Binary file slides/pics/appel.jpg has changed
Binary file slides/pics/cryptographic-small.png has changed
Binary file slides/pics/gchq.jpg has changed
Binary file slides/pics/lavabit-email.jpg has changed
Binary file slides/pics/nsa.png has changed
Binary file slides/slides01.pdf has changed
--- a/slides/slides01.tex Mon Sep 23 14:59:28 2013 +0100
+++ b/slides/slides01.tex Mon Sep 23 17:02:24 2013 +0100
@@ -119,10 +119,95 @@
\mode<presentation>{
\begin{frame}
+\onslide<-1>{
\begin{center}
\includegraphics[scale=0.1]{pics/snowden.jpg}
+\small{}
+\end{center}}
+
+\only<1->{
+\begin{textblock}{1}(4.5,7.5)
+ \begin{tikzpicture}[scale=1.3]
+ \draw[white] (0,0) node (X) {\includegraphics[scale=0.1]{pics/rman.png}};
+ \draw[white] (4,0) node (Y) {\includegraphics[scale=0.1]{pics/gman.png}};
+ \draw[red, ->, line width = 2mm] (X) -- (Y);
+ \node [inner sep=5pt,label=above:\textcolor{black}{}] at ($ (X)!.5!(Y) $) {};
+
+ \draw[white] (1.3, -1) node (NSA) {\includegraphics[scale=0.05]{pics/nsa.png}};
+ \draw[white] (2.7, -1) node (GCHQ) {\includegraphics[scale=0.3]{pics/gchq.jpg}};
+ \draw[black] (2, -2) node (OTHER) {\huge\ldots};
+
+ \end{tikzpicture}
+\end{textblock}}
+
+\end{frame}}
+ %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
+
+%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
+\mode<presentation>{
+\begin{frame}
+
+\begin{center}
+\includegraphics[scale=0.45]{pics/lavabit-email.jpg}
+\end{center}
+\small{}\mbox{}\hfill{}
+Lavabit email service closed down on 8 August 2013. \\
+\mbox{}\hfill{}\textcolor{blue}{\url{goo.gl/bgSrVp}}
+
+
+\end{frame}}
+ %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
+
+
+
+%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
+\mode<presentation>{
+\begin{frame}
+\frametitle{\begin{tabular}{@ {}c@ {}}Also Bad Guys\end{tabular}}
+
+\only<1->{
+\begin{textblock}{1}(4,2.5)
+ \begin{tikzpicture}[scale=1.3]
+ \draw[white] (0,0) node (X) {\includegraphics[scale=0.1]{pics/rman.png}};
+ \draw[white] (4,0) node (Y) {\includegraphics[scale=0.1]{pics/gman.png}};
+ \draw[red, ->, line width = 2mm] (X) -- (Y);
+ \node [inner sep=5pt,label=above:\textcolor{black}{}] at ($ (X)!.5!(Y) $) {};
+ \end{tikzpicture}
+\end{textblock}}
+
+\only<1->{
+\begin{textblock}{1}(1,6)
+\begin{tikzpicture}
+\draw (0,0) node[inner sep=2mm,fill=cream, ultra thick, draw=red, rounded corners=2mm]
+{\normalsize\color{darkgray}
+\begin{minipage}{11cm}\raggedright\footnotesize
+Annonymous Hacker operating a 10k bonnet using the ZeuS hacking tool wrote:\medskip\\
+``FYI I do not cash out the bank accounts or credit cards, I just sell the information
+(I know, its just as bad, hur dur...), there isn't even a law against such in most countries,
+dealing with stolen information is most of the time a legaly greyzone (I was just as surprised
+when I looked it up), I'm not talking about 3rd world countries, but about European like Spain
+(The Mariposa botnet owner never got charged, because a botnet isn't illegal, only abusing
+CC information is, but that did other guys).''\\
+\hfill{}\textcolor{blue}{\url{goo.gl/UWluh0}}
+\end{minipage}};
+\end{tikzpicture}
+\end{textblock}}
+
+
+\end{frame}}
+ %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
+
+%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
+\mode<presentation>{
+\begin{frame}
+\frametitle{\begin{tabular}{@ {}c@ {}}This is a Misconception!\end{tabular}}
+
+
+\begin{center}
+\includegraphics[scale=0.6]{pics/cryptographic-small.png}
\end{center}
+The NSA can probably not brute force magically better than the ``public''.
\end{frame}}
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
@@ -348,7 +433,7 @@
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
\mode<presentation>{
\begin{frame}[c]
-\frametitle{\begin{tabular}{@ {}c@ {}}Chip-and-PIN is Really Broken\end{tabular}}
+\frametitle{\Large\begin{tabular}{@ {}c@ {}}Chip-and-PIN is Really Broken\end{tabular}}
\begin{flushright}
\includegraphics[scale=0.01]{pics/andersonbook1.jpg}\;