[tor-commits] r25300: {} add my UCL presentation. (projects/presentations)

Andrew Lewman andrew at torproject.org
Wed Jan 11 15:04:41 UTC 2012


Author: phobos
Date: 2012-01-11 15:04:41 +0000 (Wed, 11 Jan 2012)
New Revision: 25300

Added:
   projects/presentations/2012-01-11-usable-online-privacy.pdf
   projects/presentations/2012-01-11-usable-online-privacy.tex
Log:
add my UCL presentation.


Added: projects/presentations/2012-01-11-usable-online-privacy.pdf
===================================================================
(Binary files differ)


Property changes on: projects/presentations/2012-01-11-usable-online-privacy.pdf
___________________________________________________________________
Added: svn:mime-type
   + application/octet-stream

Added: projects/presentations/2012-01-11-usable-online-privacy.tex
===================================================================
--- projects/presentations/2012-01-11-usable-online-privacy.tex	                        (rev 0)
+++ projects/presentations/2012-01-11-usable-online-privacy.tex	2012-01-11 15:04:41 UTC (rev 25300)
@@ -0,0 +1,203 @@
+\documentclass{beamer}
+\mode<presentation>
+\usetheme{Boadilla}
+\title{Anonymity, Usability, and Humans.  Pick Two.}
+\author{Andrew Lewman \\ andrew at torproject.org}
+\date{11 Jan 2012}
+\begin{document}
+
+\begin{frame}
+\maketitle  
+\begin{center}
+\includegraphics[height=3cm]{./images/2009-tor-logo}
+\end{center}
+\end{frame}
+
+\begin{frame}
+\frametitle{What are we talking about?}
+\begin{itemize}
+\item Crash course on anonymous communications
+\item Quick overview of Tor
+\item Usability, Security, and Humans
+\end{itemize}
+\end{frame}
+
+\begin{frame}
+\frametitle{The Tor Project, Inc.}
+501(c)(3) non-profit organization dedicated to the research and development of technologies for online anonymity and privacy
+\begin{center}
+\includegraphics[height=5cm]{./images/2009-oval_sticker_new}
+\end{center}
+\end{frame}
+
+
+\begin{frame}
+\frametitle{Anonymous communication}
+\begin{itemize}
+\item People have to hide in a crowd of other people ("anonymity loves company")
+\item The goal of the system is to make all users look as similar as possible, to give a bigger crowd
+\item Hide who is communicating with whom
+\item Layered encryption and random delays hide correlation between input traffic and output traffic
+\end{itemize}
+\end{frame}
+
+\begin{frame}
+\frametitle{What is Tor?}
+\begin{itemize}
+\item online anonymity software and network
+\pause \item open source, freely available (3-clause BSD license)
+\pause \item active research environment: \\
+Rice, UMN, NSF, NRL, Drexel, Waterloo, Cambridge UK, Bamberg Germany, Boston Univ, Harvard, MIT, RPI, Georgia Tech
+\pause \item increasingly diverse toolset: \\
+Tor, Torbutton, Tor Browser Bundle, TAILS Anonymous Operating System, Tor Weather, Tor auto-responder, Secure Updater, Orbot, Torora, Tor Check, Arm, Nymble, Tor Control, Tor Wall, TorVM
+\end{itemize}
+\end{frame}
+
+\begin{frame}
+\frametitle{Other Systems}
+\begin{itemize}
+\item VPN - Virtual Private Network, 1 to 1 connection, can redirect all traffic, generally encrypted
+\pause \item Proxy - 1 to 1 connection, per application traffic redirection, sometimes encrypted
+\pause \item I2P - Garlic routing, closed network, anonymity and reputation
+\pause \item Freenet - closed network, anonymity, distributed file storage and sharing
+\pause \item GNUnet - closed network, anonymity, distributed file storage and sharing
+\end{itemize}
+\end{frame}
+
+\begin{frame}
+\frametitle{How is Tor different from other systems?}
+\begin{overlayarea}{9cm}{6cm}
+\only<1>{\includegraphics[height=7cm]{./images/single_hop_relay}}
+\only<2>{\includegraphics[height=7cm]{./images/evil_single_hop_relay}}
+\only<3>{\includegraphics[height=7cm]{./images/data_snooping_single_hop_relay}}
+\end{overlayarea}
+\end{frame}
+
+\begin{frame}
+\frametitle{Who uses Tor?}
+\parbox{8cm}{\sloppy 
+\setbeamercolor{background}[\includegraphics[scale=0.35]{./images/anonymousman}}
+\parbox{3cm}{\sloppy 
+\begin{flushleft}
+\begin{itemize}
+\begin{small}
+\item Normal people
+\item Law Enforcement
+\item Human Rights Activists
+\item Business Execs
+\item Abuse Victims
+\item Militaries
+\end{small}
+\end{itemize}
+\end{flushleft}
+}
+\end{frame}
+
+\begin{frame}
+\frametitle{Who uses Tor?}
+\begin{itemize}
+\item <1> \textit{Normal users} \\ linking sensitive information to their current identities, online advertising networks, search engines, censorship circumvention
+\item <2> \textit{Law enforcement}\\ accidental disclosure to targets, family and friend concerns, separating work from home life
+\item <3> \textit{Rights Activists}\\ Personal safety, family safety, narrowly-defined publicity, censorship circumvention
+\item <4> \textit{Business Execs}\\ separating work from home life, competitor research, censorship circumvention
+\item <5> \textit{Abuse Victims and Survivors}\\ complete separation of past abuse and current life, finding help and safety, need to help others anonymously
+\item <6> \textit{Militaries}\\ intelligence gathering, separating work from home life, other activities
+\end{itemize}
+\end{frame}
+
+\begin{frame}
+\frametitle{estimated 400k to 800k daily users}
+\setbeamercolor{background}[\includegraphics[scale=0.4]{./images/huge-crowd}]
+\end{frame}
+
+\begin{frame}
+\frametitle{Online and Offline change happens}
+\includegraphics[scale=0.5]{./images/egypt}
+\end{frame}
+
+\begin{frame}
+\frametitle{...spring is in the air...}
+\begin{center}
+\includegraphics[scale=1.2]{./images/paco-primera-pagina-oleo-lienzo-110-x-150-cms-2008-red}
+\end{center}
+\end{frame}
+
+\begin{frame}
+\frametitle{Tor hidden services}
+\includegraphics[scale=0.5]{./images/hidden-federalist}
+\end{frame}
+
+\begin{frame}
+\frametitle{Tor hidden services}
+\includegraphics[scale=1.0]{./images/hidden-federalist-zoom}
+\end{frame}
+
+\begin{frame}
+\frametitle{Anonymity, Usability, and Humans}
+\begin{itemize}
+\item Allow the user to fully configure Tor rather than manually searching for and opening text files.
+\item Let users learn about the current state of their Tor connection, and configure or find out whether any of their applications are using it.
+\item Make alerts and error conditions visible to the user.
+\item Run on Windows, Linux, and OS X, Android, iOS, on normal computers and phones.
+\end{itemize}
+\end{frame}
+
+\begin{frame}
+\frametitle{First iteration: command line}
+\includegraphics[scale=0.8]{./images/tor-cli-start}
+\end{frame}
+
+\begin{frame}
+\frametitle{Second iteration: GUI controller contest}
+%http://replay.web.archive.org/20081220230929/http://www.torproject.org/gui/index.html.en
+\includegraphics[scale=0.6]{./images/tor-gui-competition-webpage}
+\end{frame}
+
+\begin{frame}
+\frametitle{TorK}
+%http://replay.web.archive.org/20081222193036/http://anonymityanywhere.com/tork/
+\includegraphics[scale=0.6]{./images/tork-osd-thumb}
+\end{frame}
+
+\begin{frame}
+\frametitle{April3rd}
+%http://replay.web.archive.org/20081228051332/http://www.april3rd.com/tor/
+\includegraphics[scale=0.4]{./images/april3rd-torgui-main_open_text_annotated}
+\end{frame}
+
+\begin{frame}
+\frametitle{Vidalia}
+\includegraphics[scale=0.3]{./images/vidalia-network-map}
+\end{frame}
+
+\begin{frame}
+\frametitle{Experience so far}
+\begin{itemize}
+\item Our web site is confusing to users and not technical enough for researchers.
+\pause \item Concepts of anonymity and its threats escape most users.\\"I want my Youtube!"  "I use tor to organize on facebook."
+\pause \item Cultural differences and their expectations of software, usability, anonymity, privacy, and what tor provides.
+\pause \item Software leaks data all over the place.  Stopping these leaks leads to unexpected user experiences.
+\pause \item Six years since we last dabbled in Usability.
+\end{itemize}
+\end{frame}
+
+\begin{frame}
+\frametitle{Next steps}
+Visit \url{https://www.torproject.org/} for more information, links, and ideas.
+\end{frame}
+
+\begin{frame}
+\frametitle{Time for a demo}
+Demonstration of Tor Browser Bundle
+\end{frame}
+
+\begin{frame}
+\frametitle{Copyright}
+\begin{itemize}
+\item who uses tor? \url{http://www.flickr.com/photos/mattw/2336507468/siz}, Matt Westervelt, CC-­BY-­SA.
+\item 500k, \url{http://www.flickr.com/photos/lukaskracic/334850378/sizes/l/}, Luka Skracic, used with permission.
+\item spring is in the air, Paco Pomet, http://pacopomet.wordpress.com/
+\end{itemize}
+\end{frame}
+
+\end{document}


Property changes on: projects/presentations/2012-01-11-usable-online-privacy.tex
___________________________________________________________________
Added: svn:mime-type
   + text/x-tex



More information about the tor-commits mailing list