PrivChat
Tor Project ããå±ããããã¯ããã¸ã¼ã人権ã
ã¤ã³ã¿ã¼ãããã®èªç±ã«ã¤ãã¦ã®å¯¾è«
PrivChat ã¯ãTor Project ã¸ã®å¯ä»ãåãããã«éå¬ãããåéã¤ãã³ã ã·ãªã¼ãºã§ãã PrivChat ãéãã¦ãã³ãã¥ããã£ã¨ã®ãã£ããã®ããã«å°éå®¶ãæéãããã¨ã«ããããã¯ããã¸ã¼ã人権ãããã³ã¤ã³ã¿ã¼ãããã®èªç±ã§èµ·ãã£ã¦ãããã¨ã«é¢é£ããéè¦ãªæ å ±ããå±ããã¾ãã
第 1 ç« - 2020 å¹´ã®ãªã³ã©ã¤ã³ãã©ã¤ãã·ã¼: ã¢ã¯ãã£ããºã 㨠COVID-19
è¦ãCOVID-19 ã®ãã³ãããã¯ãä¸çã®ã»ã¨ãã©ã®å½ã襲ã£ãã¨ããå¤ãã®æ¿åºã¯ãã³ãããã¯ã¨éãããã«ã¦ã¤ã«ã¹ã®æ¡æ£ã追跡ããæè¡ãæ¢ãã¾ãããæ¥è§¦è è¿½è·¡ã®æ £è¡ã¨æè¡ã¯ããã©ã¤ãã·ã¼ã«é¢ããå¤ãã®çåãç¹ã«äººã ã®ãã©ã¤ãã·ã¼ãå°éããªããã¦ã¤ã«ã¹ã追跡ãããã¨ã¯å¯è½ãã¨ããçåãæèµ·ãã¾ããã ç¾å¨ãç±³å½ã§ã®çµç¹çãªäººç¨®å·®å¥ã«å¯¾ããåçºãããã¦ããã«ç¶ãä¸çåå°ã§ã®æè°éåã®ä¸ã§ãæ¥è§¦è ã®è¿½è·¡ããã©ã¤ãã·ã¼ãç£è¦ã«é¢ããä¸å¿çãªçåãé大ãªãã®ã¨ãªã£ã¦ãã¾ããã¦ã¤ã«ã¹ã®è¿½è·¡ã«ä½¿ããã¦ããæè¡ã¯ãæè°è ã®è¿½è·¡ã«ã使ããã®ã§ããããï¼ã¾ã使ãããã®ã§ããããï¼ æåã® PrivChat ã§ã¯ãTor Project ã 3 人ã®ç´ æ´ãããã²ã¹ãããæããããã®æèã«ããããã©ã¤ãã·ã¼ã«ã¤ãã¦ã話ããã¦ããã ãã¾ãã
ãã¹ã
Roger Dingledine
Roger Dingledine ã¯ããªã³ã©ã¤ã³ä¸ã®è¿½è·¡ãæ¤é²ãç£è¦ãã人ã
ãå®ãããã«ãããªã¼ã§ãªã¼ãã³ã½ã¼ã¹ã®ã½ããã¦ã§ã¢ãéçºããéå¶å©å£ä½ Tor Project ã®ä»£è¡¨ï¼å
±åè¨ç«è
ã§ãã
ä¸ã¤ã®å¸½åããã¶ã£ã¦ãRoger ã¯å¤ãã®å¤§é¸ã®ã¸ã£ã¼ããªã¹ããæ´»åå®¶ã¨ååããå½¼ããç´é¢ãã¦ããè
å¨ãçè§£ãã対æããæå©ãããã¦ãã¾ããåæ°ã¯ãªã³ã©ã¤ã³å¿åæ§åéã®ä¸»ä»»ç ç©¶è
ã§ãããTor é¢é£ã®ãããã¯ã«åãçµãå¦è¡ç ç©¶è
ã®èª¿æ´ãæå°ãè¡ã£ã¦ãã¾ãã2002年以æ¥ãæ¯å¹´å½éçãªãã©ã¤ãã·ã¼å¼·åæè¡ã·ã³ãã¸ã¦ã (PETS) ã®éå¬ãæ¯æ´ãã¦ãã¾ãã
å½¼ã®å績ã¨ãã¦ãMIT ãã¯ããã¸ã¼ã¬ãã¥ã¼èªã®35æ³ä»¥ä¸ã®é©æ°è
ããã35ã«é¸ã°ããUsenix Security ã®ãTest of Timeãè³ãåè³ãã Tor ã®ãã¶ã¤ã³ãã¼ãã¼ãå
±åå·çããForeign Policy èªã®ã°ãã¼ãã«ææ³å®¶ããã100ã«é¸åºããã¦ãã¾ãã
åå è
Carmela Troncoso
Carmela Troncoso 㯠EPFL (ã¹ã¤ã¹) ã®å©ææã§ãSPRING Lab ãçãã¦ãã¾ãããã¼ã´å¤§å¦ã§é»æ°éä¿¡å·¥å¦ã®ä¿®å£«å· (2006 å¹´) ããKU Leuven ã§å·¥å¦ã®åå£«å· (2011 å¹´) ãåå¾ãã¦ãã¾ããEPFL ã«çä»»ããåã¯ãIMDEA Software Institute (ã¹ãã¤ã³) ã§ 2 å¹´éæå¡ãåãã¦ãã¾ãããã»ãã¥ãªãã£ã¨ãã©ã¤ãã·ã¼ã«é¢ãã Gradient ã®ãã¯ãã«ã«ãªã¼ãã¯ãæ¥çã¨ç·å¯ã«é£æºãã¦ãå®å
¨ã§ãã©ã¤ãã·ã¼ã«é
æ
®ããã½ãªã¥ã¼ã·ã§ã³ãå¸å ´ã« 4 å¹´éæä¾ãã¦ãã¾ããCOSIC ã°ã«ã¼ãã®ãã¹ãã¯ç ç©¶å¡ã§ãããã¾ãã
Carmela ã®ç ç©¶ã¯ãã»ãã¥ãªãã£ã¨ãã©ã¤ãã·ã¼ã«éç¹ãç½®ãã¦ãã¾ãã彼女ã®è«æãDesign and Analysis methods for Privacy Technologiesãã¯æ¬§å·æ
å ±å¦çæ°å¦ç ç©¶ã³ã³ã½ã¼ã·ã¢ã æåªç§åå£«è«æè³ãåè³ããã©ã¤ãã·ã¼ã¨ã³ã¸ãã¢ãªã³ã°ã«é¢ããç ç©¶ã¯ãCNIL-INRIA ãã©ã¤ãã·ã¼ä¿è·è³ 2017 ãåè³ãã¾ããã彼女ã¯ã»ãã¥ãªã㣠(ACM Conference on Computer Security ã USENIX Security Symposium ãªã©) ã¨ãã©ã¤ãã·ã¼ (ãã©ã¤ãã·ã¼å¼·åæè¡) ã®æãæ¨©å¨ããå ´æã§å®æçã«çºè¡¨ãã¦ãã¾ãã
Daniel Kahn Gillmor
Daniel Kahn Gillmor 㯠ACLU ã® Speech, Privacy, and Technology Project ã®ã·ãã¢ã¹ã¿ãããã¯ããã¸ã¹ãã§ãããæè¡ã¤ã³ãã©ã社ä¼ãå½¢æãã叿°ã®èªç±ã«å½±é¿ãä¸ããä»çµã¿ã«ç¦ç¹ãå½ã¦ã¦ãã¾ãã
ããªã¼ã½ããã¦ã§ã¢éçºè
ã§ãããDebian Project ã®ã¡ã³ãã¼ã¨ãã¦ãæ
å ±ãè±å¯ãªç°å¢ã®å¯è½æ§ãå½¢ä½ãåºæ¬çãªãã¼ã«ã«è²¢ç®ãã¦ãã¾ãã
IETF ã®åå è
ã¨ãã¦ããã©ã¤ãã·ã¼ã¨ã»ãã¥ãªãã£ã®ããã«è¨è¨ããã³æé©åãããæ°ä¸ä»£ã®ãããã¯ã¼ã¯ããã³æå·ãããã³ã«ã®éçºãä¿é²ãã¦ãã¾ãããã©ã¤ãã·ã¼ãæ£ç¾©ãè¨è«ã®èªç±ããã¼ã¿ä¸»æ¨©ã®ããã®åç£è¦ã®æå±è
ã§ãããã¾ãããã©ã¦ã³å¤§å¦ã³ã³ãã¥ã¼ã¿ã¼ãµã¤ã¨ã³ã¹ããã°ã©ã 忥ã
Matt Mitchell
Matt Mitchell ã¯ããã«ã¼ã§ãããThe Ford Foundation ã®æè¡ç ç©¶å¡ã§ããMatt ã¯ãFord Foundation ã® BUILD ããã³ Technology and Society ãã¼ã ã¨ååãã¦ããã¸ã¿ã«ã»ãã¥ãªãã£æ¦ç¥ãæè¡æ¯æ´ãµã¼ãã¹ãããã³ Ford Foundation ã®å©æãã¼ããã¼åãã®å®å
¨ã¨ã»ãã¥ãªãã£å¯¾çãéçºãã¦ãã¾ãã
ããã«ã¼ãéçºè
ããªãã¬ã¼ã·ã§ãã«ã»ãã¥ãªãã£ãã¬ã¼ãã¼ãã»ãã¥ãªãã£ç ç©¶è
ããã¼ã¿ã¸ã£ã¼ããªã¹ãã¨ãã¦ã®ãã¸ã¿ã«ã¹ãã«ãåã®ããã«ä½¿ããã¨ã«ã³ããããã¦ãã Matt ã¯ããã¯ããã¸ã¼ã¨å
Œ
±ã®ç¦ç¥ã®äº¤å·®ç¹ã§ãã¾ãã¾ãªç«å ´ã§åãã¦ãã¾ããã以åã¯ãTactical Tech (Tactical Technology Collective) ã® Digital Safety & Privacy ã®ãã£ã¬ã¯ã¿ã¼ã§ãããMatt ã¯ããã©ã¤ãã·ã¼ã«é¢ããæèãé«ãããã¸ã¿ã«ã»ãã¥ãªãã£ã®ããã®ãã¼ã«ãæä¾ããæ
å ±ãè¡åã«ç§»ãããã«äººã
ãåå¡ããã¨ãã Tactical Tech ã®ããã·ã§ã³ã«ããã¦ãã»ãã¥ãªãã£ãã¬ã¼ãã³ã°ã®åãçµã¿ãã«ãªãã¥ã©ã ãçµç¹ã»ãã¥ãªãã£ã主å°ãã¾ããã
Matt ã¯ãèåãªã»ãã¥ãªãã£ç ç©¶è
ããªãã¬ã¼ã·ã§ãã«ã»ãã¥ãªãã£ãã¬ã¼ãã¼ãããã³ãã¼ã¿ã¸ã£ã¼ããªã¹ãã§ãããã¢ããã¼ãã³ããã¿ã³ã®ã¢ããªã«ç³»ã¢ã¡ãªã«äººã³ãã¥ããã£ã«åºæ¬çãªæå·åãã¼ã«ãæããå³å¸ã¯ã¼ã¯ã·ã§ãã
CryptoHarlem
ãéå¬ãã¦ãã¾ãã
çæ§ã®ãå¯ä»ã«ããããã®ã·ãªã¼ãºã¨ Tor ã§ã®ä»äºãå¯è½ã«ãªã£ã¦ãã¾ãã
ç§ãã¡ã®æ´»åãæ¯æ´ããæåã®æ¹æ³ã¯ã æ¯æã®å¯ä»è ã«ãªããã¨ã§ãã