updated
authorChristian Urban <urbanc@in.tum.de>
Fri, 01 Jun 2018 15:46:34 +0100
changeset 564 3391a4fc3533
parent 563 9b45079eacea
child 565 d58f8e3e78a5
updated
LINKS
handouts/ho07.pdf
handouts/ho07.tex
hws/hw04.tex
--- a/LINKS	Tue Jan 16 10:23:43 2018 +0000
+++ b/LINKS	Fri Jun 01 15:46:34 2018 +0100
@@ -1,3 +1,8 @@
+for HW slides and exam work
+http://phdcomics.com/comics/archive.php?comicid=1875
+http://phdcomics.com/comics/archive.php?comicid=1873
+
+
 // MiM Attck using Wifi and Bitcoin mining
 https://nakedsecurity.sophos.com/2018/01/09/coffeeminer-project-lets-you-hack-public-wi-fi-to-mine-cryptocoins/?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+nakedsecurity+%28Naked+Security+-+Sophos%29
 
Binary file handouts/ho07.pdf has changed
--- a/handouts/ho07.tex	Tue Jan 16 10:23:43 2018 +0000
+++ b/handouts/ho07.tex	Fri Jun 01 15:46:34 2018 +0100
@@ -4,6 +4,10 @@
 \usepackage{../langs}
 \usepackage{../data}
 
+% A critical view of Blockchain usage
+%%https://hackernoon.com/ten-years-in-nobody-has-come-up-with-a-use-case-for-blockchain-ee98c180100
+
+
 %https://crypto.stanford.edu/cs251/
 %https://programmingblockchain.gitbooks.io/programmingblockchain/content/
 
@@ -54,6 +58,8 @@
 %bitcoin misconceptions
 %https://www.kaspersky.com/blog/bitcoin-blockchain-issues/18019/
 
+% dodgy Bitcoin infrastructure
+%https://www.lightbluetouchpaper.org/2018/06/01/bitcoin-redux-crypto-crime-and-how-to-tackle-it/
 
 \begin{document}
 \fnote{\copyright{} Christian Urban, 2014, 2015}
@@ -71,7 +77,7 @@
 potential government meddling. It turns out that the first
 claim ignores a lot of research in de-anonymising social
 networks, and the second underestimates the persuasive means a
-government has at its disposal. 
+government has at its disposal.   
 
 There are a lot of articles, blogposts, research papers
 etc.~available about Bitcoins. Below I will follow closely the
@@ -1000,7 +1006,7 @@
 
 \end{document}
 
-bit coin
+bitcoin
 
 A fistful of bitcoins
 http://cseweb.ucsd.edu/~smeiklejohn/files/imc13.pdf
--- a/hws/hw04.tex	Tue Jan 16 10:23:43 2018 +0000
+++ b/hws/hw04.tex	Fri Jun 01 15:46:34 2018 +0100
@@ -8,6 +8,7 @@
 \HEADER
 
 \begin{enumerate}
+\item nosuid question \url{https://rcoh.me/posts/sudo-science/}
 \item What should the architecture of a network application
       under Unix be that processes potentially hostile data?