91 lines
3.5 KiB
TeX
91 lines
3.5 KiB
TeX
\begin{frame}[t]{Privacy concerns}
|
|
\begin{figure}
|
|
\includegraphics[width=0.8\textwidth]{img/scandals.jpg}
|
|
\end{figure}
|
|
\begin{center}
|
|
\Large Privacy issues have lot of \underline{different faces}
|
|
\end{center}
|
|
\end{frame}
|
|
|
|
\begin{frame}
|
|
\frametitle{The impact of our technological choices}
|
|
|
|
\begin{figure}[h]
|
|
\tikzsetnextfilename{actors}
|
|
\begin{tikzpicture}[scale=1]
|
|
\node (cp1) at (0,0) {\includegraphics[scale=0.26]{img/computer.pdf}};
|
|
\node[below = 0cm of cp1] (cp1t) {Alice};
|
|
\node (np1) at (2.4,0) {\includegraphics[scale=1]{img/network-provider.pdf}};
|
|
\node[below = 0.1cm of np1, text width = 2cm,align=center] (cp1t) {Network Provider};
|
|
\node (sp) at (4.75,0) {\includegraphics[scale=1]{img/service-provider.pdf}};
|
|
\node[below = 0.1cm of sp, text width = 2cm,align=center] (spt) {Service Provider};
|
|
\node (np2) at (7.1,0) {\includegraphics[scale=1]{img/network-provider.pdf}};
|
|
\node[below = 0.1cm of np2, text width = 2cm,align=center] (spt) {Network Provider};
|
|
\node (cp2) at (9.5,0) {\includegraphics[scale=0.26]{img/computer.pdf}};
|
|
\node[below = 0cm of cp2] (cp2t) {Bob};
|
|
\draw[<->, solid, black, line width=1mm] (cp1) edge (np1);
|
|
\draw[<->, solid, black, line width=1mm] (np1) edge (sp);
|
|
\draw[<->, solid, black, line width=1mm] (sp) edge (np2);
|
|
\draw[<->, solid, black, line width=1mm] (np2) edge (cp2);
|
|
\node[above=-1.2cm of np1] (snp1) {\includegraphics[scale=0.10]{img/eye.pdf}};
|
|
\node[above=-1.2cm of sp] (ssp) {\includegraphics[scale=0.10]{img/eye.pdf}};
|
|
\node[above=-1.2cm of np2] (snp2) {\includegraphics[scale=0.10]{img/eye.pdf}};
|
|
\end{tikzpicture}
|
|
|
|
\vspace{1cm}
|
|
\Large The underlying Internet \underline{infrastructure} allows the collection of communication metadata.
|
|
|
|
\end{figure}
|
|
\end{frame}
|
|
|
|
\begin{frame}{Building a privacy-aware network}
|
|
\tikzsetnextfilename{anonintro2}
|
|
\begin{tikzpicture}[scale=1]
|
|
\node (cp1) at (0,0) {\includegraphics[scale=0.26]{img/computer.pdf}};
|
|
\node[below = 0cm of cp1] (cp1t) {Alice};
|
|
\node (np1) at (2.4,0) {\includegraphics[scale=1]{img/network-provider.pdf}};
|
|
\node[below = 0.1cm of np1, text width = 2cm,align=center] (cp1t) {Network Provider};
|
|
\draw[<->, solid, black, line width=1mm] (cp1) edge (np1);
|
|
|
|
\node (anet) at (4.75,0) {\includegraphics[scale=0.16]{img/tor.pdf}};
|
|
\draw[<->, solid, black, line width=1mm] (np1) edge (anet);
|
|
\node[below = 0cm of anet, text width = 2cm,align=center] (anett) {Tor};
|
|
\node (qs) at (9.5,0) {\includegraphics[scale=1.3]{img/question.pdf}};
|
|
\draw[<->, solid, black, line width=1mm] (anet) edge (qs);
|
|
\node[below = 0cm of qs, text width = 2cm,align=center] (qst) {Unknown\\Destination};
|
|
\node[above=-1.4cm of np1] (cloud1) {\includegraphics[scale=0.8]{img/cloud.pdf}};
|
|
\end{tikzpicture}
|
|
\begin{center}
|
|
\normalsize \emph{"[A] system to hide who a participant communicates with [...] in spite of an \underline{unsecured telecommunication system}"}~\footnotemark[1]
|
|
|
|
\Large With 2M+ users, \underline{Tor} is the biggest privacy-aware network
|
|
\end{center}
|
|
|
|
|
|
|
|
\footnotetext[1]{\fullcite{chaum1981untraceable}}
|
|
\end{frame}
|
|
|
|
|
|
\begin{frame}{Tor's limitation}
|
|
|
|
\begin{columns}
|
|
\begin{column}{0.5\textwidth}
|
|
\begin{figure}
|
|
\includegraphics[width=\textwidth]{img/fast.png}
|
|
\end{figure}
|
|
\end{column}
|
|
\begin{column}{0.5\textwidth}
|
|
\begin{figure}
|
|
\includegraphics[width=\textwidth]{img/torb.png}
|
|
\end{figure}
|
|
\end{column}
|
|
\end{columns}
|
|
|
|
\begin{center}
|
|
\Large \underline{Performance}
|
|
hinders Tor's adoption
|
|
\end{center}
|
|
|
|
\end{frame}
|
|
|