[tor-commits] r26691: {} add recent presentations (in projects/presentations: . images)

Andrew Lewman andrew at torproject.org
Fri Apr 4 10:52:19 UTC 2014


Author: phobos
Date: 2014-04-04 10:52:19 +0000 (Fri, 04 Apr 2014)
New Revision: 26691

Added:
   projects/presentations/2014-02-09-Cryptoparty-Boston.pdf
   projects/presentations/2014-02-09-Cryptoparty-Boston.tex
   projects/presentations/2014-02-12-MIT-codesign-presentation.txt
   projects/presentations/2014-03-19-MIT-codesign-presentation.pdf
   projects/presentations/2014-03-19-MIT-codesign-presentation.txt
   projects/presentations/2014-04-03-CivilRightsDefenders-Workshop.pdf
   projects/presentations/2014-04-03-CivilRightsDefenders-Workshop.txt
   projects/presentations/images/2014-02-17-iranian-circumvention-tools.png
Log:
add recent presentations


Added: projects/presentations/2014-02-09-Cryptoparty-Boston.pdf
===================================================================
(Binary files differ)


Property changes on: projects/presentations/2014-02-09-Cryptoparty-Boston.pdf
___________________________________________________________________
Added: svn:mime-type
   + application/octet-stream

Added: projects/presentations/2014-02-09-Cryptoparty-Boston.tex
===================================================================
--- projects/presentations/2014-02-09-Cryptoparty-Boston.tex	                        (rev 0)
+++ projects/presentations/2014-02-09-Cryptoparty-Boston.tex	2014-04-04 10:52:19 UTC (rev 26691)
@@ -0,0 +1,196 @@
+\documentclass{beamer}
+\mode<presentation>
+\usetheme{Boadilla}
+\title{Cryptoparty Boston}
+\author{Andrew Lewman \\ andrew at torproject.org}
+\date{09 February 2014}
+\begin{document}
+
+\begin{frame}
+\maketitle  
+\begin{center}
+\includegraphics[height=3cm]{./images/2009-tor-logo}
+\end{center}
+\end{frame}
+
+\begin{frame}[plain]
+   \begin{centering}
+     \pgfimage[height=\paperheight]{./images/1984first}
+     \par
+   \end{centering}
+\end{frame} 
+
+\begin{frame}
+\frametitle{George Orwell was an optimist}
+\begin{quotation}
+\noindent \includegraphics[width=1cm]{./images/opquo}\quad Who controls the past, controls the future: who controls the present controls the past
+\end{quotation}
+\flushright --- George Orwell, Nineteen Eighty Four, 1949
+\end{frame}
+
+\begin{frame}
+\frametitle{Internet Surveillance is getting more advanced}
+\begin{center}
+\includegraphics<1>[scale=0.5]{./images/procera-evolved-dpi}
+\includegraphics<2>[scale=0.5]{./images/iran-ssl-dpi-26-seconds-to-death}
+\includegraphics<3>[scale=0.6]{./images/2011-infoweek-comodo-hacker}
+\includegraphics<4>[scale=0.6]{./images/2011-06-08-china-net-censorship-piracy-porn}
+\includegraphics<5>[scale=0.6]{./images/2011-10-arstechnica-major-isps-usa-6strikes}
+\includegraphics<6>[scale=0.4]{./images/dataflow-futureprivacychart}
+\includegraphics<7>[scale=0.6]{./images/2009-knowprivacy-report-webbug-domains}
+\includegraphics<8>[scale=0.3]{./images/mediacom-ad-injection-apple}
+\includegraphics<9>[scale=0.3]{./images/mediacom-ad-injection-google}
+\end{center}
+\end{frame}
+
+\begin{frame}
+\frametitle{Twitter in Iran: Good.}
+\includegraphics[scale=0.5]{./images/twitter-iran-protests-time}
+\flushright{\tiny From http://www.time.com/time/world/article/0,8599,1905125,00.html}
+\end{frame}
+
+\begin{frame}
+\frametitle{Twitter in USA: Bad.}
+\includegraphics[scale=0.45]{./images/twitter-g20-pittsburgh-gothamist}
+\flushright{\tiny from http://gothamist.com/2009/10/05/fbi\_raids\_queens\_home\_in\_g20\_protes.php}
+\end{frame}
+
+\begin{frame}[plain]
+   \begin{centering}
+     \pgfimage[height=\paperheight]{./images/paco-primera-pagina-oleo-lienzo-110-x-150-cms-2008-red}
+     \par
+   \end{centering}
+\end{frame} 
+
+\begin{frame}
+\frametitle{The Tor Project, Inc.}
+501(c)(3) non-profit organization dedicated to the research and development of technologies for online anonymity and privacy
+\begin{center}
+\includegraphics[height=5cm]{./images/2009-oval_sticker_new}
+\end{center}
+\end{frame}
+
+\begin{frame}
+\frametitle{What is Tor?}
+\begin{itemize}
+\item online anonymity software and network
+\pause \item open source, freely available (3-clause BSD license)
+\pause \item active research environment: \\
+Drexel, Univ of Waterloo, Georgia Tech, Princeton, Boston University, University College London, Univ of Minnesota, National Science Foundation, Naval Research Labs, Cambridge UK, Bamberg Germany, MIT, NORDUnet...
+\pause \item increasingly diverse toolset: \\
+Tor, Tor Browser Bundle, Tails LiveCD, Pluggable Transports, Tor Weather, Tor auto-responder, Secure Updater, Orbot, Gibberbot, Arm and so on.
+\end{itemize}
+\end{frame}
+
+\begin{frame}
+\frametitle{Why Tor?}
+\begin{overlayarea}{9cm}{6cm}
+\only<1>{\includegraphics[scale=0.5]{./images/first-rule-of-privacy.jpg}}
+\only<2>{\includegraphics[scale=0.5]{./images/internet-venn-diagram.jpg}}
+\end{overlayarea}
+\end{frame}
+
+\begin{frame}
+\frametitle{Who uses Tor?}
+\parbox{8cm}{\sloppy \setbeamercolor{background}[\includegraphics[scale=0.35]{./images/anonymousman}}
+\parbox{3cm}{\sloppy 
+\begin{flushleft}
+\begin{itemize}
+\begin{small}
+\item Normal people
+\item Law Enforcement
+\item Human Rights Activists
+\item Business Execs
+\item Militaries
+\item Abuse Victims
+\end{small}
+\end{itemize}
+\end{flushleft}
+}
+\end{frame}
+
+\begin{frame}
+\frametitle{Online and Offline change happens}
+\includegraphics[scale=0.5]{./images/egypt}
+\end{frame}
+
+\begin{frame}
+\frametitle{You missed a use case}
+\includegraphics<1>[scale=0.4]{./images/hidden-service-takedown-warning.jpg}
+\includegraphics<2>[scale=0.8]{./images/ScreenHunter_03_Jun_26_18_11}
+\includegraphics<3>[scale=1.0]{./images/tripoli-internet-monitoring-room-sign}
+\end{frame}
+
+\begin{frame}[plain]
+\frametitle{estimated 1 million daily users}
+\includegraphics[scale=0.4]{./images/huge-crowd}
+\end{frame}
+
+\begin{frame}
+\frametitle{How is Tor different from other systems?}
+\begin{overlayarea}{9cm}{6cm}
+\only<1>{\includegraphics[height=7cm]{./images/single_hop_relay}}
+\only<2>{\includegraphics[height=7cm]{./images/evil_single_hop_relay}}
+\only<3>{\includegraphics[height=7cm]{./images/data_snooping_single_hop_relay}}
+\end{overlayarea}
+\end{frame}
+
+\begin{frame}
+\frametitle{Tor hides communication patterns by relaying data through volunteer servers}
+\begin{center}
+\begin{overlayarea}{9cm}{6cm}
+\only<1>{\includegraphics[width=9cm]{./images/tor-network}}
+\only<2>{\includegraphics[width=9cm]{./images/tor-safe-selection}}
+\only<3>{\includegraphics[width=9cm]{./images/tor-safe-path}}
+\only<4>{\includegraphics[width=9cm]{./images/tor-keys1}}
+\end{overlayarea}
+\flushright{\tiny Diagram: Robert Watson}
+\end{center}
+\end{frame}
+
+\begin{frame}
+\frametitle{Vidalia Network Map}
+\includegraphics[scale=0.4]{./images/vidalia-network-map}
+\end{frame}
+
+\begin{frame}
+\frametitle{Metrics}
+\begin{itemize}
+\item Measuring metrics anonymously
+\item NSF research grant
+\item Archive of hourly consensus, ExoneraTor, VisiTor
+\item Metrics portal: \\ \url{https://metrics.torproject.org/}
+\end{itemize}
+\end{frame}
+
+\begin{frame}
+\frametitle{Tor hidden services allow privacy enhanced hosting}
+\includegraphics[scale=0.5]{./images/hidden-federalist}
+\end{frame}
+
+\begin{frame}
+\frametitle{dot onion you say?}
+\includegraphics[scale=0.6]{./images/hidden-federalist-zoom}
+\end{frame}
+
+\begin{frame}
+\frametitle{Thanks!}
+\includegraphics[scale=0.6]{./images/thankyou_img}
+\flushright
+Visit \url{https://www.torproject.org/} for more information, links, and ideas.
+\end{frame}
+
+\begin{frame}
+\frametitle{Credits \& Thanks}
+\begin{itemize}
+\item applied theory, third image: Information Week,2011-04-09, http://www.informationweek.com/news/security/attacks/229400850
+\item applied theory, fourth image: Al Jazeera, February 2011
+\item six strikes, ars technica, \url{http://arstechnica.com/tech-policy/news/2011/07/major-isps-agree-to-six-strikes-copyright-enforcement-plan.ars}
+\item spring is in the air, Paco Pomet, http://pacopomet.wordpress.com/
+\item who uses tor? \url{http://www.flickr.com/photos/mattw/2336507468/siz}, Matt Westervelt, CC-­BY-­SA.
+\item danger!, \url{http://flickr.com/photos/hmvh/58185411/sizes/o/}, hmvh, CC-­BY-­SA.
+\item 1 Million, \url{http://www.flickr.com/photos/lukaskracic/334850378/sizes/l/}, Luka Skracic, used with permission.
+\end{itemize}
+\end{frame}
+
+\end{document}


Property changes on: projects/presentations/2014-02-09-Cryptoparty-Boston.tex
___________________________________________________________________
Added: svn:mime-type
   + text/x-tex

Added: projects/presentations/2014-02-12-MIT-codesign-presentation.txt
===================================================================
--- projects/presentations/2014-02-12-MIT-codesign-presentation.txt	                        (rev 0)
+++ projects/presentations/2014-02-12-MIT-codesign-presentation.txt	2014-04-04 10:52:19 UTC (rev 26691)
@@ -0,0 +1,70 @@
+% Domestic Violence, Technology, and You
+% Andrew Lewman, andrew at torproject.org
+% 12 February 2014
+
+# Who is this guy?
+
+501(c)(3) non-profit organization dedicated to the research and development of technologies for online anonymity and privacy. 
+
+[https://www.torproject.org](https://www.torproject.org)
+
+\begin{center}
+\includegraphics[keepaspectratio,width=\textwidth, height=.8\textheight]{images/2009-oval_sticker_new}
+\end{center}
+
+# Victims of Abuse
+
+Working with victims of infectious surveillance and trafficking.
+
+Provide anonymity and control of identity for the victims.
+
+Consult with law enforcement, advocacy organizations, and others to understand technology capabilities and usage in trafficking situations.
+
+# Infectious Surveillance
+
+  - What is it?
+
+# Infectious Surveillance
+
+  - 100 bucks is all it takes to ruin a life and those trying to help
+
+# Infectious Surveillance
+
+  - Draft clean communications protocol, [https://wiki.tpo.is/](https://wiki.tpo.is/)
+
+# Working with Advocates
+
+  - Working with NNEDV, [https://blog.torproject.org/blog/ending-domestic-violence-nnedv-and-tor](https://blog.torproject.org/blog/ending-domestic-violence-nnedv-and-tor)
+  - Transition House, [http://www.transitionhouse.org/](http://www.transitionhouse.org/)
+  - Emerge, [http://emergedv.com/](http://emergedv.com/)
+  - REACH Beyond Domestic Violence, [http://reachma.org](http://reachma.org)
+
+# Working with Law Enforcement
+
+  - FBI, [https://blog.torproject.org/blog/trip-report-october-fbi-conference](https://blog.torproject.org/blog/trip-report-october-fbi-conference)
+  - UK SOCA, [https://blog.torproject.org/blog/meeting-soca-london](https://blog.torproject.org/blog/meeting-soca-london)
+  - DHS, ICE, DoJ, and others.
+
+# Success
+
+See 2 case studies at [https://wiki.tpo.is/Case%20Studies](https://wiki.tpo.is/Case%20Studies)
+
+ - Elderly worker
+ - Adult performer
+
+Fuerza [http://fuerza.is](http://fuerza.is) mobile app to help diagnose stalking/surveillance
+
+# Challenges
+
+Lack of data on technology and DV
+
+Lack of awareness that "cyber" stalking/harassment is trauma inducing like physical abuse
+
+Relevant tech help for victims
+
+
+# Thanks!
+
+\begin{center}
+\includegraphics[keepaspectratio,width=\textwidth, height=.8\textheight]{images/thankyou_img}
+\end{center}
\ No newline at end of file


Property changes on: projects/presentations/2014-02-12-MIT-codesign-presentation.txt
___________________________________________________________________
Added: svn:eol-style
   + native
Added: svn:mime-type
   + text/plain

Added: projects/presentations/2014-03-19-MIT-codesign-presentation.pdf
===================================================================
(Binary files differ)


Property changes on: projects/presentations/2014-03-19-MIT-codesign-presentation.pdf
___________________________________________________________________
Added: svn:mime-type
   + application/octet-stream

Added: projects/presentations/2014-03-19-MIT-codesign-presentation.txt
===================================================================
--- projects/presentations/2014-03-19-MIT-codesign-presentation.txt	                        (rev 0)
+++ projects/presentations/2014-03-19-MIT-codesign-presentation.txt	2014-04-04 10:52:19 UTC (rev 26691)
@@ -0,0 +1,70 @@
+% Domestic Violence, Technology, and You
+% Andrew Lewman, andrew at torproject.org
+% 19 March 2014
+
+# Who is this guy?
+
+501(c)(3) non-profit organization dedicated to the research and development of technologies for online anonymity and privacy. 
+
+[https://www.torproject.org](https://www.torproject.org)
+
+\begin{center}
+\includegraphics[keepaspectratio,width=\textwidth, height=.8\textheight]{images/2009-oval_sticker_new}
+\end{center}
+
+# Victims of Abuse
+
+Working with victims of infectious surveillance and trafficking.
+
+Provide anonymity and control of identity for the victims.
+
+Consult with law enforcement, advocacy organizations, and others to understand technology capabilities and usage in trafficking situations.
+
+# Infectious Surveillance
+
+  - What is it?
+
+# Infectious Surveillance
+
+  - 100 bucks is all it takes to ruin a life and those trying to help
+
+# Infectious Surveillance
+
+  - Draft clean communications protocol, [https://wiki.ipvtech.is/](https://wiki.ipvtech.is/)
+
+# Working with Advocates
+
+  - Working with NNEDV, [https://blog.torproject.org/blog/ending-domestic-violence-nnedv-and-tor](https://blog.torproject.org/blog/ending-domestic-violence-nnedv-and-tor)
+  - Transition House, [http://www.transitionhouse.org/](http://www.transitionhouse.org/)
+  - Emerge, [http://emergedv.com/](http://emergedv.com/)
+  - REACH Beyond Domestic Violence, [http://reachma.org](http://reachma.org)
+
+# Working with Law Enforcement
+
+  - FBI, [https://blog.torproject.org/blog/trip-report-october-fbi-conference](https://blog.torproject.org/blog/trip-report-october-fbi-conference)
+  - UK SOCA, [https://blog.torproject.org/blog/meeting-soca-london](https://blog.torproject.org/blog/meeting-soca-london)
+  - DHS, ICE, DoJ, and others.
+
+# Success
+
+See 2 case studies at [https://wiki.ipvtech.is/Case%20Studies](https://wiki.ipvtech.is/Case%20Studies)
+
+ - Elderly worker
+ - Adult performer
+
+Fuerza [http://fuerza.is](http://fuerza.is) mobile app to help diagnose stalking/surveillance
+
+# Challenges
+
+Lack of data on technology and DV
+
+Lack of awareness that "cyber" stalking/harassment is trauma inducing like physical abuse
+
+Relevant tech help for victims
+
+
+# Thanks!
+
+\begin{center}
+\includegraphics[keepaspectratio,width=\textwidth, height=.8\textheight]{images/thankyou_img}
+\end{center}
\ No newline at end of file


Property changes on: projects/presentations/2014-03-19-MIT-codesign-presentation.txt
___________________________________________________________________
Added: svn:eol-style
   + native
Added: svn:mime-type
   + text/plain

Added: projects/presentations/2014-04-03-CivilRightsDefenders-Workshop.pdf
===================================================================
(Binary files differ)


Property changes on: projects/presentations/2014-04-03-CivilRightsDefenders-Workshop.pdf
___________________________________________________________________
Added: svn:mime-type
   + application/octet-stream

Added: projects/presentations/2014-04-03-CivilRightsDefenders-Workshop.txt
===================================================================
--- projects/presentations/2014-04-03-CivilRightsDefenders-Workshop.txt	                        (rev 0)
+++ projects/presentations/2014-04-03-CivilRightsDefenders-Workshop.txt	2014-04-04 10:52:19 UTC (rev 26691)
@@ -0,0 +1,182 @@
+% Civil Rights Defenders, Defender's Days
+% Andrew Lewman andrew at torproject.org
+% 03 April 2014
+
+# Crash course
+
+ - Anonymity Online
+ - Internet Freedom
+ - Tor and Tails
+ - Download Tor Browser & Use it
+ - Try tails (for non-Macs)
+ - Try Orbot, Firefox, Proxymob
+
+# Who is this guy?
+
+501(c)(3) non-profit organization dedicated to the research and development of technologies for online anonymity and privacy
+
+[https://www.torproject.org](https://www.torproject.org)
+
+\begin{center}
+\includegraphics[keepaspectratio,width=\textwidth, height=.8\textheight]{images/2009-oval_sticker_new}
+\end{center}
+
+# Who wants anonymity online?
+
+\parbox{7cm}{\sloppy \setbeamercolor{background}[\includegraphics[scale=0.35]{./images/anonymousman}}
+\parbox{3cm}{\sloppy
+\begin{itemize}
+\begin{small}
+\item Normal people
+\item Law Enforcement
+\item Human Rights Activists
+\item Business Execs
+\item Militaries
+\item Abuse Victims
+\end{small}
+\end{itemize}
+}
+
+# How many people want anonymity?
+
+No idea. We're an anonymity system.
+
+However, the National Science Foundation has funded us to learn more:
+
+[https://metrics.torproject.org/](https://metrics.torproject.org/)
+
+# Tor hides communication patterns by relaying data through volunteer servers
+
+  \begin{center}
+    \begin{overlayarea}{9cm}{6cm}
+    \only<1>{\includegraphics[width=9cm]{./images/tor-network}}
+    \only<2>{\includegraphics[width=9cm]{./images/tor-safe-selection}}
+    \only<3>{\includegraphics[width=9cm]{./images/tor-safe-path}}
+    \only<4>{\includegraphics[width=9cm]{./images/tor-keys1}}
+    \end{overlayarea}
+    \flushright
+    \tiny Diagram: Robert Watson
+  \end{center}
+
+# Internet Freedom
+
+> Governments of the Industrial World, you weary giants of flesh and steel, I come from Cyberspace, the new home of Mind. On behalf of the future, I ask you of the past to leave us alone. You are not welcome among us. You have no sovereignty where we gather.
+
+>	— John Perry Barlow, "A Declaration of the Independence of Cyberspace"
+
+>		February 8, 1996
+
+# ...applied theory...
+\begin{center}
+\includegraphics<1>[keepaspectratio,width=\textwidth, height=.8\textheight]{./images/2011-06-08-china-net-censorship-piracy-porn-crop}
+\includegraphics<2>[keepaspectratio,width=\textwidth, height=.8\textheight]{./images/cropped-saudi-arabia-filter-message}
+\includegraphics<3>[keepaspectratio,width=\textwidth, height=.8\textheight]{./images/wikipedia-internet-blackholes.pdf}
+\includegraphics<4>[keepaspectratio,width=\textwidth, height=.8\textheight]{./images/procera-evolved-dpi}
+\includegraphics<5>[keepaspectratio,width=\textwidth, height=.8\textheight]{./images/2011-10-arstechnica-major-isps-usa-6strikes}
+\includegraphics<6>[keepaspectratio,width=\textwidth, height=.8\textheight]{./images/iran-ssl-dpi-26-seconds-to-death}
+\includegraphics<7>[keepaspectratio,width=\textwidth, height=.8\textheight]{./images/2009-knowprivacy-report-webbug-domains}
+\includegraphics<8>[keepaspectratio,width=\textwidth, height=.8\textheight]{./images/dataflow-futureprivacychart}
+\end{center}
+
+# ...spring is in the air...
+\begin{center}
+\includegraphics[[keepaspectratio,width=\textwidth, height=.8\textheight]{./images/paco-primera-pagina-oleo-lienzo-110-x-150-cms-2008-red}
+\end{center}
+
+# An example from Iran
+\begin{center}
+\includegraphics<1>[keepaspectratio,width=\textwidth, height=.8\textheight]{./images/2014-02-17-iranian-circumvention-tools.png}
+\end{center}
+
+# Software
+
+We write a lot of free software.
+
+About half is GPLv2 and the other half 3-Clause BSD.
+
+# Software
+
+We write in C, C++, python, ruby, shell, javascript, java, perl, and whatever else I forgot.
+
+All our code is available at Tor's gitweb, https://gitweb.torproject.org
+
+or our old svn server, https://svn.torproject.org/.
+
+# Software - People
+
+33 core people. 6 female and 27 male.
+
+12 countries. Virtual team, virtual office.
+
+we talk via email, IRC, and XMPP.
+
+5,000+ volunteers, 85 countries.
+
+See what we've done in the past few years in our 2012 Annual Report
+
+[https://www.torproject.org/about/findoc/2012-TorProject-Annual-Report.pdf](https://www.torproject.org/about/findoc/2012-TorProject-Annual-Report.pdf)
+
+# Software - Products
+
+We focus on six main products:
+
+ - tor browser, [https://www.torproject.org/projects/torbrowser](https://www.torproject.org/projects/torbrowser)
+ - arm, [http://www.atagar.com/arm/](http://www.atagar.com/arm/)
+ - atlas/compass/metrics, https://(atlas|compass|metrics).torproject.org
+ - Pluggable Transpors, [https://www.torproject.org/docs/pluggable-transports.html.en](https://www.torproject.org/docs/pluggable-transports.html.en)
+ - tor cloud, [https://cloud.torproject.org](https://cloud.torproject.org) and
+ - tor itself.
+
+# Software - Tor Ecosystem
+
+Growing ecosystem of products:
+
+ - tails, [https://tails.boum.org](https://tails.boum.org)
+ - orbot, [https://guardianproject.info](https://guardianproject.info)
+ - torchat, [https://github.com/prof7bit/TorChat](https://github.com/prof7bit/TorChat)
+ - TorTV, [http://www.dyne.org/software/tortv/](http://www.dyne.org/software/tortv/)
+ - Torouter, [https://trac.torproject.org/projects/tor/wiki/doc/Torouter](https://trac.torproject.org/projects/tor/wiki/doc/Torouter)
+ - Onion Browser, [https://mike.tig.as/onionbrowser/](https://mike.tig.as/onionbrowser/)
+
+# Anonymous Operating System - Tails
+
+Tails is a live DVD or live USB that aims at preserving your privacy and anonymity.
+
+It's based on Debian Stable.
+
+# Anonymous Operating System - Tails
+
+It's used in 94 countries with an average client boot seen every 24 seconds around the clock.
+
+We sponsor Tails.
+
+We're doing a bug bounty program. This will fix a lot of bugs/feature requests in upstream.
+
+# Tails
+
+\includegraphics[keepaspectratio,width=\textwidth, height=.8\textheight]{./images/2013-02-19-tails-bootscreen.png}
+
+# Company
+
+The Tor Project, Inc runs on free software.
+
+We believe in transparency and sharing. Our code, designs, and content are all freely licensed (3-Clause BSD, GPL, or CC-BY-3.0)
+
+We publish our tickets, discussions, and contract details with the world on our wiki, [https://wiki.torproject.org](https://wiki.torproject.org).
+
+# Thanks!
+
+\begin{center}
+\includegraphics[keepaspectratio,width=\textwidth, height=.8\textheight]{images/thankyou_img}
+\end{center}
+
+Visit [https://www.torproject.org](https://www.torproject.org) for more information, links, and ideas.
+
+# Copyrights
+\begin{itemize}
+\item applied theory, first image: Reporters without Borders, http://www.rsf.org
+\item applied theory, second image: Tor Project, Inc, https://blog.torproject.org/blog/update-internet-censorship-iran
+\item applied theory, third image: Information Week,2011-04-09, http://www.informationweek.com/news/security/attacks/229400850
+\item applied theory, fourth image: Al Jazeera, February 2011
+\item spring is in the air, Paco Pomet, http://pacopomet.wordpress.com/
+\end{itemize}


Property changes on: projects/presentations/2014-04-03-CivilRightsDefenders-Workshop.txt
___________________________________________________________________
Added: svn:eol-style
   + native
Added: svn:mime-type
   + text/plain

Added: projects/presentations/images/2014-02-17-iranian-circumvention-tools.png
===================================================================
(Binary files differ)


Property changes on: projects/presentations/images/2014-02-17-iranian-circumvention-tools.png
___________________________________________________________________
Added: svn:mime-type
   + image/png



More information about the tor-commits mailing list