slides/slides04.tex
changeset 409 0c04ec017892
parent 408 9332d1e54360
child 411 542116a239cf
equal deleted inserted replaced
408:9332d1e54360 409:0c04ec017892
   642 \includegraphics[scale=0.3025]{../pics/startstop.jpg}
   642 \includegraphics[scale=0.3025]{../pics/startstop.jpg}
   643 \end{center}
   643 \end{center}
   644 
   644 
   645 \begin{itemize}
   645 \begin{itemize}
   646 \item Other examples: Wifi, Http-request, TCP-request,
   646 \item Other examples: Wifi, Http-request, TCP-request,
   647 card readers, RFID (passports)\medskip\pause
   647 card readers, RFID (passports)\ldots\medskip\pause
   648 
   648 
   649 \item The point is that we cannot control the network: An attacker
   649 \item The point is that we cannot control the network: An attacker
   650 can install a packet sniffer, inject packets, modify packets,
   650 can install a packet sniffer, inject packets, modify packets,
   651 replay messages\ldots{}fake pretty much everything.
   651 replay messages\ldots{}fake pretty much everything.
   652 \end{itemize}
   652 \end{itemize}