diff -r aa7ddfee35c9 -r 9126c13a7d93 handouts/ho01.tex --- a/handouts/ho01.tex Tue Sep 23 17:05:14 2014 +0100 +++ b/handouts/ho01.tex Tue Sep 23 17:05:33 2014 +0100 @@ -79,9 +79,11 @@ people guarding and maintaining the system have to do their job properly, and also the motive that the attackers have to try to defeat your policy). The last point is often overlooked, but plays an -important role. Lets look at an example. The questions is whether -the Chip-and-PIN system with credit cards is more secure than the older -method of signing receipts at the till. +important role. + +Lets look at an example. The questions is whether the Chip-and-PIN +system with credit cards is more secure than the older method of +signing receipts at the till.