updated
authorChristian Urban <christian dot urban at kcl dot ac dot uk>
Wed, 05 Oct 2016 08:50:44 +0100
changeset 469 7d4aa41b748e
parent 468 e4a2807ac7f2
child 470 6764a249118a
updated
handouts/ho05.tex
hws/hw07.pdf
hws/hw07.tex
slides/slides02.pdf
slides/slides02.tex
--- a/handouts/ho05.tex	Tue Oct 04 22:56:04 2016 +0100
+++ b/handouts/ho05.tex	Wed Oct 05 08:50:44 2016 +0100
@@ -14,6 +14,8 @@
 %http://www.hackingarticles.in/hack-password-using-rogue-wi-fi-access-point-attack-wifi-pumpkin/
 %https://github.com/P0cL4bs/WiFi-Pumpkin
 
+%http://routersecurity.org/index.php
+
 \section*{Handout 5 (Protocols)}
 
 Protocols are the computer science equivalent to fractals and
Binary file hws/hw07.pdf has changed
--- a/hws/hw07.tex	Tue Oct 04 22:56:04 2016 +0100
+++ b/hws/hw07.tex	Wed Oct 05 08:50:44 2016 +0100
@@ -23,42 +23,42 @@
       do with you and grandmother testing the latest
       encryption technology, nor just for the sake of it.)
 
-\item One part of achieving privacy (but not the only one) is
-      to properly encrypt your conversations on the Internet.
-      But this is fiercely resisted by some spy agencies.
-      These agencies (and some politicians for that
-      matter) argue that, for example, ISIL's recruiters
-      broadcast messages on, say, Twitter, and get people to
-      follow them. Then they move potential recruits to
-      Twitter Direct Messaging to evaluate if they are a
-      legitimate recruit. If yes, they move them to an
-      encrypted mobile-messaging app. The spy agencies argue
-      that although they can follow the conversations on
-      Twitter, they ``go dark'' on the encrypted message
-      app. To counter this ``going-dark problem'', the spy
-      agencies push for the implementation of back-doors in
-      iMessage and Facebook and Skype and everything else UK
-      or US-made, which they can use eavesdrop on
-      conversations without the conversants' knowledge or
-      consent.\medskip
+\item One part of achieving privacy (but not the only one) is to
+  properly encrypt your conversations on the Internet.  But this is
+  fiercely resisted by some spy agencies.  These agencies (and some
+  politicians for that matter) argue that, for example, ISIL's
+  recruiters broadcast messages on, say, Twitter, and get people to
+  follow them. Then they move potential recruits to Twitter Direct
+  Messaging to evaluate if they are a legitimate recruit. If yes, they
+  move them to an encrypted mobile-messaging app. The spy agencies
+  argue that although they can follow the conversations on Twitter,
+  they ``go dark'' on the encrypted message app. To counter this
+  ``going-dark problem'', the spy agencies push for the implementation
+  of back-doors in iMessage and Facebook and Skype and everything else
+  UK or US-made, which they can use eavesdrop on conversations without
+  the conversants' knowledge or consent.\medskip
    
-      What is the fallacy in the spy agencies going-dark
-      argument? (Hint: Think what would happen if the spy
-      agencies and certain politicians get their wish.)
+      What is the fallacy in the spy agencies going-dark argument?
+      (Hint: Think what would happen if the spy agencies and certain
+      politicians get their wish.)
        
-\item DNA data is very sensitive and can easily violate the
-      privacy of (living) people. To get around this, two
-      scientists from Denmark proposed to create a
-      \emph{necrogenomic database} which would record the DNA
-      data of all Danish citizens and residents at the time of
-      their \emph{death}. By matching these to information
-      about illnesses and ailments in life, helpful evidence
-      could be gathered about the genetic origins of diseases.
-      The idea is that the privacy of dead people cannot be
-      violated.
+\item DNA data is very sensitive and can easily violate the privacy of
+  (living) people. To get around this, two scientists from Denmark
+  proposed to create a \emph{necrogenomic database} which would record
+  the DNA data of all Danish citizens and residents at the time of
+  their \emph{death}. By matching these to information about illnesses
+  and ailments in life, helpful evidence could be gathered about the
+  genetic origins of diseases.  The idea is that the privacy of dead
+  people cannot be violated.
 
       What is the fallacy behind this reasoning?
-           
+
+\item A few years ago a Google executive tried to allay worries about
+  Google pooring over all your emails on Gmail. He said something
+  along the lines: you are watched by an algorithm; this is like being
+  naked in front of your dog. What is wrong with this argument?
+
+\item \POSTSCRIPT  
 \end{enumerate} 
 \end{document}
 
Binary file slides/slides02.pdf has changed
--- a/slides/slides02.tex	Tue Oct 04 22:56:04 2016 +0100
+++ b/slides/slides02.tex	Wed Oct 05 08:50:44 2016 +0100
@@ -587,7 +587,7 @@
 
 \begin{itemize}
 \item acquired a machine from an anonymous source\medskip
-\item they try to keep secret the source code running on the machine\medskip\pause
+\item they tried to keep secret the source code running on the machine\medskip\pause
 
 \item first reversed-engineered the machine (extremely tedious)
 \item could completely reboot the machine and even install a virus that infects other Diebold machines