slides/slides11.tex
changeset 437 08906f4325bb
parent 436 8bf6704fc991
child 438 85a25932811f
equal deleted inserted replaced
436:8bf6704fc991 437:08906f4325bb
    34 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
    34 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
    35 \begin{frame}[c]
    35 \begin{frame}[c]
    36 
    36 
    37 \begin{bubble}[10cm]
    37 \begin{bubble}[10cm]
    38 Imagine you have a completely innocent email message, like
    38 Imagine you have a completely innocent email message, like
    39 birthday wishes to your grandmother? Why should you still
    39 birthday wishes to your grandmother. Why should you still
    40 encrypt this message and your grandmother take the effort to
    40 encrypt this message and your grandmother take the effort to
    41 decrypt it?
    41 decrypt it?
    42 \end{bubble}
    42 \end{bubble}
    43 
    43 
    44 \begin{itemize}
    44 \begin{itemize}
    59 \begin{center}
    59 \begin{center}
    60 \includegraphics[scale=0.6]{../pics/escher.jpg}\\
    60 \includegraphics[scale=0.6]{../pics/escher.jpg}\\
    61 \footnotesize\mbox{M.C.Escher, Amazing World (from Gödel, Escher, Bach by D.Hofstadter)} 
    61 \footnotesize\mbox{M.C.Escher, Amazing World (from Gödel, Escher, Bach by D.Hofstadter)} 
    62 \end{center}
    62 \end{center}
    63 
    63 
       
    64 \hfill\includegraphics[scale=0.3]{../pics/hofstadter.jpg}
    64 \end{frame}
    65 \end{frame}
    65 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%  
    66 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%  
    66 
    67 
    67 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
    68 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
    68 \begin{frame}[c]
    69 \begin{frame}[c]
    69 \frametitle{Interlock Protocol}
    70 \frametitle{Interlock Protocols}
    70 
    71 
    71 \mbox{A Protocol between a car \bl{$C$} and a key transponder \bl{$T$}:}\bigskip 
    72 \mbox{A Protocol between a car \bl{$C$} and a key transponder \bl{$T$}:}\bigskip 
    72 
    73 
    73 \begin{enumerate}
    74 \begin{enumerate}
    74 \item \bl{$C$} generates a random number \bl{$N$}
    75 \item \bl{$C$} generates a random number \bl{$N$}
   473 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
   474 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
   474 \begin{frame}[c]
   475 \begin{frame}[c]
   475 \frametitle{Coming Back To\ldots}
   476 \frametitle{Coming Back To\ldots}
   476 
   477 
   477 \begin{bubble}[10cm]
   478 \begin{bubble}[10cm]
   478 Imagine you have an completely innocent email message, like
   479 Imagine you have a completely innocent email message, like
   479 birthday wishes to your grandmother? Why should you still
   480 birthday wishes to your grandmother. Why should you still
   480 encrypt this message and your grandmother take the effort to
   481 encrypt this message and your grandmother take the effort to
   481 decrypt it?
   482 decrypt it?
   482 \end{bubble}\pause
   483 \end{bubble}\pause
   483       
   484       
   484 \begin{itemize}      
   485 \begin{itemize}      
       
   486 \item \small Any wild guesses?\pause
   485 \item \small
   487 \item \small
   486       Bruce Schneier\\
   488       Bruce Schneier\\
   487       NSA Surveillance and What To Do About It\\
   489       NSA Surveillance and What To Do About It\\
   488       \url{https://www.youtube.com/watch?v=QXtS6UcdOMs}
   490       \url{https://www.youtube.com/watch?v=QXtS6UcdOMs}
   489 \end{itemize}
   491 \end{itemize}
   501 counter this ``going-dark problem'', the spy agencies push for
   503 counter this ``going-dark problem'', the spy agencies push for
   502 the implementation of back-doors in iMessage and Facebook and
   504 the implementation of back-doors in iMessage and Facebook and
   503 Skype and everything else UK or US-made, which they can use
   505 Skype and everything else UK or US-made, which they can use
   504 eavesdrop on conversations without the conversants' knowledge
   506 eavesdrop on conversations without the conversants' knowledge
   505 or consent.
   507 or consent.
   506 
       
   507 \end{bubble}      
   508 \end{bubble}      
   508 
   509 
   509 \begin{itemize}
   510 \begin{itemize}
   510 \item What is the fallacy in the spy agencies going-dark
   511 \item What is the fallacy in the spy agencies going-dark
   511       argument?
   512       argument?