diff --git a/donar.tex b/donar.tex index d5e35bd..3c78df4 100644 --- a/donar.tex +++ b/donar.tex @@ -1,5 +1,5 @@ -\section{Tor performances \\ \& VoIP requirements} +%\section{Tor performances \\ \& VoIP requirements} \begin{frame}{What are voice calling requirements?} \tikzsetnextfilename{rtapp} @@ -9,8 +9,11 @@ \draw[->, solid, black,line width=1mm] (micro) edge node[sloped,anchor=north,text width=6.5cm]{ \Large Call Requirements \\ \normalsize - \textbf{Delay:} $99^{th}$-perc delay $<$ 360 ms \\ - \textbf{Drop:} Dropped calls $<$ 2\% \\ + \underline{Single call}\\ + \textbf{Interactive:} $99^{th}$-perc delay $<$ 360 ms\\ + \underline{System}\\ + \textbf{Acceptable:} $>$ 80\% \\ + \textbf{Drop:} $<$ 2\% \\ \textbf{Duration:} 5 min avg, up to 90 min \\ \textbf{Anonymity:} 2-way anonymity\\ \small Alice is anonymous to Bob,\\Bob is anonymous to Alice @@ -19,7 +22,6 @@ \begin{center} - \Large \includegraphics[scale=0.6]{img/question.pdf} \color{blue} Which Tor configuration should we use? \\ \Large \includegraphics[scale=0.6]{img/question.pdf} \color{blue} Can Tor satisfy these requirements? \end{center} \end{frame} @@ -126,7 +128,6 @@ Each configuration is repeated 64 times\\ \underline{Questions}\\ Do Onion Service meet latency requirements?\\ Do Onion Service are stable enough?\\ -Get insights on Onion Services' latency \end{frame} @@ -156,12 +157,15 @@ Get insights on Onion Services' latency \includegraphics[width=0.8\textwidth]{img/x1.pdf} \end{column} \begin{column}{0.5\textwidth} -\normalsize \underline{Acceptable 5-minute calls}\\ + +\vspace{0.5cm} + +\normalsize \underline{5-minute calls $<$ 360ms}\\ \Large \textcolor{red}{9\%} \vspace{0.5cm} -\normalsize \underline{Acceptable 90-minute calls}\\ +\normalsize \underline{90-minute calls $<$ 360ms}\\ \Large \textcolor{red}{3\%} \end{column} @@ -172,7 +176,7 @@ Get insights on Onion Services' latency \end{center} \end{frame} -\begin{frame}{Even with onion service using 2-hop circuits?} +\begin{frame}{What is we use 2-hop circuits?} \tikzsetnextfilename{petitschema2} \begin{tikzpicture} @@ -197,12 +201,16 @@ Get insights on Onion Services' latency \includegraphics[width=0.8\textwidth]{img/x2.pdf} \end{column} \begin{column}{0.5\textwidth} -\normalsize \underline{Acceptable 5-minute calls}\\ + +\vspace{0.5cm} + + +\normalsize \underline{5-minute calls $<$ 360ms}\\ \Large \textcolor{red}{44\%} \vspace{0.5cm} -\normalsize \underline{Acceptable 90-minute calls}\\ +\normalsize \underline{90-minute calls $<$ 360ms}\\ \Large \textcolor{red}{23\%} \end{column} @@ -254,11 +262,15 @@ Get insights on Onion Services' latency \includegraphics[width=0.8\textwidth]{img/x3.pdf} \end{column} \begin{column}{0.5\textwidth} + +\vspace{0.3cm} + + \normalsize \underline{Dropped 5-minute calls}\\ \Large \textcolor{red}{5\%} \normalsize for 2 hops \\ \Large \textcolor{red}{10\%} \normalsize for 3 hops -\vspace{0.5cm} +\vspace{0.3cm} \normalsize \underline{Dropped 90-minute calls}\\ \Large \textcolor{red}{10\%} \normalsize for 2 hops\\ @@ -268,7 +280,7 @@ Get insights on Onion Services' latency \end{columns} \begin{center} -\Large \includegraphics[scale=0.4]{img/stop.pdf} \color{red} Calls are dropped too often +\Large \includegraphics[scale=0.4]{img/stop.pdf} \color{red} Calls are dropped too often ($>$ 2\%) \end{center} \end{frame} @@ -556,7 +568,7 @@ Alternate + Ranking (6/12 active paths) \textbf{Donar Double Send}\\ Double Send + Ranking (6/12 active paths) -\scriptsize Implemented in \texttt{C}, notable API/lib: \texttt{epoll}, \texttt{gstreamer}, \texttt{glib} +\scriptsize Implemented in \texttt{C}, notable API/lib: \texttt{epoll}, \texttt{gstreamer}, \texttt{glib}\\ \normalsize @@ -666,9 +678,9 @@ Double Send + Ranking (6/12 active paths) \end{center} \end{frame} -\section{Future work \& Conclusion} - +\section{Conclusion} +\iffalse \begin{frame}{Future Work} \underline{We plan to evaluate} @@ -691,12 +703,15 @@ Double Send + Ranking (6/12 active paths) To make traffic correlation harder \end{frame} +\fi \begin{frame}{Conclusion} \underline{We contributed} \Large Foundations \\ -\normalsize to build a Tor softphone with stable latency +\normalsize to build a Tor softphone with stable latency \\ +over the existing Tor network \\ +\scriptsize Source code: github.com/CloudLargeScale-UCLouvain/Donar \Large Insights \\ \normalsize diff --git a/img/fastl.png b/img/fastl.png new file mode 100644 index 0000000..49663d0 Binary files /dev/null and b/img/fastl.png differ diff --git a/img/proxy.png b/img/proxy.png new file mode 100644 index 0000000..b402f56 Binary files /dev/null and b/img/proxy.png differ diff --git a/img/torb2.png b/img/torb2.png new file mode 100644 index 0000000..5f5a756 Binary files /dev/null and b/img/torb2.png differ diff --git a/introduction.tex b/introduction.tex index 8963295..166ecef 100644 --- a/introduction.tex +++ b/introduction.tex @@ -1,98 +1,18 @@ -\iffalse -\begin{frame}[t]{Privacy concerns} - \begin{columns} - \begin{column}{0.65\textwidth} - \begin{figure} - \includegraphics[width=\textwidth]{img/scandals.jpg} - \end{figure} - \end{column} - \begin{column}{0.35\textwidth} - \begin{center} - \vspace{3cm} - \Large Privacy issues have many \underline{different faces} - \end{center} - \end{column} - \end{columns} -\end{frame} +\begin{frame}{Tor's limitations} -\begin{frame} - \frametitle{The impact of our technological choices} - - %\begin{figure}[h] - \Large The underlying Internet \underline{infrastructure}\\allows the collection\\of \underline{communication metadata}. - - \vspace{1cm} - - \tikzsetnextfilename{actors} - \begin{tikzpicture}[scale=1] - \node (cp1) at (0,0) {\includegraphics[scale=0.26]{img/computer.pdf}}; - \node[below = 0cm of cp1] (cp1t) {Alice}; - \node (np1) at (2.4,0) {\includegraphics[scale=1]{img/network-provider.pdf}}; - \node[below = 0.1cm of np1, text width = 2cm,align=center] (cp1t) {Network Provider}; - \node (sp) at (4.75,0) {\includegraphics[scale=1]{img/service-provider.pdf}}; - \node[below = 0.1cm of sp, text width = 2cm,align=center] (spt) {Service Provider}; - \node (np2) at (7.1,0) {\includegraphics[scale=1]{img/network-provider.pdf}}; - \node[below = 0.1cm of np2, text width = 2cm,align=center] (spt) {Network Provider}; - \node (cp2) at (9.5,0) {\includegraphics[scale=0.26]{img/computer.pdf}}; - \node[below = 0cm of cp2] (cp2t) {Bob}; - \draw[<->, solid, black, line width=1mm] (cp1) edge (np1); - \draw[<->, solid, black, line width=1mm] (np1) edge (sp); - \draw[<->, solid, black, line width=1mm] (sp) edge (np2); - \draw[<->, solid, black, line width=1mm] (np2) edge (cp2); - \node[above=-1.2cm of np1] (snp1) {\includegraphics[scale=0.10]{img/eye.pdf}}; - \node[above=-1.2cm of sp] (ssp) {\includegraphics[scale=0.10]{img/eye.pdf}}; - \node[above=-1.2cm of np2] (snp2) {\includegraphics[scale=0.10]{img/eye.pdf}}; - \end{tikzpicture} - - - %\end{figure} -\end{frame} - -\begin{frame}{Building a privacy-aware network} - \tikzsetnextfilename{anonintro2} - \begin{tikzpicture}[scale=1] - \node (cp1) at (0,0) {\includegraphics[scale=0.26]{img/computer.pdf}}; - \node[below = 0cm of cp1] (cp1t) {Alice}; - \node (np1) at (2.4,0) {\includegraphics[scale=1]{img/network-provider.pdf}}; - \node[below = 0.1cm of np1, text width = 2cm,align=center] (cp1t) {Network Provider}; - \draw[<->, solid, black, line width=1mm] (cp1) edge (np1); - - \node (anet) at (4.75,0) {\includegraphics[scale=0.16]{img/tor.pdf}}; - \draw[<->, solid, black, line width=1mm] (np1) edge (anet); - \node[below = 0cm of anet, text width = 2cm,align=center] (anett) {Tor}; - \node (qs) at (7,0) {\includegraphics[scale=1.3]{img/question.pdf}}; - \draw[<->, solid, black, line width=1mm] (anet) edge (qs); - \node[below = 0cm of qs, text width = 2cm,align=center] (qst) {Unknown\\Destination}; - \node[above=-1.4cm of np1] (cloud1) {\includegraphics[scale=0.8]{img/cloud.pdf}}; - \end{tikzpicture} - \begin{center} - \normalsize \emph{"[A] system to hide who a participant communicates with [...] in spite of an \underline{unsecured telecommunication system}"}~\footnotemark[1] - - \Large With 2M+ users, \underline{Tor} is the biggest privacy-aware network - \end{center} - - - - \footnotetext[1]{\fullcite{chaum1981untraceable}} -\end{frame} -\fi - -\begin{frame}{Tor's limitation} - - \Large \underline{Performance} - hinders Tor's adoption + \Large \underline{High latency} hinders Tor's adoption\\for \underline{interactive} applications like VoIP \begin{columns} \begin{column}{0.5\textwidth} \vspace{0.5cm} \begin{figure} - \includegraphics[width=\textwidth]{img/fast.png} + \includegraphics[width=\textwidth]{img/fastl.png} \end{figure} \end{column} \begin{column}{0.5\textwidth} \vspace{1cm} \begin{figure} - \includegraphics[width=\textwidth]{img/torb.png} + \includegraphics[width=\textwidth]{img/torb2.png} \end{figure} \end{column} \end{columns}