# HG changeset patch # User Christian Urban # Date 1464782661 -3600 # Node ID f65e4fa6e902922408b34e61385b13d510a23b5b # Parent 2d9e005100f4e2e132ac633252cac095f5629727 updated diff -r 2d9e005100f4 -r f65e4fa6e902 handouts/ho02.pdf Binary file handouts/ho02.pdf has changed diff -r 2d9e005100f4 -r f65e4fa6e902 handouts/ho02.tex --- a/handouts/ho02.tex Fri May 06 13:15:08 2016 +0100 +++ b/handouts/ho02.tex Wed Jun 01 13:04:21 2016 +0100 @@ -16,6 +16,28 @@ %version of Windows XP from 2004, using hardwired WEP keys and administrator %passwords, could be used for over a decade in most of Virginia. +%% second angle of the problem +%Jonathan Zittrain is interested in algorithmic accountability, +%from Facebook’s ability to tell that two people are in a +%relationship before they announce it, to their ability to +%engineer an election by prompting one side’s supporters. +%They’d be in the soup if they were caught, but they have been +%near the soup a number of times. One internal meeting had the +%question “What responsibility does FB have to prevent +%President Trump?” That has repudiated once leaked, but the age +%of innocence is behind us. Back in 2005 Google apologised when +%the hate site “jew watch news” appeared in search results for +%“jew”; but the site has morphed from tool to friend. +%Facebook’s M and Apple’s Siri are the same. This leads +%Jonathan to the idea of “information fiduciaries” whereby the +%big firms would have to put user welfare first like doctors or +%lawyers. Should Google tell you to vaccinate your child? +%Already in Europe they suppress hate speech and promote +%counter-narratives. To whom does Uber owe a fiduciary duty – +%the driver or the passenger? And should data scientists join +%divines, medics, lawyers and surveyors as a learned +%profession? + \section*{Handout 2 (E-Voting)} diff -r 2d9e005100f4 -r f65e4fa6e902 handouts/ho03.tex --- a/handouts/ho03.tex Fri May 06 13:15:08 2016 +0100 +++ b/handouts/ho03.tex Wed Jun 01 13:04:21 2016 +0100 @@ -6,6 +6,7 @@ %https://pentestn00b.wordpress.com/safe-to-hack-sites/ %http://pastebin.com/raw/0SNSvyjJ +%http://seclists.org/oss-sec/2016/q1/645 \begin{document} \fnote{\copyright{} Christian Urban, King's College London, 2014, 2015, 2016} diff -r 2d9e005100f4 -r f65e4fa6e902 handouts/ho05.tex --- a/handouts/ho05.tex Fri May 06 13:15:08 2016 +0100 +++ b/handouts/ho05.tex Wed Jun 01 13:04:21 2016 +0100 @@ -8,6 +8,8 @@ %% the expectation is that anything encrypted today, will be %% decrypted in 20 years time +%http://www.net.in.tum.de/fileadmin/TUM/teaching/netzsicherheit/ws1516/07_PKI.pdf + \section*{Handout 5 (Protocols)} Protocols are the computer science equivalent to fractals and diff -r 2d9e005100f4 -r f65e4fa6e902 handouts/ho07.tex --- a/handouts/ho07.tex Fri May 06 13:15:08 2016 +0100 +++ b/handouts/ho07.tex Wed Jun 01 13:04:21 2016 +0100 @@ -38,8 +38,13 @@ %increased message latency," Lazar notes. %http://orange.hosting.lsoft.com/trk/click?ref=znwrbbrs9_5-e70bx2d991x066779& +%%%% +%% canvas tracking +%%https://freedom-to-tinker.com/blog/englehardt/the-princeton-web-census-a-1-million-site-measurement-and-analysis-of-web-privacy/ - +%%% +%% cupit re-identification attack +%% https://nakedsecurity.sophos.com/2016/05/20/published-personal-data-on-70000-okcupid-users-taken-down-after-dmca-order/?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+nakedsecurity+%28Naked+Security+-+Sophos%29 \section*{Handout 7 (Privacy)} diff -r 2d9e005100f4 -r f65e4fa6e902 handouts/ho08.tex --- a/handouts/ho08.tex Fri May 06 13:15:08 2016 +0100 +++ b/handouts/ho08.tex Wed Jun 01 13:04:21 2016 +0100 @@ -5,6 +5,7 @@ \usepackage{../data} %https://crypto.stanford.edu/cs251/ +%https://programmingblockchain.gitbooks.io/programmingblockchain/content/ \begin{document} \fnote{\copyright{} Christian Urban, 2014, 2015} diff -r 2d9e005100f4 -r f65e4fa6e902 hws/hw01.pdf Binary file hws/hw01.pdf has changed diff -r 2d9e005100f4 -r f65e4fa6e902 hws/hw01.tex --- a/hws/hw01.tex Fri May 06 13:15:08 2016 +0100 +++ b/hws/hw01.tex Wed Jun 01 13:04:21 2016 +0100 @@ -122,6 +122,7 @@ \item Why is making bank customers liable for financial fraud a bad design choice for credit card payments? +\item \POSTSCRIPT \end{enumerate} \end{document} diff -r 2d9e005100f4 -r f65e4fa6e902 style.sty --- a/style.sty Fri May 06 13:15:08 2016 +0100 +++ b/style.sty Wed Jun 01 13:04:21 2016 +0100 @@ -58,3 +58,9 @@ \noindent Solutions will only be accepted until 30th December!}\bigskip} +\newcommand{\POSTSCRIPT}{ +{\bf (Optional)} This question is for you to provide +regular feedback to me. No need to address every aspect of the suggested question: +What were the most interesting, least interesting, or confusing parts in this lecture? Please +feel free to share any other questions or concerns.} +