slides.org (Stationary) [Surveillance Cameras]: Break out notes
parent
22732b0e8e
commit
35ff64870e
51
slides.org
51
slides.org
|
@ -37,11 +37,11 @@
|
|||
| *** Modem | | DRAFT | |
|
||||
|------------------------------------+----------+---------+---------------|
|
||||
| * Stationary [0/5] | 0:08 | RAW | |
|
||||
| ** Introduction [0/1] | 0:00 | RAW | ignoreheading |
|
||||
| *** Introduction | 00:00:30 | RAW | fullframe |
|
||||
| ** Surveillance Cameras [0/2] | 0:00 | RAW | |
|
||||
| *** Unavoidable | | RAW | |
|
||||
| *** Access to Data | 00:00:30 | RAW | |
|
||||
| ** Introduction [0/1] | 0:00 | DRAFT | ignoreheading |
|
||||
| *** Introduction | 00:00:30 | DRAFT | fullframe |
|
||||
| ** Surveillance Cameras [0/2] | 0:00 | DRAFT | |
|
||||
| *** Unavoidable Surveillance | | DRAFT | |
|
||||
| *** Access to Data | 00:00:30 | DRAFT | |
|
||||
| ** Internet of Things [0/4] | 0:04 | RAW | |
|
||||
| *** Wide Open | 00:00:30 | RAW | |
|
||||
| *** Lack of Security | 00:01:30 | RAW | |
|
||||
|
@ -107,7 +107,7 @@
|
|||
| *** Status Quo | 00:02 | RAW | |
|
||||
| *** Push Back | 00:01 | RAW | |
|
||||
|------------------------------------+----------+---------+---------------|
|
||||
| * Local Variabes | | | |
|
||||
| * Local Variables | | | |
|
||||
#+END
|
||||
|
||||
|
||||
|
@ -372,23 +372,39 @@ So even with Replicant,
|
|||
|
||||
|
||||
* RAW Stationary [0/5]
|
||||
** RAW Introduction [0/1] :B_ignoreheading:
|
||||
** DRAFT Introduction [0/1] :B_ignoreheading:
|
||||
:PROPERTIES:
|
||||
:BEAMER_env: ignoreheading
|
||||
:END:
|
||||
*** RAW Introduction :B_fullframe:
|
||||
*** DRAFT Introduction :B_fullframe:
|
||||
:PROPERTIES:
|
||||
:DURATION: 00:00:30
|
||||
:BEAMER_env: fullframe
|
||||
:END:
|
||||
|
||||
#+BEGIN_CENTER
|
||||
Certain types of tracking are unavoidable.
|
||||
#+END_CENTER
|
||||
|
||||
#+BEGIN_COMMENT
|
||||
So let's say you have evaded that type of tracking.
|
||||
Maybe you don't carry a phone.
|
||||
Or maybe you've mitigated those threats in some way.
|
||||
|
||||
There's certain things that are nearly impossible to avoid.
|
||||
#+END_COMMENT
|
||||
|
||||
** RAW Surveillance Cameras [0/2]
|
||||
*** RAW Unavoidable
|
||||
** DRAFT Surveillance Cameras [0/2]
|
||||
*** DRAFT Unavoidable Surveillance
|
||||
|
||||
- Security cameras are everywhere
|
||||
- Homes
|
||||
- Private businesses
|
||||
- Traffic cameras
|
||||
- Streets
|
||||
- ...
|
||||
|
||||
#+BEGIN_COMMENT
|
||||
On the way here,
|
||||
you likely walked by numerous security cameras.
|
||||
They could be security cameras for private businesses.
|
||||
|
@ -399,18 +415,27 @@ Let's set aside local, state, and federal-owned cameras for a moment
|
|||
and focus on businesses.
|
||||
So a bunch of separate businesses have you on camera.
|
||||
So what?
|
||||
#+END_COMMENT
|
||||
|
||||
|
||||
*** RAW Access to Data
|
||||
*** DRAFT Access to Data
|
||||
:PROPERTIES:
|
||||
:DURATION: 00:00:30
|
||||
:END:
|
||||
|
||||
- <1> Data can be subpoenaed or obtained with a warrant
|
||||
- <1> If law enforcement wants to track you, they can
|
||||
- <2> If you own a surveillance system, be responsible and considerate
|
||||
- <2> Best way to restrict data is to avoid collecting it to begin with
|
||||
|
||||
#+BEGIN_COMMENT
|
||||
Well one of the most obvious threats, should it pertain to you, is a
|
||||
subpoena.
|
||||
The best form of privacy is to avoid having the data be collected to begin
|
||||
with.
|
||||
If law enforcement wanted to track you for whatever reason---crime or
|
||||
not!---they could simply subpoena the surrounding area.
|
||||
The best form of privacy is to avoid having the data be collected to begin
|
||||
with.
|
||||
#+END_COMMENT
|
||||
|
||||
** RAW Internet of Things [0/4]
|
||||
*** RAW Wide Open
|
||||
|
|
Loading…
Reference in New Issue