# HG changeset patch # User Christian Urban # Date 1527864394 -3600 # Node ID 3391a4fc35333012821a1f47760abe06dcd6bbc8 # Parent 9b45079eaceac948b16694ac8f20f3add5551830 updated diff -r 9b45079eacea -r 3391a4fc3533 LINKS --- a/LINKS Tue Jan 16 10:23:43 2018 +0000 +++ b/LINKS Fri Jun 01 15:46:34 2018 +0100 @@ -1,3 +1,8 @@ +for HW slides and exam work +http://phdcomics.com/comics/archive.php?comicid=1875 +http://phdcomics.com/comics/archive.php?comicid=1873 + + // MiM Attck using Wifi and Bitcoin mining https://nakedsecurity.sophos.com/2018/01/09/coffeeminer-project-lets-you-hack-public-wi-fi-to-mine-cryptocoins/?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+nakedsecurity+%28Naked+Security+-+Sophos%29 diff -r 9b45079eacea -r 3391a4fc3533 handouts/ho07.pdf Binary file handouts/ho07.pdf has changed diff -r 9b45079eacea -r 3391a4fc3533 handouts/ho07.tex --- a/handouts/ho07.tex Tue Jan 16 10:23:43 2018 +0000 +++ b/handouts/ho07.tex Fri Jun 01 15:46:34 2018 +0100 @@ -4,6 +4,10 @@ \usepackage{../langs} \usepackage{../data} +% A critical view of Blockchain usage +%%https://hackernoon.com/ten-years-in-nobody-has-come-up-with-a-use-case-for-blockchain-ee98c180100 + + %https://crypto.stanford.edu/cs251/ %https://programmingblockchain.gitbooks.io/programmingblockchain/content/ @@ -54,6 +58,8 @@ %bitcoin misconceptions %https://www.kaspersky.com/blog/bitcoin-blockchain-issues/18019/ +% dodgy Bitcoin infrastructure +%https://www.lightbluetouchpaper.org/2018/06/01/bitcoin-redux-crypto-crime-and-how-to-tackle-it/ \begin{document} \fnote{\copyright{} Christian Urban, 2014, 2015} @@ -71,7 +77,7 @@ potential government meddling. It turns out that the first claim ignores a lot of research in de-anonymising social networks, and the second underestimates the persuasive means a -government has at its disposal. +government has at its disposal. There are a lot of articles, blogposts, research papers etc.~available about Bitcoins. Below I will follow closely the @@ -1000,7 +1006,7 @@ \end{document} -bit coin +bitcoin A fistful of bitcoins http://cseweb.ucsd.edu/~smeiklejohn/files/imc13.pdf diff -r 9b45079eacea -r 3391a4fc3533 hws/hw04.tex --- a/hws/hw04.tex Tue Jan 16 10:23:43 2018 +0000 +++ b/hws/hw04.tex Fri Jun 01 15:46:34 2018 +0100 @@ -8,6 +8,7 @@ \HEADER \begin{enumerate} +\item nosuid question \url{https://rcoh.me/posts/sudo-science/} \item What should the architecture of a network application under Unix be that processes potentially hostile data?