aboutsummaryrefslogtreecommitdiff
path: root/slides/2021-pets/src/end.tex
blob: 56beaf314ae5e911eef6144b555f8d1c43662f8a (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
\begin{frame}
	% 
	% As a take away I hope that you are convinced that Tor Browser would
	% benefit from CT.
	% - This was the first part of the presentation.
	%
	% CT would also benefit from more auditing, which we can do here in a secure
	% and privacy-preserving manner because of and how we use Tor.
	% - This was the second part of the presentation.
	%
	% Although not presented here, we show in our paper that the resulting
	% system is also performant based on estimations from two public data sets.
	%
	% An important insight from our work is that pushing the auditing logic
	% away from Tor Browser is important to defend against relevant threats.
	% The simple approach of "just fetching an inclusion proof" does not work.
	%
	% That's it.  Thanks!
	\vfill
	\begin{columns}
		\begin{column}{0.6\textwidth}
			\mktitle{Take away}
			\begin{itemize}
				\item Tor Browser would benefit from CT
				\item CT would benefit from more auditing
				\item Delegated auditing is key in our setting
			\end{itemize}
		\end{column}
		\begin{column}{0.4\textwidth}
			\centering
			\includegraphics[width=.8\columnwidth]{img/thanks}
		\end{column}
	\end{columns}
\end{frame}