InfoCoBuild

Privacy in the Internet (without Giving Up Everything Else)

By David Naylor. Using the Internet inherently entails privacy risks. Each packet, potentially carrying information that users would rather keep private, is exposed to a network infrastructure operated by a number of third parties the user may not trust and likely cannot even identify. In some cases, the user may not even trust the recipient.

Techniques exist to protect user privacy, but they typically do so at the expense of other desirable properties. For example, anonymity services like Tor hide a packet's true sender, but weaken accountability by making it difficult for network administrators or law enforcement to track down malicious senders. Similarly, encryption hides application data from third parties, but prevents the use of middleboxes - devices that process packets in the network to improve performance (like caches) or security (like intrusion detection systems). In this talk, I'll present techniques for managing these "Privacy vs. X" conflicts, including a new network architecture that re-thinks basic networking building blocks like packet source addresses and new secure communication protocols that explicitly balance data privacy with the benefits of middleboxes.

Privacy in the Internet (without Giving Up Everything Else)


Related Links
The Invisible Trail: Pervasive Tracking in a Connected Age
Franziska Roesner discusses recent studies at the UW that explore how advertisers, social media sites, and others invisibly track your browsing, and how smartphone applications are able to access your camera, location and other sensitive information in ways you may not expect.
Cybersecurity and Privacy and the Human Factors behind It
Society is dependent on networked computer systems and software for everything from running the smart grid that powers your house to social networking with your family and friends.
Living in a Cyber-Enabled World
An exploration of the state of software today, how we got to where we are, and what we shall need to do to shore up the foundations of a digital society that is increasingly built on sand.
Computer Viruses
Every so often there is a panic when computers succumb to viruses. The theory behind viruses is rather fun, and shows how bugs can disappear and become impossible to find.
Social Implications of Computing
A discussion-intensive course about the social implications of computing. Topics include electronic community, the changing nature of work, etc.
Introduction to Cryptography and Data Security
The lectures give a fairly comprehensive introduction to modern applied cryptography. Topics include: Advanced Encryption Standard (AES), Data Encryption Standard (DES), RSA Cryptosystem, etc.