nsdi-presentation/introduction.tex

92 lines
3.5 KiB
TeX
Raw Normal View History

2022-03-14 14:59:17 +00:00
\begin{frame}[t]{Privacy concerns}
\begin{figure}
\includegraphics[width=0.8\textwidth]{img/scandals.jpg}
\end{figure}
\begin{center}
\Large Privacy issues have lot of \underline{different faces}
\end{center}
\end{frame}
\begin{frame}
\frametitle{The impact of our technological choices}
\begin{figure}[h]
\tikzsetnextfilename{actors}
\begin{tikzpicture}[scale=1]
\node (cp1) at (0,0) {\includegraphics[scale=0.26]{img/computer.pdf}};
\node[below = 0cm of cp1] (cp1t) {Alice};
\node (np1) at (2.4,0) {\includegraphics[scale=1]{img/network-provider.pdf}};
\node[below = 0.1cm of np1, text width = 2cm,align=center] (cp1t) {Network Provider};
\node (sp) at (4.75,0) {\includegraphics[scale=1]{img/service-provider.pdf}};
\node[below = 0.1cm of sp, text width = 2cm,align=center] (spt) {Service Provider};
\node (np2) at (7.1,0) {\includegraphics[scale=1]{img/network-provider.pdf}};
\node[below = 0.1cm of np2, text width = 2cm,align=center] (spt) {Network Provider};
\node (cp2) at (9.5,0) {\includegraphics[scale=0.26]{img/computer.pdf}};
\node[below = 0cm of cp2] (cp2t) {Bob};
\draw[<->, solid, black, line width=1mm] (cp1) edge (np1);
\draw[<->, solid, black, line width=1mm] (np1) edge (sp);
\draw[<->, solid, black, line width=1mm] (sp) edge (np2);
\draw[<->, solid, black, line width=1mm] (np2) edge (cp2);
\node[above=-1.2cm of np1] (snp1) {\includegraphics[scale=0.10]{img/eye.pdf}};
\node[above=-1.2cm of sp] (ssp) {\includegraphics[scale=0.10]{img/eye.pdf}};
\node[above=-1.2cm of np2] (snp2) {\includegraphics[scale=0.10]{img/eye.pdf}};
\end{tikzpicture}
\vspace{1cm}
\Large The underlying Internet \underline{infrastructure} allows the collection of communication metadata.
\end{figure}
\end{frame}
\begin{frame}{Building a privacy-aware network}
\tikzsetnextfilename{anonintro2}
\begin{tikzpicture}[scale=1]
\node (cp1) at (0,0) {\includegraphics[scale=0.26]{img/computer.pdf}};
\node[below = 0cm of cp1] (cp1t) {Alice};
\node (np1) at (2.4,0) {\includegraphics[scale=1]{img/network-provider.pdf}};
\node[below = 0.1cm of np1, text width = 2cm,align=center] (cp1t) {Network Provider};
\draw[<->, solid, black, line width=1mm] (cp1) edge (np1);
\node (anet) at (4.75,0) {\includegraphics[scale=0.16]{img/tor.pdf}};
\draw[<->, solid, black, line width=1mm] (np1) edge (anet);
\node[below = 0cm of anet, text width = 2cm,align=center] (anett) {Tor};
\node (qs) at (9.5,0) {\includegraphics[scale=1.3]{img/question.pdf}};
\draw[<->, solid, black, line width=1mm] (anet) edge (qs);
\node[below = 0cm of qs, text width = 2cm,align=center] (qst) {Unknown\\Destination};
\node[above=-1.4cm of np1] (cloud1) {\includegraphics[scale=0.8]{img/cloud.pdf}};
\end{tikzpicture}
\begin{center}
\normalsize \emph{"[A] system to hide who a participant communicates with [...] in spite of an \underline{unsecured telecommunication system}"}~\footnotemark[1]
\Large With 2M+ users, \underline{Tor} is the biggest privacy-aware network
\end{center}
\footnotetext[1]{\fullcite{chaum1981untraceable}}
\end{frame}
\begin{frame}{Tor's limitation}
\begin{columns}
\begin{column}{0.5\textwidth}
\begin{figure}
\includegraphics[width=\textwidth]{img/fast.png}
\end{figure}
\end{column}
\begin{column}{0.5\textwidth}
\begin{figure}
\includegraphics[width=\textwidth]{img/torb.png}
\end{figure}
\end{column}
\end{columns}
\begin{center}
\Large \underline{Performance}
hinders Tor's adoption
\end{center}
\end{frame}