# HG changeset patch # User Christian Urban # Date 1415054567 0 # Node ID 5616e664c0207fbae08d3f143ffb047860916c7a # Parent ed3c071ed36a0dc54f19056906a50e2436d4fe34 updated diff -r ed3c071ed36a -r 5616e664c020 handouts/ho05.pdf Binary file handouts/ho05.pdf has changed diff -r ed3c071ed36a -r 5616e664c020 handouts/ho05.tex --- a/handouts/ho05.tex Mon Nov 03 13:19:51 2014 +0000 +++ b/handouts/ho05.tex Mon Nov 03 22:42:47 2014 +0000 @@ -806,6 +806,20 @@ that you sit in the ``middle'' of the communication of two people. You just have to route their traffic through a node you own. +An article in The Guardien from 2013 reveals how GCHG and the NSA at a +G20 Summit in 2009 sniffed emails from Internet cafes, monitored phone +calls from delegates and attempted to listen on Russians phone calls +which were transmitted via satelite links: + +\begin{center} +\url{http://www.theguardian.com/uk/2013/jun/16/gchq-intercepted-communications-g20-summits} +\end{center} + +\noindent +\ldots all in the name of having a better position for +negotiations. Hmmm\ldots + + \end{document} %%% Local Variables: diff -r ed3c071ed36a -r 5616e664c020 pics/car-standard.jpg Binary file pics/car-standard.jpg has changed diff -r ed3c071ed36a -r 5616e664c020 slides/slides06.pdf Binary file slides/slides06.pdf has changed diff -r ed3c071ed36a -r 5616e664c020 slides/slides06.tex --- a/slides/slides06.tex Mon Nov 03 13:19:51 2014 +0000 +++ b/slides/slides06.tex Mon Nov 03 22:42:47 2014 +0000 @@ -32,13 +32,20 @@ \end{center} \end{frame} - %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% - - - +%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% -\mode{ +\begin{frame}[c] +\frametitle{Problems with Car Keys} + +\begin{center} +\includegraphics[scale=0.4]{../pics/car-standard.jpg} +\end{center} + +\end{frame} +%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% + +%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% \begin{frame}[t] \frametitle{Checking Solutions} @@ -72,11 +79,10 @@ this is essentially a hash function...but Bob can only check once he has also found the solution } -\end{frame}} +\end{frame} %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% -\mode{ \begin{frame}[c] \frametitle{Zero-Knowledge Proofs} @@ -89,7 +95,7 @@ that Alice knows the secret. \end{itemize} -\end{frame}} +\end{frame} %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%