[tor-commits] r25895: {} add my EADV presentation, remove the old tech pres we never (in projects/presentations: . images)

Andrew Lewman andrew at torproject.org
Mon Nov 19 15:55:44 UTC 2012


Author: phobos
Date: 2012-11-19 15:55:44 +0000 (Mon, 19 Nov 2012)
New Revision: 25895

Added:
   projects/presentations/2012-11-16-EADV-Tech-Stalking-Advice.odp
   projects/presentations/2012-11-16-EADV-Tech-Stalking-Advice.pdf
   projects/presentations/images/2012-09-27-top-10-country-table.png
   projects/presentations/images/direct-users-2009-09-27-off-300-2012-09-27-all.png
   projects/presentations/images/grand-mosque-du-paris.jpg
   projects/presentations/images/grandma-at-computer.jpg
   projects/presentations/images/networksize-2009-09-27-300-2012-09-27.png
   projects/presentations/images/porn-star.jpg
   projects/presentations/images/save-the-corps.jpg
   projects/presentations/images/stalker-2.jpg
Removed:
   projects/presentations/technical-solutions-to-internet-surveillance.tex
Log:
add my EADV presentation, remove the old tech pres we never use


Added: projects/presentations/2012-11-16-EADV-Tech-Stalking-Advice.odp
===================================================================
(Binary files differ)


Property changes on: projects/presentations/2012-11-16-EADV-Tech-Stalking-Advice.odp
___________________________________________________________________
Added: svn:mime-type
   + application/octet-stream

Added: projects/presentations/2012-11-16-EADV-Tech-Stalking-Advice.pdf
===================================================================
(Binary files differ)


Property changes on: projects/presentations/2012-11-16-EADV-Tech-Stalking-Advice.pdf
___________________________________________________________________
Added: svn:mime-type
   + application/octet-stream

Added: projects/presentations/images/2012-09-27-top-10-country-table.png
===================================================================
(Binary files differ)


Property changes on: projects/presentations/images/2012-09-27-top-10-country-table.png
___________________________________________________________________
Added: svn:mime-type
   + image/png

Added: projects/presentations/images/direct-users-2009-09-27-off-300-2012-09-27-all.png
===================================================================
(Binary files differ)


Property changes on: projects/presentations/images/direct-users-2009-09-27-off-300-2012-09-27-all.png
___________________________________________________________________
Added: svn:mime-type
   + image/png

Added: projects/presentations/images/grand-mosque-du-paris.jpg
===================================================================
(Binary files differ)


Property changes on: projects/presentations/images/grand-mosque-du-paris.jpg
___________________________________________________________________
Added: svn:mime-type
   + image/jpeg

Added: projects/presentations/images/grandma-at-computer.jpg
===================================================================
(Binary files differ)


Property changes on: projects/presentations/images/grandma-at-computer.jpg
___________________________________________________________________
Added: svn:mime-type
   + image/jpeg

Added: projects/presentations/images/networksize-2009-09-27-300-2012-09-27.png
===================================================================
(Binary files differ)


Property changes on: projects/presentations/images/networksize-2009-09-27-300-2012-09-27.png
___________________________________________________________________
Added: svn:mime-type
   + image/png

Added: projects/presentations/images/porn-star.jpg
===================================================================
(Binary files differ)


Property changes on: projects/presentations/images/porn-star.jpg
___________________________________________________________________
Added: svn:mime-type
   + image/jpeg

Added: projects/presentations/images/save-the-corps.jpg
===================================================================
(Binary files differ)


Property changes on: projects/presentations/images/save-the-corps.jpg
___________________________________________________________________
Added: svn:mime-type
   + image/jpeg

Added: projects/presentations/images/stalker-2.jpg
===================================================================
(Binary files differ)


Property changes on: projects/presentations/images/stalker-2.jpg
___________________________________________________________________
Added: svn:mime-type
   + image/jpeg

Deleted: projects/presentations/technical-solutions-to-internet-surveillance.tex
===================================================================
--- projects/presentations/technical-solutions-to-internet-surveillance.tex	2012-11-18 20:54:03 UTC (rev 25894)
+++ projects/presentations/technical-solutions-to-internet-surveillance.tex	2012-11-19 15:55:44 UTC (rev 25895)
@@ -1,428 +0,0 @@
-\documentclass{beamer}
-\mode<presentation>
-\usetheme{Pittsburgh}
-\usecolortheme{beaver}
-\title{Technical Solutions to Internet Surveillance}
-\author{Andrew Lewman \\ andrew at torproject.org \\ https://torproject.org}
-\date{\today}
-\begin{document}
-
-% General flow:
-% internet is becoming centralized; good: cheaper to deploy, easier to manage; bad: control points, surveillance points
-% govt wants data, see total info awareness (wow, look at that logo or how to freak out your population) (give credit to moxie)
-% wiretapping the internet: mention some countries with programs about wiretapping, show nsa-room in AT&T San Fran
-% here's a better way to collect vast amounts of data about your population: show facebook logo
-% want more than just social interactions? show google logo, look at all of this data, email, instant messaging, topics of interest (search queries, results clicked, ads shown/clicked)
-% is absence of signal enough to arouse suspicion? cell phone location data, google services, facebook accounts?
-% how do you hide in a crowd without arousing suspicion? show tor headed liberty bell pic, don't be this guy
-% 
-
-\begin{frame}
-	\maketitle  
-	\begin{center}
-		\includegraphics[height=3cm]{./images/2009-tor-logo}
-		\hspace{1cm} 
-		\includegraphics[height=3cm]{./images/TIA-logo}
-	\end{center}
-\end{frame}
-  
-\begin{frame}
-\frametitle{Internet architecture is becoming centralized}
-\includegraphics[width=10cm]{./images/cnmap}
-\flushright
-\tiny Diagram: China Internet Network Information Center
-\end{frame}
-
-\begin{frame}
-\frametitle{Internet surveillance is pervasive}
-
-     \begin{columns}[t]
-      \column{7cm}
-\begin{itemize}
-\item Conventional surveillance methods had to be targeted
-\item Internet censorship is capable of monitoring everyone, all of the time
-\item Governments are increasing monitoring: SORM (Russia), Golden Shield (China), Data Retention Directive (EU), and Interception Modernisation Programme (UK), Warrantless Wiretapping (USA)
-\item 1 in 7 East German citizens worked for the Stasi. Today we can achieve the same results with a fraction of the cost
-\end{itemize}
-
-      \column{5cm}
-     \vbox{}
-    \parbox{5cm}{\includegraphics[width=4.5cm]{./images/nsa-room}}
-    \end{columns}
-
-\end{frame}
-
-\begin{frame}
-\frametitle{Traffic data surveillance}
-
-\begin{itemize}
-\item Traffic data (who talks to whom, how often and for how long) is the core of intelligence capabilities
-\item This information is cheaper to record and store, compared to full content
-\item Because it can be easily processed by computer, data mining techniques can be used to understand social structures
-\end{itemize}
-
-\begin{quotation}
-\noindent \includegraphics[width=1cm]{./images/opquo}\quad No government of any colour is to be trusted with such a roadmap to our souls
-\end{quotation}
-\flushright --- Sir Ken Macdonald, former director of public prosecutions, on the UK Interception Modernisation Program
-
-\end{frame}
-
-\begin{frame}
-    \frametitle{Importantly, information on social networks can be derived}
-    \begin{columns}[t]
-      \column{4.5cm}
-      \vspace{0cm}
-      
-             {\color{red}$\bullet$} Communities\newline
-             {\color{blue}$\bullet$} People
-             \column{7cm}
-             \vbox{}
-             
-             \includegraphics[clip, trim=5cm 12cm 2cm 5cm,width=7cm]{./images/network}
-    \end{columns}
-    \flushright{\tiny From "The Economics of Mass Surveillance" by George Danezis and Bettina Wittneben}
-  \end{frame}
-  
-\begin{frame}
-\frametitle{Search Engine results are censored}
-\includegraphics[width=11cm]{./images/tiananmen}
-\begin{center}
-Searching for "Tiananmen Square" on Google.com and Google.cn
-\end{center}
-\end{frame}
-
-\begin{frame}
-\frametitle{Sweden's iPRED experience}
-\includegraphics[scale=1]{./images/netnodnov}
-\end{frame}
-
-\begin{frame}
-\frametitle{Incentives}
-\noindent \includegraphics[width=1cm]{./images/opquo}\quad Our analysis shows that consumers increasingly want to decide for themselves when to watch and from which screen. Unfortunately, many have become adept at circumventing the IPRED legislation. 
-\flushright --- Jens Heron, Mediavision
-\end{frame}
-
-\begin{frame}
-\frametitle{Resisting Internet censorship}
-
-\begin{quotation}
-\noindent \includegraphics[width=1cm]{./images/opquo}\quad The Net interprets censorship as damage and routes around it.
-\end{quotation}
-\flushright --- John Gilmore, 1993
-
-\flushleft
-
-No longer true on a technical level: censorship is in the routers.
-\medskip
-
-Remains true on a social level: when material is censored, people distribute copies and draw attention to them
-\medskip
-
-But what if people are too afraid to do this?
-\end{frame}
-
-\begin{frame}
-\frametitle{Twitter in Iran: Good.}
-\includegraphics[scale=0.5]{./images/twitter-iran-protests-time}
-\flushright{\tiny From http://www.time.com/time/world/article/0,8599,1905125,00.html}
-\end{frame}
-
-\begin{frame}
-\frametitle{Twitter in USA: Bad.}
-\includegraphics[scale=0.45]{./images/twitter-g20-pittsburgh-gothamist}
-\flushright{\tiny from http://gothamist.com/2009/10/05/fbi\_raids\_queens\_home\_in\_g20\_protes.php}
-\end{frame}
-
-  \begin{frame}
-  \frametitle{The Transparent Society}
-
-     \begin{columns}[t]
-      \column{7cm}
-\begin{itemize}
-\item David Brin proposed that in a world of pervasive surveillance, balance could be maintained by allowing everyone to monitor everyone else
-\item Bruce Schneier retorted that surveillance amplifies existing powers
-\item Many countries restrict anonymous speech (e.g.\ Germany and China)
-\item It is easy for those in power to call on the weak to link their names to opinions
-\end{itemize}
-
-      \column{5cm}
-     \vbox{}
-    \parbox{5cm}{\includegraphics[width=4.5cm]{./images/namesheet}}
-
-\flushright{\tiny Photo: Manos Simonides}
-    \end{columns}
-\end{frame}
-
-\begin{frame}
-\frametitle{Censorship resistance systems}
-\begin{itemize}
-\item Software to resist censorship should
-\begin{itemize}
- \item have a diverse set of users
- \item work where you are without special steps
- \item be sustainable (what if the company goes broke?)
- \item be decentralized (swapping censors doesn't help you)
- \item protect you by default
- \item have accessible standards and published designs (black box vs. glass box)
- \item be fast enough that you'll use it daily
- \item doesn't promise perfect everything including a fully encrypted Internet
-\end{itemize}
-\item<1-> These properties should be maintained even if the censorship resistance system is partially compromised
-\end{itemize}
-\end{frame}
-
-\begin{frame}
-\frametitle{Blocking with technology}
-\begin{itemize}
-\item When a country's government controls international connectivity, they can block requests for banned websites and destinations
-\item There are a number of different approaches (DNS blocking, IP address blocking, etc.)
-\item Software may be produced in-country, but often is an adapted commercial product
-\item These companies not only make the software, but provide a continuously updated list of websites to be blocked
-\end{itemize}
-\end{frame}
-
-  \begin{frame}
-    \frametitle{Normal web browsing}
-
-    \begin{centering}
-    \vbox{}
-
-    \includegraphics[clip, trim=1cm 4cm 1cm 2.2cm, width=10cm]{./images/no-proxy}
-    \end{centering}
-
-\vspace{-1cm}
-
-      \flushright
-
-      \tiny Diagram: Jane Gowan
-
-  \end{frame}
-
-  \begin{frame}
-    \frametitle{DNS tampering}
-
-    \begin{centering}
-    \vbox{}
-
-    \includegraphics[clip, trim=1cm 4cm 1cm 2.2cm, width=10cm]{./images/dns}
-    \end{centering}
-
-\vspace{-1cm}
-
-      \flushright
-
-      \tiny Diagram: Jane Gowan
-
-  \end{frame}
-
-  \begin{frame}
-    \frametitle{IP blocking}
-
-    \begin{centering}
-    \vbox{}
-
-    \includegraphics[clip, trim=1cm 4cm 1cm 2.2cm, width=10cm]{./images/ip}
-    \end{centering}
-
-\vspace{-1cm}
-
-      \flushright
-
-      \tiny Diagram: Jane Gowan
-
-  \end{frame}
-  
-  \begin{frame}
-\frametitle{Trade-offs in blocking systems}
-\begin{itemize}
-\item<1-> DNS blocking
-\begin{itemize}
-\item Easy and cheap to implement
-\item Blocks at domain name granularity -- over blocks protocols, web pages
-\item Trivial to bypass
-\end{itemize}
-\item<2-> IP blocking
-\begin{itemize}
-\item Easy and cheap to implement
-\item Blocks at IP address (perhaps port) -- over-blocks virtual hosting
-\end{itemize}
-\item<3-> Proxy blocking
-\begin{itemize}
-\item Expensive to implement
-\item Blocks at webpage level -- low over-blocking
-\end{itemize}
-\item<4-> Hybrid blocking -- IP based redirection to proxy
-\begin{itemize}
-\item Tricky to get right, but cheap
-\item Has some vulnerabilities
-\item Blocks at webpage level -- low over-blocking
-\end{itemize}
-\end{itemize}
-\end{frame}
-
-\begin{frame}
-\frametitle{Who wants online privacy?}
-\begin{itemize}
-\item<1-> Ordinary people
-\begin{itemize}
-\item To avoid personal information being sold to marketers
-\item Protect themselves when researching sensitive topics
-\end{itemize}
-\item<2-> Military and Law Enforcement
-\begin{itemize}
-\item To carry out intelligence gathering
-\item Protect undercover field agents
-\item Offer anonymous tip lines
-\end{itemize}
-\item<3-> Journalists
-\begin{itemize}
-\item To protect sources, such as whistle blowers
-\end{itemize}
-\item<4-> Human rights workers
-\begin{itemize}
-\item To publicize abuses and protect themselves from surveillance
-\item Blogging about controversial subjects
-\end{itemize}
-\item<5-> Businesses
-\begin{itemize}
-\item To observe their competition and build anonymous collaborations
-\end{itemize}
-\end{itemize}
-\end{frame}
-
-\begin{frame}
-\frametitle{Anonymous communication}
-\begin{itemize}
-\item People have to hide in a crowd of other people ("anonymity loves company")
-\item The goal of the system is to make all users look as similar as possible, to give a bigger crowd
-\item Hide who is communicating with whom
-\item Layered encryption and random delays hide correlation between input traffic and output traffic
-\end{itemize}
-\end{frame}
-
-\begin{frame}
-\frametitle{Tor is a low-latency anonymity system}
-\begin{itemize}
-\item<1-> Based on technology developed in the Onion Routing project
-\item<2-> Privacy by design, not by policy (no data collected)
-\item<3-> Commonly used for web browsing and instant messaging (works for any TCP traffic)
-\item<4-> Originally built as a pure anonymity system (hides who is talking to whom)
-\item<5-> Now designed to resist censorship too (hides whether someone is using the system at all)
-\item<6-> Centralized directory authorities publish a list of all servers; client doesn't trust the network by design
-\end{itemize}
-
-\begin{center}
-\includegraphics[height=3cm]{./images/2009-tor-logo}
-\end{center}
-
-\end{frame}
-
-  \begin{frame}
-    \frametitle{Tor hides communication patterns by relaying data through volunteer servers}
-    \begin{center}
-      \begin{overlayarea}{9cm}{6cm}
-      \only<1>{\includegraphics[width=9cm]{./images/tor-network}}
-      \only<2>{\includegraphics[width=9cm]{./images/tor-safe-selection}}
-      \only<3>{\includegraphics[width=9cm]{./images/tor-safe-path}}
-      \end{overlayarea}
-      \flushright
-
-      \tiny Diagram: Robert Watson
-    \end{center}
-  \end{frame}
-
-\begin{frame}
-\frametitle{Tor hidden services allow censorship resistant services}
-\includegraphics[scale=0.5]{./images/wikileaks}
-\end{frame}
-  
-\begin{frame}
-\frametitle{How is Tor different from other systems?}
-\\[1cm]
-\begin{center}
-\only<1>{\includegraphics[height=7cm]{./images/single_hop_relay}}
-\only<2>{\includegraphics[height=7cm]{./images/evil_single_hop_relay}}
-\only<3>{\includegraphics[height=7cm]{./images/data_snooping_single_hop_relay}}
-\end{center}
-\end{frame}
-  
-\begin{frame}
-\frametitle{Limitations of censorship resistance}
-\begin{itemize}
-\item Censorship resistance is thought controversial -- especially by the censors
-\item There is something for everyone to like, and something for everyone to dislike, going on with censorship resistance systems
-\item Bad people do use them to do bad things (for many different definitions of bad people)
-\item It is impossible to block bad uses, even if we could come up with a common definition of bad content
-\item The systems are not perfect, so it is possible some people will be caught
-\end{itemize}
-\end{frame}
-
-\begin{frame}
-\frametitle{Conclusions}
-    \begin{columns}[t]
-      \column{7cm}
-      \begin{itemize}
-      \item The Internet and centralisation can both improve and harm freedom of speech
-      \item Slogans regarding the borderless nature and inherent freedoms of the Internet are frequently wrong
-      \item Technical details matter: how a system is implemented can make a radical difference
-      \item Technologies can be used to resist censorship and improve privacy
-      \item However, policies must be changed too and pressure is needed on legislators
-      \end{itemize}
-      \column{5cm}
-      \vbox{}
-      \begin{overlayarea}{5cm}{10cm}
-        \resizebox{5cm}{!}{\includegraphics{./images/collage}}
-      \end{overlayarea}
-    \end{columns}
-\end{frame}
-
-\begin{frame}
-\frametitle{One Version of the Future}
-\begin{quotation}
-\noindent \includegraphics[width=1cm]{./images/opquo}\quad I'd like to change the design of the Internet by introducing                                                                                                 
-regulation--Internet passports, Internet police and international                                                                                            
-agreement--about following Internet standards. And if some countries                                                                                         
-don't agree with or don't pay attention to the agreement, just cut                                                                                           
-them off. 
-\end{quotation}
-\flushright --- Eugene Kaspersky, Co-Founder \& CEO of Kaspersky Labs
-\end{frame}
-
-\begin{frame}
-\frametitle{A better version of the future}
-\textbf{Internet Access as a Human Right}
-\medskip
-\begin{quotation}
-\noindent \includegraphics[width=1cm]{./images/opquo}\quad
-We think it's something you cannot live without in modern society. Like banking services or water or electricity, you need an Internet connection
-\end{quotation}
-\flushright --- Laura Vilkkonen, Ministry of Transport and Communications, Finland
-
-\bigskip
-\textbf{Tor Project's Mission}
-\medskip
-\begin{quotation}
-\noinent \includegraphics[width=1cm]{./images/opquo}\quad We remain committed to defending online privacy and anonymity as a human right.
-\end{quotation}
-\end{frame}
-
-\begin{frame}
-\frametitle{How to get there}
-\begin{itemize}
-\item Increased funding of research and development for privacy, circumvention, and anti-censorship technologies
-\item Policy and Legal frameworks for free access, free speech, and anonymity
-%\item Mobile devices and telco innovation
-%\item Ambient connectivity
-\end{itemize}
-\end{frame}
- 
-\begin{frame}
-\frametitle{Credits}
-\begin{itemize}
-\item Thank you to Steven J. Murdoch, \url{http://www.cl.cam.ac.uk/users/sjm217/}, for the research and basis for this presentation. \\
-\item Photographer and Diagram credits as listed throughout the presentation.
-\end{itemize}
-\end{frame}
-
-\end{document}



More information about the tor-commits mailing list