Binary file slides/slides02.pdf has changed
--- a/slides/slides02.tex Mon Sep 30 23:57:44 2013 +0100
+++ b/slides/slides02.tex Tue Oct 01 00:13:40 2013 +0100
@@ -680,15 +680,33 @@
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
\mode<presentation>{
-\begin{frame}[c]
+\begin{frame}<1-3>[c]
\frametitle{\begin{tabular}{@ {}c@ {}}Lessons Learned\end{tabular}}
\begin{itemize}
\item keep a paper trail and design your system to keep this secure\medskip
-\item make the software open source (avoid security-by-obscurity)\medskip
+\item make the software open source (avoid security-by-obscurity)\\
+{\small\mbox{}\hfill source code for Estonian vote \textcolor{blue}{\url{http://goo.gl/oRMHAI}}}\medskip
\item have a simple design in order to minimise the attack surface
\end{itemize}
+\only<2>{
+\begin{textblock}{9}(3.4,7)
+\begin{tikzpicture}
+\draw (0,0) node[inner sep=2mm,fill=cream, ultra thick, draw=red, rounded corners=2mm]
+{\normalsize\color{darkgray}
+\begin{minipage}{9cm}\consolas\small
+def analyze(ik, vote, votebox):\\
+\\
+ \# TODO: implement security checks\\
+ \# such as verifying the correct size\\
+ \# of the encrypted vote\\
+\\
+ return []
+\end{minipage}};
+\end{tikzpicture}
+\end{textblock}}
+
\end{frame}}
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%