--- a/slides/slides01.tex Mon Sep 15 00:19:10 2014 +0100
+++ b/slides/slides01.tex Tue Sep 16 11:31:55 2014 +0100
@@ -1,43 +1,21 @@
\documentclass[dvipsnames,14pt,t, xelatex]{beamer}
-\usepackage{beamerthemeplaincu}
-\usepackage{fontenc,xltxtra,xunicode}
-\defaultfontfeatures{Mapping=tex-text}
-\usepackage{mathpartir}
-\usepackage[absolute,overlay]{textpos}
-\usepackage{ifthen}
-\usepackage{tikz}
-\usepackage{pgf}
-\usepackage{calc}
-\usepackage{ulem}
-\usepackage{listings}
-\renewcommand{\uline}[1]{#1}
-\usetikzlibrary{arrows}
-\usetikzlibrary{automata}
-\usetikzlibrary{shapes}
-\usetikzlibrary{shadows}
-\usetikzlibrary{positioning}
-\usetikzlibrary{calc}
-\usepackage{upquote}
-\usetikzlibrary{plotmarks}
-\usepackage{graphicx}
-\usepackage{pgfplots}
+\usepackage{../slides}
+\usepackage{../graphics}
\usepackage{../langs}
+\setmonofont[Scale=.88]{Consolas}
+\newfontfamily{\consolas}{Consolas}
-\makeatletter
-\lst@CCPutMacro\lst@ProcessOther {"2D}{\lst@ttfamily{-{}}{-{}}}
-\@empty\z@\@empty
-\makeatother
-
+\hfuzz=220pt
% beamer stuff
-\renewcommand{\slidecaption}{APP 01, King's College London, 24.~September 2013}
+\renewcommand{\slidecaption}{APP 01, King's College London}
\begin{document}
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
-\begin{frame}[t]
+\begin{frame}
\frametitle{%
\begin{tabular}{@ {}c@ {}}
\LARGE Access Control and \\[-3mm]
@@ -67,34 +45,43 @@
\end{center}
\end{frame}
- %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
+%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
\begin{frame}
\begin{center}
+\begin{tikzpicture}[scale=1.3]
+ %\draw[very thick, scale=1] (0, 0) grid (6, -4);
+ \draw (0,0) node (X) {\includegraphics[scale=0.1]{pics/rman.png}};
+ \draw (6,0) node (Y) {\includegraphics[scale=0.1]{pics/gman.png}};
+ \node[below] at (X.south) {Alice};
+ \node[below] at (Y.south) {Bob};
+
+ \draw[red,<->,line width = 3mm] (X) -- (Y);
+ \node [inner sep=5pt,label=above:{\begin{tabular}{c}
+ secure/private\\
+ communication
+ \end{tabular}}]
+ at ($ (X)!.5!(Y) $) {};
+
+ \draw (1.0,-1.5) node {\includegraphics[scale=0.05]{pics/nsa.png}};
+ \draw (2.4,-1.5) node {\includegraphics[scale=0.3]{pics/gchq.jpg}};
+ \draw (1.7,-2.3) node {\huge\ldots};
+ \draw (4.2,-1.5) node {\includegraphics[scale=0.05]{pics/apple.png}};
+ \draw (5.4,-1.7) node {\includegraphics[scale=0.15]{pics/google.png}};
+ \draw (5.0,-2.3) node {\huge\ldots};
+\end{tikzpicture}
+\end{center}
+
+\begin{center}
\includegraphics[scale=0.1]{pics/snowden.jpg}
\end{center}
-\begin{textblock}{1}(3.5,7.5)
- \begin{tikzpicture}[scale=1.3]
- \draw[white] (0,0) node (X) {\includegraphics[scale=0.1]{pics/rman.png}};
- \draw[white] (6,0) node (Y) {\includegraphics[scale=0.1]{pics/gman.png}};
- \draw[red, ->, line width = 3mm] (X) -- (Y);
- \node [inner sep=5pt,label=above:\textcolor{black}{communication}] at ($ (X)!.5!(Y) $) {};
-
- \draw[white] (1.3, -1) node (NSA) {\includegraphics[scale=0.05]{pics/nsa.png}};
- \draw[white] (2.7, -1) node (GCHQ) {\includegraphics[scale=0.3]{pics/gchq.jpg}};
- \draw[black] (2, -2) node (OTHER) {\huge\ldots};
-
- \end{tikzpicture}
-\end{textblock}
-
\end{frame}
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
-\mode<presentation>{
\begin{frame}
\begin{center}
@@ -102,84 +89,108 @@
\end{center}
\small{}\mbox{}\hfill{}
Lavabit email service closed down on 8 August 2013. \\
-\mbox{}\hfill{}\textcolor{blue}{\url{goo.gl/bgSrVp}}
-
+\mbox{}\hfill{}\url{www.goo.gl/bgSrVp}
-\end{frame}}
- %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
-
-
+\end{frame}
+%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
-\mode<presentation>{
\begin{frame}
\frametitle{Also Bad Guys}
-\only<1->{
\begin{textblock}{1}(4,2.5)
\begin{tikzpicture}[scale=1.3]
- \draw[white] (0,0) node (X) {\includegraphics[scale=0.1]{pics/rman.png}};
- \draw[white] (4,0) node (Y) {\includegraphics[scale=0.1]{pics/gman.png}};
- \draw[red, ->, line width = 2mm] (X) -- (Y);
- \node [inner sep=5pt,label=above:\textcolor{black}{}] at ($ (X)!.5!(Y) $) {};
+ \draw (0,0) node (X) {\includegraphics[scale=0.1]{pics/rman.png}};
+ \draw (4,0) node (Y) {\includegraphics[scale=0.1]{pics/gman.png}};
+ \draw[red, <->, line width = 2mm] (X) -- (Y);
\end{tikzpicture}
-\end{textblock}}
+\end{textblock}
-\only<1->{
\begin{textblock}{1}(1,6)
-\begin{tikzpicture}
-\draw (0,0) node[inner sep=2mm,fill=cream, ultra thick, draw=red, rounded corners=2mm]
-{\normalsize\color{darkgray}
-\begin{minipage}{11cm}\raggedright\footnotesize
-Annonymous Hacker operating a 10k bonnet using the ZeuS hacking tool wrote:\medskip\\
-``FYI I do not cash out the bank accounts or credit cards, I just sell the information
-(I know, its just as bad, hur dur...), there isn't even a law against such in most countries,
-dealing with stolen information is most of the time a legaly greyzone (I was just as surprised
-when I looked it up), I'm not talking about 3rd world countries, but about European like Spain
-(The Mariposa botnet owner never got charged, because a botnet isn't illegal, only abusing
-CC information is, but that did other guys).''\\
-\hfill{}\textcolor{blue}{\url{goo.gl/UWluh0}}
-\end{minipage}};
-\end{tikzpicture}
-\end{textblock}}
+\begin{bubble}[11cm]
+\footnotesize
+Annonymous Hacker operating a 10k bonnet using the ZeuS
+hacking tool wrote:\medskip\\ ``FYI I do not cash out the bank
+accounts or credit cards, I just sell the information (I know,
+its just as bad...), there isn't even a law against
+such in most countries, dealing with stolen information is
+most of the time a legally greyzone (I was just as surprised
+when I looked it up), I'm not talking about 3rd world
+countries, but about European like Spain (The Mariposa botnet
+owner never got charged, because a botnet isn't illegal, only
+abusing CC information is, but that did other guys).''\\
+\hfill{}\url{www.goo.gl/UWluh0}
+\end{bubble}
+\end{textblock}
-
-\end{frame}}
- %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
+\end{frame}
+%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
-\mode<presentation>{
\begin{frame}
\frametitle{\begin{tabular}{@ {}c@ {}}This is a Misconception!\end{tabular}}
-
\begin{center}
-\includegraphics[scale=0.6]{pics/cryptographic-small.png}
+\includegraphics[scale=0.55]{pics/cryptographic-small.png}
\end{center}
-Though, the NSA can probably not brute-force magically better than the ``public''.
-\end{frame}}
- %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
+There is some consensus that the NSA can probably not
+brute-force magically better than the ``public''.
+
+\end{frame}
+%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
+
+%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
+\begin{frame}[c]
+The content of this course is very much inspired by the work of
+three people:\bigskip
+
+\small
+\begin{center}
+\begin{tabular}{ccc}
+\includegraphics[scale=1.4]{pics/schneier.png} &
+\includegraphics[scale=0.103]{pics/ross.jpg} &
+\includegraphics[scale=0.2]{pics/halderman.jpg} \\
+Bruce Schneier & Ross Anderson & Alex Halderman\\
+\tiny\url{en.wikipedia.org/wiki/Bruce_Schneier} &
+\tiny\url{www.cl.cam.ac.uk/~rja14} &
+\tiny\url{jhalderm.com}
+\end{tabular}
+\end{center}
+
+\end{frame}
+%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
-\mode<presentation>{
\begin{frame}[c]
-\frametitle{\begin{tabular}{@ {}c@ {}}Security Engineers\end{tabular}}
-\small\alert{\bf Security engineers} require a particular \alert{\bf mindset}:\bigskip
+\alert{\bf Security engineers} require a particular \alert{\bf mindset}:
+\bigskip\medskip
-\begin{tikzpicture}
-\draw (0,0) node[inner sep=2mm,fill=cream, ultra thick, draw=red, rounded corners=2mm]
-{\normalsize\color{darkgray}
-\begin{minipage}{10cm}\raggedright\small
-``Security engineers --- at least the good ones --- see the world differently.
-They can't walk into a store without noticing how they might shoplift. They can't
-use a computer without wondering about the security vulnerabilities. They can't
-vote without trying to figure out how to vote twice. They just can't help it.''\\
+\begin{overlayarea}{\textwidth}{5cm}
+\small
+\only<1>{\begin{bubble}[10cm]
+``Security engineers --- at least the good ones --- see
+the world differently. They can't walk into a store without
+noticing how they might shoplift. They can't use a computer
+without wondering about the security vulnerabilities. They
+can't vote without trying to figure out how to vote twice.
+They just can't help it.''\\
\hfill{}---Bruce Schneier
-\end{minipage}};
-\end{tikzpicture}
+\end{bubble}}%
+\only<2>{\begin{bubble}[10.5cm]
+``Security engineering\ldots requires you to think
+differently. You need to figure out not how something works,
+but how something can be made to not work. You have to imagine
+an intelligent and malicious adversary inside your system
+\ldots, constantly trying new ways to
+subvert it. You have to consider all the ways your system can
+fail, most of them having nothing to do with the design
+itself. You have to look at everything backwards, upside down,
+and sideways. You have to think like an alien.''\hfill{}---Bruce Schneier
+\end{bubble}}
+\end{overlayarea}
\begin{flushright}
\includegraphics[scale=0.0087]{pics/schneierbook1.jpg}\;
@@ -188,44 +199,72 @@
\includegraphics[scale=0.85]{pics/schneier.png}
\end{flushright}
-
-\end{frame}}
+\end{frame}
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
-\mode<presentation>{
\begin{frame}[c]
-\frametitle{\begin{tabular}{@ {}c@ {}}Breaking Things\end{tabular}}
+\frametitle{Breaking Things}
For example:
\begin{center}
-\begin{tikzpicture}
-\draw (0,0) node[inner sep=2mm,fill=cream, ultra thick, draw=red, rounded corners=2mm]
-{\normalsize\color{darkgray}
-\begin{minipage}{10cm}\raggedright\small
-Prof.~V.~Nasty gives the following final exam question (closed books, closed notes):\bigskip
+\begin{bubble}[10cm]\small
+Prof.~V.~Nasty gives the following final exam question (closed books,
+closed notes):\bigskip
\noindent
\begin{tabular}{@ {}l}
Write the first 100 digits of $\pi$:\\
3.\_\,\_\,\_\,\_\,\_\,\_\,\_\,\_\,\_\,\_\,\_\,\_\,\_\,\_\,\_\,\_\,\_\,\_\,\_\,\_\,\_\,\_\,\_\,\_\,\_\,\_\,\_\,\_\,\_\,\_\,\_\,\_\,\_\,\_\,\_\,\_
\end{tabular}
-\end{minipage}};
-\end{tikzpicture}
+\end{bubble}
\end{center}
How can you cheat in this exam and how can you defend against such cheating?
-\end{frame}}
+\end{frame}
+%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
+
+%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
+\begin{frame}
+\frametitle{\textcolor{red}{Warning}}
+\small
+
+\begin{itemize}
+\item<1-> I will be teaching techniques that can be used to
+ compromise security and privacy.
+\end{itemize}
+
+\onslide<2->{
+\begin{itemize}
+\item Don’t be evil!
+\only<3>{\item Using those techniques in the real world may
+violate the law or King’s rules, and it may be unethical.}
+\only<3>{\item Under some circumstances, even probing for weaknesses of a
+system may result in severe penalties, up to and including
+expulsion, fines and jail time.}
+\only<3>{\item Acting lawfully and ethically is \underline{your} responsibility.}
+\only<4>{\item Ethics requires you to
+refrain from doing harm.}
+\only<4>{\item \underline{Always} respect privacy and rights of
+others.}
+\only<4>{\item Do not tamper with any of King's systems.}
+\only<5>{\item If you try
+out a technique, always make doubly sure you are working in a
+safe environment so that you cannot cause any harm, not even
+accidentally.}
+\only<5>{\item Don't be evil. Be an \underline{ethical} hacker.}
+\end{itemize}}
+
+\end{frame}
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
-\mode<presentation>{
\begin{frame}[c]
-\frametitle{\begin{tabular}{@ {}c@ {}}Chip-and-PIN\end{tabular}}
+\frametitle{Chip-and-PIN}
\begin{center}
\includegraphics[scale=0.3]{pics/creditcard1.jpg}\;
@@ -234,48 +273,43 @@
\begin{itemize}
\item Chip-and-PIN was introduced in the UK in 2004
-\item before that customers had to sign a receipt\medskip
-\item Is Chip-and-PIN a more secure system?
+\item before that customers had to sign a receipt\bigskip
+\item \bf Is Chip-and-PIN a more secure system?
\end{itemize}
\begin{flushright}
-\small\textcolor{gray}{(Some other countries still use the old method.)}
+\small\textcolor{gray}{(some other countries still use the old method)}
\end{flushright}
-
-\end{frame}}
+\end{frame}
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
-
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
-\mode<presentation>{
\begin{frame}[c]
-\frametitle{\begin{tabular}{@ {}c@ {}}Yes \ldots\end{tabular}}
+\frametitle{Yes \ldots}
-\begin{tikzpicture}
-\draw (0,0) node[inner sep=2mm,fill=cream, ultra thick, draw=red, rounded corners=2mm]
-{\normalsize\color{darkgray}
-\begin{minipage}{10cm}\raggedright\small
-``Chip-and-PIN is so effective in this country [UK] that fraudsters are starting to move their activities overseas,''
-said Emile Abu-Shakra, spokesman for Lloyds TSB (in the Guardian, 2006).
-\end{minipage}};
-\end{tikzpicture}\bigskip
+\begin{bubble}[10cm]
+\small ``Chip-and-PIN is so effective in this country [UK]
+that fraudsters are starting to move their activities
+overseas,''\smallskip\\
+\hfill{}said some spokesman for Lloyds TSB\\
+\hfill(in The Guardian, 2006)
+\end{bubble}\bigskip
\begin{itemize}
\item mag-stripe cards cannot be cloned anymore
\item stolen or cloned cards need to be used abroad
-\item fraud on lost, stolen and counterfeit credit cards was down \pounds{}60m (24\%) on 2004's figure
+\item fraud on lost, stolen and counterfeit credit
+cards was down \pounds{60m} (24\%) on 2004's figure
\end{itemize}
-
-\end{frame}}
+\end{frame}
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
-\mode<presentation>{
\begin{frame}[c]
-\frametitle{\begin{tabular}{c}But let's see \ldots\end{tabular}}
+\frametitle{But let's see}
\begin{textblock}{1}(3,4)
@@ -344,48 +378,44 @@
\end{tikzpicture}
\end{textblock}}
-\end{frame}}
+\end{frame}
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
-\mode<presentation>{
\begin{frame}[c]
-\frametitle{\begin{tabular}{c}Chip-and-PIN\end{tabular}}
-
+\frametitle{Chip-and-PIN}
\begin{itemize}
\item A ``tamperesitant'' terminal playing Tetris on
-\textcolor{blue}{\href{http://www.youtube.com/watch?v=wWTzkD9M0sU}{youtube}}.\\
-\textcolor{lightgray}{\footnotesize(\url{http://www.youtube.com/watch?v=wWTzkD9M0sU})}
+\href{http://www.youtube.com/watch?v=wWTzkD9M0sU}{youtube}.\smallskip\\
+\footnotesize(\url{http://www.youtube.com/watch?v=wWTzkD9M0sU})
\end{itemize}
-
\includegraphics[scale=0.2]{pics/tetris.jpg}
-
-\end{frame}}
+\end{frame}
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
-\mode<presentation>{
-\begin{frame}[c]
-\frametitle{\begin{tabular}{c}Chip-and-PIN\end{tabular}}
-
+\begin{frame}
+\frametitle{Chip-and-PIN}
\begin{itemize}
-\item in 2006, Shell petrol stations stopped accepting Chip-and-PIN after \pounds{}1m had been stolen from customer accounts\smallskip
-\item in 2008, hundreds of card readers for use in Britain, Ireland, the Netherlands, Denmark, and Belgium had been
-expertly tampered with shortly after manufacture so that details and PINs of credit cards were sent during the 9 months
-before over mobile phone networks to criminals in Lahore, Pakistan
+\item in 2006, Shell petrol stations stopped accepting Chip-and-PIN after
+ \pounds{1M} had been stolen from customer accounts\smallskip
+\item in 2008, hundreds of card readers for use in Britain, Ireland,
+ the Netherlands, Denmark, and Belgium had been expertly tampered with
+ shortly after manufacture so that details and PINs of credit cards
+ were sent during the 9 months before over mobile phone networks
+ to criminals in Lahore, Pakistan
\end{itemize}
-\end{frame}}
+\end{frame}
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
-\mode<presentation>{
\begin{frame}[c]
-\frametitle{\begin{tabular}{c}Chip-and-PIN is Broken\end{tabular}}
+\frametitle{Chip-and-PIN is Broken}
\begin{flushright}
\includegraphics[scale=0.01]{pics/andersonbook1.jpg}\;
@@ -400,21 +430,20 @@
\mbox{}\hspace{-20mm}\includegraphics[scale=0.5]{pics/chip-attack.png}
\end{center}
-
\begin{textblock}{1}(11.5,13.7)
\begin{tabular}{l}
\footnotesize on BBC Newsnight\\[-2mm]
-\footnotesize in 2010 or \textcolor{blue}{\href{http://www.youtube.com/watch?v=JPAX32lgkrw}{youtube}}
+\footnotesize in 2010 or
+\href{http://www.youtube.com/watch?v=JPAX32lgkrw}{youtube}
\end{tabular}
\end{textblock}
-\end{frame}}
+\end{frame}
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
-\mode<presentation>{
\begin{frame}[c]
-\frametitle{\Large\begin{tabular}{@ {}c@ {}}Chip-and-PIN is Really Broken\end{tabular}}
+\frametitle{\Large Chip-and-PIN is Really Broken}
\begin{flushright}
\includegraphics[scale=0.01]{pics/andersonbook1.jpg}\;
@@ -423,17 +452,16 @@
\begin{itemize}
\item same group successfully attacked in 2012 card readers and ATM machines
-\item the problem: several types of ATMs generate poor random numbers, which are used as nonces
+\item the problem: several types of ATMs generate poor random numbers,
+ which are used as nonces
\end{itemize}
-\end{frame}}
+\end{frame}
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
-\mode<presentation>{
\begin{frame}[c]
-\frametitle{\begin{tabular}{c}The Real Problem \ldots\end{tabular}}
-
+\frametitle{The Real Problem \ldots}
\begin{textblock}{1}(3,4)
\begin{tabular}{c}
@@ -504,39 +532,34 @@
\end {itemize}
\end{textblock}
-\end{frame}}
+\end{frame}
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
-\mode<presentation>{
-\begin{frame}
-\frametitle{\begin{tabular}{@ {}c@ {}}The Bad Guy Again\end{tabular}}
-
+\begin{frame}[c]
+\frametitle{The Bad Guy Again}
-\only<1->{
-\begin{textblock}{1}(1,4)
-\begin{tikzpicture}
-\draw (0,0) node[inner sep=2mm,fill=cream, ultra thick, draw=red, rounded corners=2mm]
-{\normalsize\color{darkgray}
-\begin{minipage}{11cm}\raggedright\footnotesize
-The Annonymous Hacker from earlier:\medskip\\
-``Try to use `Verified-By-Visa' and `Mastercard-Securecode' as rarely as possible. If only your CVV2 code is getting sniffed, you are not liable for any damage, because the code is physically printed and could have been stolen while you payed with your card at a store. Same applies if someone cloned your CC reading the magnetic stripe or sniffing RFID. Only losing your VBV or MCSC password can cause serious trouble.''\\
-\hfill{}\textcolor{blue}{\url{goo.gl/UWluh0}}
-\end{minipage}};
-\end{tikzpicture}
-\end{textblock}}
+\begin{bubble}[10cm]
+\footnotesize
+The anonymous hacker from earlier:\medskip\\ ``Try to use
+`Verified-By-Visa' and `Mastercard-Securecode' as rarely as
+possible. If only your CVV2 code is getting sniffed, you are
+not liable for any damage, because the code is physically
+printed and could have been stolen while you payed with your
+card at a store. Same applies if someone cloned your CC
+reading the magnetic stripe or sniffing RFID. Only losing your
+VBV or MCSC password can cause serious trouble.''\\
+\hfill{}\url{goo.gl/UWluh0}
+\end{bubble}
-
-\end{frame}}
- %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
+\end{frame}
+%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
-\mode<presentation>{
\begin{frame}[c]
-\frametitle{\begin{tabular}{c}Being Screwed Again\end{tabular}}
-
+\frametitle{Being Screwed Again}
\begin{flushright}
\includegraphics[scale=0.3]{pics/rbssecure.jpg}
@@ -544,18 +567,17 @@
\begin{itemize}
\item {\bf Responsibility}\\
-``You understand that you are financially responsible for all uses of RBS Secure.''\\
-\textcolor{lightgray}{\footnotesize\url{https://www.rbssecure.co.uk/rbs/tdsecure/terms_of_use.jsp}}
+``You understand that you are financially responsible for all uses
+of RBS Secure.''\medskip\\
+\footnotesize\url{https://www.rbssecure.co.uk/rbs/tdsecure/terms_of_use.jsp}
\end{itemize}
-\end{frame}}
+\end{frame}
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
-\mode<presentation>{
\begin{frame}[c]
-\frametitle{\begin{tabular}{c}Web Applications\end{tabular}}
-
+\frametitle{Web Applications}
\begin{textblock}{1}(2,5)
\begin{tabular}{c}
@@ -592,14 +614,13 @@
\end{itemize}
\end{textblock}
-\end{frame}}
+\end{frame}
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
-\mode<presentation>{
\begin{frame}[c]
-\frametitle{\begin{tabular}{c}Why Scala?\end{tabular}}
+\frametitle{Why Scala?}
\begin{textblock}{6}(1,3)
\begin{tabular}{l}
@@ -648,38 +669,36 @@
\only<5->{
\begin{textblock}{1}(3,6)
-\begin{tikzpicture}
-\draw (0,0) node[inner sep=2mm,fill=cream, ultra thick, draw=red, rounded corners=2mm]
-{\normalsize\color{darkgray}
-\begin{minipage}{8.5cm}\raggedright\normalsize
-Scala is a functional and object-oriented programming language; compiles to the JVM; does not
-need null-pointer exceptions; a course on Coursera\\
-\mbox{}\hfill\textcolor{blue}{\url{http://www.scala-lang.org}}
-\end{minipage}};
-\end{tikzpicture}
+\begin{bubble}[8.5cm]
+\normalsize
+Scala is a functional and object-oriented programming
+language; compiles to the JVM; does not need null-pointer
+exceptions; a course on Coursera\\
+\mbox{}\hfill\url{http://www.scala-lang.org}
+\end{bubble}
\end{textblock}}
-\end{frame}}
+\end{frame}
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
-\mode<presentation>{
\begin{frame}[c]
-\frametitle{\begin{tabular}{c}Scala + Play\end{tabular}}
+\frametitle{Scala + Play}
+
+A simple response from the server:
-\small a simple response from the server:
+\small
+\lstinputlisting{../progs/app0.scala}
+\medskip
+
+\small
+alternative response:\smallskip\\
-{\lstset{language=Scala}\fontsize{8}{10}\selectfont
-\texttt{\lstinputlisting{../progs/app0.scala}}}\bigskip
+\lstinline{Ok("<H1>Hello world!</H1>").as(HTML)}
-\small
-alternative response:\\
-
-{\lstset{language=Scala}\fontsize{8}{10}\selectfont
-\texttt{\lstinline{Ok("<H1>Hello world!</H1>").as(HTML)}}}
-\end{frame}}
+\end{frame}
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%