1
0
Fork 0

timeblock (easy exploitation): timing and refinement

master
Mike Gerwitz 2016-03-16 23:20:44 -04:00
parent f2737d85f1
commit 9c63a44946
No known key found for this signature in database
GPG Key ID: F22BB8158EE30EAB
1 changed files with 17 additions and 15 deletions

View File

@ -598,7 +598,7 @@
%%%=== END TIMEBLOCK 8m ==============================================
%%%=== BEGIN TIMEBLOCK Nm ==============================================
%%%=== BEGIN TIMEBLOCK 4.5m ==============================================
\begin{frame}[c]
\begin{center}
@ -607,7 +607,8 @@
\lecture{Everyone is flocking to the web. And a major reason is because
of the convenience that is provided by transferring even more
control away from the user to the authors and distributors.}
control away from the user \emph{to} the authors and
distributors.}
\end{frame}
@ -637,7 +638,7 @@
\lecture{In the modern web, platform or operating system isn't a
border---you can rob someone of their freedoms anywhere, any
time, whether they're on a mobile device, their home
computer, or their refrigerator.}
computer, or their television.}
\item Automatic updates! We know best! (Ephemeral software)
\lecture{And let's not worry about those pesky users who decide to
@ -651,23 +652,22 @@
computers have a backdoor---software updates. Well, in
this case, the backdoor is the front door. You have no
option. There \emph{is no} separate installation and
update---they're one and the same. As I mentioned, we
can say that the software is ephemeral---it exists as
long as you're on the website, and then disappears until
you next load it again.}
update---they're one and the same. As I already
mentioned, we can say that the software is ephemeral---it
exists as long as you're on the website, and then
disappears until you next load it again.}
\end{itemize}
\item We control your data (SaaSS)!
\lecture{But that's not enough. How can we remove every atom of
freedom that the user has? Ah, let's also hold their data
\item We control your data and computing (SaaSS)!
\lecture{But that's not enough. How can we take even greater
advantage of the user? Ah, let's also hold their data
hostage, and control what they can and cannot do with it!}
\item So easy to spy on you!
\lecture{And what's a magnificent consequence of all of this? We get
to spy on you for free! It's part of the package! We know
exactly what you are doing, when your are doing it, how you
are doing it, and anything in-between. This is too good to
be true!}
are doing it, and anything in-between.}
\end{itemize}
\end{frame}
@ -698,6 +698,11 @@
\end{center}
\end{frame}
%%%=== END TIMEBLOCK 4.5m ==============================================
%%%=== BEGIN TIMEBLOCK Nm ==============================================
\begin{frame}{The Web Is Easy}
\lecture{Let's explore another aspect of why the Web is so appealing for
@ -765,11 +770,8 @@
\end{center}
\end{frame}
%%%=== END TIMEBLOCK Nm ==============================================
%%%=== BEGIN TIMEBLOCK Nm ==============================================
\begin{frame}{Effortless \emph{Proprietary} Software}
\lecture{While it's making software easy for the good guys, it's also
making it easy for the bad guys! And there's an explanation for