diff --git a/slides.org b/slides.org index d08e6bb..38b355d 100644 --- a/slides.org +++ b/slides.org @@ -37,11 +37,11 @@ | *** Modem | | DRAFT | | |------------------------------------+----------+---------+---------------| | * Stationary [0/5] | 0:08 | RAW | | -| ** Introduction [0/1] | 0:00 | RAW | ignoreheading | -| *** Introduction | 00:00:30 | RAW | fullframe | -| ** Surveillance Cameras [0/2] | 0:00 | RAW | | -| *** Unavoidable | | RAW | | -| *** Access to Data | 00:00:30 | RAW | | +| ** Introduction [0/1] | 0:00 | DRAFT | ignoreheading | +| *** Introduction | 00:00:30 | DRAFT | fullframe | +| ** Surveillance Cameras [0/2] | 0:00 | DRAFT | | +| *** Unavoidable Surveillance | | DRAFT | | +| *** Access to Data | 00:00:30 | DRAFT | | | ** Internet of Things [0/4] | 0:04 | RAW | | | *** Wide Open | 00:00:30 | RAW | | | *** Lack of Security | 00:01:30 | RAW | | @@ -107,7 +107,7 @@ | *** Status Quo | 00:02 | RAW | | | *** Push Back | 00:01 | RAW | | |------------------------------------+----------+---------+---------------| -| * Local Variabes | | | | +| * Local Variables | | | | #+END @@ -372,23 +372,39 @@ So even with Replicant, * RAW Stationary [0/5] -** RAW Introduction [0/1] :B_ignoreheading: +** DRAFT Introduction [0/1] :B_ignoreheading: :PROPERTIES: :BEAMER_env: ignoreheading :END: -*** RAW Introduction :B_fullframe: +*** DRAFT Introduction :B_fullframe: :PROPERTIES: :DURATION: 00:00:30 :BEAMER_env: fullframe :END: + +#+BEGIN_CENTER +Certain types of tracking are unavoidable. +#+END_CENTER + +#+BEGIN_COMMENT So let's say you have evaded that type of tracking. Maybe you don't carry a phone. Or maybe you've mitigated those threats in some way. There's certain things that are nearly impossible to avoid. +#+END_COMMENT -** RAW Surveillance Cameras [0/2] -*** RAW Unavoidable +** DRAFT Surveillance Cameras [0/2] +*** DRAFT Unavoidable Surveillance + +- Security cameras are everywhere + - Homes + - Private businesses + - Traffic cameras + - Streets + - ... + +#+BEGIN_COMMENT On the way here, you likely walked by numerous security cameras. They could be security cameras for private businesses. @@ -399,18 +415,27 @@ Let's set aside local, state, and federal-owned cameras for a moment and focus on businesses. So a bunch of separate businesses have you on camera. So what? +#+END_COMMENT -*** RAW Access to Data +*** DRAFT Access to Data :PROPERTIES: :DURATION: 00:00:30 :END: + +- <1> Data can be subpoenaed or obtained with a warrant +- <1> If law enforcement wants to track you, they can +- <2> If you own a surveillance system, be responsible and considerate + - <2> Best way to restrict data is to avoid collecting it to begin with + +#+BEGIN_COMMENT Well one of the most obvious threats, should it pertain to you, is a subpoena. -The best form of privacy is to avoid having the data be collected to begin - with. If law enforcement wanted to track you for whatever reason---crime or not!---they could simply subpoena the surrounding area. +The best form of privacy is to avoid having the data be collected to begin + with. +#+END_COMMENT ** RAW Internet of Things [0/4] *** RAW Wide Open