{"id":371867,"date":"2017-03-13T14:20:00","date_gmt":"2017-03-13T21:20:00","guid":{"rendered":"https:\/\/cm-edgetun.pages.dev\/en-us\/research\/?post_type=msr-research-item&#038;p=371867"},"modified":"2017-03-17T14:23:56","modified_gmt":"2017-03-17T21:23:56","slug":"privacy-internet-without-giving-everything-else","status":"publish","type":"msr-video","link":"https:\/\/cm-edgetun.pages.dev\/en-us\/research\/video\/privacy-internet-without-giving-everything-else\/","title":{"rendered":"Privacy in the Internet (Without Giving up Everything Else)"},"content":{"rendered":"<p>&#8220;Using the Internet inherently entails privacy risks. Each packet, potentially carrying information that users would rather keep private, is exposed to a network infrastructure operated by a number of third parties the user may not trust and likely cannot even identify. In some cases, the user may not even trust the recipient.<br \/>\nTechniques exist to protect user privacy, but they typically do so at the expense of other desirable properties. For example, anonymity services like Tor hide a packet&#8217;s true sender, but weaken accountability by making it<br \/>\ndifficult for network administrators or law enforcement to track down malicious senders. Similarly, encryption hides application data from third parties, but prevents the use of middleboxes&#8212;devices that process packets in<br \/>\nthe network to improve performance (like caches) or security (like intrusion detection systems). In this talk, I&#8217;ll present techniques for managing these &#8220;&#8221;Privacy vs. X&#8221;&#8221; conflicts, including a new network architecture that re-thinks basic networking building blocks like packet source addresses and new secure communication protocols that explicitly balance data privacy with the benefits of middleboxes. &#8221;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>&#8220;Using the Internet inherently entails privacy risks. Each packet, potentially carrying information that users would rather keep private, is exposed to a network infrastructure operated by a number of third parties the user may not trust and likely cannot even identify. In some cases, the user may not even trust the recipient. Techniques exist to [&hellip;]<\/p>\n","protected":false},"featured_media":371870,"template":"","meta":{"msr-url-field":"","msr-podcast-episode":"","msrModifiedDate":"","msrModifiedDateEnabled":false,"ep_exclude_from_search":false,"_classifai_error":"","msr_hide_image_in_river":0,"footnotes":""},"research-area":[13558],"msr-video-type":[],"msr-locale":[268875],"msr-post-option":[],"msr-session-type":[],"msr-impact-theme":[],"msr-pillar":[],"msr-episode":[],"msr-research-theme":[],"class_list":["post-371867","msr-video","type-msr-video","status-publish","has-post-thumbnail","hentry","msr-research-area-security-privacy-cryptography","msr-locale-en_us"],"msr_download_urls":"","msr_external_url":"https:\/\/youtu.be\/AgF4WLSoi0M","msr_secondary_video_url":"","msr_video_file":"","_links":{"self":[{"href":"https:\/\/cm-edgetun.pages.dev\/en-us\/research\/wp-json\/wp\/v2\/msr-video\/371867","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cm-edgetun.pages.dev\/en-us\/research\/wp-json\/wp\/v2\/msr-video"}],"about":[{"href":"https:\/\/cm-edgetun.pages.dev\/en-us\/research\/wp-json\/wp\/v2\/types\/msr-video"}],"version-history":[{"count":0,"href":"https:\/\/cm-edgetun.pages.dev\/en-us\/research\/wp-json\/wp\/v2\/msr-video\/371867\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cm-edgetun.pages.dev\/en-us\/research\/wp-json\/wp\/v2\/media\/371870"}],"wp:attachment":[{"href":"https:\/\/cm-edgetun.pages.dev\/en-us\/research\/wp-json\/wp\/v2\/media?parent=371867"}],"wp:term":[{"taxonomy":"msr-research-area","embeddable":true,"href":"https:\/\/cm-edgetun.pages.dev\/en-us\/research\/wp-json\/wp\/v2\/research-area?post=371867"},{"taxonomy":"msr-video-type","embeddable":true,"href":"https:\/\/cm-edgetun.pages.dev\/en-us\/research\/wp-json\/wp\/v2\/msr-video-type?post=371867"},{"taxonomy":"msr-locale","embeddable":true,"href":"https:\/\/cm-edgetun.pages.dev\/en-us\/research\/wp-json\/wp\/v2\/msr-locale?post=371867"},{"taxonomy":"msr-post-option","embeddable":true,"href":"https:\/\/cm-edgetun.pages.dev\/en-us\/research\/wp-json\/wp\/v2\/msr-post-option?post=371867"},{"taxonomy":"msr-session-type","embeddable":true,"href":"https:\/\/cm-edgetun.pages.dev\/en-us\/research\/wp-json\/wp\/v2\/msr-session-type?post=371867"},{"taxonomy":"msr-impact-theme","embeddable":true,"href":"https:\/\/cm-edgetun.pages.dev\/en-us\/research\/wp-json\/wp\/v2\/msr-impact-theme?post=371867"},{"taxonomy":"msr-pillar","embeddable":true,"href":"https:\/\/cm-edgetun.pages.dev\/en-us\/research\/wp-json\/wp\/v2\/msr-pillar?post=371867"},{"taxonomy":"msr-episode","embeddable":true,"href":"https:\/\/cm-edgetun.pages.dev\/en-us\/research\/wp-json\/wp\/v2\/msr-episode?post=371867"},{"taxonomy":"msr-research-theme","embeddable":true,"href":"https:\/\/cm-edgetun.pages.dev\/en-us\/research\/wp-json\/wp\/v2\/msr-research-theme?post=371867"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}