\begin{frame}[t]{Privacy concerns} \begin{columns} \begin{column}{0.65\textwidth} \begin{figure} \includegraphics[width=\textwidth]{img/scandals.jpg} \end{figure} \end{column} \begin{column}{0.35\textwidth} \begin{center} \vspace{3cm} \Large Privacy issues have many \underline{different faces} \end{center} \end{column} \end{columns} \end{frame} \begin{frame} \frametitle{The impact of our technological choices} %\begin{figure}[h] \Large The underlying Internet \underline{infrastructure}\\allows the collection\\of \underline{communication metadata}. \vspace{1cm} \tikzsetnextfilename{actors} \begin{tikzpicture}[scale=1] \node (cp1) at (0,0) {\includegraphics[scale=0.26]{img/computer.pdf}}; \node[below = 0cm of cp1] (cp1t) {Alice}; \node (np1) at (2.4,0) {\includegraphics[scale=1]{img/network-provider.pdf}}; \node[below = 0.1cm of np1, text width = 2cm,align=center] (cp1t) {Network Provider}; \node (sp) at (4.75,0) {\includegraphics[scale=1]{img/service-provider.pdf}}; \node[below = 0.1cm of sp, text width = 2cm,align=center] (spt) {Service Provider}; \node (np2) at (7.1,0) {\includegraphics[scale=1]{img/network-provider.pdf}}; \node[below = 0.1cm of np2, text width = 2cm,align=center] (spt) {Network Provider}; \node (cp2) at (9.5,0) {\includegraphics[scale=0.26]{img/computer.pdf}}; \node[below = 0cm of cp2] (cp2t) {Bob}; \draw[<->, solid, black, line width=1mm] (cp1) edge (np1); \draw[<->, solid, black, line width=1mm] (np1) edge (sp); \draw[<->, solid, black, line width=1mm] (sp) edge (np2); \draw[<->, solid, black, line width=1mm] (np2) edge (cp2); \node[above=-1.2cm of np1] (snp1) {\includegraphics[scale=0.10]{img/eye.pdf}}; \node[above=-1.2cm of sp] (ssp) {\includegraphics[scale=0.10]{img/eye.pdf}}; \node[above=-1.2cm of np2] (snp2) {\includegraphics[scale=0.10]{img/eye.pdf}}; \end{tikzpicture} %\end{figure} \end{frame} \begin{frame}{Building a privacy-aware network} \tikzsetnextfilename{anonintro2} \begin{tikzpicture}[scale=1] \node (cp1) at (0,0) {\includegraphics[scale=0.26]{img/computer.pdf}}; \node[below = 0cm of cp1] (cp1t) {Alice}; \node (np1) at (2.4,0) {\includegraphics[scale=1]{img/network-provider.pdf}}; \node[below = 0.1cm of np1, text width = 2cm,align=center] (cp1t) {Network Provider}; \draw[<->, solid, black, line width=1mm] (cp1) edge (np1); \node (anet) at (4.75,0) {\includegraphics[scale=0.16]{img/tor.pdf}}; \draw[<->, solid, black, line width=1mm] (np1) edge (anet); \node[below = 0cm of anet, text width = 2cm,align=center] (anett) {Tor}; \node (qs) at (7,0) {\includegraphics[scale=1.3]{img/question.pdf}}; \draw[<->, solid, black, line width=1mm] (anet) edge (qs); \node[below = 0cm of qs, text width = 2cm,align=center] (qst) {Unknown\\Destination}; \node[above=-1.4cm of np1] (cloud1) {\includegraphics[scale=0.8]{img/cloud.pdf}}; \end{tikzpicture} \begin{center} \normalsize \emph{"[A] system to hide who a participant communicates with [...] in spite of an \underline{unsecured telecommunication system}"}~\footnotemark[1] \Large With 2M+ users, \underline{Tor} is the biggest privacy-aware network \end{center} \footnotetext[1]{\fullcite{chaum1981untraceable}} \end{frame} \begin{frame}{Tor's limitation} \Large \underline{Performance} hinders Tor's adoption \begin{columns} \begin{column}{0.5\textwidth} \vspace{0.5cm} \begin{figure} \includegraphics[width=\textwidth]{img/fast.png} \end{figure} \end{column} \begin{column}{0.5\textwidth} \vspace{1cm} \begin{figure} \includegraphics[width=\textwidth]{img/torb.png} \end{figure} \end{column} \end{columns} \end{frame}