diff -r c9f28c80bb08 -r 9b01bb695b22 handouts/ho01.tex --- a/handouts/ho01.tex Sun Sep 24 17:51:31 2017 +0100 +++ b/handouts/ho01.tex Sun Sep 24 18:03:21 2017 +0100 @@ -121,7 +121,7 @@ guarding and maintaining the system have to do their job properly, and also the motive that the attackers have to try to defeat your policy). The last point is often overlooked, -but plays an important role. To illustrate this lets look at +but plays an important role. To illustrate this let's look at an example. \subsubsection*{Chip-and-PIN is Surely More Secure, No?} @@ -230,7 +230,7 @@ Computer Club conference is for you: \begin{center} -\url{https://www.youtube.com/watch?v=XeZbVZQsKO8} +\url{https://goo.gl/zuwVHb} \end{center} \noindent They claim that they are able to clone Chip-and-PINs