      \vbox{}
+      \begin{overlayarea}{5cm}{10.5cm}
+        \only<1>{\resizebox{5cm}{!}{\includegraphics{hrichina}}}
+        \only<2>{\resizebox{5cm}{!}{\includegraphics{islameyat}}}
+        \only<3>{\resizebox{5cm}{!}{\includegraphics{playboy}}}
+      \end{overlayarea}
+    \end{columns}
+  \end{frame}
+
+\begin{frame}
+\frametitle{Search Engine results are censored}
+\includegraphics[width=11cm]{tiananmen}
+\begin{center}
+Searching for "Tiananmen Square" on Google.com and Google.cn
+\end{center}
+\end{frame}
+
+\begin{frame}
+\frametitle{Chilling effects: self-censorship through fear, intimidation, and punishment}
+People can be intimidated into not testing rules through fear of detection and retribution
+\begin{columns}[t]
+\column{5.5cm}
+\vbox{}
+%% http://farm1.static.flickr.com/150/347760599_fedfd250cb.jpg
+
+\includegraphics[width=5.5cm]{kareem}
+\column{5.5cm}
+\vbox{}
+
+\textit{"I call on Egyptian government officials to take the necessary procedures to protect the Egyptian youth from the spread of subversive religious ideologies among them by permanently shutting down religious institutions in this country."}
+\flushright --- Kareem Amer (sentenced to four years of prison in Egypt)
+\end{columns}
+\end{frame}
+
+\begin{frame}
+\frametitle{Resisting Internet censorship}
+
+\begin{quotation}
+\noindent \includegraphics[width=1cm]{opquo}\quad The Net interprets censorship as damage and routes around it.
+\end{quotation}
+\flushright --- John Gilmore, 1993
+
+\flushleft
+
+No longer true on a technical level: censorship is in the routers.
+\medskip
+
+Remains true on a social level: when material is censored, people distribute copies and draw attention to them
+\medskip
+
+But what if people are too afraid to do this?
+\end{frame}
+
+\begin{frame}
+\frametitle{Freedom of speech and anonymity}
+
+\textbf{United States Constitution: 1st Amendment}
+
+\begin{quotation}
+\noindent \includegraphics[width=1cm]{opquo}\quad Congress shall make no law respecting an establishment of religion, or prohibiting the free exercise thereof; or abridging the freedom of speech, or of the press; or the right of the people peaceably to assemble, and to petition the Government for a redress of grievances.
+\end{quotation}
+
+\textbf{McIntyre v. Ohio Elections Commission}
+
+\begin{quotation}
+\noindent \includegraphics[width=1cm]{opquo}\quad Protections for anonymous speech are vital to democratic discourse. Allowing dissenters to shield their identities frees them to express critical, minority views \ldots Anonymity is a shield from the tyranny of the majority \ldots It thus exemplifies the purpose behind the Bill of Rights, and of the First Amendment in particular
+\end{quotation}
+\end{frame}
+
+\begin{frame}
+\frametitle{Twitter in Iran: Good.}
+\includegraphics[scale=0.5]{twitter-iran-protests-time}
+\flushright{\tiny From http://www.time.com/time/world/article/0,8599,1905125,00.html}
+\end{frame}
+
+\begin{frame}
+\frametitle{Twitter in USA: Bad.}
+\includegraphics[scale=0.45]{twitter-g20-pittsburgh-gothamist}
+\flushright{\tiny from http://gothamist.com/2009/10/05/fbi\_raids\_queens\_home\_in\_g20\_protes.php}
+\end{frame}
+
+\begin{frame}
+\frametitle{Internet surveillance is pervasive}
+
+     \begin{columns}[t]
+      \column{7cm}
+\begin{itemize}
+\item Conventional surveillance methods had to be targeted
+\item Internet censorship is capable of monitoring everyone, all of the time
+\item Governments are increasing monitoring: SORM (Russia), Golden Shield (China), Data Retention Directive (EU), and Interception Modernisation Programme (UK), Warrantless Wiretapping (USA)
+\item 1 in 7 East German citizens worked for the Stasi. Today we can achieve the same results with a fraction of the cost
+\end{itemize}
+
+      \column{5cm}
+     \vbox{}
+    \parbox{5cm}{\includegraphics[width=4.5cm]{nsa-room}}
+    \end{columns}
+
+\end{frame}
+
+\begin{frame}
+\frametitle{Traffic data surveillance}
+
+\begin{itemize}
+\item Traffic data (who talks to whom, how often and for how long) is the core of intelligence capabilities
+\item This information is cheaper to record and store, compared to full content
+\item Because it can be easily processed by computer, data mining techniques can be used to understand social structures
+\end{itemize}
+
+\begin{quotation}
+\noindent \includegraphics[width=1cm]{opquo}\quad No government of any colour is to be trusted with such a roadmap to our souls
+\end{quotation}
+\flushright --- Sir Ken Macdonald, former director of public prosecutions, on the UK Interception Modernisation Program
+
+\end{frame}
+
+\begin{frame}
+    \frametitle{Importantly, information on social networks can be derived}
+    \begin{columns}[t]
+      \column{4.5cm}
+      \vspace{0cm}
+      
+             {\color{red}$\bullet$} Communities\newline
+             {\color{blue}$\bullet$} People
+             \column{7cm}
+             \vbox{}
+             
+             \includegraphics[clip, trim=5cm 12cm 2cm 5cm,width=7cm]{network}
+    \end{columns}
+    \flushright{\tiny From "The Economics of Mass Surveillance" by George Danezis and Bettina Wittneben}
+  \end{frame}
+ 
+  \begin{frame}
+  \frametitle{The Transparent Society}
+
+     \begin{columns}[t]
+      \column{7cm}
+\begin{itemize}
+\item David Brin proposed that in a world of pervasive surveillance, balance could be maintained by allowing everyone to monitor everyone else
+\item Bruce Schneier retorted that surveillance amplifies existing powers
+\item Many countries restrict anonymous speech (e.g.\ Germany and China)
+\item It is easy for those in power to call on the weak to link their names to opinions
+\end{itemize}
+
+      \column{5cm}
+     \vbox{}
+    \parbox{5cm}{\includegraphics[width=4.5cm]{namesheet}}
+
+\flushright{\tiny Photo: Manos Simonides}
+    \end{columns}
+\end{frame}
+
+\begin{frame}
+\frametitle{Censorship resistance systems}
+\begin{itemize}
+\item Software to resist censorship should
+\begin{itemize}
+ \item have a diverse set of users
+ \item work where you are without special steps
+ \item be sustainable (what if the company goes broke?)
+ \item be decentralized (swapping censors doesn't help you)
+ \item protect you by default
+ \item have accessible standards and published designs (black box vs. glass box)
+ \item be fast enough that you'll use it daily
+ \item doesn't promise perfect everything including a fully encrypted Internet
+\end{itemize}
+\item<1-> These properties should be maintained even if the censorship resistance system is partially compromised
+\end{itemize}
+\end{frame}
+
+\begin{frame}
+\frametitle{Blocking with technology}
+\begin{itemize}
+\item When a country's government controls international connectivity, they can block requests for banned websites and destinations
+\item There are a number of different approaches (DNS blocking, IP address blocking, etc.)
+\item Software may be produced in-country, but often is an adapted commercial product
+\item These companies not only make the software, but provide a continuously updated list of websites to be blocked
+\end{itemize}
+\end{frame}
+
+  \begin{frame}
+    \frametitle{Normal web browsing}
+
+    \begin{centering}
+    \vbox{}
+
+    \includegraphics[clip, trim=1cm 4cm 1cm 2.2cm, width=10cm]{no-proxy}
+    \end{centering}
+
+\vspace{-1cm}
+
+      \flushright
+
+      \tiny Diagram: Jane Gowan
+
+  \end{frame}
+
+  \begin{frame}
+    \frametitle{DNS tampering}
+
+    \begin{centering}
+    \vbox{}
+
+    \includegraphics[clip, trim=1cm 4cm 1cm 2.2cm, width=10cm]{dns}
+    \end{centering}
+
+\vspace{-1cm}
+
+      \flushright
+
+      \tiny Diagram: Jane Gowan
+
+  \end{frame}
+
+  \begin{frame}
+    \frametitle{IP blocking}
+
+    \begin{centering}
+    \vbox{}
+
+    \includegraphics[clip, trim=1cm 4cm 1cm 2.2cm, width=10cm]{ip}
+    \end{centering}
+
+\vspace{-1cm}
+
+      \flushright
+
+      \tiny Diagram: Jane Gowan
+
+  \end{frame}
+  
+  \begin{frame}
+\frametitle{Trade-offs in blocking systems}
+\begin{itemize}
+\item<1-> DNS blocking
+\begin{itemize}
+\item Easy and cheap to implement
+\item Blocks at domain name granularity -- over blocks protocols, web pages
+\item Trivial to bypass
+\end{itemize}
+\item<2-> IP blocking
+\begin{itemize}
+\item Easy and cheap to implement
+\item Blocks at IP address (perhaps port) -- over-blocks virtual hosting
+\end{itemize}
+\item<3-> Proxy blocking
+\begin{itemize}
+\item Expensive to implement
+\item Blocks at webpage level -- low over-blocking
+\end{itemize}
+\item<4-> Hybrid blocking -- IP based redirection to proxy
+\begin{itemize}
+\item Tricky to get right, but cheap
+\item Has some vulnerabilities
+\item Blocks at webpage level -- low over-blocking
+\end{itemize}
+\end{itemize}
+\end{frame}
+
+\begin{frame}
+\frametitle{Who wants online privacy?}
+\begin{itemize}
+\item<1-> Ordinary people
+\begin{itemize}
+\item To avoid personal information being sold to marketers
+\item Protect themselves when researching sensitive topics
+\end{itemize}
+\item<2-> Military and Law Enforcement
+\begin{itemize}
+\item To carry out intelligence gathering
+\item Protect undercover field agents
+\item Offer anonymous tip lines
+\end{itemize}
+\item<3-> Journalists
+\begin{itemize}
+\item To protect sources, such as whistle blowers
+\end{itemize}
+\item<4-> Human rights workers
+\begin{itemize}
+\item To publicize abuses and protect themselves from surveillance
+\item Blogging about controversial subjects
+\end{itemize}
+\item<5-> Businesses
+\begin{itemize}
+\item To observe their competition and build anonymous collaborations
+\end{itemize}
+\end{itemize}
+\end{frame}
+
+\begin{frame}
+\frametitle{Anonymous communication}
+\begin{itemize}
+\item People have to hide in a crowd of other people ("anonymity loves company")
+\item The goal of the system is to make all users look as similar as possible, to give a bigger crowd
+\item Hide who is communicating with whom
+\item Layered encryption and random delays hide correlation between input traffic and output traffic
+\end{itemize}
+\end{frame}
+
+\begin{frame}
+\frametitle{Tor is a low-latency anonymity system}
+\begin{itemize}
+\item<1-> Based on technology developed in the Onion Routing project
+\item<2-> Privacy by design, not by policy (no data collected)
+\item<3-> Commonly used for web browsing and instant messaging (works for any TCP traffic)
+\item<4-> Originally built as a pure anonymity system (hides who is talking to whom)
+\item<5-> Now designed to resist censorship too (hides whether someone is using the system at all)
+\item<6-> Centralized directory authorities publish a list of all servers; client doesn't trust the network by design
+\end{itemize}
+
+\begin{center}
+\includegraphics[height=3cm]{2009-tor-logo}
+\end{center}
+
+\end{frame}
+
+  \begin{frame}
+    \frametitle{Tor hides communication patterns by relaying data through volunteer servers}
+    \begin{center}
+      \begin{overlayarea}{9cm}{6cm}
+      \only<1>{\includegraphics[width=9cm]{tor-network}}
+      \only<2>{\includegraphics[width=9cm]{tor-safe-selection}}
+      \only<3>{\includegraphics[width=9cm]{tor-safe-path}}
+      \end{overlayarea}
+      \flushright
+
+      \tiny Diagram: Robert Watson
+    \end{center}
+  \end{frame}
+
+\begin{frame}
+\frametitle{Tor hidden services allow censorship resistant services}
+\includegraphics[scale=0.5]{wikileaks}
+\end{frame}
+  
+\begin{frame}
+\frametitle{How is Tor different from other systems?}
+\\[1cm]
+\begin{center}
+\only<1>{\includegraphics[height=7cm]{single_hop_relay}}
+\only<2>{\includegraphics[height=7cm]{evil_single_hop_relay}}
+\only<3>{\includegraphics[height=7cm]{data_snooping_single_hop_relay}}
+\end{center}
+\end{frame}
+  
+\begin{frame}
+\frametitle{Limitations of censorship resistance}
+\begin{itemize}
+\item Censorship resistance is thought controversial -- especially by the censors
+\item There is something for everyone to like, and something for everyone to dislike, going on with censorship resistance systems
+\item Bad people do use them to do bad things (for many different definitions of bad people)
+\item It is impossible to block bad uses, even if we could come up with a common definition of bad content
+\item The systems are not perfect, so it is possible some people will be caught
+\end{itemize}
+\end{frame}
+
+\begin{frame}
+\frametitle{Conclusions}
+    \begin{columns}[t]
+      \column{7cm}
+      \begin{itemize}
+      \item The Internet and centralisation can both improve and harm freedom of speech
+      \item Slogans regarding the borderless nature and inherent freedoms of the Internet are frequently wrong
+      \item Technical details matter: how a system is implemented can make a radical difference
+      \item Technologies can be used to resist censorship and improve privacy
+      \item However, policies must be changed too and pressure is needed on legislators
+      \end{itemize}
+      \column{5cm}
+      \vbox{}
+      \begin{overlayarea}{5cm}{10cm}
+        \resizebox{5cm}{!}{\includegraphics{collage}}
+      \end{overlayarea}
+    \end{columns}
+\end{frame}
+
+\begin{frame}
+\frametitle{One Version of the Future}
+\begin{quotation}
+\noindent \includegraphics[width=1cm]{opquo}\quad I'd like to change the design of the Internet by introducing                                                                                                 
+regulation--Internet passports, Internet police and international                                                                                            
+agreement--about following Internet standards. And if some countries                                                                                         
+don't agree with or don't pay attention to the agreement, just cut                                                                                           
+them off. 
+\end{quotation}
+\flushright --- Eugene Kaspersky, Co-Founder \& CEO of Kaspersky Labs
+\end{frame}
+
+\begin{frame}
+\frametitle{A better version of the future}
+\textbf{Internet Access as a Human Right}
+\medskip
+\begin{quotation}
+\noindent \includegraphics[width=1cm]{opquo}\quad
+We think it's something you cannot live without in modern society. Like banking services or water or electricity, you need an Internet connection
+\end{quotation}
+\flushright --- Laura Vilkkonen, Ministry of Transport and Communications, Finland
+
+\bigskip
+\textbf{Tor Project's Mission}
+\medskip
+\begin{quotation}
+\noinent \includegraphics[width=1cm]{opquo}\quad We remain committed to defending online privacy and anonymity as a human right.
+\end{quotation}
+\end{frame}
+
+\begin{frame}
+\frametitle{How to get there}
+\begin{itemize}
+\item Increased funding of research and development for privacy, circumvention, and anti-censorship technologies
+\item Policy and Legal frameworks for free access, free speech, and anonymity
+%\item Mobile devices and telco innovation
+%\item Ambient connectivity
+\end{itemize}
+\end{frame}
+ 
+\begin{frame}
+\frametitle{Credits}
+\begin{itemize}
+\item Thank you to Steven J. Murdoch, \url{http://www.cl.cam.ac.uk/users/sjm217/}, for the research and basis for this presentation. \\
+\item Photographer and Diagram credits as listed throughout the presentation.
+\end{itemize}
+\end{frame}
+
+\end{document}


Property changes on: projects/presentations/Censorship-HighLevel-Presentation.tex
___________________________________________________________________
Added: svn:mime-type
   + text/x-tex

Added: projects/presentations/Defcon_Presentation.pdf
===================================================================
(Binary files differ)


Property changes on: projects/presentations/Defcon_Presentation.pdf
___________________________________________________________________
Added: svn:mime-type
   + application/octet-stream

Added: projects/presentations/FBI-Online-Anonymity-with-Tor.odp
===================================================================
(Binary files differ)


Property changes on: projects/presentations/FBI-Online-Anonymity-with-Tor.odp
___________________________________________________________________
Added: svn:mime-type
   + application/octet-stream

Added: projects/presentations/FBI-Online-Anonymity-with-Tor.pdf
===================================================================
(Binary files differ)


Property changes on: projects/presentations/FBI-Online-Anonymity-with-Tor.pdf
___________________________________________________________________
Added: svn:mime-type
   + application/octet-stream

Added: projects/presentations/amnesty09freedom.pdf
===================================================================
(Binary files differ)


Property changes on: projects/presentations/amnesty09freedom.pdf
___________________________________________________________________
Added: svn:mime-type
   + application/octet-stream

Added: projects/presentations/cl08security-anon.pdf
===================================================================
(Binary files differ)


Property changes on: projects/presentations/cl08security-anon.pdf
___________________________________________________________________
Added: svn:mime-type
   + application/octet-stream

Added: projects/presentations/general-anonymity-presentation.odp
===================================================================
(Binary files differ)


Property changes on: projects/presentations/general-anonymity-presentation.odp
___________________________________________________________________
Added: svn:mime-type
   + application/octet-stream

Added: projects/presentations/iccs-fordham-jan09.odp
===================================================================
(Binary files differ)


Property changes on: projects/presentations/iccs-fordham-jan09.odp
___________________________________________________________________
Added: svn:mime-type
   + application/octet-stream

Added: projects/presentations/images/1513071722_0cf9da3d33.jpg
===================================================================
(Binary files differ)


Property changes on: projects/presentations/images/1513071722_0cf9da3d33.jpg
___________________________________________________________________
Added: svn:mime-type
   + image/jpeg

Added: projects/presentations/images/167234088_08f07f0dbe_o.jpg
===================================================================
(Binary files differ)


Property changes on: projects/presentations/images/167234088_08f07f0dbe_o.jpg
___________________________________________________________________
Added: svn:mime-type
   + image/jpeg

Added: projects/presentations/images/2007-tor-funding-pie-chart.png
===================================================================
(Binary files differ)


Property changes on: projects/presentations/images/2007-tor-funding-pie-chart.png
___________________________________________________________________
Added: svn:mime-type
   + image/png

Added: projects/presentations/images/2008-funding-chart.png
===================================================================
(Binary files differ)


Property changes on: projects/presentations/images/2008-funding-chart.png
___________________________________________________________________
Added: svn:mime-type
   + image/png

Added: projects/presentations/images/2009-10-12-china-bridge-usage.png
===================================================================
(Binary files differ)


Property changes on: projects/presentations/images/2009-10-12-china-bridge-usage.png
___________________________________________________________________
Added: svn:mime-type
   + image/png

Added: projects/presentations/images/2009-10-12-china-dirreq-trusted.png
===================================================================
(Binary files differ)


Property changes on: projects/presentations/images/2009-10-12-china-dirreq-trusted.png
___________________________________________________________________
Added: svn:mime-type
   + image/png

Added: projects/presentations/images/2009-oval_sticker_new.png
===================================================================
(Binary files differ)


Property changes on: projects/presentations/images/2009-oval_sticker_new.png
___________________________________________________________________
Added: svn:mime-type
   + image/png

Added: projects/presentations/images/2009-tor-logo.png
===================================================================
(Binary files differ)


Property changes on: projects/presentations/images/2009-tor-logo.png
___________________________________________________________________
Added: svn:mime-type
   + image/png

Added: projects/presentations/images/2124665370_420_1.jpg
===================================================================
(Binary files differ)


Property changes on: projects/presentations/images/2124665370_420_1.jpg
___________________________________________________________________
Added: svn:mime-type
   + image/jpeg

Added: projects/presentations/images/288531950_8ec4c4c057.jpg
===================================================================
(Binary files differ)


Property changes on: projects/presentations/images/288531950_8ec4c4c057.jpg
___________________________________________________________________
Added: svn:mime-type
   + image/jpeg

Added: projects/presentations/images/771997673_ef1f763d99.jpg
===================================================================
(Binary files differ)


Property changes on: projects/presentations/images/771997673_ef1f763d99.jpg
___________________________________________________________________
Added: svn:mime-type
   + image/jpeg

Added: projects/presentations/images/800px-Decryption_mix_net.png
===================================================================
(Binary files differ)


Property changes on: projects/presentations/images/800px-Decryption_mix_net.png
___________________________________________________________________
Added: svn:mime-type
   + image/png

Added: projects/presentations/images/93915772_3cac42d9f4_o.jpg
===================================================================
(Binary files differ)


Property changes on: projects/presentations/images/93915772_3cac42d9f4_o.jpg
___________________________________________________________________
Added: svn:mime-type
   + image/jpeg

Added: projects/presentations/images/Blue-question-mark.jpg
===================================================================
(Binary files differ)


Property changes on: projects/presentations/images/Blue-question-mark.jpg
___________________________________________________________________
Added: svn:mime-type
   + image/jpeg

Added: projects/presentations/images/Fixedfreeweb.png
===================================================================
(Binary files differ)


Property changes on: projects/presentations/images/Fixedfreeweb.png
___________________________________________________________________
Added: svn:mime-type
   + image/png

Added: projects/presentations/images/Horizontal_RGB_600.png
===================================================================
(Binary files differ)


Property changes on: projects/presentations/images/Horizontal_RGB_600.png
___________________________________________________________________
Added: svn:mime-type
   + image/png

Added: projects/presentations/images/P7100001.jpg
===================================================================
(Binary files differ)


Property changes on: projects/presentations/images/P7100001.jpg
___________________________________________________________________
Added: svn:mime-type
   + image/jpeg

Added: projects/presentations/images/PNS1-CK-1555_520x345x90.jpg
===================================================================
(Binary files differ)


Property changes on: projects/presentations/images/PNS1-CK-1555_520x345x90.jpg
___________________________________________________________________
Added: svn:mime-type
   + image/jpeg

Added: projects/presentations/images/PbDlogo-web.jpg
===================================================================
(Binary files differ)


Property changes on: projects/presentations/images/PbDlogo-web.jpg
___________________________________________________________________
Added: svn:mime-type
   + image/jpeg

Added: projects/presentations/images/ScreenHunter_03 Jun. 26 18.11.gif
===================================================================
(Binary files differ)


Property changes on: projects/presentations/images/ScreenHunter_03 Jun. 26 18.11.gif
___________________________________________________________________
Added: svn:mime-type
   + image/gif

Added: projects/presentations/images/Screenshot-24 June 2009 Tehran Election Protests - Google Maps - Iceweasel.png
===================================================================
(Binary files differ)


Property changes on: projects/presentations/images/Screenshot-24 June 2009 Tehran Election Protests - Google Maps - Iceweasel.png
___________________________________________________________________
Added: svn:mime-type
   + image/png

Added: projects/presentations/images/Screenshot-CBC.ca - Canadian News Sports Entertainment Kids Docs Radio TV - Mozilla Firefox-1.png
===================================================================
(Binary files differ)


Property changes on: projects/presentations/images/Screenshot-CBC.ca - Canadian News Sports Entertainment Kids Docs Radio TV - Mozilla Firefox-1.png
___________________________________________________________________
Added: svn:mime-type
   + image/png

Added: projects/presentations/images/Screenshot-CBC.ca - Canadian News Sports Entertainment Kids Docs Radio TV - Mozilla Firefox.png
===================================================================
(Binary files differ)


Property changes on: projects/presentations/images/Screenshot-CBC.ca - Canadian News Sports Entertainment Kids Docs Radio TV - Mozilla Firefox.png
___________________________________________________________________
Added: svn:mime-type
   + image/png

Added: projects/presentations/images/Screenshot-PageInfo-www.privacybydesign.ca.png
===================================================================
(Binary files differ)


Property changes on: projects/presentations/images/Screenshot-PageInfo-www.privacybydesign.ca.png
___________________________________________________________________
Added: svn:mime-type
   + image/png

Added: projects/presentations/images/Screenshot-Privacy by Design.ca - Mozilla Firefox.png
===================================================================
(Binary files differ)


Property changes on: projects/presentations/images/Screenshot-Privacy by Design.ca - Mozilla Firefox.png
___________________________________________________________________
Added: svn:mime-type
   + image/png

Added: projects/presentations/images/Screenshot-Whois record for 71.174.247.46 - Mozilla Firefox-ZOOMED.png
===================================================================
(Binary files differ)


Property changes on: projects/presentations/images/Screenshot-Whois record for 71.174.247.46 - Mozilla Firefox-ZOOMED.png
___________________________________________________________________
Added: svn:mime-type
   + image/png

Added: projects/presentations/images/Screenshot-Whois record for 71.174.247.46 - Mozilla Firefox.png
===================================================================
(Binary files differ)


Property changes on: projects/presentations/images/Screenshot-Whois record for 71.174.247.46 - Mozilla Firefox.png
___________________________________________________________________
Added: svn:mime-type
   + image/png

Added: projects/presentations/images/Screenshot-WinXP-Play [Running] - Sun VirtualBox-1.png
===================================================================
(Binary files differ)


Property changes on: projects/presentations/images/Screenshot-WinXP-Play [Running] - Sun VirtualBox-1.png
___________________________________________________________________
Added: svn:mime-type
   + image/png

Added: projects/presentations/images/Screenshot-WinXP-Play [Running] - Sun VirtualBox.png
===================================================================
(Binary files differ)


Property changes on: projects/presentations/images/Screenshot-WinXP-Play [Running] - Sun VirtualBox.png
___________________________________________________________________
Added: svn:mime-type
   + image/png

Added: projects/presentations/images/anonbib-screenshot.png
===================================================================
(Binary files differ)


Property changes on: projects/presentations/images/anonbib-screenshot.png
___________________________________________________________________
Added: svn:mime-type
   + image/png

Added: projects/presentations/images/anonymousman.jpg
===================================================================
(Binary files differ)


Property changes on: projects/presentations/images/anonymousman.jpg
___________________________________________________________________
Added: svn:mime-type
   + image/jpeg

Added: projects/presentations/images/berlin-large-crowd.jpg
===================================================================
(Binary files differ)


Property changes on: projects/presentations/images/berlin-large-crowd.jpg
___________________________________________________________________
Added: svn:mime-type
   + image/jpeg

Added: projects/presentations/images/chacha.jpg
===================================================================
(Binary files differ)


Property changes on: projects/presentations/images/chacha.jpg
___________________________________________________________________
Added: svn:mime-type
   + image/jpeg

Added: projects/presentations/images/chimage.php.gif
===================================================================
(Binary files differ)


Property changes on: projects/presentations/images/chimage.php.gif
___________________________________________________________________
Added: svn:mime-type
   + image/gif

Added: projects/presentations/images/cnmap.jpg
===================================================================
(Binary files differ)


Property changes on: projects/presentations/images/cnmap.jpg
___________________________________________________________________
Added: svn:mime-type
   + image/jpeg

Added: projects/presentations/images/collage.png
===================================================================
(Binary files differ)


Property changes on: projects/presentations/images/collage.png
___________________________________________________________________
Added: svn:mime-type
   + image/png

Added: projects/presentations/images/cropped-anon-man.png
===================================================================
(Binary files differ)


Property changes on: projects/presentations/images/cropped-anon-man.png
___________________________________________________________________
Added: svn:mime-type
   + image/png

Added: projects/presentations/images/cropped-hijack-sign-south-africa.jpg
===================================================================
(Binary files differ)


Property changes on: projects/presentations/images/cropped-hijack-sign-south-africa.jpg
___________________________________________________________________
Added: svn:mime-type
   + image/jpeg

Added: projects/presentations/images/danger-sign.jpg
===================================================================
(Binary files differ)


Property changes on: projects/presentations/images/danger-sign.jpg
___________________________________________________________________
Added: svn:mime-type
   + image/jpeg

Added: projects/presentations/images/data_snooping_single_hop_relay.jpg
===================================================================
(Binary files differ)


Property changes on: projects/presentations/images/data_snooping_single_hop_relay.jpg
___________________________________________________________________
Added: svn:mime-type
   + image/jpeg

Added: projects/presentations/images/dns.pdf
===================================================================
(Binary files differ)


Property changes on: projects/presentations/images/dns.pdf
___________________________________________________________________
Added: svn:mime-type
   + application/octet-stream

Added: projects/presentations/images/encryption-cc-by-sa.png
===================================================================
(Binary files differ)


Property changes on: projects/presentations/images/encryption-cc-by-sa.png
___________________________________________________________________
Added: svn:mime-type
   + image/png

Added: projects/presentations/images/evil-single-hop-proxy.png
===================================================================
(Binary files differ)


Property changes on: projects/presentations/images/evil-single-hop-proxy.png
___________________________________________________________________
Added: svn:mime-type
   + image/png

Added: projects/presentations/images/evil_single_hop_relay.jpg
===================================================================
(Binary files differ)


Property changes on: projects/presentations/images/evil_single_hop_relay.jpg
___________________________________________________________________
Added: svn:mime-type
   + image/jpeg

Added: projects/presentations/images/gfw-topology.svg
===================================================================
(Binary files differ)


Property changes on: projects/presentations/images/gfw-topology.svg
___________________________________________________________________
Added: svn:mime-type
   + image/svg+xml

Added: projects/presentations/images/google_tracking.jpg
===================================================================
(Binary files differ)


Property changes on: projects/presentations/images/google_tracking.jpg
___________________________________________________________________
Added: svn:mime-type
   + image/jpeg

Added: projects/presentations/images/guardian-crop.png
===================================================================
(Binary files differ)


Property changes on: projects/presentations/images/guardian-crop.png
___________________________________________________________________
Added: svn:mime-type
   + image/png

Added: projects/presentations/images/guardian-search.png
===================================================================
(Binary files differ)


Property changes on: projects/presentations/images/guardian-search.png
___________________________________________________________________
Added: svn:mime-type
   + image/png

Added: projects/presentations/images/head_logo.png
===================================================================
(Binary files differ)


Property changes on: projects/presentations/images/head_logo.png
___________________________________________________________________
Added: svn:mime-type
   + image/png

Added: projects/presentations/images/hijack-sign-south-africa.jpg
===================================================================
(Binary files differ)


Property changes on: projects/presentations/images/hijack-sign-south-africa.jpg
___________________________________________________________________
Added: svn:mime-type
   + image/jpeg

Added: projects/presentations/images/hrichina.png
===================================================================
(Binary files differ)


Property changes on: projects/presentations/images/hrichina.png
___________________________________________________________________
Added: svn:mime-type
   + image/png

Added: projects/presentations/images/huge-crowd.jpg
===================================================================
(Binary files differ)


Property changes on: projects/presentations/images/huge-crowd.jpg
___________________________________________________________________
Added: svn:mime-type
   + image/jpeg

Added: projects/presentations/images/images_pic-large-27489-In_the_future.jpg
===================================================================
(Binary files differ)


Property changes on: projects/presentations/images/images_pic-large-27489-In_the_future.jpg
___________________________________________________________________
Added: svn:mime-type
   + image/jpeg

Added: projects/presentations/images/ip.pdf
===================================================================
(Binary files differ)


Property changes on: projects/presentations/images/ip.pdf
___________________________________________________________________
Added: svn:mime-type
   + application/octet-stream

Added: projects/presentations/images/ir-firewall-port-filters.jpg
===================================================================
(Binary files differ)


Property changes on: projects/presentations/images/ir-firewall-port-filters.jpg
___________________________________________________________________
Added: svn:mime-type
   + image/jpeg

Added: projects/presentations/images/ir-outages.jpg
===================================================================
(Binary files differ)


Property changes on: projects/presentations/images/ir-outages.jpg
___________________________________________________________________
Added: svn:mime-type
   + image/jpeg

Added: projects/presentations/images/ir.png
===================================================================
(Binary files differ)


Property changes on: projects/presentations/images/ir.png
___________________________________________________________________
Added: svn:mime-type
   + image/png

Added: projects/presentations/images/iran-internet-connectivity-TAE-14.gif
===================================================================
(Binary files differ)


Property changes on: projects/presentations/images/iran-internet-connectivity-TAE-14.gif
___________________________________________________________________
Added: svn:mime-type
   + image/gif

Added: projects/presentations/images/iran-protest-cc-by.jpg
===================================================================
(Binary files differ)


Property changes on: projects/presentations/images/iran-protest-cc-by.jpg
___________________________________________________________________
Added: svn:mime-type
   + image/jpeg

Added: projects/presentations/images/irc-image-cc-nc-sa.jpg
===================================================================
(Binary files differ)


Property changes on: projects/presentations/images/irc-image-cc-nc-sa.jpg
___________________________________________________________________
Added: svn:mime-type
   + image/jpeg

Added: projects/presentations/images/islameyat.png
===================================================================
(Binary files differ)


Property changes on: projects/presentations/images/islameyat.png
___________________________________________________________________
Added: svn:mime-type
   + image/png

Added: projects/presentations/images/kareem.jpg
===================================================================
(Binary files differ)


Property changes on: projects/presentations/images/kareem.jpg
___________________________________________________________________
Added: svn:mime-type
   + image/jpeg

Added: projects/presentations/images/mix.pdf
===================================================================
(Binary files differ)


Property changes on: projects/presentations/images/mix.pdf
___________________________________________________________________
Added: svn:mime-type
   + application/octet-stream

Added: projects/presentations/images/murray.jpg
===================================================================
(Binary files differ)


Property changes on: projects/presentations/images/murray.jpg
___________________________________________________________________
Added: svn:mime-type
   + image/jpeg

Added: projects/presentations/images/namesheet.jpg
===================================================================
(Binary files differ)


Property changes on: projects/presentations/images/namesheet.jpg
___________________________________________________________________
Added: svn:mime-type
   + image/jpeg

Added: projects/presentations/images/netmap_mac.png
===================================================================
(Binary files differ)


Property changes on: projects/presentations/images/netmap_mac.png
___________________________________________________________________
Added: svn:mime-type
   + image/png

Added: projects/presentations/images/netnodnov.jpg
===================================================================
(Binary files differ)


Property changes on: projects/presentations/images/netnodnov.jpg
___________________________________________________________________
Added: svn:mime-type
   + image/jpeg

Added: projects/presentations/images/network.pdf
===================================================================
(Binary files differ)


Property changes on: projects/presentations/images/network.pdf
___________________________________________________________________
Added: svn:mime-type
   + application/octet-stream

Added: projects/presentations/images/no-proxy.pdf
===================================================================
(Binary files differ)


Property changes on: projects/presentations/images/no-proxy.pdf
___________________________________________________________________
Added: svn:mime-type
   + application/octet-stream

Added: projects/presentations/images/nsa-room.jpg
===================================================================
(Binary files differ)


Property changes on: projects/presentations/images/nsa-room.jpg
___________________________________________________________________
Added: svn:mime-type
   + image/jpeg

Added: projects/presentations/images/observer.png
===================================================================
(Binary files differ)


Property changes on: projects/presentations/images/observer.png
___________________________________________________________________
Added: svn:mime-type
   + image/png

Added: projects/presentations/images/opquo.png
===================================================================
(Binary files differ)


Property changes on: projects/presentations/images/opquo.png
___________________________________________________________________
Added: svn:mime-type
   + image/png

Added: projects/presentations/images/orangemen.jpg
===================================================================
(Binary files differ)


Property changes on: projects/presentations/images/orangemen.jpg
___________________________________________________________________
Added: svn:mime-type
   + image/jpeg

Added: projects/presentations/images/playboy.png
===================================================================
(Binary files differ)


Property changes on: projects/presentations/images/playboy.png
___________________________________________________________________
Added: svn:mime-type
   + image/png

Added: projects/presentations/images/remailer.pdf
===================================================================
(Binary files differ)


Property changes on: projects/presentations/images/remailer.pdf
___________________________________________________________________
Added: svn:mime-type
   + application/octet-stream

Added: projects/presentations/images/renesys-ir-proxycount.png
===================================================================
(Binary files differ)


Property changes on: projects/presentations/images/renesys-ir-proxycount.png
___________________________________________________________________
Added: svn:mime-type
   + image/png

Added: projects/presentations/images/rigby-anonymity.html
===================================================================
--- projects/presentations/images/rigby-anonymity.html	                        (rev 0)
+++ projects/presentations/images/rigby-anonymity.html	2010-04-21 19:00:45 UTC (rev 22219)
@@ -0,0 +1,633 @@
+<html><head><title>Anonymity on the Internet Must be Protected</title></head><body>
+
+<center>
+<h1>
+Anonymity on the Internet Must be Protected
+</h1>
+<h2>
+Karina Rigby
+</h2>
+
+<hr>
+Paper for MIT 6.805/STS085: Ethics and Law on the Electronic Frontier, Fall
+1995
+<hr>
+
+</center>
+
+
+<h2>1. Introduction</h2>
+<dl>
+<dt><em>Anonymity</em>:	     
+</dt><dd>1. The quality of state of being unknown or unacknowledged.	    <br> 2.
+One that is unknown or unacknowledged.[26]</dd></dl>
+The internet community is quickly changing and evolving as more of the world
+comes on-line.  Free speech and anonymity have always been important
+real-world societal issues and have been the topics of numerous heated court
+cases.  These issues are becoming increasingly important as more people
+discover the digital world and find the need for anonymity in this new
+society.  Over the last few years, an intense battle has been raging between
+the citizens of the net over the issue of whether on-line anonymity should be
+eliminated.  One side feels that people should have enough conviction in their
+beliefs to state them without hiding behind anonymity.  The other side feels
+that anonymity is vital for the protection of freedom of expression.
+Whichever side one agrees with, it is obvious that the technology for
+anonymity on the internet is readily available and that a definite vacuum is
+being filled by anonymity services. <p>
+This paper will examine the issue of anonymity on the internet, first
+providing a background on how anonymity services work and why these services
+came into existence.  In this discussion, I will limit the scope of my subject
+to the services provided by anonymous and pseudonymous remailers and posting
+sites which are currently used by thousands of people each day to send email
+and post to internet newsgroups.  Although the issues of digital cash and
+cryptography have close ties to anonymity, these subjects will not be
+discussed here.  After a background on anonymity has been provided, I will go
+on to present arguments for and against anonymity on the internet and discuss
+a number of famous conflicts involving anonymity on the internet.  I will then
+present some specific barriers to on-line anonymity, including attacks by net
+citizens, concerns of system administrators, and legal issues.  Finally, based
+on this discussion, I will show that anonymity on the internet provides a
+vital service and enhances freedom of expression and that most negative
+affects of anonymity can be minimized by following a few guidelines related to
+how anonymous services are provided and used.</p><p>
+</p><h2>2. Background</h2>
+<h3>2.1 How on-line anonymity works</h3>
+Although internet users can send messages by borrowing other user's accounts
+or by forging identities, one of the most common and least complicated ways of
+obtaining anonymity on the internet is by making use of one of many anonymity
+services.  Some of these services are connected directly to specific
+newsgroups on the usenet. Other anonymity providers are global and service the
+entire internet.  These anonymity servers make use of what are called
+"remailers", which are basically computers on the internet that forward
+electronic mail or files to other network addresses.  Before the remailer
+forwards the information, it strips the header from the original email so that
+the information showing where the message originated is no longer attached to
+the email.  Many anonymity services replace the header with anonymous
+addresses such as nobody at nowhere.  The eventual recipient of the message then
+has no idea about who sent the email and where it originated.  This type of
+service is termed truly anonymous.  Other anonymity services use similar
+remailers, but also give each user an anonymous ID, almost like a mailbox on
+the server, which stores the address of the sender so that any replies to
+anonymous email can be forwarded to the original sender.  This type of
+anonymity, called pseudonymity, allows users to be anonymous but reachable.
+<h3>2.2 History</h3>
+Anonymous posting/reply services on the internet were started around
+1988 and
+were introduced primarily for use on specific newsgroups which
+discussed
+particularly volatile, sensitive and personal subjects. One of the
+first of
+these services was started by Dave Mack for use on alt.sex.bondage.
+Anonymous
+postings on newsgroups such as this one soon became the primary method
+of
+communication. Anonymity services which utilized remailers originated
+with
+the Cypherpunk group in mid-1992. Global anonymity servers which served
+the
+entire internet soon sprang up, combining the functions of anonymous
+posting
+as well as anonymous remailing in one service. The new global services
+also
+introduced the concept of pseudonymous emails which allowed replies to
+anonymous
+mail.[19] These and other global servers which were started in the US
+died
+quickly as a result of numerous barriers such as attacks by net
+citizens and
+system administrators. These issues are discussed in section 6. The
+average life span of most anonymity servers is about 6 months
+because of these barriers and there are usually only 20 to 30 of these
+servers
+operating around the world at any one time.[26] Some of the most used
+of these
+global servers include the Kleinpaste, Clunie and Helsingius
+servers.[19]
+Even these servers were temporarily and/or permanently shut down due to
+the
+intense conflict surrounding their use. Foreign anonymity servers often
+fare
+better due to a more relaxed attitude of foreign system administrators.<p>
+
+  The Helsingius server, which is called penet.fi and run by Johan "Julf"
+Helsingius, is one of the most stable global anonymity servers. Julf Helsingius'
+original impetus to provide a global anonymity service was his desire to prove
+that censorship on the internet is impossible because there is always a
+technological solution which can circumvent the problem.[3]  The site is based
+on scripts and C code which was written by K. Kleinpaste and was originally
+intended to serve only Scandinavia.  Helsingius eventually expanded to
+worldwide service due to a flood of international requests. This server, which
+is one of the most popular, currently has over 200,000 registered users.[20]
+Although penet.fi has undergone numerous temporary shutdowns and has been
+involved in a recent police investigation (discussed in section 6), it
+has survived for over 3 years. Penet.fi and similar servers are currently the
+primary anonymity servers on the internet today.  According to Raph Levien,
+graduate student at the University of California, Berkeley who tracks the
+anonymity providers, up to 15,000 email messages a day are sent through
+anonymous remailing services.[16]  A list of some of the current anonymity
+services can be found at the <a href="http://www.cs.berkeley.edu/%7Eraph/remailer-list.html">University of California at Berkeley</a>.[22]
+</p><h2>3. Arguments for anonymity</h2>
+The society in which we live can frequently be extremely conservative, often
+making it dangerous to make certain statements, have certain opinions, or
+adopt a certain lifestyle.  Anonymity is important for on line discussions
+involving sexual abuse, minority issues, harassment, sex lives, and many other
+things.  Additionally, anonymity is useful for people who want to ask
+technical questions that they don't want to admit they don't know the answer
+to, report illegal activities without fear of retribution, and many other things. For example,
+the state of Florida maintains an anonymous hotline for government workers to
+report wastes and abuses to the comptroller's office.[12]  Without anonymity,
+these actions can result in public ridicule or censure, physical injury, loss
+of employment or status, and in some cases, even legal action.  Protection
+from harm resulting from this type of social intolerance is a definite example
+of an important and legitimate use of anonymity on the internet.  An example
+of  how vital such anonymity can be is exemplified by the following excerpt
+from a newsgroup post during a temporary shutdown of penet.fi:
+<blockquote>"I had been posting to a nontechnical misc newsgroup about an
+intimate topic for which I felt I required privacy.  I have received
+immeasurable help from the people in that news group....Please, folks, believe
+me, I *need* this service.  Please consider my point of view and permit
+admin at penet.fi to turn the service back on."[18]
+</blockquote>
+Doctors who are members of the on-line community often encourage their
+patients to connect with others and form support groups on issues about which
+they do not feel comfortable speaking about publicly.[18]  It is essential to
+be able to express certain opinions without revealing your true identity.  One
+relevant example of anonymity in the real world is the debate over Caller ID
+on telephones.[4]  A great deal of people were extremely disturbed that the
+person on the receiving end of a telephone call would know the identity of the
+caller.  People had taken for granted that they could be anonymous if they
+wanted and were distressed at the idea of that anonymity being taken away.
+Many net users feel the same way about on-line anonymity.<p>
+Anonymity is extremely effective in promoting freedom of expression. Julf
+Helsingius asserts that anonymity is beneficial because it gives people an
+outlet for their opinions, even controversial ones.  He feels that it is "good
+to bring out things like that in daylight because that actually allows you to
+...start processing it, see how people react to it, and so on."[3]  This may
+have sort of a cathartic effect in that it allows people to get their feelings
+out without physically hurting people of other cultures, races, etc.
+Additionally, anonymity hinders some methods of controlling the actions of
+other people.  This is an additional argument in the usefulness of anonymity
+in the protection of freedom of expression.</p><p>
+There are many long-standing precedents for anonymity in publishing.  The
+responsibility of a journalists not to reveal their sources is recognized
+almost universally.  Many authors write under pen-names and there are still
+some cases where the true identity of the author has never been discovered.
+Even the Federalist Papers were published under a pseudonym.[12] Most
+newspapers publish letters to the editor and help columns and allow the
+letters to be anonymous or signed with a pseudonym and many newspaper articles
+are merely credited to "AP Newswire".  Additionally, anonymous peer reviews of
+proposals and articles is common in academic circles. </p><p>
+An additional argument for anonymity is that it is a part of society and
+unavoidable.  Anonymous communication can be achieved  in real life by sending
+an unsigned letter or making an anonymous phone call.  From the large number
+of users who take advantage of anonymous services on the internet, it can be
+seen that these services are truly necessary and fill a specific need.   The
+availability of the technology to set up such an anonymous server also makes
+the elimination of such servers virtually impossible; as soon as one is shut
+down, another one is created.[19]  The current availability of such services
+eliminates the need to forge an identity or use another person's identity to
+correspond anonymously.  People on the net are anonymous to some degree anyway
+because of the inherent characteristics of the medium.  Services providing
+additional anonymity are only expanding on this  feature of the net.</p><p>
+
+Pseudonymity comes in useful in that it allows users to send mail to
+pseudonymous users in response to their mail or post.  People are able to
+respond to emails that they like or dislike or that they find offensive or
+disruptive.  This makes the pseudonymous user more responsible for his or her
+actions than the completely anonymous user.  They are still accountable for
+their actions on the net but are protected from "real world" damage.</p><p>
+
+Abolishing anonymity servers is not necessary since the technology exists to
+produce kill files which allow users to choose for themselves what they
+consider offensive.  This allows individuals to filter out anonymous posts and
+emails which they dislike, while still reaping the benefits afforded by
+anonymous services. Although some people will automatically discount any
+anonymous postings, other people don't care who wrote it, as long as it is
+intelligent or funny.  Still others use anonymity specifically to allow their
+opinions to be judged on their merit, rather than by the name attached to
+them.
+</p><h2>4. Arguments against anonymity</h2>
+With the benefits of on-line anonymity also come the disadvantages.
+Extreme
+abuse and illegal activity on the net is one of the most visible
+drawbacks to
+anonymity on the net. In general, abusive and frivolous anonymous email
+and posting is done mostly by users who
+have just discovered anonymity servers and whenever the novelty wears
+off, the
+frequency of the abuse decreases.
+However, a small minority of people who use anonymity servers are
+sociopaths who
+are attracted by the ease with which they can avoid responsibility and
+accountability for their actions. Examples of the these actions include
+kidnapping, terrorism, harassment, personal threats, hatespeech,
+financial
+scams, disclosure of trade secrets and exposure of personal information
+or
+secrets, among other things. One user expressed the desire to ban
+anonymity from the internet because he
+had no recourse against an anonymous user who posted his address, phone
+number
+and the name of his employer on the internet in retaliation for
+something that
+he had said.[18] Although such uses of anonymity go against the
+philosophy of
+'netiquette' which citizens of the net use to partially govern the net,
+it can
+be argued that the user who complained would have been protected from
+this
+retaliation if he had posted his original comment anonymously.<p>
+
+Some people argue that the use of on-line anonymity in these cases of abusive
+or hurtful activity are especially bad because people are more likely to
+believe things that they see in print, as opposed to something they hear in an
+anonymous phone call or conversation. The instantaneous means by which this
+printed information can be distributed around the world also gives many people
+cause for concern. Additionally, it is almost impossible to control illegal
+activity which is perpetrated or discussed anonymously over the internet
+since, in most cases, police are not able to track the offender down.  The
+recent case involving penet.fi and the Finnish police is one exception, but
+this instance is in the extreme minority of cases where the identity of an
+anonymous user who has used the internet for criminal activity has not
+remained secret.  </p><p>
+
+
+
+Some users value free speech so much that they have no problems with the
+hatespeech which a minority of users profess in anonymous posts and
+emails. They do, however, object to the fact that these users use anonymity as
+a shield for their beliefs.
+Some people use the existence of this problem to argue that anonymity is only needed to avoid retribution due to lack of
+understanding in the on-line society.  They feel that dealing with societal
+problems which make people feel the need to express their opinions anonymously
+is a better solution than sanctioning these problems by allowing the existence
+of anonymous services. Additionally, many of the people who cause the
+intolerant conditions in some areas of the net which cause people to feel the
+need to express their opinions anonymously are the same people that abuse the
+anonymous services by using them to attack their opponents with impunity.
+There is a possibility that this problem could be diminished if societal
+problems were dealt with directly instead of discussed anonymously.  This
+argument loses significant power, however, due to the fact that these problems
+have persisted for centuries in real-life society as well.  Rude,
+inappropriate and offensive emails and posts were present on the internet long
+before anonymity servers were created.  The best way do deal with rude people
+is to ignore them, and not to eliminate a service which has many benefits to
+the net.  As one user mentioned: "It is akin to ...closing down the highway
+system because a few people speed."[18]</p><p>
+
+Some users agree that anonymity is useful for some newsgroups or discussions
+on sensitive topics, but they object to the fact that anonymity servers
+provide anonymity for everybody on every newsgroup.  They feel that each
+newsgroup should decide whether or not they want anonymous posts and then set
+up a server designed specifically for that group.  A number of newsgroups
+already function like this, but other newsgroups that object to anonymous
+posts are still subjected to them because users are able to use global
+services such as penet.fi.  Many users feel that the introduction of such
+services has changed the culture of the net.
+
+</p><h2>5. Famous cases</h2>
+<h3>5.1 The ARMM censorship case</h3>
+
+The issue of how anonymous people should be allowed to be has always been a
+controversial subject.  Julf Helsingius has always felt that the anonymity of
+the people who use his service should be protected completely (or as
+completely as possible, as will be described in section 5.2).  Many net users disagreed
+with this policy and felt that users who employ anonymity services in order to
+post abusive messages or commit illegal acts should be exposed.  One of the
+greatest supporters of this view was Dick Depew, the news administrator on
+usenet.  Depew strongly disagreed with Helsingius' policy of complete
+anonymity and announced in March of 1993 that he would cancel all anonymous
+messages originating from Helsingius' server.[19]  Depew had written a piece of
+software which he called ARMM (standing for Automatic Retroactive Minimal
+Moderation) which was designed to send out cancel messages instead of posting
+the anonymous posts.  Since Depew was an administrator on usenet, he was in a
+position to do this, whereas normal users of the system did not have this
+capability.[19]
+
+<p>After 2 anonymous messages were canceled using the ARMM program, an
+anonymous user called an8785 retaliated by posting Depew's address of
+employment and the name and phone number of his supervisor on the net.  He
+told users that he had done this in response  to Depew's censorship and urged
+users to complain to Depew's supervisor.  Helsingius eventually deactivated
+the account of anonymous user an8785, but never revealed his identity.  About
+a month later, Depew released a revised version of the ARMM program on the
+Helsingius server, which some people felt was in response to the fact that
+Helsingius refused to reveal the identity of an8785.  The revised program
+severely backfired, both technically and politically.  The software had a bug
+which caused it to post hundreds of messages on various newsgroups, causing a
+few mailservers to crash and generally making many net users angry.[19]  This
+situation caused a great deal of outcry over attempts at censoring and
+policing the net.  It also caused many users to publicly express their support
+for Helsingius' policy of absolute anonymity.  Both of these issues are
+extremely important in the ongoing debate about what sort of legal
+restrictions should be put on the net and what types of legislation will be
+created for this purpose (this will be discussed in section 7).
+
+</p><h3>5.2 Anonymity and the Church of Scientology</h3>
+In January of this year, the Church of Scientology asserted that somebody had
+broken into a CoS computer and had stolen privileged information.  An
+anonymous user then spread this information on the internet and posted it on
+alt.religion.scientology and other newsgroups, where supporters and critics of
+the church have been feuding for 3 1/2 years.[15,16]   The church submitted a
+request to one of the newsgroups to close down  completely because the posts
+had allegedly violated trademarks and copyrights held by the church.  The
+church also threatened to hold the newsgroup operator and Netcom, the internet
+provider, legally responsible for such violations.[16]  A federal judge
+eventually refused the Church's request for an injunction against Netcom and
+the newsgroup operator to stop posting such information.  The judge ruled that
+it would be an impossible burden on the service provider to have to monitor
+all of the traffic through its service.[17]  This ruling shows that there is
+some hope that anonymity on the internet will eventually be legally
+preserved.<p>
+
+On February 2,  lawyers for the Church of Scientology also contacted the
+operators of several anonymity services, including Julf Helsingius, and
+demanded that they stop further anonymous posts to the newsgroups or legal
+action would ensue. After Helsingius made it clear that he would not
+voluntarily reveal the identity of the user in question, he was informed that
+the Finnish police were being contacted via Interpol. On February 8,  Finnish
+police informed Helsingius that if he did not reveal the identity of the
+anonymous user, they would serve him with a search warrant to seize his entire
+server with the identities of all of the users who utilize his anonymity
+service. The Finnish police used the fact that the anonymous user was
+suspected of "unauthorized use of a computer" as the grounds for their search
+and the confiscation of the information from Julf Helsingius. Faced with the
+choice between revealing the identity of only one of his users or all of them,
+Helsingius reluctantly supplied the Finnish police with the name of the
+anonymous user involved in the CoS case.  On February 14, Helsingius is
+informed that the criminal investigation in the CoS has been
+dropped.[14,20,21]  In this case, Helsingius was forced to choose between
+protecting a user who relied on their service for anonymity at a time when
+anonymity was crucial and protecting the records of all of the other users of
+the system.  The most practical choice was made and Helsingius intends to
+continue his anonymity service, but it will be interesting to see if any
+changes are made in the penet.fi system as a result of this choice.
+Additionally, the fact that complete anonymity on the internet was compromised
+by the authorities brings up many legal questions about the future of
+anonymity on the internet.  This issue will be discussed in section 7. 
+
+</p><h3>5.3  Anonymity in criminal cases</h3>
+
+Recent debates about regulation of the internet have involved the hot topics
+of child pornography and abuse.  The use of anonymity or pseudonymity  in
+these criminal activities has recently come up in a court case involving two
+men in Texas.   Gene Howland and Daniel Van Deusen ran a bulletin board
+service called "Lifestyles" in Houston, Texas which provided its more than
+1000 subscribers with pornographic material, including child pornography.  The
+two men, using the pseudonyms "Poo Bear" and "Wild One", lured two young boys
+to their home and forced them to commit sexual acts.  Both men were indicted
+on March 11 on charges of sexual assault, aggravated sexual assault and
+indecency with a child.[7] Cases such as this one encourage assertions that
+the internet should be regulated and that anonymity should be eliminated since
+it enables people to use on-line services to commit criminal acts more
+easily. 
+
+<h2>6. Barriers to anonymity</h2>
+<h3>6.1 Attacks by net citizens</h3>
+About once a month, Julf Helsingius, who runs penet.fi, receives mailbombs
+from irate net users who are upset about an anonymous post or email that came
+through his server.  This causes many delays or the loss of data.  Julf's
+general solution to this problem is to block the service of the site from
+which the mailbomb came for a few days.  This usually discourages the
+mailbomber enough to stop, at least temporarily.[4]  However, if enough people
+bomb the server, the loss of anonymity service could be more widespread or the
+server may even end up being shut down completely. 
+
+<h3>6.2 Concerns of system administrators</h3>
+
+System administrators are often adamantly against the use of their sites for
+anonymity servers.  They are afraid that they will be held responsible for
+acts such as terrorism or kidnapping which take place because of anonymous
+messages which pass through their system.  Administrators would often rather
+shut down an anonymity server than deal with all of the politics that surround
+the use of such servers.  This is one of the main reasons for the short life
+spans of many anonymity servers on the net.  At one point in the life of the
+penet.fi server, an unknown authority on the internet appealed to the main
+administrator of the Finnish university network to shut down the anonymous
+server.  At that point in time, the server shared the internet connection with
+the university network and it created a difficult situation for Julf
+Helsingius.  He decided to shut down the service for a few weeks until he
+could get a completely commercial connection that was totally separate from
+that of the university network.[3]  Other server operators often do not have
+this option and are forced to shut their servers down due to a conflict of
+interest with system administrators.<p>
+
+ The validity of the concerns of system administrators can be demonstrated in
+the civil court case of Stratton vs. Prodigy.  An anonymous user of Prodigy
+accused Stratton Oakmont Inc., a New York investment bank, of acting
+fraudulently and illegally in one of its initial public offerings.  As a
+result of this anonymous statement, Stratton filed a $200 million libel suit
+against Prodigy and the anonymous user.  Stratton considers the network
+responsible for shielding the user with anonymity and stated: "If Prodigy is
+in the publishing business, then it opens itself up to libel charges."[6]
+Cases such as this one intimidate numerous system administrators and result in
+the shutdown of many anonymity servers each year.</p><p>
+
+Sometimes system administrators try to block anonymity service in their areas
+by using tactics other than just trying to shut the anonymity server down.  An
+example of such a scheme was the famous case involving the ARMM program which
+tried to censor anonymous messages and remove them from newsgroups.
+Although this program backfired and generated much opposition to censorship on
+the net, the possibility
+of future use of such programs is not eliminated.  Any system administrator
+with enough technical knowledge to create a better program of this kind may be
+able to effectively censor any anonymous messages at their site.
+
+</p><h2>7. Legal issues</h2>
+
+US law does not specifically guarantee the right to anonymity, although it is
+generally understood that anonymity in some form is protected under the First
+Amendment to the Constitution.[22] This is exemplified in the Supreme Court
+decision on the case of New York Times Co. vs. Sullivan, 1964.  The court
+stated that: "an author's decision to remain anonymous...is an aspect of the
+freedom of speech protected by the First Amendment" and "the anonymity of an
+author is not ordinarily a sufficient reason to exclude her work product from
+the protections of the First Amendment."[22,24]  In 1958, the Supreme Court
+upheld the right of the NAACP to keep from disclosing their membership list to
+the government.[22]   The Supreme court has also struck down several laws
+which require the disclosure of the names of member of dissident groups.[22]
+Additionally, an example as simple as that of going into a voting both and
+anonymously entering your vote demonstrates that the US government does
+understand the importance of anonymity in some cases. Other countries are also
+gradually realizing the importance of anonymity.  The most recent Canadian
+Copyright Act specifically guarantees the right of an author to write under a
+pseudonym or remain anonymous.[8]  <p>
+
+US legislation is sure to examine the subject of <em>on-line</em> anonymity as laws
+slowly begin to catch up with important issues regarding the internet. One
+daunting look into current legal cases, however, seems to paint a grim picture
+for anonymity on the internet.  Justice Scalia recently stated in a ruling on
+McIntyre vs. Ohio Elections Commission that he found anonymity generally
+dishonorable.  He wrote that "It facilitates wrong by eliminating
+accountability, which is ordinarily the very purpose of the anonymity."  He
+also felt that creating legal protection for anonymous communication without a
+reason to expect "threats, harassment or reprisals seems to me a distortion of
+the past that will lead to a coarsening of the future".[22,23]
+Additionally, the Supreme Court of California recently upheld a state law
+prohibiting anonymous mass political mailings by political candidates.[22]
+The fact that this case involves limiting anonymous speech, which is strongly
+protected by the First Amendment, does not bode well for media such as on-line
+communications which would have inherently less protection.</p><p>
+
+The recent clash between Finnish police and penet.fi, the longest running
+anonymity server, is bound to inspire many net citizens who prize their
+anonymity to push for legislation, in Finland and around the world, to protect
+this precious resource and make it harder to legally raid anonymity servers.
+The recent court ruling earlier this year in the dispute between Netcom and
+The Church of Scientology  which held that network administrators should not
+be responsible for all of the traffic through their server, including
+anonymous messages, shows that defenders of the right to anonymity do have the
+support of some members of the judicial system.  On the other hand, the rise
+in the number of criminals who have joined the on-line community and are using
+the internet to discuss or participate in criminal activity is sure to inspire
+legislators to push for stricter laws on the limitations of anonymity in cases
+where illegal activity has occurred.  Companies are also beginning to fight
+against anonymity on the internet because they fear that it will undermine
+long-established laws designed to protect the ownership of information and
+control its dissemination.  It will be interesting to watch this battle play
+itself out in the coming years.
+
+</p><h2>8. Rules</h2>
+
+Current rules regarding anonymity on the internet are not global and are
+severely dependent on the opinion of the service providers who run the
+servers.  Net users and readers of anonymous posts are also not unified in
+their opinions of what is acceptable or not.  Julf Helsingius' policy is that if people on his system abuse the anonymity
+service to repeatedly post abusive articles in cultural newsgroups he will
+usually send them a warning message, and in some cases even cut them off.[3]
+He has also instituted a policy which limits the size of the files which can
+be sent through his server.   This was done to minimize the amount of
+copyrighted software and pornographic images that could be transmitted via his
+service since both of these types of files are usually rather large.[15]<p>
+
+There has been a significant push on the internet to force anonymity providers
+to reveal the identity of users who have committed criminal or severely
+abusive acts.  Julf Helsingius opposes this idea and feels that he does not
+have the right to judge what is right and wrong.  Additionally, the
+international scope of his service means that the concept of illegal
+activities is not universal.  He uses the example of pornographic images to
+prove his point.  Posting pornographic images on the internet is considered
+illegal in many countries, while it is perfectly legal in others.  He feels
+that it is not his place to draw the line on these issues.[3]  Additionally,
+in many countries which have entered the on-line community, writings which are
+critical of the government, such as the exposure of human rights abuses in
+China and elsewhere, are illegal.  The international nature of the net simply
+makes it impossible to enforce the laws of every country individually.
+
+
+It is quite possible that on-line anonymity will be reduced as soon as US
+legislation catches up with internet activities unless the digital community
+shows that it can regulate itself.  One way to do this, is to draw up a set of
+guidelines on the use of anonymity services and stick to them.  A very good
+example of such a set of rules can be found in a document written by
+L. Detweiler called <a href="http://www.eff.org/pub/Privacy/Anonymity/net_anonymity.faq">Anonymity on
+the Internet</a>.[19]
+
+Examples of some of the most important rules that <em>must</em> be followed in
+order to discourage legislators from stepping in are as follows:
+</p><p>
+For users:
+</p><ul>
+<li><em>Use anonymity only if you have to.</em>  Frivolous uses weaken the seriousness
+and usefulness of the capability for others.
+</li><li><em>Do not use anonymity to provoke, harass, or threaten others.</em>
+</li><li><em>Be aware of the policies of the anonymous site and respect them.</em>  Be
+prepared to forfeit your anonymity if you abuse the privilege.[19]
+</li></ul>
+For operators:
+<ul>
+<li><em>Document thoroughly acceptable and unacceptable uses in an introductory
+file that is sent to new users.</em>  Have a coherent and consistent policy and
+stick to it. State clearly what logging and monitoring is occuring.
+</li><li><em>Formulate a plan for problematic ethical situations and anticipate
+potentially intense moral quandaries and dilemmas.</em>
+</li><li><em>Take precautions to ensure the wecurity of the server from physical and
+network-based attacks and infiltrations.</em>[19]
+</li><li><em>Require a vote either to allow or disallow anonymous posts on individual
+newsgroups.</em>
+</li></ul>
+For readers:
+<ul>
+<li><em>React to the anonymous information unemotionally.</em>  Abusive posters will be
+encouraged further if they get irrationally irate responses.  Sometimes the
+most effective response is silence.
+</li><li><em>Notify operators if very severe abuses or criminal activity occur</em>, such as
+piracy, harassment, extortion, etc.[19]
+</li></ul>
+If these and other guidelines are followed, problems associated with anonymity
+on the internet can be minimized.  
+
+
+<h2>9. Conclusion</h2>Freedom of expression must be allowed.  With this
+freedom comes all sorts of problems, but these types of problems are not
+unique to the internet. Unpopular speech is a necessary consequence of free
+speech and it was decided long ago, during the drafting of the Constitution
+and the Bill of Rights, that the advantages of free speech outweigh the
+disadvantages.  This principle should hold on the internet as well.
+Anonymity servers on the internet provide a vital service with many benefits
+to the on-line community.  The minority of users who abuse this service by
+sending harassing messages or engaging in illegal activities are a definite
+disadvantage to anonymity on the internet but this problem can be reduced
+significantly by following guidelines suggested here.   The fact remains that
+more than 15,000 email messages are sent anonymously each day which shows that
+there is a significant need for anonymity services on the net.     If
+anonymity service is a truly negative thing for the internet, it will
+eventually die out by itself from lack of use.  Attempts to artificially
+eliminate this service through legislation would not be right.  This wish that
+the internet remain unregulated seems rather naive, however.  It is hoped, at
+least, that future national and international legislation on the internet
+allows the vital service of anonymity to remain.  A common set of guidelines
+for the use of anonymity on the entire internet is vital.  Such guidelines
+will only function on an international scale if both lawmakers and net users
+work together and try to figure out a solution.
+<hr>
+<h2>References</h2>
+<ol>
+<li>The American Heritage Dictionary of the English Language, Third Edition,
+Houghton Mifflin Company, Copyright 1992.
+
+</li><li><a href="http://www.eff.org/pub/Privacy/Anonymity/net_anonymity.faq">Anonymity on
+the Internet, Part 2</a>
+&lt;</li><li><a href="http://www.race.u-tokyo.ac.jp/RACE/TGM/Texts/remailer.html">Don't try to
+Control the Network Because it's Impossible Anyway</a>
+</li><li><a href="http://www.hotwired.com/wired/2.06/departments/electrosphere/anonymous.1.html">Anonymously
+Yours --Part 1</a>
+</li><li><a href="http://www.hotwired.com/wired/2.06/departments/electrosphere/anonymous.1.html">Anonymously
+Yours --Part 2</a>
+</li><li><a href="http://www.theta.com/goodman/lies.htm">Solutions to On-Line Lies</a>
+</li><li><a href="http://www.theta.com/goodman/crime.htm">A Crime By Any Other Name...</a>
+</li><li><a href="http://www.eff.org/pub/Privacy/Anonymity/can_anonymity.law">Canadian law supporting right to anonymity</a>
+</li><li><a href="http://www.boardwatch.com/mag/95/may/bwm50.htm">Legally Online</a>
+</li><li><a href="http://www.clas.ufl.edu/%7Eavi/NII/wsj_no-anon.html">Personal Technology</a>
+</li><li><a href="http://www.clas.ufl.edu/%7Eavi/NII/siegel_editorial.txt">Anarchy, Chaos on the Internet Must End</a>
+</li><li><a href="http://www.clas.ufl.edu/%7Eavi/NII/wsj_avi-response.txt">Response to editorial by Avi Baumstein</a>
+</li><li><a href="http://www.clas.ufl.edu/%7Eavi/NII/siegel_raph-response.txt">Response to editorial in the SF Cronical</a>
+</li><li><a href="http://www.tezcat.com/%7Ewednsday/penet.michigass">Police actions in Finland</a>
+</li><li><a href="http://www.clas.ufl.edu/%7Eavi/NII/TIME_penet.txt">Unmasked on the Net</a>, Time Magazine, March 6, 1995 Volume
+145, No. 9.
+</li><li><a href="http://www.clas.ufl.edu/%7Eavi/NII/ANON_twisted.txt">Internet's anonymity a boon the the 'twisted' Phyladelphia
+Inquirer</a> by Reid Kanaley, February1, 1995.
+</li><li><a href="http://www.clas.ufl.edu/%7Eavi/NII/CHURCH_refused.txt">Ruling Supports Internet Provider Against Copyright Violation
+Charge</a>Edupage, March 2, 1995.
+</li><li><a href="http://www.eff.org/pub/Privacy/Anonymity/net_anonymity.faq">Anonymity on
+the Internet, Part 3</a>
+</li><li><a href="http://www.eff.org/pub/Privacy/Anonymity/net_anonymity.faq">Anonymity on
+the Internet, Part 1</a>
+</li><li><a href="http://swissnet.ai.mit.edu/6095/articles/anonymity/short-pieces/finland-feb21.txt">World-wide internet community appalled over the Scientology seizure</a>
+</li><li><a href="http://www.tezcat.com/%7Ewednsday/penet.pr">Press release on anon servers, child porn and
+scientologists</a> Helsinki, Finland, February 20, 1995.
+</li><li><a href="http://www.law.cornell.edu/jol/froomkin.htm">Anonymity and Its
+Enmities (Article 4)</a>by A. Michael Froomkin.
+</li><li>63 U.S.L.W. 4294, 4293-94 (Scalia, J., dissenting).
+</li><li>McIntyre v. Ohio Elections Commission, 63 U.S.L.W. 4279 (U.S. April 18, 1995)
+</li><li><a href="http://www.clas.ufl.edu/%7Eavi/NII/PENET_broke.txt">Feb. 22, 1995, Postcard from Cyberspace: The Helsinki Incident and the Right to
+      Anonymity</a>, by Daniel Akst, Los Angeles Times.
+</li><li><a href="http://swissnet.ai.mit.edu/6095/articles/anonymity/short-pieces/lewis-nyt-dec3194.txt">Comment by Raph Levien on the Dec. 31, 1994, New York Times
+article: Computer Jokes and Threats Ignite Debate
+      on Anonymity.</a>
+</li><li><a href="http://www.clas.ufl.edu/%7Eavi/NII/NYT_anon-amok.txt">Computer Jokes and Threats Ignite Debate on Anonymity</a>The
+New York Times, December 31, 1994, pp. 1, 53.
+</li><li><a href="http://swissnet.ai.mit.edu/6095/articles/anonymity/short-pieces/new-scientist-mar1195.html">Identity Crisis on the Internet</a>New Scientist 11 Mar 95
+
+
+</li></ol></body></html>
\ No newline at end of file


Property changes on: projects/presentations/images/rigby-anonymity.html
___________________________________________________________________
Added: svn:mime-type
   + text/html

Added: projects/presentations/images/security.png
===================================================================
(Binary files differ)


Property changes on: projects/presentations/images/security.png
___________________________________________________________________
Added: svn:mime-type
   + image/png

Added: projects/presentations/images/single-hop-proxy.png
===================================================================
(Binary files differ)


Property changes on: projects/presentations/images/single-hop-proxy.png
___________________________________________________________________
Added: svn:mime-type
   + image/png

Added: projects/presentations/images/single_hop_relay.jpg
===================================================================
(Binary files differ)


Property changes on: projects/presentations/images/single_hop_relay.jpg
___________________________________________________________________
Added: svn:mime-type
   + image/jpeg

Added: projects/presentations/images/steganography-cc-by-sa.jpg
===================================================================
(Binary files differ)


Property changes on: projects/presentations/images/steganography-cc-by-sa.jpg
___________________________________________________________________
Added: svn:mime-type
   + image/jpeg

Added: projects/presentations/images/tiananmen.png
===================================================================
(Binary files differ)


Property changes on: projects/presentations/images/tiananmen.png
___________________________________________________________________
Added: svn:mime-type
   + image/png

Added: projects/presentations/images/tor-keys1.pdf
===================================================================
(Binary files differ)


Property changes on: projects/presentations/images/tor-keys1.pdf
___________________________________________________________________
Added: svn:mime-type
   + application/octet-stream

Added: projects/presentations/images/tor-keys2.pdf
===================================================================
(Binary files differ)


Property changes on: projects/presentations/images/tor-keys2.pdf
___________________________________________________________________
Added: svn:mime-type
   + application/octet-stream

Added: projects/presentations/images/tor-keys3.pdf
===================================================================
(Binary files differ)


Property changes on: projects/presentations/images/tor-keys3.pdf
___________________________________________________________________
Added: svn:mime-type
   + application/octet-stream

Added: projects/presentations/images/tor-lines-of-code-by-language.png
===================================================================
(Binary files differ)


Property changes on: projects/presentations/images/tor-lines-of-code-by-language.png
___________________________________________________________________
Added: svn:mime-type
   + image/png

Added: projects/presentations/images/tor-network.pdf
===================================================================
(Binary files differ)


Property changes on: projects/presentations/images/tor-network.pdf
___________________________________________________________________
Added: svn:mime-type
   + application/octet-stream

Added: projects/presentations/images/tor-safe-path.pdf
===================================================================
(Binary files differ)


Property changes on: projects/presentations/images/tor-safe-path.pdf
___________________________________________________________________
Added: svn:mime-type
   + application/octet-stream

Added: projects/presentations/images/tor-safe-selection.pdf
===================================================================
(Binary files differ)


Property changes on: projects/presentations/images/tor-safe-selection.pdf
___________________________________________________________________
Added: svn:mime-type
   + application/octet-stream

Added: projects/presentations/images/totalLong.png
===================================================================
(Binary files differ)


Property changes on: projects/presentations/images/totalLong.png
___________________________________________________________________
Added: svn:mime-type
   + image/png

Added: projects/presentations/images/twitter-g20-pittsburgh-gothamist.png
===================================================================
(Binary files differ)


Property changes on: projects/presentations/images/twitter-g20-pittsburgh-gothamist.png
___________________________________________________________________
Added: svn:mime-type
   + image/png

Added: projects/presentations/images/twitter-iran-protests-time.png
===================================================================
(Binary files differ)


Property changes on: projects/presentations/images/twitter-iran-protests-time.png
___________________________________________________________________
Added: svn:mime-type
   + image/png

Added: projects/presentations/images/wikileaks-cropped.png
===================================================================
(Binary files differ)


Property changes on: projects/presentations/images/wikileaks-cropped.png
___________________________________________________________________
Added: svn:mime-type
   + image/png

Added: projects/presentations/images/wikileaks.png
===================================================================
(Binary files differ)


Property changes on: projects/presentations/images/wikileaks.png
___________________________________________________________________
Added: svn:mime-type
   + image/png

Added: projects/presentations/images/yellow-crowd.jpg
===================================================================
(Binary files differ)


Property changes on: projects/presentations/images/yellow-crowd.jpg
___________________________________________________________________
Added: svn:mime-type
   + image/jpeg

Added: projects/presentations/pugwash08censorship.pdf
===================================================================
(Binary files differ)


Property changes on: projects/presentations/pugwash08censorship.pdf
___________________________________________________________________
Added: svn:mime-type
   + application/octet-stream

Added: projects/presentations/slides-24c3.odp
===================================================================
(Binary files differ)


Property changes on: projects/presentations/slides-24c3.odp
___________________________________________________________________
Added: svn:mime-type
   + application/octet-stream

Added: projects/presentations/slides-24c3.pdf
===================================================================
(Binary files differ)


Property changes on: projects/presentations/slides-24c3.pdf
___________________________________________________________________
Added: svn:mime-type
   + application/octet-stream

Added: projects/presentations/slides-26c3.pdf
===================================================================
(Binary files differ)


Property changes on: projects/presentations/slides-26c3.pdf
___________________________________________________________________
Added: svn:mime-type
   + application/octet-stream

Added: projects/presentations/slides-bh07.odp
===================================================================
(Binary files differ)


Property changes on: projects/presentations/slides-bh07.odp
___________________________________________________________________
Added: svn:mime-type
   + application/octet-stream

Added: projects/presentations/slides-bh07.pdf
===================================================================
(Binary files differ)


Property changes on: projects/presentations/slides-bh07.pdf
___________________________________________________________________
Added: svn:mime-type
   + application/octet-stream

Added: projects/presentations/slides-csf.odp
===================================================================
(Binary files differ)


Property changes on: projects/presentations/slides-csf.odp
___________________________________________________________________
Added: svn:mime-type
   + application/octet-stream

Added: projects/presentations/slides-fbi-sep09.odp
===================================================================
(Binary files differ)


Property changes on: projects/presentations/slides-fbi-sep09.odp
___________________________________________________________________
Added: svn:mime-type
   + application/octet-stream

Added: projects/presentations/slides-fbi-sep09.pdf
===================================================================
(Binary files differ)


Property changes on: projects/presentations/slides-fbi-sep09.pdf
___________________________________________________________________
Added: svn:mime-type
   + application/octet-stream

Added: projects/presentations/slides-gv08.odp
===================================================================
(Binary files differ)


Property changes on: projects/presentations/slides-gv08.odp
___________________________________________________________________
Added: svn:mime-type
   + application/octet-stream

Added: projects/presentations/slides-twitter.pdf
===================================================================
(Binary files differ)


Property changes on: projects/presentations/slides-twitter.pdf
___________________________________________________________________
Added: svn:mime-type
   + application/octet-stream



More information about the tor-commits mailing list