Computers and Society Carnegie Mellon University Spring 2006 Cranor/Tongia/Farber 1 Regulating Online Speech.

Slides:



Advertisements
Similar presentations
The Internet and the Web
Advertisements

U.N. Human Rights Council Report of the Special Rapporteur on the promotion and protection of the right to freedom of opinion and expression.
Building web applications on top of encrypted data using Mylar Presented by Tenglu Liang Tai Liu.
1 Computer Networks: A Systems Approach, 5e Larry L. Peterson and Bruce S. Davie Chapter 8 Network Security Copyright © 2010, Elsevier Inc. All rights.
Publius A Robust, Tamper Evident, Censorship Resistant WWW Based Publishing System Marc Waldman NYU – CS Dept. Lorrie Cranor AT&T Research Aviel Rubin.
Lorrie Cranor AT&T Labs Avi Rubin AT&T Labs Marc Waldman
Publius: A robust, tamper-evident, censorship-resistant web publishing system By Waldman, Rubin, and Cranor Presented by Marco Barreno October 8th, 2003.
1 Lesson 14 Sharing Documents Computer Literacy BASICS: A Comprehensive Guide to IC 3, 3 rd Edition Morrison / Wells.
Chapter 7: The Web and 1 The Web and Chapter 7.
Censorship-Resistant Publishing Systems Marc Waldman Computer Science Department New York University.
Computers and Society Carnegie Mellon University Spring 2007 Cranor/Tongia 1 Regulating Online Speech Week.
Cryptography In Censorship Resistant Web Publishing Systems By Hema Hariharan Swati B Shah.
Chapter 9 - Control in Computerized Environment ATG 383 – Spring 2002.
Week 2 IBS 685. Static Page Architecture The user requests the page by typing a URL in a browser The Browser requests the page from the Web Server The.
Computers and Society Carnegie Mellon University Spring 2007 Cranor/Tongia 1 Regulating Online Speech / Privacy.
Privacy Policy, Law and Technology Carnegie Mellon University Fall 2007 Lorrie Cranor 1 Identity, Anonymity,
Internet – Part II. What is the World Wide Web? The World Wide Web is a collection of host machines, which deliver documents, graphics and multi-media.
Ethics and Policy issues in Computing Carnegie Mellon University Spring 2008 Tongia 1 Regulating.
Using the WWW in Teaching and Learning Barbara Watson Andrew Stansfield IT Service.
1 Copyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall. by Mary Anne Poatsy, Keith Mulbery, Eric Cameron, Jason Davidson, Rebecca Lawson,
 Proxy Servers are software that act as intermediaries between client and servers on the Internet.  They help users on private networks get information.
Internet Safety By: Caitlyn Stevenson. Information about Internet Safety  The internet is a huge deal, any child that can press a few letters on a keyboard.
Web-based Document Management System By Group 3 Xinyi Dong Matthew Downs Joshua Ferguson Sriram Gopinath Sayan Kole.
+ Connecting to the Web Week 7, Lecture A. + Midterm Basics Thursday February 28 during Class The lab Tuesday, February 26 is optional review Class on.
Club Presentation Press or left-click on mouse to advance to the next slide Welcome to ClubRunner ™ Discover a better way to communicate.
Networks and Security. Types of Attacks/Security Issues  Malware  Viruses  Worms  Trojan Horse  Rootkit  Phishing  Spyware  Denial of Service.
Psiphon Program By Amine Moubtasim.
INFORMATION TECHNOLOGY IN BUSINESS AND SOCIETY SESSION 7 – THE WEB SEAN J. TAYLOR.
OCLC Online Computer Library Center CONTENTdm ® Digital Collection Management Software Ron Gardner, OCLC Digital Services Consultant ICOLC Meeting April.
Internet Basics A management-level overview of the Internet, its architecture, capabilities, and protocols. Copyright 2011 SPMI / Online Development.
Privacy Policy, Law and Technology Carnegie Mellon University Fall 2004 Lorrie Cranor 1 Anonymity and Privacy Enhancing.
Web Browser Security Prepared By Mohammed EL-Batta Mohammed Soubih Supervised By Eng. Eman alajrami Explain Date 10. may University of Palestine.
CSU - DCE Internet Security... Privacy Overview - Fort Collins, CO Copyright © XTR Systems, LLC Setting Up & Using a Site Security Policy Instructor:
VCP Virtual Community Portal Bruxelles, February 19-20, 2004 Claudio Beltrame.
Security & Reputation protection or restriction?building or destroying? & Reputation helen goss
Chapter 8 Safeguarding the Internet. Firewalls Firewalls: hardware & software that are built using routers, servers and other software A point between.
Systems Analysis and Design in a Changing World, 6th Edition 1 Chapter 12 - Databases, Controls, and Security.
Freenet: A Distributed Anonymous Information Storage and Retrieval System Presenter: Chris Grier ECE 598nb Spring 2006.
Chapter 8 Browsing and Searching the Web. Browsing and Searching the Web FAQs: – What’s a Web page? – What’s a URL? – How does a browser work? – How do.
Secure Distributed Document Sharing System Dukyun Nam, Seunghyun Han, CDS&N Lab. ICU.
Chapter 18 Technology in the Workplace Section 18.2 Internet Basics.
Chapter 8 Browsing and Searching the Web. 2Practical PC 5 th Edition Chapter 8 Getting Started In this Chapter, you will learn: − What is a Web page −
Evoting using collaborative clustering Justin Gray Osama Khaleel Joey LaConte Frank Watson.
Privacy Policy, Law and Technology Carnegie Mellon University Fall 2005 Lorrie Cranor 1 Identity, Anonymity, and.
COSC 513 Operating Systems Project Presentation: Internet Security Instructor: Dr. Anvari Student: Ying Zhou Spring 2003.
Module 8 : Configuration II Jong S. Bok
By Ben Smith. What is COICA? What effect it will have on the web? How does it work? How to prevent COICA from passing Summary.
Freenet “…an adaptive peer-to-peer network application that permits the publication, replication, and retrieval of data while protecting the anonymity.
Slides prepared by Cyndi Chie and Sarah Frye A Gift of Fire Third edition Sara Baase Chapter 3: Freedom of Speech.
11 MANAGING INTERNET EXPLORER CONNECTIONS AND SECURITY Chapter 12.
Chapter 8 Using the Web for Teaching and Learning.
InternetInternet ISYS 1050 K. Steere. What is the Internet? A collection of local, regional, national, and international computer networks that are linked.
Access The L Line The Express Line to Learning 2007 L Line L © Wiley Publishing All Rights Reserved.
One-way indexing for plausible deniability in censorship resistant storage Eugene Vasserman, Victor Heorhiadi, Nicholas Hopper, and Yongdae Kim.
1 Internet – The Good, the Bad, and the Ugly Module 4 Section 3.
Session 11: Cookies, Sessions ans Security iNET Academy Open Source Web Development.
Tutorial 1 Getting Started with Adobe Dreamweaver CS5.
Chapter 8 E-Commerce Technologies Introduction to Business Information Systems by Mark Huber, Craig Piercy, Patrick McKeown, and James Norrie.
Introduction to Information Systems SSD1: Introduction to Information Systems Unit 1. The World Wide Web Unit 2. Introduction to Java and Object- Oriented.
Chapter 8 Browsing and Searching the Web
HTTP and Abstraction on the Internet
NETWORK SECURITY Cryptography By: Abdulmalik Kohaji.
E-commerce | WWW World Wide Web - Concepts
E-commerce | WWW World Wide Web - Concepts
Networks Problem Set 1 Due Oct 3 Bonus Date Oct 2
GCE Applied ICT G053: Lesson 01 Introduction To The Unit
Lesson 9 Sharing Documents
CISC103 Web Development Basics: Web site:
Lesson 14 Sharing Documents
Electronic Payment Security Technologies
Presentation transcript:

Computers and Society Carnegie Mellon University Spring 2006 Cranor/Tongia/Farber 1 Regulating Online Speech / Intellectual Property Week 4 - February 7, 9

Computers and Society Carnegie Mellon University Spring 2006 Cranor/Tongia/Farber 2 Class debate #2 High schools should use Internet content filters to block inappropriate content.

Computers and Society Carnegie Mellon University Spring 2006 Cranor/Tongia/Farber 3 Anonymous censorship-resistant publishing The printing press and the WWW can be powerful revolutionary tools Political dissent Whistle blowing Radical ideas but those who seek to suppress revolutions have powerful tools of their own Stop publication Destroy published materials Prevent distribution Intimidate or physically or financially harm author or publisher

Computers and Society Carnegie Mellon University Spring 2006 Cranor/Tongia/Farber 4 Anonymity increases censorship-resistance Reduces ability to force “voluntary” self- censorship Allows some authors to have their work taken more seriously Reduces bias due to gender, race, ethnic background, social position, etc. Many historical examples of important anonymous publications In the Colonies during Revolutionary War when British law prohibited writings suggesting overthrow of the government Federalist papers

Computers and Society Carnegie Mellon University Spring 2006 Cranor/Tongia/Farber 5 Publius design goals Censorship resistant Tamper evident Source anonymous Updateable Deniable Fault tolerant Persistent Extensible Freely Available

Computers and Society Carnegie Mellon University Spring 2006 Cranor/Tongia/Farber 6 Publius Overview Publius Content – Static content (HTML, images, PDF, etc) Publishers – Post Publius content Servers – Host Publius content Retrievers – Browse Publius content PublishersServersRetrievers

Computers and Society Carnegie Mellon University Spring 2006 Cranor/Tongia/Farber 7 Publishing a Publius document Generate secret key and use it to encrypt document Use “secret splitting” to split key into n shares This technique has special property that only k out of n shares are needed to put the key back together Publish encrypted document and 1 share on each of n servers Generate special Publius URL that encodes the location of each share and encrypted document – example: PublishersServers

Computers and Society Carnegie Mellon University Spring 2006 Cranor/Tongia/Farber 8 Retrieving a Publius document Break apart URL to discover document locations Retrieve encrypted document and share from k locations Reassemble key from shares Decrypt retrieved document Check for tampering View in web browser PublishersServersRetrievers

Computers and Society Carnegie Mellon University Spring 2006 Cranor/Tongia/Farber 9 Publius proxies Publius proxies running on a user’s local machine or on the network handle all the publish and retrieve operations Proxies also allow publishers to delete and update content PublishersServersRetrievers PROXYPROXY PROXYPROXY

Computers and Society Carnegie Mellon University Spring 2006 Cranor/Tongia/Farber 10 Threats and limitations Attacks on server resources 100K Content Limit (easy to subvert) Server limits # of files it will store Possibility: use a payment scheme Threats to publisher anonymity “Rubber-Hose Cryptanalysis” Added “don’t update” and don’t delete bit Logging, network segment eavesdropping Collaboration of servers to censor content A feature?

Computers and Society Carnegie Mellon University Spring 2006 Cranor/Tongia/Farber 14 Discussion Technology that can protect “good” speech also protects “bad” speech What if your dog does publish your secrets to the Internet and you can't do anything about it? Is building a censorship-resistant publishing system irresponsible? If a tree falls in a forest and nobody hears it….

Computers and Society Carnegie Mellon University Spring 2006 Cranor/Tongia/Farber 15 For further reading Publius web site Publius chapter in Peer-to-Peer: Harnessing the Power of Disruptive Technologies edited by Andy Oram The Architecture of Robust Publishing Systems. ACM Transactions on Internet Technology 1(2):

Computers and Society Carnegie Mellon University Spring 2006 Cranor/Tongia/Farber 16 Homework 2 discussion sp06/homework/hw2.html sp06/homework/hw2.html Spam counter measures

Computers and Society Carnegie Mellon University Spring 2006 Cranor/Tongia/Farber 17 Administrivia Homework 3 sp06/homework/hw3.html sp06/homework/hw3.html Debate 3 assignments

Computers and Society Carnegie Mellon University Spring 2006 Cranor/Tongia/Farber 18 Guest speaker: Patrick Wagstrom