# HG changeset patch # User Christian Urban # Date 1475653844 -3600 # Node ID 7d4aa41b748ee64e368dd99f64238e47cff3dc7f # Parent e4a2807ac7f2ebe9400c31dd46efee57976a5bc7 updated diff -r e4a2807ac7f2 -r 7d4aa41b748e handouts/ho05.tex --- a/handouts/ho05.tex Tue Oct 04 22:56:04 2016 +0100 +++ b/handouts/ho05.tex Wed Oct 05 08:50:44 2016 +0100 @@ -14,6 +14,8 @@ %http://www.hackingarticles.in/hack-password-using-rogue-wi-fi-access-point-attack-wifi-pumpkin/ %https://github.com/P0cL4bs/WiFi-Pumpkin +%http://routersecurity.org/index.php + \section*{Handout 5 (Protocols)} Protocols are the computer science equivalent to fractals and diff -r e4a2807ac7f2 -r 7d4aa41b748e hws/hw07.pdf Binary file hws/hw07.pdf has changed diff -r e4a2807ac7f2 -r 7d4aa41b748e hws/hw07.tex --- a/hws/hw07.tex Tue Oct 04 22:56:04 2016 +0100 +++ b/hws/hw07.tex Wed Oct 05 08:50:44 2016 +0100 @@ -23,42 +23,42 @@ do with you and grandmother testing the latest encryption technology, nor just for the sake of it.) -\item One part of achieving privacy (but not the only one) is - to properly encrypt your conversations on the Internet. - But this is fiercely resisted by some spy agencies. - These agencies (and some politicians for that - matter) argue that, for example, ISIL's recruiters - broadcast messages on, say, Twitter, and get people to - follow them. Then they move potential recruits to - Twitter Direct Messaging to evaluate if they are a - legitimate recruit. If yes, they move them to an - encrypted mobile-messaging app. The spy agencies argue - that although they can follow the conversations on - Twitter, they ``go dark'' on the encrypted message - app. To counter this ``going-dark problem'', the spy - agencies push for the implementation of back-doors in - iMessage and Facebook and Skype and everything else UK - or US-made, which they can use eavesdrop on - conversations without the conversants' knowledge or - consent.\medskip +\item One part of achieving privacy (but not the only one) is to + properly encrypt your conversations on the Internet. But this is + fiercely resisted by some spy agencies. These agencies (and some + politicians for that matter) argue that, for example, ISIL's + recruiters broadcast messages on, say, Twitter, and get people to + follow them. Then they move potential recruits to Twitter Direct + Messaging to evaluate if they are a legitimate recruit. If yes, they + move them to an encrypted mobile-messaging app. The spy agencies + argue that although they can follow the conversations on Twitter, + they ``go dark'' on the encrypted message app. To counter this + ``going-dark problem'', the spy agencies push for the implementation + of back-doors in iMessage and Facebook and Skype and everything else + UK or US-made, which they can use eavesdrop on conversations without + the conversants' knowledge or consent.\medskip - What is the fallacy in the spy agencies going-dark - argument? (Hint: Think what would happen if the spy - agencies and certain politicians get their wish.) + What is the fallacy in the spy agencies going-dark argument? + (Hint: Think what would happen if the spy agencies and certain + politicians get their wish.) -\item DNA data is very sensitive and can easily violate the - privacy of (living) people. To get around this, two - scientists from Denmark proposed to create a - \emph{necrogenomic database} which would record the DNA - data of all Danish citizens and residents at the time of - their \emph{death}. By matching these to information - about illnesses and ailments in life, helpful evidence - could be gathered about the genetic origins of diseases. - The idea is that the privacy of dead people cannot be - violated. +\item DNA data is very sensitive and can easily violate the privacy of + (living) people. To get around this, two scientists from Denmark + proposed to create a \emph{necrogenomic database} which would record + the DNA data of all Danish citizens and residents at the time of + their \emph{death}. By matching these to information about illnesses + and ailments in life, helpful evidence could be gathered about the + genetic origins of diseases. The idea is that the privacy of dead + people cannot be violated. What is the fallacy behind this reasoning? - + +\item A few years ago a Google executive tried to allay worries about + Google pooring over all your emails on Gmail. He said something + along the lines: you are watched by an algorithm; this is like being + naked in front of your dog. What is wrong with this argument? + +\item \POSTSCRIPT \end{enumerate} \end{document} diff -r e4a2807ac7f2 -r 7d4aa41b748e slides/slides02.pdf Binary file slides/slides02.pdf has changed diff -r e4a2807ac7f2 -r 7d4aa41b748e slides/slides02.tex --- a/slides/slides02.tex Tue Oct 04 22:56:04 2016 +0100 +++ b/slides/slides02.tex Wed Oct 05 08:50:44 2016 +0100 @@ -587,7 +587,7 @@ \begin{itemize} \item acquired a machine from an anonymous source\medskip -\item they try to keep secret the source code running on the machine\medskip\pause +\item they tried to keep secret the source code running on the machine\medskip\pause \item first reversed-engineered the machine (extremely tedious) \item could completely reboot the machine and even install a virus that infects other Diebold machines