[or-cvs] r22237: {projects} update some tex files to point to the right image page, add (in projects/presentations: . security-part2-anon)

Andrew Lewman andrew at torproject.org
Mon Apr 26 01:34:45 UTC 2010


Author: phobos
Date: 2010-04-26 01:34:45 +0000 (Mon, 26 Apr 2010)
New Revision: 22237

Added:
   projects/presentations/2009-12-16-mozilla-stats.png
   projects/presentations/2llg3ts.jpg
   projects/presentations/mullah.png
   projects/presentations/security-part2-anon/
   projects/presentations/security-part2-anon/AnonymityAndCensorship.mm
   projects/presentations/security-part2-anon/Makefile
   projects/presentations/security-part2-anon/Pugwash talk.mm
   projects/presentations/security-part2-anon/access-denied.jpg
   projects/presentations/security-part2-anon/bridges-firefox.png
   projects/presentations/security-part2-anon/bridges-vidalia.png
   projects/presentations/security-part2-anon/censorship-map.png
   projects/presentations/security-part2-anon/chacha.jpg
   projects/presentations/security-part2-anon/cl08security-anon.tex
   projects/presentations/security-part2-anon/cnmap.jpg
   projects/presentations/security-part2-anon/david.jpg
   projects/presentations/security-part2-anon/dns.pdf
   projects/presentations/security-part2-anon/freenet-logo.jpg
   projects/presentations/security-part2-anon/freenet.png
   projects/presentations/security-part2-anon/hrichina.png
   projects/presentations/security-part2-anon/ip.pdf
   projects/presentations/security-part2-anon/islameyat.png
   projects/presentations/security-part2-anon/jingjing.jpg
   projects/presentations/security-part2-anon/jitterbug.png
   projects/presentations/security-part2-anon/jondo.png
   projects/presentations/security-part2-anon/kareem.jpg
   projects/presentations/security-part2-anon/mix.pdf
   projects/presentations/security-part2-anon/mix.svg
   projects/presentations/security-part2-anon/network.pdf
   projects/presentations/security-part2-anon/no-proxy.pdf
   projects/presentations/security-part2-anon/nonlinear-anim4.pdf
   projects/presentations/security-part2-anon/playboy.png
   projects/presentations/security-part2-anon/psiphon-logo.jpg
   projects/presentations/security-part2-anon/psiphon.png
   projects/presentations/security-part2-anon/remailer.pdf
   projects/presentations/security-part2-anon/remailer.svg
   projects/presentations/security-part2-anon/tiananmen.png
   projects/presentations/security-part2-anon/timing_tcp_seq.pdf
   projects/presentations/security-part2-anon/tor-keys.svg
   projects/presentations/security-part2-anon/tor-keys1.pdf
   projects/presentations/security-part2-anon/tor-keys2.pdf
   projects/presentations/security-part2-anon/tor-keys3.pdf
   projects/presentations/security-part2-anon/tor-network.pdf
   projects/presentations/security-part2-anon/tor-safe-path.pdf
   projects/presentations/security-part2-anon/tor-safe-selection.pdf
   projects/presentations/security-part2-anon/wikileaks.png
   projects/presentations/security-part2-anon/wireshark.png
   projects/presentations/security-part2-anon/xmlreveal.py
Modified:
   projects/presentations/2009-10-20-USAID-Presentation.pdf
   projects/presentations/2009-10-20-USAID-Presentation.tex
   projects/presentations/2009-11-04-CASCON-Presentation.tex
   projects/presentations/2010-FOSDEM-Freespeech-opensource-onlineprivacy.tex
Log:
update some tex files to point to the right image page, add in some of
the missing images, add in the details of security-part2-anon
presentation from sjmurdoch.


Modified: projects/presentations/2009-10-20-USAID-Presentation.pdf
===================================================================
(Binary files differ)

Modified: projects/presentations/2009-10-20-USAID-Presentation.tex
===================================================================
--- projects/presentations/2009-10-20-USAID-Presentation.tex	2010-04-25 22:11:29 UTC (rev 22236)
+++ projects/presentations/2009-10-20-USAID-Presentation.tex	2010-04-26 01:34:45 UTC (rev 22237)
@@ -9,9 +9,9 @@
 \begin{frame}
 \maketitle  
 \begin{center}
-\includegraphics[height=3cm]{2009-tor-logo}
+\includegraphics[height=3cm]{./images/2009-tor-logo}
 \hspace{1cm} 
-\includegraphics[height=3cm]{chacha}
+\includegraphics[height=3cm]{./images/chacha}
 \end{center}
 \end{frame}
   
@@ -20,7 +20,7 @@
 \textbf{Article 19}
 \medskip
 \begin{quotation}
-\noindent \includegraphics[width=1cm]{opquo}\quad Everyone has the right to freedom of opinion and expression; this
+\noindent \includegraphics[width=1cm]{./images/opquo}\quad Everyone has the right to freedom of opinion and expression; this
 right includes freedom to hold opinions without interference and to
 seek, receive and impart information and ideas through any media and
 regardless of frontiers.
@@ -30,7 +30,7 @@
 \textbf{Article 20}
 \medskip
 \begin{quotation}
-\noindent \includegraphics[width=1cm]{opquo}\quad Everyone has the
+\noindent \includegraphics[width=1cm]{./images/opquo}\quad Everyone has the
 right to freedom of peaceful assembly and association.
 \end{quotation}
 \end{frame}
@@ -39,8 +39,8 @@
 \frametitle{Online archives are easily censored}
 
 \begin{center}
-\includegraphics<1>[height=7.5cm]{observer}
-\includegraphics<2>[height=6.5cm]{guardian-crop}
+\includegraphics<1>[height=7.5cm]{./images/observer}
+\includegraphics<2>[height=6.5cm]{./images/guardian-crop}
 \end{center}
 
 \end{frame}
@@ -59,10 +59,10 @@
 \end{itemize}
       \column{5cm}
      \vbox{}
-    \parbox{5cm}{\includegraphics[width=4.5cm]{observer}}
+    \parbox{5cm}{\includegraphics[width=4.5cm]{./images/observer}}
     \bigskip
 
-    \parbox{5cm}{\includegraphics[width=4.5cm]{guardian-crop}}
+    \parbox{5cm}{\includegraphics[width=4.5cm]{./images/guardian-crop}}
     \end{columns}
 
 \end{frame}
@@ -70,7 +70,7 @@
 \begin{frame}
 \frametitle{George Orwell was an optimist}
 \begin{quotation}
-\noindent \includegraphics[width=1cm]{opquo}\quad Who controls the past, controls the future: who controls the present controls the past
+\noindent \includegraphics[width=1cm]{./images/opquo}\quad Who controls the past, controls the future: who controls the present controls the past
 \end{quotation}
 \flushright --- George Orwell, Nineteen Eighty Four, 1949
 
@@ -94,8 +94,8 @@
       \column{6cm}
      \vbox{}
      \begin{overlayarea}{6cm}{6cm}
-     \parbox{6cm}{\includegraphics<1>[width=5cm]{orangemen}
-       \includegraphics<2>[width=5cm]{murray}}
+     \parbox{6cm}{\includegraphics<1>[width=5cm]{./images/orangemen}
+       \includegraphics<2>[width=5cm]{./images/murray}}
      \end{overlayarea}
     \end{columns}
 \end{frame}
@@ -103,7 +103,7 @@
 \begin{frame}
 \frametitle{Internet architecture allows censorship}
 \begin{center}
-\includegraphics[width=9cm]{cnmap}
+\includegraphics[width=9cm]{./images/cnmap}
 \end{center}
       \flushright
 
@@ -130,9 +130,9 @@
       \column{5cm}
       \vbox{}
       \begin{overlayarea}{5cm}{10.5cm}
-        \only<1>{\resizebox{5cm}{!}{\includegraphics{hrichina}}}
-        \only<2>{\resizebox{5cm}{!}{\includegraphics{islameyat}}}
-        \only<3>{\resizebox{5cm}{!}{\includegraphics{playboy}}}
+        \only<1>{\resizebox{5cm}{!}{\includegraphics{./images/hrichina}}}
+        \only<2>{\resizebox{5cm}{!}{\includegraphics{./images/islameyat}}}
+        \only<3>{\resizebox{5cm}{!}{\includegraphics{./images/playboy}}}
       \end{overlayarea}
     \end{columns}
   \end{frame}
@@ -140,7 +140,7 @@
  \begin{frame}
     \frametitle{Even if a site is accessible, it may be removed from search engine results}
     \begin{center}
-    \includegraphics[width=11cm]{tiananmen}
+    \includegraphics[width=11cm]{./images/tiananmen}
     \end{center}
     Searching for ``Tiananmen Square'' on Google.com and Google.cn
   \end{frame}
@@ -149,7 +149,7 @@
 \frametitle{Resisting Internet censorship}
 
 \begin{quotation}
-\noindent \includegraphics[width=1cm]{opquo}\quad The Net interprets censorship as damage and routes around it.
+\noindent \includegraphics[width=1cm]{./images/opquo}\quad The Net interprets censorship as damage and routes around it.
 \end{quotation}
 \flushright --- John Gilmore, 1993
 
@@ -173,7 +173,7 @@
 \vbox{}
 %% http://farm1.static.flickr.com/150/347760599_fedfd250cb.jpg
 
-\includegraphics[width=5.5cm]{kareem}
+\includegraphics[width=5.5cm]{./images/kareem}
 \column{5.5cm}
 \vbox{}
 
@@ -189,7 +189,7 @@
 %\medskip
 
 \begin{quotation}
-\noindent \includegraphics[width=1cm]{opquo}\quad Congress shall make no law respecting an establishment of religion, or prohibiting the free exercise thereof; or abridging the freedom of speech, or of the press; or the right of the people peaceably to assemble, and to petition the Government for a redress of grievances.
+\noindent \includegraphics[width=1cm]{./images/opquo}\quad Congress shall make no law respecting an establishment of religion, or prohibiting the free exercise thereof; or abridging the freedom of speech, or of the press; or the right of the people peaceably to assemble, and to petition the Government for a redress of grievances.
 \end{quotation}
 
 \textbf{McIntyre v. Ohio Elections Commission}
@@ -197,7 +197,7 @@
 %\medskip
 
 \begin{quotation}
-\noindent \includegraphics[width=1cm]{opquo}\quad Protections for anonymous speech are vital to democratic discourse. Allowing dissenters to shield their identities frees them to express critical, minority views \ldots Anonymity is a shield from the tyranny of the majority \ldots It thus exemplifies the purpose behind the Bill of Rights, and of the First Amendment in particular
+\noindent \includegraphics[width=1cm]{./images/opquo}\quad Protections for anonymous speech are vital to democratic discourse. Allowing dissenters to shield their identities frees them to express critical, minority views \ldots Anonymity is a shield from the tyranny of the majority \ldots It thus exemplifies the purpose behind the Bill of Rights, and of the First Amendment in particular
 \end{quotation}
 
 \end{frame}
@@ -217,7 +217,7 @@
 
       \column{5cm}
      \vbox{}
-    \parbox{5cm}{\includegraphics[width=4.5cm]{nsa-room}}
+    \parbox{5cm}{\includegraphics[width=4.5cm]{./images/nsa-room}}
     \end{columns}
 
 \end{frame}
@@ -232,7 +232,7 @@
 \end{itemize}
 
 \begin{quotation}
-\noindent \includegraphics[width=1cm]{opquo}\quad No government of any colour is to be trusted with such a roadmap to our souls
+\noindent \includegraphics[width=1cm]{./images/opquo}\quad No government of any colour is to be trusted with such a roadmap to our souls
 \end{quotation}
 \flushright --- Sir Ken Macdonald, former director of public prosecutions, on the UK Interception Modernisation Program
 
@@ -249,7 +249,7 @@
              \column{7cm}
              \vbox{}
              
-             \includegraphics[clip, trim=5cm 12cm 2cm 5cm,width=7cm]{network}
+             \includegraphics[clip, trim=5cm 12cm 2cm 5cm,width=7cm]{./images/network}
     \end{columns}
     \flushright{\tiny From ``The Economics of Mass Surveillance'' by George Danezis and Bettina Wittneben}
   \end{frame}
@@ -268,7 +268,7 @@
 
       \column{5cm}
      \vbox{}
-    \parbox{5cm}{\includegraphics[width=4.5cm]{namesheet}}
+    \parbox{5cm}{\includegraphics[width=4.5cm]{./images/namesheet}}
 
 \flushright{\tiny Photo: Manos Simonides}
     \end{columns}
@@ -297,15 +297,13 @@
 
 \end{frame}
 
-\begin{comment}
-
   \begin{frame}
     \frametitle{Normal web browsing}
 
     \begin{centering}
     \vbox{}
 
-    \includegraphics[clip, trim=1cm 4cm 1cm 2.2cm, width=10cm]{no-proxy}
+    \includegraphics[clip, trim=1cm 4cm 1cm 2.2cm, width=10cm]{./images/no-proxy}
     \end{centering}
 
 \vspace{-1cm}
@@ -322,7 +320,7 @@
     \begin{centering}
     \vbox{}
 
-    \includegraphics[clip, trim=1cm 4cm 1cm 2.2cm, width=10cm]{dns}
+    \includegraphics[clip, trim=1cm 4cm 1cm 2.2cm, width=10cm]{./images/dns}
     \end{centering}
 
 \vspace{-1cm}
@@ -339,7 +337,7 @@
     \begin{centering}
     \vbox{}
 
-    \includegraphics[clip, trim=1cm 4cm 1cm 2.2cm, width=10cm]{ip}
+    \includegraphics[clip, trim=1cm 4cm 1cm 2.2cm, width=10cm]{./images/ip}
     \end{centering}
 
 \vspace{-1cm}
@@ -417,7 +415,7 @@
 \end{itemize}
 
 \begin{center}
-\includegraphics[width=8cm]{800px-Decryption_mix_net}
+\includegraphics[width=8cm]{./images/800px-Decryption_mix_net}
 \end{center}
 
 \end{frame}
@@ -433,7 +431,7 @@
 \end{itemize}
 
 \begin{center}
-\includegraphics[height=3cm]{2009-tor-logo}
+\includegraphics[height=3cm]{./images/2009-tor-logo}
 \end{center}
 
 \end{frame}
@@ -442,9 +440,9 @@
     \frametitle{Tor hides communication patterns by relaying data through volunteer servers}
     \begin{center}
       \begin{overlayarea}{9cm}{6cm}
-      \only<1>{\includegraphics[width=9cm]{tor-network}}
-      \only<2>{\includegraphics[width=9cm]{tor-safe-selection}}
-      \only<3>{\includegraphics[width=9cm]{tor-safe-path}}
+      \only<1>{\includegraphics[width=9cm]{./images/tor-network}}
+      \only<2>{\includegraphics[width=9cm]{./images/tor-safe-selection}}
+      \only<3>{\includegraphics[width=9cm]{./images/tor-safe-path}}
       \end{overlayarea}
       \flushright
 
@@ -455,7 +453,7 @@
   \begin{frame}
   \frametitle{Tor hidden services allow censorship resistant hosting of services}
   \begin{center}
-    \includegraphics[width=14cm]{wikileaks}
+    \includegraphics[width=14cm]{./images/wikileaks}
   \end{center}
   \end{frame}
   
@@ -464,8 +462,8 @@
 \\[3cm]
 \begin{center}
 \begin{overlayarea}{9cm}{6cm}
-\only<1>{\includegraphics[height=5cm]{single-hop-proxy}}
-\only<2>{\includegraphics[height=5cm]{evil-single-hop-proxy}}
+\only<1>{\includegraphics[height=5cm]{./images/single-hop-proxy}}
+\only<2>{\includegraphics[height=5cm]{./images/evil-single-hop-proxy}}
 \end{overlayarea}
 \end{center}
 \end{frame}
@@ -495,7 +493,7 @@
       \column{5cm}
       \vbox{}
       \begin{overlayarea}{5cm}{10cm}
-        \resizebox{5cm}{!}{\includegraphics{collage}}
+        \resizebox{5cm}{!}{\includegraphics{./images/collage}}
       \end{overlayarea}
     \end{columns}
 \end{frame}
@@ -503,7 +501,7 @@
 \begin{frame}
 \frametitle{One Version of the Future}
 \begin{quotation}
-\noindent \includegraphics[width=1cm]{opquo}\quad I'd like to change the design of the Internet by introducing                                                                                                 
+\noindent \includegraphics[width=1cm]{./images/opquo}\quad I'd like to change the design of the Internet by introducing                                                                                                 
 regulation--Internet passports, Internet police and international                                                                                            
 agreement--about following Internet standards. And if some countries                                                                                         
 don't agree with or don't pay attention to the agreement, just cut                                                                                           

Modified: projects/presentations/2009-11-04-CASCON-Presentation.tex
===================================================================
--- projects/presentations/2009-11-04-CASCON-Presentation.tex	2010-04-25 22:11:29 UTC (rev 22236)
+++ projects/presentations/2009-11-04-CASCON-Presentation.tex	2010-04-26 01:34:45 UTC (rev 22237)
@@ -10,7 +10,7 @@
 \begin{frame}
 \maketitle  
 \begin{center}
-\includegraphics[height=3cm]{2009-tor-logo}
+\includegraphics[height=3cm]{./images/2009-tor-logo}
 \end{center}
 \end{frame}
 
@@ -18,7 +18,7 @@
 \frametitle{The Tor Project, Inc.}
 501(c)(3) non-profit organization dedicated to the research and development of technologies for online anonymity and privacy
 \begin{center}
-\includegraphics[height=5cm]{2009-oval_sticker_new}
+\includegraphics[height=5cm]{./images/2009-oval_sticker_new}
 \end{center}
 \end{frame}
 
@@ -36,17 +36,17 @@
 
 \begin{frame}
 \frametitle{estimated 300,000 daily users}
-\setbeamercolor{background}[\includegraphics[height=9cm]{huge-crowd}]
+\setbeamercolor{background}[\includegraphics[height=9cm]{./images/huge-crowd}]
 \end{frame}
 
 \begin{frame}
 \frametitle{Who funds Tor?}
-\setbeamercolor{background}[\includegraphics[height=5cm]{2008-funding-chart}
+\setbeamercolor{background}[\includegraphics[height=5cm]{./images/2008-funding-chart}
 \end{frame}
 
 \begin{frame}
 \frametitle{Who uses Tor?}
-\parbox{5cm}{\sloppy \setbeamercolor{background}[\includegraphics[height=7cm]{anonymousman}}
+\parbox{5cm}{\sloppy \setbeamercolor{background}[\includegraphics[height=7cm]{./images/anonymousman}}
 \parbox{5cm}{\sloppy 
 \begin{itemize}
 \begin{small}
@@ -63,7 +63,7 @@
 
 \begin{frame}
 \frametitle{\url{http://freehaven.net/anonbib/}}
-\setbeamercolor{background}[\includegraphics[height=7cm]{anonbib-screenshot}]
+\setbeamercolor{background}[\includegraphics[height=7cm]{./images/anonbib-screenshot}]
 \end{frame}
 
 \begin{frame}
@@ -115,7 +115,7 @@
 
 \begin{frame}
 \frametitle{Operating Systems leak info like a sieve}
-\parbox{5cm}{\sloppy \setbeamercolor{background}[\includegraphics[height=7cm]{cropped-hijack-sign-south-africa}}
+\parbox{5cm}{\sloppy \setbeamercolor{background}[\includegraphics[height=7cm]{./images/cropped-hijack-sign-south-africa}}
 \parbox{5cm}{\begin{itemize}
 \item Applications, network stacks, plugins, oh my....
 \pause some call this "sharing"

Added: projects/presentations/2009-12-16-mozilla-stats.png
===================================================================
(Binary files differ)


Property changes on: projects/presentations/2009-12-16-mozilla-stats.png
___________________________________________________________________
Added: svn:mime-type
   + image/png

Modified: projects/presentations/2010-FOSDEM-Freespeech-opensource-onlineprivacy.tex
===================================================================
--- projects/presentations/2010-FOSDEM-Freespeech-opensource-onlineprivacy.tex	2010-04-25 22:11:29 UTC (rev 22236)
+++ projects/presentations/2010-FOSDEM-Freespeech-opensource-onlineprivacy.tex	2010-04-26 01:34:45 UTC (rev 22237)
@@ -10,15 +10,15 @@
 \begin{frame}
 \maketitle  
 \begin{center}
-\includegraphics[height=3cm]{2009-tor-logo}
+\includegraphics[height=3cm]{./images/2009-tor-logo}
 \hspace{1cm} 
-\includegraphics[height=3cm]{../Marketing/mullah}
+\includegraphics[height=3cm]{./images/mullah}
 \end{center}
 \end{frame}
   
 \begin{frame}
 \frametitle{What is anonymity?}
-\includegraphics[width=10cm]{../Marketing/2llg3ts}
+\includegraphics[width=10cm]{./images/2llg3ts}
 \end{frame}
 
 \begin{frame}
@@ -28,7 +28,7 @@
 \item You still know who is talking to whom, how often, and how much data is sent.
 \end{itemize}
 \begin{center}
-\includegraphics[width=5cm]{encryption-cc-by-sa}
+\includegraphics[width=5cm]{./images/encryption-cc-by-sa}
 \end{center}
 \end{frame}
 
@@ -38,7 +38,7 @@
 \bigskip
 
 \begin{center}
-\includegraphics[width=5cm]{steganography-cc-by-sa}
+\includegraphics[width=5cm]{./images/steganography-cc-by-sa}
 \end{center}
 \end{frame}
 
@@ -138,7 +138,7 @@
 \frametitle{Who is The Tor Project, Inc?}
 \begin{columns}[c]
 \column{5cm}
-\includegraphics[height=4.5cm]{2009-oval_sticker_new}
+\includegraphics[height=4.5cm]{./images/2009-oval_sticker_new}
 \column{5cm}
 The 501(c)(3) non-profit organization dedicated to the research and development of tools for online anonymity and privacy
 \end{columns}
@@ -156,13 +156,13 @@
 \end{itemize}
 
 \begin{center}
-\includegraphics[height=3cm]{2009-tor-logo}
+\includegraphics[height=3cm]{./images/2009-tor-logo}
 \end{center}
 \end{frame}
 
 \begin{frame}
 \frametitle{Tor code stats}
-\includegraphics[width=10.5cm]{tor-lines-of-code-by-language}
+\includegraphics[width=10.5cm]{./images/tor-lines-of-code-by-language}
 \flushright \tiny stats from ohloh.net
 \end{frame}
 
@@ -170,9 +170,9 @@
 \frametitle{Tor hides communication patterns by relaying data through volunteer servers}
 \begin{center}
 \begin{overlayarea}{9cm}{6cm}
-      \only<1>{\includegraphics[width=9cm]{tor-network}}
-      \only<2>{\includegraphics[width=9cm]{tor-safe-selection}}
-      \only<3>{\includegraphics[width=9cm]{tor-safe-path}}
+      \only<1>{\includegraphics[width=9cm]{./images/tor-network}}
+      \only<2>{\includegraphics[width=9cm]{./images/tor-safe-selection}}
+      \only<3>{\includegraphics[width=9cm]{./images/tor-safe-path}}
       \end{overlayarea}
       \flushright
 
@@ -189,21 +189,21 @@
 \begin{frame}
 \frametitle{How many people use Tor?}
 \begin{flushleft}
-\includegraphics[width=12cm]{../Marketing/2009-12-16-mozilla-stats}
+\includegraphics[width=12cm]{./images/2009-12-16-mozilla-stats}
 \end{flushleft}
 \end{frame}
 
 \begin{frame}
 \frametitle{Tor hidden services allow privacy enhanced hosting of services}
-\includegraphics[scale=0.5]{wikileaks}
+\includegraphics[scale=0.5]{./images/wikileaks}
 \end{frame}
   
 \begin{frame}
 \frametitle{How is Tor different from other systems?}
 \begin{overlayarea}{9cm}{6cm}
-\only<1>{\includegraphics[height=7cm]{single_hop_relay}}
-\only<2>{\includegraphics[height=7cm]{evil_single_hop_relay}}
-\only<3>{\includegraphics[height=7cm]{data_snooping_single_hop_relay}}
+\only<1>{\includegraphics[height=7cm]{./images/single_hop_relay}}
+\only<2>{\includegraphics[height=7cm]{./images/evil_single_hop_relay}}
+\only<3>{\includegraphics[height=7cm]{./images/data_snooping_single_hop_relay}}
 \end{overlayarea}
 \end{frame}
 
@@ -212,21 +212,21 @@
 \textbf{Article 19}
 \medskip
 \begin{quotation}
-\noindent \includegraphics[width=1cm]{opquo}\quad Everyone has the right to freedom of opinion and expression; this right includes freedom to hold opinions without interference and to seek, receive and impart information and ideas through any media and regardless of frontiers.
+\noindent \includegraphics[width=1cm]{./images/opquo}\quad Everyone has the right to freedom of opinion and expression; this right includes freedom to hold opinions without interference and to seek, receive and impart information and ideas through any media and regardless of frontiers.
 \end{quotation}
 
 \bigskip
 \textbf{Article 20}
 \medskip
 \begin{quotation}
-\noindent \includegraphics[width=1cm]{opquo}\quad Everyone has the right to freedom of peaceful assembly and association.
+\noindent \includegraphics[width=1cm]{./images/opquo}\quad Everyone has the right to freedom of peaceful assembly and association.
 \end{quotation}
 \end{frame}
 
 \begin{frame}
 \frametitle{George Orwell was an optimist}
 \begin{quotation}
-\noindent \includegraphics[width=1cm]{opquo}\quad Who controls the past, controls the future: who controls the present controls the past
+\noindent \includegraphics[width=1cm]{./images/opquo}\quad Who controls the past, controls the future: who controls the present controls the past
 \end{quotation}
 \flushright --- George Orwell, Nineteen Eighty Four, 1949
 
@@ -238,7 +238,7 @@
 \frametitle{Resisting Internet censorship}
 
 \begin{quotation}
-\noindent \includegraphics[width=1cm]{opquo}\quad The Net interprets censorship as damage and routes around it.
+\noindent \includegraphics[width=1cm]{./images/opquo}\quad The Net interprets censorship as damage and routes around it.
 \end{quotation}
 \flushright --- John Gilmore, 1993
 
@@ -265,7 +265,7 @@
 
       \column{5cm}
      \vbox{}
-    \parbox{5cm}{\includegraphics[width=4.5cm]{nsa-room}}
+    \parbox{5cm}{\includegraphics[width=4.5cm]{./images/nsa-room}}
     \end{columns}
 \end{frame}
 
@@ -278,7 +278,7 @@
 \end{itemize}
 
 \begin{quotation}
-\noindent \includegraphics[width=1cm]{opquo}\quad No government of any colour is to be trusted with such a roadmap to our souls
+\noindent \includegraphics[width=1cm]{./images/opquo}\quad No government of any colour is to be trusted with such a roadmap to our souls
 \end{quotation}
 \flushright --- Sir Ken Macdonald, former director of public prosecutions, on the UK Interception Modernisation Program
 \end{frame}
@@ -292,14 +292,14 @@
 {\color{blue}$\bullet$} People
 \column{7cm}
 \vbox{}
-\includegraphics[clip, trim=5cm 12cm 2cm 5cm,width=7cm]{network}
+\includegraphics[clip, trim=5cm 12cm 2cm 5cm,width=7cm]{./images/network}
 \end{columns}
 \flushright{\tiny From "The Economics of Mass Surveillance" by George Danezis and Bettina Wittneben}
 \end{frame}
 
 \begin{frame}
 \frametitle{Supporters}
-\includegraphics[scale=.5]{167234088_08f07f0dbe_o}
+\includegraphics[scale=.5]{./images/167234088_08f07f0dbe_o}
 \end{frame}
 
 \begin{frame}

Added: projects/presentations/2llg3ts.jpg
===================================================================
(Binary files differ)


Property changes on: projects/presentations/2llg3ts.jpg
___________________________________________________________________
Added: svn:mime-type
   + image/jpeg

Added: projects/presentations/mullah.png
===================================================================
(Binary files differ)


Property changes on: projects/presentations/mullah.png
___________________________________________________________________
Added: svn:mime-type
   + image/png

Added: projects/presentations/security-part2-anon/AnonymityAndCensorship.mm
===================================================================
(Binary files differ)


Property changes on: projects/presentations/security-part2-anon/AnonymityAndCensorship.mm
___________________________________________________________________
Added: svn:mime-type
   + application/x-freemind

Added: projects/presentations/security-part2-anon/Makefile
===================================================================
--- projects/presentations/security-part2-anon/Makefile	                        (rev 0)
+++ projects/presentations/security-part2-anon/Makefile	2010-04-26 01:34:45 UTC (rev 22237)
@@ -0,0 +1,69 @@
+.PHONY: all all-pres all-notes4 clean reallyclean show 
+
+BASENAME=cl08security-anon
+DEST=presentation
+DEFAULTDEPS=logo.pdf tor-logo.png tor-keys1.pdf tor-keys2.pdf tor-keys3.pdf \
+	mix.pdf remailer.pdf
+
+PUBLISHDIR=$(HOME)/public_html/talks
+PUBLISHTARGET=template.pdf
+
+GLOBAL=$(HOME)/local/presentation
+
+TCPP=cpp -traditional-cpp -x c -P -C
+LATEX=pdflatex
+
+VIEWER=evince --presentation -p 1
+
+all: all-pres all-notes4
+
+tor-keys1.svg: tor-keys.svg
+	./xmlreveal.py $< $@ "Base" "A"
+tor-keys2.svg: tor-keys.svg
+	./xmlreveal.py $< $@ "Base" "TLS" "TLS2" "A"
+tor-keys3.svg: tor-keys.svg
+	./xmlreveal.py $< $@ "Base" "TLS" "TLS2" "A" "B"
+
+%.pdf: %.svg
+	inkscape -A $@ $<
+
+all-pres all-notes4: all-%: $(BASENAME)-%.pdf
+	mkdir -p $(DEST)
+	cp $^ $(DEST)
+
+show: all-pres
+	i810switch crt on || true
+	$(VIEWER) $(DEST)/$(BASENAME)-pres.pdf
+
+publish: $(BASENAME)-pres.pdf
+	cp $(BASENAME)-pres.pdf $(PUBLISHDIR)/$(PUBLISHTARGET)
+	chmod 644 $(PUBLISHDIR)/$(PUBLISHTARGET)
+
+logo.pdf tor-logo.png:
+	ln -s $(GLOBAL)/$@ .
+
+$(BASENAME)-pres.pdf $(BASENAME)-notes.pdf: $(DEFAULTDEPS)
+
+$(BASENAME)-notes4.pdf: $(BASENAME)-notes.pdf
+	pdftops -paperw 363 -paperh 273 $(BASENAME)-notes.pdf
+	psnup -w11cm -4 $(BASENAME)-notes.ps -W12.8cm -H9.6cm > $(BASENAME)-notes4.ps
+	ps2pdf $(BASENAME)-notes4.ps
+
+$(BASENAME)-notes.tex: $(BASENAME).tex
+	$(TCPP) -DHANDOUT $(BASENAME).tex > $(BASENAME)-notes.tex
+
+$(BASENAME)-pres.tex: $(BASENAME).tex
+	$(TCPP) $(BASENAME).tex > $(BASENAME)-pres.tex
+
+clean:
+	rm -f *~ *.dvi *.log *.bak *.aux *.toc *.ps *.eps *.pdf *.blg *.bbl \
+	      *.pstex *.pstex_t *.pdftex *.pdftex_t *.out *.png *.snm *.nav \
+               $(BASENAME)-notes.tex $(BASENAME)-pres.tex
+
+reallyclean: clean
+	rm -rf $(DEST)
+
+%.pdf: %.tex
+	pdflatex $< || { rm -f $*.pdf $*.dvi $*.aux $*.idx && false ; }
+	while grep 'Rerun to get cross-references right.' $*.log ; do \
+	  pdflatex $< || { rm -f $*.pdf $*.dvi $*.aux $*.idx && false ; } ; done


Property changes on: projects/presentations/security-part2-anon/Makefile
___________________________________________________________________
Added: svn:eol-style
   + native

Added: projects/presentations/security-part2-anon/Pugwash talk.mm
===================================================================
(Binary files differ)


Property changes on: projects/presentations/security-part2-anon/Pugwash talk.mm
___________________________________________________________________
Added: svn:mime-type
   + application/x-freemind

Added: projects/presentations/security-part2-anon/access-denied.jpg
===================================================================
(Binary files differ)


Property changes on: projects/presentations/security-part2-anon/access-denied.jpg
___________________________________________________________________
Added: svn:mime-type
   + image/jpeg

Added: projects/presentations/security-part2-anon/bridges-firefox.png
===================================================================
(Binary files differ)


Property changes on: projects/presentations/security-part2-anon/bridges-firefox.png
___________________________________________________________________
Added: svn:mime-type
   + image/png

Added: projects/presentations/security-part2-anon/bridges-vidalia.png
===================================================================
(Binary files differ)


Property changes on: projects/presentations/security-part2-anon/bridges-vidalia.png
___________________________________________________________________
Added: svn:mime-type
   + image/png

Added: projects/presentations/security-part2-anon/censorship-map.png
===================================================================
(Binary files differ)


Property changes on: projects/presentations/security-part2-anon/censorship-map.png
___________________________________________________________________
Added: svn:mime-type
   + image/png

Added: projects/presentations/security-part2-anon/chacha.jpg
===================================================================
(Binary files differ)


Property changes on: projects/presentations/security-part2-anon/chacha.jpg
___________________________________________________________________
Added: svn:mime-type
   + image/jpeg

Added: projects/presentations/security-part2-anon/cl08security-anon.tex
===================================================================
--- projects/presentations/security-part2-anon/cl08security-anon.tex	                        (rev 0)
+++ projects/presentations/security-part2-anon/cl08security-anon.tex	2010-04-26 01:34:45 UTC (rev 22237)
@@ -0,0 +1,546 @@
+\documentclass[hyperref={bookmarks=false},xcolor={table}]{beamer}
+
+%% Tricks
+%%  Make CPP ignore \\ at end of line:
+%%   United States & 211 & 302 \\[0pt]
+
+%% TODO
+% Add nice presentation plan slide
+
+\setbeamertemplate{navigation symbols}{}
+\setbeamersize{text margin left=0.5cm, text margin right=0.5cm}
+\usepackage{pgf}
+\usepackage{pgfarrows}
+\usepackage{helvet}
+\usepackage{pifont}
+\usepackage{booktabs}
+\usepackage{colortbl}
+\usepackage{comment}
+\newcommand{\degree}{\ensuremath{^\circ}}
+\newcommand{\surl}[1]{\href{http://#1}{\texttt{#1}}}
+\newcommand{\slurl}[1]{\href{http://#1/}{\texttt{#1}}}
+
+\mode<presentation> {
+  \usetheme{Pittsburgh}
+  \setbeamercovered{transparent}
+}
+
+\begin{document}
+
+\begin{comment}
+  \begin{frame}
+    \vbox{}
+    \vspace{-0.3cm}
+    \begin{centering}
+      \begin{beamercolorbox}[sep=8pt,center]{title}
+	\bfseries
+	%% TODO -- title here
+	\usebeamerfont{title}Anonymity and Censorship Resistance\par%
+      \end{beamercolorbox}%
+      
+      \vspace{1cm}
+
+      %% TODO -- main image here
+     \includegraphics[height=3.5cm]{tor-safe-path} \hspace{1cm} \includegraphics[height=3.5cm]{chacha.jpg}
+
+     \vspace{1.5cm}
+
+      \begin{beamercolorbox}[sep=8pt,center]{author}
+        Steven J. Murdoch\\[0.2cm]
+        \url{http://www.cl.cam.ac.uk/users/sjm217/}
+      \end{beamercolorbox}
+
+    \end{centering}
+    \vfill
+    \begin{flushright}
+      %% TODO location here
+      \fontsize{4}{4} \selectfont Part II Security, 14 November 2008, Cambridge, UK
+    \end{flushright}
+  \end{frame}
+\end{comment}
+
+  \begin{frame}
+    \vbox{}
+    \vspace{-0.3cm}
+    \begin{centering}
+      \begin{beamercolorbox}[sep=8pt,center]{title}
+	\bfseries
+	\usebeamerfont{title}Censorship, Anonymity, and Traffic Analysis\par%
+      \end{beamercolorbox}%
+      
+      \vspace{0.5cm}
+
+      %% TODO -- main image here
+     \includegraphics[height=3.5cm]{tor-safe-path} \hspace{1cm} \includegraphics[height=3.5cm]{chacha.jpg}
+
+     \vspace{0.5cm}
+
+      \begin{beamercolorbox}[sep=8pt,center]{author}
+	\underline{Steven J. Murdoch}\\[0.2cm]
+        \url{http://www.cl.cam.ac.uk/users/sjm217/}
+      \end{beamercolorbox}
+      \begin{beamercolorbox}[sep=2pt,center]{institute}
+	\usebeamerfont{institute}%
+	\parbox[t]{4.9cm}{\raggedleft \fontfamily{psb} \selectfont \bfseries
+          \vspace{1mm}\resizebox{3.46cm}{!}{\includegraphics{logo}}\\[1mm]}
+	\hspace{2.5cm}
+	\parbox[t]{3.46cm}{
+	  \vspace{0mm}\resizebox{1.40cm}{!}{\includegraphics{tor-logo}}\\[-0.1mm]
+          \mbox{\bfseries \hspace{-5.5mm}\color[HTML]{773795} \href{https://www.torproject.org/}{www.torproject.org}}}
+      \end{beamercolorbox}
+    \end{centering}
+    \vfill
+    \begin{flushright}
+      %% TODO location here
+      %\fontsize{4}{4} \selectfont Anonymity Research Meet-up, 28 November 2008, London, UK
+    \end{flushright}
+  \end{frame}
+
+%% \begin{frame}
+%% \frametitle{Construction of the Internet}
+%% \begin{itemize}
+%% \item Internet Service Providers (ISPs) give people access to the Internet, and allow people to host services such as websites
+%% \item ISPs connect to other ISPs so the customers of one ISP can communicate with those of others
+%% \item Some ISPs have international connections, others use those of the bigger ISPs
+%% \item ISPs are typically based in one country and governed by the laws of that country
+%% \item Often governments control international Internet connections, either directly or via regulation
+%% \end{itemize}
+%% \end{frame}
+
+%% \begin{frame}
+%% \frametitle{Construction of the Internet}
+%% \begin{center}
+%% \includegraphics[width=10cm]{cnmap}
+%% \end{center}
+%%       \flushright
+
+%%       \tiny Diagram: China Internet Network Information Center
+%% \end{frame}
+
+
+  \begin{frame}
+    \frametitle{What is being blocked, and why}
+    \begin{columns}[t]
+      \column{7cm}
+     \setbeamercovered{transparent}
+
+      \begin{itemize}
+      \item Out of the 40 countries studied by the OpenNet Initiative in 2006, 26 censored the Internet in some way
+      \item The types of material censored varied depending on country, e.g.:
+        \begin{itemize}
+        \item<1-> Human Rights (blocked in China)
+        \item<2-> Religion (blocked in Saudi Arabia, UAE, Iran, Bahrain)
+        \item<3-> Pornography (blocked in Saudi Arabia, UAE, Iran, Bahrain, Singapore, Burma, \ldots)
+        \end{itemize}
+      \item Other issues censored include: military and militant websites; sex education, alcohol/drugs, music; gay and lesbian websites; news
+      \end{itemize}
+      \setbeamercovered{invisible}
+      \column{5cm}
+      \vbox{}
+      \begin{overlayarea}{5cm}{10.5cm}
+        \only<1>{\resizebox{5cm}{!}{\includegraphics{hrichina}}}
+        \only<2>{\resizebox{5cm}{!}{\includegraphics{islameyat}}}
+        \only<3>{\resizebox{5cm}{!}{\includegraphics{playboy}}}
+      \end{overlayarea}
+    \end{columns}
+  \end{frame}
+
+\begin{frame}
+\frametitle{Blocking with technology}
+\begin{itemize}
+\item When a country's government controls international connectivity, they can block requests for banned websites
+\item There are a number of different approaches (DNS blocking, IP address blocking, etc.)
+\item Software may be produced in-country, but often is an adapted commercial product
+\item These companies not only make the software, but provide a continuously updated list of websites to be blocked
+\end{itemize}
+
+\end{frame}
+
+\begin{comment}
+
+  \begin{frame}
+    \frametitle{Normal web browsing}
+
+    \begin{centering}
+    \vbox{}
+
+    \includegraphics[clip, trim=1cm 4cm 1cm 2.2cm, width=10cm]{no-proxy}
+    \end{centering}
+
+\vspace{-1cm}
+
+      \flushright
+
+      \tiny Diagram: Jane Gowan
+
+  \end{frame}
+
+  \begin{frame}
+    \frametitle{DNS tampering}
+
+    \begin{centering}
+    \vbox{}
+
+    \includegraphics[clip, trim=1cm 4cm 1cm 2.2cm, width=10cm]{dns}
+    \end{centering}
+
+\vspace{-1cm}
+
+      \flushright
+
+      \tiny Diagram: Jane Gowan
+
+  \end{frame}
+
+  \begin{frame}
+    \frametitle{IP blocking}
+
+    \begin{centering}
+    \vbox{}
+
+    \includegraphics[clip, trim=1cm 4cm 1cm 2.2cm, width=10cm]{ip}
+    \end{centering}
+
+\vspace{-1cm}
+
+      \flushright
+
+      \tiny Diagram: Jane Gowan
+
+  \end{frame}
+
+\end{comment}
+
+\begin{frame}
+\frametitle{Tradeoffs in blocking systems}
+\begin{itemize}
+\item DNS blocking
+\begin{itemize}
+\item Easy and cheap to implement
+\item Blocks at domain name granularity -- overblocks protocols, webpages
+\item Trivial to bypass
+\end{itemize}
+\item IP blocking
+\begin{itemize}
+\item Easy and cheap to implement
+\item Blocks at IP address (perhaps port) -- overblocks virtual hosting
+\end{itemize}
+\item Proxy blocking
+\begin{itemize}
+\item Expensive to implement
+\item Blocks at webpage level -- low overblocking
+\end{itemize}
+\item Hybrid blocking -- IP based redirection to proxy
+\begin{itemize}
+\item Tricky to get right, but cheap
+\item Has some vulnerabilities
+\item Blocks at webpage level -- low overblocking
+\end{itemize}
+\end{itemize}
+\end{frame}
+
+\begin{comment}
+\begin{frame}
+\frametitle{Blocking through regulation}
+\begin{itemize}
+\item ISPs may also be forced to implement their own blocking system, through regulation
+\item Individuals may also be covered by laws
+\item Governments can also force self-regulation by threatening more heavyweight legislation
+\end{itemize}
+\begin{columns}[t]
+\column{6cm}
+\vbox{}
+%% http://farm1.static.flickr.com/150/347760599_fedfd250cb.jpg
+
+\includegraphics[width=6cm]{kareem}
+\column{6cm}
+\vbox{}
+
+Kareem Amer: An blogger to four years' prison in Egypt for insulting Islam and the president.
+
+\textit{``I call on Egyptian government officials to take the necessary procedures to protect the Egyptian youth from the spread of subversive religious ideologies among them by permanently shutting down religious institutions in this country.''}
+\end{columns}
+\end{frame}
+\end{comment}
+
+\begin{frame}
+  \frametitle{Even if a site is accessible, it may be removed from search engine results}
+  \begin{center}
+    \includegraphics[width=11cm]{tiananmen}
+  \end{center}
+  Searching for ``Tiananmen Square'' on Google.com and Google.cn
+\end{frame}
+
+\begin{frame}
+\frametitle{Limitations of blocking}
+     \begin{columns}[t]
+      \column{7cm}
+\begin{itemize}
+\item Censorship systems block legitimate content and fail to block banned content
+\item It is fairly easy for readers and publishers to circumvent the technical measures
+\item Building and maintaining censorship systems is expensive
+\item Blocking one type of content encourages other types to be blocked
+\item Often the process of censorship is not transparent
+\end{itemize}
+      \column{5cm}
+     \vbox{}
+    \parbox{5cm}{\includegraphics[width=5cm]{david}}
+
+    \flushright
+    \tiny Photograph: \href{http://commons.wikimedia.org/wiki/Image:Michelangelos_David.jpg}{David Gaya}
+    \end{columns}
+\end{frame}
+
+\begin{frame}
+\frametitle{Blocking through laws, fear, and intimidation}
+     \begin{columns}[t]
+      \column{7cm}
+     \begin{itemize}
+\item ISPs may be forced to block sites themselves, or implement self-regulation
+\item People can be intimidated into not testing rules through fear of detection and retribution
+\item These may be through laws, social pressure or extra-legal punishment
+\item All these approaches may be used at the same time, and complement each other
+      \end{itemize}
+      \column{5cm}
+     \vbox{}
+    \parbox{5cm}{\resizebox{3.5cm}{!}{\includegraphics{chacha}}}
+    \parbox{5cm}{\resizebox{3.5cm}{!}{\includegraphics{kareem}}}
+    \end{columns}
+\end{frame}
+
+%% \begin{frame}
+%% \frametitle{Measuring censorship}
+%% The OpenNet Initiative test and analyse Internet censorship
+
+%% \begin{center}
+%% \includegraphics[width=10cm]{censorship-map}
+%% \end{center}
+
+%% \url{http://opennet.net/}
+
+%% \end{frame}
+
+\begin{frame}
+\frametitle{Censorship resistance systems}
+\begin{itemize}
+\item Software to resist censorship should
+\begin{itemize}
+ \item Hide where user is visiting (to prevent blocking)
+ \item Hide who the user is (to protect them from intimidation)
+\end{itemize}
+\item These properties should be maintained even if the censorship resistance system is partially compromised
+\end{itemize}
+
+\begin{center}
+\includegraphics[height=3cm]{tor-logo}\quad\includegraphics[height=3cm]{freenet-logo}\quad\includegraphics[height=3cm]{psiphon-logo}
+\end{center}
+
+\end{frame}
+
+\begin{frame}
+\frametitle{There are many other reasons why people might want privacy}
+\begin{itemize}
+\item Ordinary people
+\begin{itemize}
+\item To avoid personal information being sold to marketers
+\item Protect themselves when researching sensitive topics
+\end{itemize}
+\item Militaries and law enforcement
+\begin{itemize}
+\item To carry out intelligence gathering
+\item Protect undercover field agents
+\item Offer anonymous tip lines
+\end{itemize}
+\item Journalists
+\begin{itemize}
+\item To protect sources, such as whistle blowers
+\end{itemize}
+\item Human rights workers
+\begin{itemize}
+\item To publicise abuses and protect themselves from surveillance
+\item Blogging about controversial subjects
+\end{itemize}
+\item Businesses
+\begin{itemize}
+\item To observe their competition and build anonymous collaborations
+\end{itemize}
+\end{itemize}
+\end{frame}
+
+%% \begin{frame}
+%% \frametitle{Limitations of censorship resistance}
+%% \begin{itemize}
+%% \item Censorship resistance is thought controversial -- especially by the censors
+%% \item There is something for everyone to like, and something for everyone to dislike, going on with censorship resistance systems
+%% \item Bad people do use them to do bad things (for many different definitions of bad people)
+%% \item It is impossible to block bad uses, even if we could come up with a common definition of bad content
+%% \item The systems are not perfect, so it is possible some people will be caught
+%% \end{itemize}
+%% \end{frame}
+
+%\begin{comment}
+
+\begin{frame}
+\frametitle{Anonymous communication}
+\begin{itemize}
+\item People have to hide in a crowd of other people (``anonymity loves company'')
+\item The goal of the system is to make all users look as similar as possible, to give a bigger crowd
+\item Hide who is communicating with whom
+\item Layered encryption and random delays hide correlation between input traffic and output traffic
+\end{itemize}
+
+\begin{center}
+\includegraphics[width=11cm]{mix}
+\end{center}
+
+\end{frame}
+
+\begin{frame}
+\frametitle{Remailers}
+
+\begin{center}
+\includegraphics[width=11cm]{remailer}
+\end{center}
+
+\end{frame}
+
+%\end{comment}
+
+\begin{frame}
+\frametitle{Tor is a low-latency anonymity system}
+\begin{itemize}
+\item Based on technology developed in the Onion Routing project
+\item Commonly used for web browsing (works for any TCP traffic)
+\item Originally built as a pure anonymity system (hides who is talking to whom)
+\item Now designed to resist censorship too (hides whether someone is using the system at all)
+\item Centralised directory authorities publish a list of all servers
+%%\item (First version developed as Part II project by Matej Pfajfar)
+\end{itemize}
+\end{frame}
+
+  \begin{frame}
+    \frametitle{Tor hides communication patterns by relaying data through volunteer servers}
+    \begin{center}
+      \begin{overlayarea}{9cm}{6cm}
+      \only<1>{\includegraphics[width=9cm]{tor-network}}
+      \only<2>{\includegraphics[width=9cm]{tor-safe-selection}}
+      \only<3>{\includegraphics[width=9cm]{tor-safe-path}}
+      \end{overlayarea}
+      \flushright
+
+      \tiny Diagram: Robert Watson
+    \end{center}
+  \end{frame}
+
+%\begin{comment}
+  \begin{frame}
+    \frametitle{Tor uses two types of encryption}
+
+    \begin{center}
+    \begin{overlayarea}{11cm}{5cm}
+      \includegraphics<1>[width=11cm]{tor-keys1}
+      \includegraphics<2>[width=11cm]{tor-keys2}
+      \includegraphics<3>[width=11cm]{tor-keys3}
+    \end{overlayarea}
+    \end{center}
+
+  \begin{overlayarea}{12cm}{1cm}
+  \only<1-3>{Circuit encryption unlinks data entering and leaving a server}
+
+  \only<2-3>{Link encryption (TLS) disguises individual circuits}
+
+  \only<3>{But data rate is unchanged so traffic analysis can correlate flows}
+  \end{overlayarea}
+
+  \end{frame}
+%\end{comment}
+
+%%   \begin{frame}
+%%   \frametitle{Tor hidden services allow censorship resistant hosting of services}
+%%   \begin{center}
+%%     \includegraphics[width=11cm]{wikileaks}
+%%   \end{center}
+%%   \end{frame}
+
+  \begin{frame}
+    \frametitle{Freenet is an anonymous content distribution network}
+    \begin{columns}[t]
+      \column{7cm}
+      \begin{itemize}
+      \item While Tor allows access to the Internet, Freenet creates a private network
+      \item Users can create websites, share files and send/receive emails between other members of the network
+      \item Content is hosted by sharing it amongst users of the network
+      \item Users cannot select what content they host, and it is stored in an encrypted form
+      \end{itemize}
+      \column{5cm}
+      \vbox{}
+      \begin{overlayarea}{5cm}{10cm}
+        \resizebox{5cm}{!}{\includegraphics{freenet}}
+      \end{overlayarea}
+    \end{columns}
+  \end{frame}
+
+  \begin{frame}
+    \frametitle{Psiphon a is censorship resistance system with different tradeoffs to Tor}
+    \begin{columns}[t]
+      \column{7cm}
+      \begin{itemize}
+      \item There is no centralized control, so it is hard to block but also hard for user to find a server
+      \item Users do not have to download software, but this limits the strength of protection
+      \item If the user cannot modify browser settings or install software, Psiphon is still usable
+      \item Users within a censored country can ask someone they trust outside of the country to install the Psiphon server
+      \end{itemize}
+      \column{5cm}
+      \vbox{}
+      \begin{overlayarea}{5cm}{10cm}
+        \resizebox{5cm}{!}{\includegraphics{psiphon}}
+      \end{overlayarea}
+    \end{columns}
+  \end{frame}
+
+\begin{frame}
+\frametitle{Further information}
+    \begin{columns}[t]
+      \column{9cm}
+
+      \setlength{\parskip}{\bigskipamount}
+
+``Tools and Technology of Internet Filtering'', a chapter in ``Access Denied''. \url{http://opennet.net/accessdenied}
+
+``Security Engineering'', 2nd Edition (Chapter 23). \url{http://www.cl.cam.ac.uk/~rja14/book.html}
+
+The anonymity bibliography \url{http://www.freehaven.net/anonbib/}
+
+The Tor Project website \url{https://www.torproject.org/}
+
+%A copy of these slides will be available \url{http://www.cl.cam.ac.uk/~sjm217/}
+      
+      \column{3cm}
+      \vbox{}
+
+      \center
+      \includegraphics[width=3cm]{access-denied}
+      \medskip
+
+      \includegraphics[width=3cm]{tor-logo}
+
+    \end{columns}
+\end{frame}
+
+%% \begin{frame}
+%% \frametitle{Ethical issues in censorship resistance}
+ 
+%% \begin{overlayarea}{\textwidth}{6cm}
+%% \begin{itemize}
+%% \item People take risks in using censorship resistance systems, and contributing to them -- many of these risks are not well understood
+%% \item Censorship resistance systems are used for evil, as well as for good -- does the latter outweigh the former
+%% \item Censorship does serve a useful purpose for some people -- when is it acceptable
+%% \item Is it appropriate to develop censorship software, deploying in countries with poor human right records, building list of blocked sites, designing surveillance systems
+%% \end{itemize}
+%% \begin{center}
+%% \only<2>{\fbox{Discuss}}
+%% \end{center}
+%% \end{overlayarea}
+%% \end{frame}
+
+\end{document}


Property changes on: projects/presentations/security-part2-anon/cl08security-anon.tex
___________________________________________________________________
Added: svn:mime-type
   + text/x-tex

Added: projects/presentations/security-part2-anon/cnmap.jpg
===================================================================
(Binary files differ)


Property changes on: projects/presentations/security-part2-anon/cnmap.jpg
___________________________________________________________________
Added: svn:mime-type
   + image/jpeg

Added: projects/presentations/security-part2-anon/david.jpg
===================================================================
(Binary files differ)


Property changes on: projects/presentations/security-part2-anon/david.jpg
___________________________________________________________________
Added: svn:mime-type
   + image/jpeg

Added: projects/presentations/security-part2-anon/dns.pdf
===================================================================
(Binary files differ)


Property changes on: projects/presentations/security-part2-anon/dns.pdf
___________________________________________________________________
Added: svn:mime-type
   + application/octet-stream

Added: projects/presentations/security-part2-anon/freenet-logo.jpg
===================================================================
(Binary files differ)


Property changes on: projects/presentations/security-part2-anon/freenet-logo.jpg
___________________________________________________________________
Added: svn:mime-type
   + image/jpeg

Added: projects/presentations/security-part2-anon/freenet.png
===================================================================
(Binary files differ)


Property changes on: projects/presentations/security-part2-anon/freenet.png
___________________________________________________________________
Added: svn:mime-type
   + image/png

Added: projects/presentations/security-part2-anon/hrichina.png
===================================================================
(Binary files differ)


Property changes on: projects/presentations/security-part2-anon/hrichina.png
___________________________________________________________________
Added: svn:mime-type
   + image/png

Added: projects/presentations/security-part2-anon/ip.pdf
===================================================================
(Binary files differ)


Property changes on: projects/presentations/security-part2-anon/ip.pdf
___________________________________________________________________
Added: svn:mime-type
   + application/octet-stream

Added: projects/presentations/security-part2-anon/islameyat.png
===================================================================
(Binary files differ)


Property changes on: projects/presentations/security-part2-anon/islameyat.png
___________________________________________________________________
Added: svn:mime-type
   + image/png

Added: projects/presentations/security-part2-anon/jingjing.jpg
===================================================================
(Binary files differ)


Property changes on: projects/presentations/security-part2-anon/jingjing.jpg
___________________________________________________________________
Added: svn:mime-type
   + image/jpeg

Added: projects/presentations/security-part2-anon/jitterbug.png
===================================================================
(Binary files differ)


Property changes on: projects/presentations/security-part2-anon/jitterbug.png
___________________________________________________________________
Added: svn:mime-type
   + image/png

Added: projects/presentations/security-part2-anon/jondo.png
===================================================================
(Binary files differ)


Property changes on: projects/presentations/security-part2-anon/jondo.png
___________________________________________________________________
Added: svn:mime-type
   + image/png

Added: projects/presentations/security-part2-anon/kareem.jpg
===================================================================
(Binary files differ)


Property changes on: projects/presentations/security-part2-anon/kareem.jpg
___________________________________________________________________
Added: svn:mime-type
   + image/jpeg

Added: projects/presentations/security-part2-anon/mix.pdf
===================================================================
(Binary files differ)


Property changes on: projects/presentations/security-part2-anon/mix.pdf
___________________________________________________________________
Added: svn:mime-type
   + application/octet-stream

Added: projects/presentations/security-part2-anon/mix.svg
===================================================================
(Binary files differ)


Property changes on: projects/presentations/security-part2-anon/mix.svg
___________________________________________________________________
Added: svn:mime-type
   + image/svg+xml

Added: projects/presentations/security-part2-anon/network.pdf
===================================================================
(Binary files differ)


Property changes on: projects/presentations/security-part2-anon/network.pdf
___________________________________________________________________
Added: svn:mime-type
   + application/octet-stream

Added: projects/presentations/security-part2-anon/no-proxy.pdf
===================================================================
(Binary files differ)


Property changes on: projects/presentations/security-part2-anon/no-proxy.pdf
___________________________________________________________________
Added: svn:mime-type
   + application/octet-stream

Added: projects/presentations/security-part2-anon/nonlinear-anim4.pdf
===================================================================
(Binary files differ)


Property changes on: projects/presentations/security-part2-anon/nonlinear-anim4.pdf
___________________________________________________________________
Added: svn:mime-type
   + application/octet-stream

Added: projects/presentations/security-part2-anon/playboy.png
===================================================================
(Binary files differ)


Property changes on: projects/presentations/security-part2-anon/playboy.png
___________________________________________________________________
Added: svn:mime-type
   + image/png

Added: projects/presentations/security-part2-anon/psiphon-logo.jpg
===================================================================
(Binary files differ)


Property changes on: projects/presentations/security-part2-anon/psiphon-logo.jpg
___________________________________________________________________
Added: svn:mime-type
   + image/jpeg

Added: projects/presentations/security-part2-anon/psiphon.png
===================================================================
(Binary files differ)


Property changes on: projects/presentations/security-part2-anon/psiphon.png
___________________________________________________________________
Added: svn:mime-type
   + image/png

Added: projects/presentations/security-part2-anon/remailer.pdf
===================================================================
(Binary files differ)


Property changes on: projects/presentations/security-part2-anon/remailer.pdf
___________________________________________________________________
Added: svn:mime-type
   + application/octet-stream

Added: projects/presentations/security-part2-anon/remailer.svg
===================================================================
(Binary files differ)


Property changes on: projects/presentations/security-part2-anon/remailer.svg
___________________________________________________________________
Added: svn:mime-type
   + image/svg+xml

Added: projects/presentations/security-part2-anon/tiananmen.png
===================================================================
(Binary files differ)


Property changes on: projects/presentations/security-part2-anon/tiananmen.png
___________________________________________________________________
Added: svn:mime-type
   + image/png

Added: projects/presentations/security-part2-anon/timing_tcp_seq.pdf
===================================================================
(Binary files differ)


Property changes on: projects/presentations/security-part2-anon/timing_tcp_seq.pdf
___________________________________________________________________
Added: svn:mime-type
   + application/octet-stream

Added: projects/presentations/security-part2-anon/tor-keys.svg
===================================================================
(Binary files differ)


Property changes on: projects/presentations/security-part2-anon/tor-keys.svg
___________________________________________________________________
Added: svn:mime-type
   + image/svg+xml

Added: projects/presentations/security-part2-anon/tor-keys1.pdf
===================================================================
(Binary files differ)


Property changes on: projects/presentations/security-part2-anon/tor-keys1.pdf
___________________________________________________________________
Added: svn:mime-type
   + application/octet-stream

Added: projects/presentations/security-part2-anon/tor-keys2.pdf
===================================================================
(Binary files differ)


Property changes on: projects/presentations/security-part2-anon/tor-keys2.pdf
___________________________________________________________________
Added: svn:mime-type
   + application/octet-stream

Added: projects/presentations/security-part2-anon/tor-keys3.pdf
===================================================================
(Binary files differ)


Property changes on: projects/presentations/security-part2-anon/tor-keys3.pdf
___________________________________________________________________
Added: svn:mime-type
   + application/octet-stream

Added: projects/presentations/security-part2-anon/tor-network.pdf
===================================================================
(Binary files differ)


Property changes on: projects/presentations/security-part2-anon/tor-network.pdf
___________________________________________________________________
Added: svn:mime-type
   + application/octet-stream

Added: projects/presentations/security-part2-anon/tor-safe-path.pdf
===================================================================
(Binary files differ)


Property changes on: projects/presentations/security-part2-anon/tor-safe-path.pdf
___________________________________________________________________
Added: svn:mime-type
   + application/octet-stream

Added: projects/presentations/security-part2-anon/tor-safe-selection.pdf
===================================================================
(Binary files differ)


Property changes on: projects/presentations/security-part2-anon/tor-safe-selection.pdf
___________________________________________________________________
Added: svn:mime-type
   + application/octet-stream

Added: projects/presentations/security-part2-anon/wikileaks.png
===================================================================
(Binary files differ)


Property changes on: projects/presentations/security-part2-anon/wikileaks.png
___________________________________________________________________
Added: svn:mime-type
   + image/png

Added: projects/presentations/security-part2-anon/wireshark.png
===================================================================
(Binary files differ)


Property changes on: projects/presentations/security-part2-anon/wireshark.png
___________________________________________________________________
Added: svn:mime-type
   + image/png

Added: projects/presentations/security-part2-anon/xmlreveal.py
===================================================================
--- projects/presentations/security-part2-anon/xmlreveal.py	                        (rev 0)
+++ projects/presentations/security-part2-anon/xmlreveal.py	2010-04-26 01:34:45 UTC (rev 22237)
@@ -0,0 +1,24 @@
+#!/usr/bin/python
+
+import sys
+import xml.dom.minidom
+
+infile = file(sys.argv[1], "r")
+outfile = file(sys.argv[2], "w")
+layers = sys.argv[3:]
+
+dom = xml.dom.minidom.parse(infile)
+
+infile.close()
+
+groups = dom.getElementsByTagName("g")
+groups = [ n for n in groups if n.getAttribute("inkscape:groupmode")=='layer' ]
+
+for n in groups:
+    if n.getAttribute("inkscape:label") in layers:
+        n.setAttribute("style", "display:inline")
+    else:
+        n.setAttribute("style", "display:none")
+
+dom.writexml(outfile)
+outfile.close()


Property changes on: projects/presentations/security-part2-anon/xmlreveal.py
___________________________________________________________________
Added: svn:executable
   + *
Added: svn:mime-type
   + text/x-python



More information about the tor-commits mailing list