--- a/LINKS Tue Jan 16 10:23:43 2018 +0000
+++ b/LINKS Fri Jun 01 15:46:34 2018 +0100
@@ -1,3 +1,8 @@
+for HW slides and exam work
+http://phdcomics.com/comics/archive.php?comicid=1875
+http://phdcomics.com/comics/archive.php?comicid=1873
+
+
// MiM Attck using Wifi and Bitcoin mining
https://nakedsecurity.sophos.com/2018/01/09/coffeeminer-project-lets-you-hack-public-wi-fi-to-mine-cryptocoins/?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+nakedsecurity+%28Naked+Security+-+Sophos%29
Binary file handouts/ho07.pdf has changed
--- a/handouts/ho07.tex Tue Jan 16 10:23:43 2018 +0000
+++ b/handouts/ho07.tex Fri Jun 01 15:46:34 2018 +0100
@@ -4,6 +4,10 @@
\usepackage{../langs}
\usepackage{../data}
+% A critical view of Blockchain usage
+%%https://hackernoon.com/ten-years-in-nobody-has-come-up-with-a-use-case-for-blockchain-ee98c180100
+
+
%https://crypto.stanford.edu/cs251/
%https://programmingblockchain.gitbooks.io/programmingblockchain/content/
@@ -54,6 +58,8 @@
%bitcoin misconceptions
%https://www.kaspersky.com/blog/bitcoin-blockchain-issues/18019/
+% dodgy Bitcoin infrastructure
+%https://www.lightbluetouchpaper.org/2018/06/01/bitcoin-redux-crypto-crime-and-how-to-tackle-it/
\begin{document}
\fnote{\copyright{} Christian Urban, 2014, 2015}
@@ -71,7 +77,7 @@
potential government meddling. It turns out that the first
claim ignores a lot of research in de-anonymising social
networks, and the second underestimates the persuasive means a
-government has at its disposal.
+government has at its disposal.
There are a lot of articles, blogposts, research papers
etc.~available about Bitcoins. Below I will follow closely the
@@ -1000,7 +1006,7 @@
\end{document}
-bit coin
+bitcoin
A fistful of bitcoins
http://cseweb.ucsd.edu/~smeiklejohn/files/imc13.pdf
--- a/hws/hw04.tex Tue Jan 16 10:23:43 2018 +0000
+++ b/hws/hw04.tex Fri Jun 01 15:46:34 2018 +0100
@@ -8,6 +8,7 @@
\HEADER
\begin{enumerate}
+\item nosuid question \url{https://rcoh.me/posts/sudo-science/}
\item What should the architecture of a network application
under Unix be that processes potentially hostile data?