1
0
Fork 0

issue introduction: reduce transitions with minor refinement

master
Mike Gerwitz 2016-03-18 12:50:20 -04:00
parent aa58b1c36d
commit 8c2e9ccda5
No known key found for this signature in database
GPG Key ID: F22BB8158EE30EAB
1 changed files with 12 additions and 12 deletions

View File

@ -384,7 +384,7 @@
\begin{frame}[c]{Just Say ``Yes!''...and ``Yes!'' and ``Yes!'' and ``Yes!''...}
\begin{itemize}
\item<+-> Everyone expects their code to run, always, or there's
\item<1-> Everyone expects their code to run, always, or there's
something wrong with your browser
\lecture{So if your browser doesn't default to saying ``yes'' to
@ -396,18 +396,18 @@
even though it would make its users safer. No, that would
``break'' websites.}
\item<+-> But most browsers today give you a binary choice:
\item<2-> But most browsers today give you a binary choice:
\lecture{But let's say you are one of those people who might be a
little uncomfortable with this situation, and want to do
something about it. Well, with most browsers, what are your
options?}
\begin{enumerate}[<+->]
\item No---disable JavaScript
\item<2-> No---disable JavaScript
\lecture{You could disable JavaScript completely. But there might
be \emph{some} things that you'd like to run.}
\item Yes---run everything!
\item<2-> Yes---run everything!
\lecture{Or you could run everything! Good choices here. These
are clearly not choices that taken into consideration
these issues.}
@ -415,7 +415,7 @@
\lecture{Now, many people will simply say, ``Well, I trust the sites I
visit.''}
\item<+-> You aren't just running that site's JavaScript
\item<3-> You aren't just running that site's JavaScript
\lecture{But it's very important to understand that you aren't just
running the programs for that website. That website might
also include code from other servers---like CDNs. It might
@ -445,17 +445,17 @@
software through that distro's package manager. GNU Guix
is a pretty good one to try.}
\item<4-> Source distribution (tarballs/etc)
\item<3-> Source distribution (tarballs/etc)
\lecture{You might compile from source. That's even more of an
explicit process.}
\item<5-> Binaries (especially on proprietary operating systems)
\item<3-> Binaries (especially on proprietary operating systems)
\lecture{And, as is usually necessary on proprietary operating
systems, there are binaries. They might be downloaded from
a website or a walled weed garden,}
\end{itemize}
\item<6-> There is a conscious effort made by the user
\item<4-> There is a conscious effort made by the user
\lecture{but in any case, it's generally a conscious operation all the
same. Even users of proprietary operating systems don't like
when things appear on their computer without having been
@ -475,7 +475,7 @@
for you to receive by using cryptographic signatures. I'm
not getting into those caveats here.}
\item<2-> Many projects distribute detached signatures for manual
\item<1-> Many projects distribute detached signatures for manual
verification
\lecture{In the case of source distributions, detached signatures are
often used. You'll see this with GNU programs, for
@ -484,7 +484,7 @@
GPG to verify that your download is what the author
actually signed.}
\item<3-> No such thing exists for the Web
\item<2-> No such thing exists for the Web
\lecture{...We don't have this type of thing for the web.}
\item<4-> I wish I had time to discuss this
@ -496,10 +496,10 @@
\lecture{I really wish I had the time to discuss this on a more
technical level, but I don't. Like I said---it's a
presentation about problems, and there's a lot of them to get
to in 45 minutes!}
to in such a short talk!}
\end{itemize}
\lecture{But what does the absence of user control mean?}
\lecture{So what does the absence of user control mean?}
\end{frame}
%%%=== END TIMEBLOCK 8m ==============================================