diff -r d8657ff8cca1 -r 793ae8926a97 handouts/ho01.tex --- a/handouts/ho01.tex Tue Sep 23 10:24:38 2014 +0100 +++ b/handouts/ho01.tex Tue Sep 23 10:31:03 2014 +0100 @@ -35,18 +35,17 @@ \end{quote} \noindent In this module I like to teach you this security -mindset. This might be a mindset that you think is very -foreign to you (after all we are all good citizens). I beg to -differ: You have this mindset already when in school you were -thinking, at least hypothetically, in which ways you can cheat -in an exam (whether it is about hiding notes or looking over -the shoulders of your fellow pupils). Right? To defend a -system, you need to have this kind mindset and be able to -think like an attacker. This will include understanding -techniques that can be used to compromise security and privacy -in systems. This will many times result in insights where -well-intended security mechanism made a system actually less -secure.\smallskip +mindset. This might be a mindset that you think is very foreign to you +(after all we are all good citizens and not ahck into things). I beg +to differ: You have this mindset already when in school you were +thinking, at least hypothetically, in which ways you can cheat in an +exam (whether it is about hiding notes or looking over the shoulders +of your fellow pupils). Right? To defend a system, you need to have +this kind mindset and be able to think like an attacker. This will +include understanding techniques that can be used to compromise +security and privacy in systems. This will many times result in +insights where well-intended security mechanism made a system actually +less secure.\smallskip {\Large\bf Warning!} However, don’t be evil! Using those techniques in the real world may violate the law or King’s