equal
deleted
inserted
replaced
642 \includegraphics[scale=0.3025]{../pics/startstop.jpg} |
642 \includegraphics[scale=0.3025]{../pics/startstop.jpg} |
643 \end{center} |
643 \end{center} |
644 |
644 |
645 \begin{itemize} |
645 \begin{itemize} |
646 \item Other examples: Wifi, Http-request, TCP-request, |
646 \item Other examples: Wifi, Http-request, TCP-request, |
647 card readers, RFID (passports)\medskip\pause |
647 card readers, RFID (passports)\ldots\medskip\pause |
648 |
648 |
649 \item The point is that we cannot control the network: An attacker |
649 \item The point is that we cannot control the network: An attacker |
650 can install a packet sniffer, inject packets, modify packets, |
650 can install a packet sniffer, inject packets, modify packets, |
651 replay messages\ldots{}fake pretty much everything. |
651 replay messages\ldots{}fake pretty much everything. |
652 \end{itemize} |
652 \end{itemize} |