handouts/ho01.tex
changeset 534 62985f147c85
parent 529 9b01bb695b22
child 539 48e0c8b03ae5
--- a/handouts/ho01.tex	Tue Sep 26 12:03:24 2017 +0100
+++ b/handouts/ho01.tex	Tue Sep 26 12:10:41 2017 +0100
@@ -9,6 +9,10 @@
 \fnote{\copyright{} Christian Urban, 
 King's College London, 2014, 2015, 2016}
 
+% passwords at dropbox
+%%https://blogs.dropbox.com/tech/2016/09/how-dropbox-securely-stores-your-passwords/
+
+
 %Ross anderson
 %https://youtu.be/FY2YKxBxOkg
 %http://www.scmagazineuk.com/amazon-launches-open-source-tls-implementation-s2n/article/424360/
@@ -30,6 +34,10 @@
 % IoT
 % https://nakedsecurity.sophos.com/2015/10/26/the-internet-of-things-stop-the-things-i-want-to-get-off/
 
+% cloning creditc cards and passports
+%https://www.youtube.com/watch?v=-4_on9zj-zs
+
+
 \section*{Handout 1 (Security Engineering)}
 
 
@@ -113,7 +121,7 @@
 guarding and maintaining the system have to do their job
 properly, and also the motive that the attackers have to try
 to defeat your policy). The last point is often overlooked,
-but plays an important role. To illustrate this lets look at
+but plays an important role. To illustrate this let's look at
 an example. 
 
 \subsubsection*{Chip-and-PIN is Surely More Secure, No?}
@@ -222,7 +230,7 @@
 Computer Club conference is for you:
 
 \begin{center}
-\url{https://www.youtube.com/watch?v=XeZbVZQsKO8}
+\url{https://goo.gl/zuwVHb}
 \end{center}
 
 \noindent They claim that they are able to clone Chip-and-PINs