Binary file slides/slides02.pdf has changed
--- a/slides/slides02.tex Tue Oct 01 00:13:40 2013 +0100
+++ b/slides/slides02.tex Tue Oct 01 12:59:31 2013 +0100
@@ -474,6 +474,23 @@
\end{frame}}
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
+%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
+\mode<presentation>{
+\begin{frame}[c]
+
+Which security requirements do paper ballots satisfy better than voice voting?\bigskip
+
+\begin{itemize}
+\item Integrity
+\item Enfranchisement
+\item Ballot secrecy
+\item Voter authentication
+\item Availability
+\end{itemize}
+
+\end{frame}}
+
+
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
\mode<presentation>{
\begin{frame}[t]
@@ -508,21 +525,6 @@
\end{frame}}
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
-%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
-\mode<presentation>{
-\begin{frame}[c]
-
-Which security requirements do paper ballots satisfy better than voice voting?\bigskip
-
-\begin{itemize}
-\item Integrity
-\item Enfranchisement
-\item Ballot secrecy
-\item Voter authentication
-\item Availability
-\end{itemize}
-
-\end{frame}}
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
@@ -610,7 +612,7 @@
\begin{itemize}
\item acquired a machine from an anonymous source\medskip
-\item the source code running the machine was tried to be kept secret\medskip\pause
+\item they try to keep secret the source code running the machine\medskip\pause
\item first reversed-engineered the machine (extremely tedious)
\item could completely reboot the machine and even install a virus that infects other Diebold machines
@@ -653,7 +655,7 @@
\end{center}\pause
You still have to solve problems about
-voter registration, voter authentification, guarding against tampering
+voter registration, voter authentication, guarding against tampering
\end{frame}}
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
@@ -686,7 +688,8 @@
\begin{itemize}
\item keep a paper trail and design your system to keep this secure\medskip
\item make the software open source (avoid security-by-obscurity)\\
-{\small\mbox{}\hfill source code for Estonian vote \textcolor{blue}{\url{http://goo.gl/oRMHAI}}}\medskip
+{\small\mbox{}\hfill source code for Estonian e-vote included\\
+\mbox{}\hfill\textcolor{blue}{\url{http://goo.gl/oRMHAI}}}\medskip
\item have a simple design in order to minimise the attack surface
\end{itemize}
@@ -710,6 +713,21 @@
\end{frame}}
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
+%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
+\mode<presentation>{
+\begin{frame}[c]
+\frametitle{Online Banking vs.~E-Voting}
+
+\begin{itemize}
+\item online banking: if fraud occurred you try to identify who did what (somebody's account got zero)\bigskip
+\item e-voting: some parts can be done electronically, but not the actual voting (final year project: online voting)
+\end{itemize}
+
+
+\end{frame}}
+%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
+
+
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
\mode<presentation>{