1 / 10

Privacy Technologies ( H09L2A )

Privacy Technologies ( H09L2A ). Claudia Diaz ESAT / COSIC. Privacy as protection from surveillance. UPSTREAM Internet-scale traffic analysis (optic fiber) PRISM

louie
Télécharger la présentation

Privacy Technologies ( H09L2A )

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Privacy Technologies (H09L2A) Claudia Diaz ESAT / COSIC

  2. Privacy as protection from surveillance • UPSTREAM • Internet-scale traffic analysis (optic fiber) • PRISM • “Collection directly from the servers of these U.S. Service Providers: Microsoft, Yahoo, Google, Facebook, PalTalk, AOL, Skype, YouTube, Apple.” • Hacking into Belgacom (GCHQ)

  3. Privacy technologies • Content: • Communication privacy: Tor, P2Pdarknets • Advanced crypto protocols • Database privacy • Location privacy • Privacy in social networks

  4. Privacy not only about counter-surveillance • Privacy as decision-making: e.g., what you decide to share with someone • Privacy practices in social media • Data anonymization • Legal, philosophical, ethical aspects of online privacy • “I have nothing to hide” argument • Data protection and Human Rights legislation • Relationship to free speech and to censorship • Identity construction

  5. Objectives • Identify privacy concerns in a system • Relate those concerns to technical design choices • Understand the principles underlying the design of privacy technologies, and their limitations • learn to critically look at technology • Analyze privacy technologies and evaluate their vulnerabilities with respect to different adversary models • Develop awareness and informed opinions about online privacy • Learn to read, critically review, and present scientific articles

  6. Exercises: 4 sessions • Session 1: Problem-solving exercise • Session 2: Role-playing debate • Topic: social relevance and real world implications of privacy issues. • Sessions 3 & 4: Critical review, presentation and discussion of research articles • Going more in depth into the technology • Topics: • anonymous communications (e.g., Tor) and protection against traffic analysis • data (de-)anonymization and database privacy. 

  7. Evaluation • Exam: 14pt • Open book • Written with oral examination • Exercises: 6pt • [2 pt] Reviews of research articles • [1 pt]Presentation(s) of research articles • [1.5 pt] Problem solving exercise session • [1.5 pt] Debate

  8. Type of classes • Small class (likely~10 people) • Unless all of you decide to register  • Some 1st year PhD students also follow the course • You can also learn from them and not only from me! • Highly interactive • Questions and discussion

  9. Practical info • Language: English • Semester: First • Location: ESAT 01.60 • Timing • Lectures (9 lectures of 2 hours): Wednesdays from 16h00 to 18h00 • Exercises (4 sessions of 1.5 hours): Oct 24 (16h), Nov 21 (16h), Dec 2 (8h), Dec 16 (8h) • Exam: January 10 (morning) • Need permission from program director, can be chosen as “further specialization” (verderespecialisatie) • Detailed ECTS fiche: • http://onderwijsaanbod.kuleuven.be/syllabi/e/H09L2AE.htm • Contact: Claudia Diaz • claudia.diaz@esat.kuleuven.be • http://homes.esat.kuleuven.be/~cdiaz/

More Related