slides.org (Stationary) [Surveillance Cameras]: Break out notes
parent
22732b0e8e
commit
35ff64870e
51
slides.org
51
slides.org
|
@ -37,11 +37,11 @@
|
||||||
| *** Modem | | DRAFT | |
|
| *** Modem | | DRAFT | |
|
||||||
|------------------------------------+----------+---------+---------------|
|
|------------------------------------+----------+---------+---------------|
|
||||||
| * Stationary [0/5] | 0:08 | RAW | |
|
| * Stationary [0/5] | 0:08 | RAW | |
|
||||||
| ** Introduction [0/1] | 0:00 | RAW | ignoreheading |
|
| ** Introduction [0/1] | 0:00 | DRAFT | ignoreheading |
|
||||||
| *** Introduction | 00:00:30 | RAW | fullframe |
|
| *** Introduction | 00:00:30 | DRAFT | fullframe |
|
||||||
| ** Surveillance Cameras [0/2] | 0:00 | RAW | |
|
| ** Surveillance Cameras [0/2] | 0:00 | DRAFT | |
|
||||||
| *** Unavoidable | | RAW | |
|
| *** Unavoidable Surveillance | | DRAFT | |
|
||||||
| *** Access to Data | 00:00:30 | RAW | |
|
| *** Access to Data | 00:00:30 | DRAFT | |
|
||||||
| ** Internet of Things [0/4] | 0:04 | RAW | |
|
| ** Internet of Things [0/4] | 0:04 | RAW | |
|
||||||
| *** Wide Open | 00:00:30 | RAW | |
|
| *** Wide Open | 00:00:30 | RAW | |
|
||||||
| *** Lack of Security | 00:01:30 | RAW | |
|
| *** Lack of Security | 00:01:30 | RAW | |
|
||||||
|
@ -107,7 +107,7 @@
|
||||||
| *** Status Quo | 00:02 | RAW | |
|
| *** Status Quo | 00:02 | RAW | |
|
||||||
| *** Push Back | 00:01 | RAW | |
|
| *** Push Back | 00:01 | RAW | |
|
||||||
|------------------------------------+----------+---------+---------------|
|
|------------------------------------+----------+---------+---------------|
|
||||||
| * Local Variabes | | | |
|
| * Local Variables | | | |
|
||||||
#+END
|
#+END
|
||||||
|
|
||||||
|
|
||||||
|
@ -372,23 +372,39 @@ So even with Replicant,
|
||||||
|
|
||||||
|
|
||||||
* RAW Stationary [0/5]
|
* RAW Stationary [0/5]
|
||||||
** RAW Introduction [0/1] :B_ignoreheading:
|
** DRAFT Introduction [0/1] :B_ignoreheading:
|
||||||
:PROPERTIES:
|
:PROPERTIES:
|
||||||
:BEAMER_env: ignoreheading
|
:BEAMER_env: ignoreheading
|
||||||
:END:
|
:END:
|
||||||
*** RAW Introduction :B_fullframe:
|
*** DRAFT Introduction :B_fullframe:
|
||||||
:PROPERTIES:
|
:PROPERTIES:
|
||||||
:DURATION: 00:00:30
|
:DURATION: 00:00:30
|
||||||
:BEAMER_env: fullframe
|
:BEAMER_env: fullframe
|
||||||
:END:
|
:END:
|
||||||
|
|
||||||
|
#+BEGIN_CENTER
|
||||||
|
Certain types of tracking are unavoidable.
|
||||||
|
#+END_CENTER
|
||||||
|
|
||||||
|
#+BEGIN_COMMENT
|
||||||
So let's say you have evaded that type of tracking.
|
So let's say you have evaded that type of tracking.
|
||||||
Maybe you don't carry a phone.
|
Maybe you don't carry a phone.
|
||||||
Or maybe you've mitigated those threats in some way.
|
Or maybe you've mitigated those threats in some way.
|
||||||
|
|
||||||
There's certain things that are nearly impossible to avoid.
|
There's certain things that are nearly impossible to avoid.
|
||||||
|
#+END_COMMENT
|
||||||
|
|
||||||
** RAW Surveillance Cameras [0/2]
|
** DRAFT Surveillance Cameras [0/2]
|
||||||
*** RAW Unavoidable
|
*** DRAFT Unavoidable Surveillance
|
||||||
|
|
||||||
|
- Security cameras are everywhere
|
||||||
|
- Homes
|
||||||
|
- Private businesses
|
||||||
|
- Traffic cameras
|
||||||
|
- Streets
|
||||||
|
- ...
|
||||||
|
|
||||||
|
#+BEGIN_COMMENT
|
||||||
On the way here,
|
On the way here,
|
||||||
you likely walked by numerous security cameras.
|
you likely walked by numerous security cameras.
|
||||||
They could be security cameras for private businesses.
|
They could be security cameras for private businesses.
|
||||||
|
@ -399,18 +415,27 @@ Let's set aside local, state, and federal-owned cameras for a moment
|
||||||
and focus on businesses.
|
and focus on businesses.
|
||||||
So a bunch of separate businesses have you on camera.
|
So a bunch of separate businesses have you on camera.
|
||||||
So what?
|
So what?
|
||||||
|
#+END_COMMENT
|
||||||
|
|
||||||
|
|
||||||
*** RAW Access to Data
|
*** DRAFT Access to Data
|
||||||
:PROPERTIES:
|
:PROPERTIES:
|
||||||
:DURATION: 00:00:30
|
:DURATION: 00:00:30
|
||||||
:END:
|
:END:
|
||||||
|
|
||||||
|
- <1> Data can be subpoenaed or obtained with a warrant
|
||||||
|
- <1> If law enforcement wants to track you, they can
|
||||||
|
- <2> If you own a surveillance system, be responsible and considerate
|
||||||
|
- <2> Best way to restrict data is to avoid collecting it to begin with
|
||||||
|
|
||||||
|
#+BEGIN_COMMENT
|
||||||
Well one of the most obvious threats, should it pertain to you, is a
|
Well one of the most obvious threats, should it pertain to you, is a
|
||||||
subpoena.
|
subpoena.
|
||||||
The best form of privacy is to avoid having the data be collected to begin
|
|
||||||
with.
|
|
||||||
If law enforcement wanted to track you for whatever reason---crime or
|
If law enforcement wanted to track you for whatever reason---crime or
|
||||||
not!---they could simply subpoena the surrounding area.
|
not!---they could simply subpoena the surrounding area.
|
||||||
|
The best form of privacy is to avoid having the data be collected to begin
|
||||||
|
with.
|
||||||
|
#+END_COMMENT
|
||||||
|
|
||||||
** RAW Internet of Things [0/4]
|
** RAW Internet of Things [0/4]
|
||||||
*** RAW Wide Open
|
*** RAW Wide Open
|
||||||
|
|
Loading…
Reference in New Issue