* slides.org: Support buffer export with Slides heading

This was a huge PITA because I'm still relatively new to the finer details
of Org Mode.  I needed the Slides heading for the columnview table to
properly sum the complete time for the presentation, but in doing so, the
section depth from the headers was off in the exported presentation (unless
I did a subtree export).

I eventually found that there is a contrib package that provides :ignore:,
which solves my problem.

* slides.org
  (Slides): Add heading.
  (columnview table): Regenerate table.
  (Exporting): Add heading.
  (Local Variables): Add ox stuff.
master
Mike Gerwitz 2017-03-06 21:48:35 -05:00
parent 35ff64870e
commit 59756ebae0
1 changed files with 219 additions and 183 deletions

View File

@ -9,105 +9,133 @@
#+BEAMER_THEME: Warsaw
#+BEAMER_HEADER: \beamertemplatenavigationsymbolsempty
#+TODO: RAW(r) LACKING(l) DRAFT(d) REVIEWED(R) | READY(+) REHEARSED(D)
#+COLUMNS: %40ITEM %10DURATION{:} %TODO %BEAMER_ENV(ENVIRONMENT)
#+COLUMNS: %40ITEM %10DURATION %TODO %BEAMER_ENV(ENVIRONMENT)
#+BEGIN_COMMENT
#+BEGIN: columnview :hlines 1 :id local
| ITEM | DURATION | TODO | ENVIRONMENT |
|------------------------------------+----------+---------+---------------|
| * Introduction / Opening | 00:00:30 | DRAFT | fullframe |
|------------------------------------+----------+---------+---------------|
| * Mobile [0/5] | 0:04 | LACKING | |
| ** Introduction | 0:00 | DRAFT | ignoreheading |
| *** Introduction | 00:00:30 | DRAFT | fullframe |
| ** Cell Towers [0/2] | 00:01 | LACKING | |
| *** Fundamentally Needed | | DRAFT | |
| *** Cell-Site Simulators | | LACKING | |
| ** Wifi [0/3] | 00:01 | LACKING | |
| *** Wifi | | DRAFT | |
| *** Ubiquitous Access Points | | LACKING | |
| *** Mitigations | | DRAFT | |
| ** Location Services [0/2] | 00:01 | DRAFT | |
| *** GPS | | DRAFT | |
| *** Access Points | | DRAFT | |
| ** Operating System [0/3] | 00:01 | DRAFT | |
| *** Untrusted/Proprietary OS | | DRAFT | |
| *** Free/Libre Mobile OS? | | DRAFT | |
| *** Modem | | DRAFT | |
|------------------------------------+----------+---------+---------------|
| * Stationary [0/5] | 0:08 | RAW | |
| ** Introduction [0/1] | 0:00 | DRAFT | ignoreheading |
| *** Introduction | 00:00:30 | DRAFT | fullframe |
| ** Surveillance Cameras [0/2] | 0:00 | DRAFT | |
| *** Unavoidable Surveillance | | DRAFT | |
| *** Access to Data | 00:00:30 | DRAFT | |
| ** Internet of Things [0/4] | 0:04 | RAW | |
| *** Wide Open | 00:00:30 | RAW | |
| *** Lack of Security | 00:01:30 | RAW | |
| *** Who's Watching? | 00:00:30 | RAW | |
| *** Facial Recognition | 00:01 | RAW | |
| ** Social Media [0/1] | 0:01 | RAW | |
| *** Collateral Damage | 00:01 | RAW | |
| ** Driving [0/3] | 0:02 | RAW | |
| *** Introduction | 00:00:30 | RAW | fullframe |
| *** ALPRs | 00:01 | RAW | |
| *** Car Itself | 00:00:30 | RAW | |
|------------------------------------+----------+---------+---------------|
| * The Web [0/6] | 0:12 | RAW | |
| ** Introduction [0/1] | | RAW | ignoreheading |
| *** Introduction | | RAW | fullframe |
| ** Bridging the Gap [0/1] | 0:01 | RAW | |
| *** Ultrasound Tracking | 00:01 | RAW | |
| ** Incentive to Betray [0/1] | 0:00 | RAW | |
| *** Summary | 00:00:30 | RAW | fullframe |
| ** Analytics [0/2] | 0:02 | RAW | |
| *** Trackers | 00:01 | RAW | |
| *** Like Buttons | 00:01 | RAW | |
| ** Fingerprinting [0/2] | 0:04 | RAW | |
| *** Summary | 00:03 | RAW | fullframe |
| *** Browser Addons | 00:01 | RAW | |
| ** Anonymity [0/3] | 0:04 | RAW | |
| *** Summary | 00:01 | RAW | fullframe |
| *** The Tor Network | 00:01 | RAW | |
| *** TorBrowser, Tails, and Whonix | 00:02 | RAW | |
|------------------------------------+----------+---------+---------------|
| * Data Analytics [0/2] | 0:04 | LACKING | |
| ** Introduction [0/1] | 0:00 | RAW | ignoreheading |
| *** Introduction | 00:00 | RAW | fullframe |
| ** Headings [0/3] | 0:04 | LACKING | |
| *** Advertisers | 00:02 | LACKING | |
| *** Social Media | 00:01 | LACKING | |
| *** Governments | 00:00:30 | LACKING | |
|------------------------------------+----------+---------+---------------|
| * Policy and Government [0/6] | 0:12 | RAW | |
| ** Introduction [0/1] | 0:00 | RAW | ignoreheading |
| *** Introduction | 00:00:30 | RAW | fullframe |
| ** Surveillance [0/4] | 0:06 | LACKING | |
| *** History of NSA Surveillance | 00:02 | LACKING | |
| *** Verizon Metadata | 00:00:30 | LACKING | |
| *** Snowden | 00:01 | LACKING | |
| *** Tools | 00:02 | LACKING | |
| ** Crypto Wars [0/3] | 0:03 | LACKING | |
| *** Introduction | 00:00 | RAW | fullframe |
| *** Bernstein v. United States | 00:01 | LACKING | |
| *** Makes Us Less Safe | 00:02 | LACKING | |
| ** Espionage [0/1] | 0:01 | LACKING | |
| *** US Can't Keep Its Own Secrets | 00:01 | LACKING | |
| ** Subpoenas, Warrants, NSLs [0/1] | 0:01 | LACKING | |
| *** National Security Letters | 00:01 | LACKING | |
| ** Law [0/1] | 0:01 | LACKING | |
| *** Summary | 00:01 | LACKING | fullframe |
|------------------------------------+----------+---------+---------------|
| * Your Fight [0/1] | 0:05 | RAW | |
| ** Headings [0/5] | 0:05 | RAW | |
| *** Feeding | 00:00 | RAW | fullframe |
| *** SaaSS and Centralization | 00:01 | RAW | |
| *** Corporate Negligence | 00:01 | RAW | |
| *** Status Quo | 00:02 | RAW | |
| *** Push Back | 00:01 | RAW | |
|------------------------------------+----------+---------+---------------|
| * Local Variables | | | |
#+BEGIN: columnview :hlines 3 :id global
| ITEM | DURATION | TODO | ENVIRONMENT |
|-------------------------------------+----------+---------+---------------|
| * Slides | | | |
|-------------------------------------+----------+---------+---------------|
| ** Introduction / Opening | 00:00:30 | DRAFT | fullframe |
|-------------------------------------+----------+---------+---------------|
| ** Mobile [0/5] | | LACKING | |
|-------------------------------------+----------+---------+---------------|
| *** Introduction | | DRAFT | ignoreheading |
| **** Introduction | 00:00:30 | DRAFT | fullframe |
|-------------------------------------+----------+---------+---------------|
| *** Cell Towers [0/2] | 00:01 | LACKING | |
| **** Fundamentally Needed | | DRAFT | |
| **** Cell-Site Simulators | | LACKING | |
|-------------------------------------+----------+---------+---------------|
| *** Wifi [0/3] | 00:01 | LACKING | |
| **** Wifi | | DRAFT | |
| **** Ubiquitous Access Points | | LACKING | |
| **** Mitigations | | DRAFT | |
|-------------------------------------+----------+---------+---------------|
| *** Location Services [0/2] | 00:01 | DRAFT | |
| **** GPS | | DRAFT | |
| **** Access Points | | DRAFT | |
|-------------------------------------+----------+---------+---------------|
| *** Operating System [0/3] | 00:01 | DRAFT | |
| **** Untrusted/Proprietary OS | | DRAFT | |
| **** Free/Libre Mobile OS? | | DRAFT | |
| **** Modem | | DRAFT | |
|-------------------------------------+----------+---------+---------------|
| ** Stationary [0/5] | | RAW | |
|-------------------------------------+----------+---------+---------------|
| *** Introduction [0/1] | | DRAFT | ignoreheading |
| **** Introduction | 00:00:30 | DRAFT | fullframe |
|-------------------------------------+----------+---------+---------------|
| *** Surveillance Cameras [0/2] | | DRAFT | |
| **** Unavoidable Surveillance | | DRAFT | |
| **** Access to Data | 00:00:30 | DRAFT | |
|-------------------------------------+----------+---------+---------------|
| *** Internet of Things [0/4] | | RAW | |
| **** Wide Open | 00:00:30 | RAW | |
| **** Lack of Security | 00:01:30 | RAW | |
| **** Who's Watching? | 00:00:30 | RAW | |
| **** Facial Recognition | 00:01 | RAW | |
|-------------------------------------+----------+---------+---------------|
| *** Social Media [0/1] | | RAW | |
| **** Collateral Damage | 00:01 | RAW | |
|-------------------------------------+----------+---------+---------------|
| *** Driving [0/3] | | RAW | |
| **** Introduction | 00:00:30 | RAW | fullframe |
| **** ALPRs | 00:01 | RAW | |
| **** Car Itself | 00:00:30 | RAW | |
|-------------------------------------+----------+---------+---------------|
| ** The Web [0/6] | | RAW | |
|-------------------------------------+----------+---------+---------------|
| *** Introduction [0/1] | | RAW | ignoreheading |
| **** Introduction | | RAW | fullframe |
|-------------------------------------+----------+---------+---------------|
| *** Bridging the Gap [0/1] | | RAW | |
| **** Ultrasound Tracking | 00:01 | RAW | |
|-------------------------------------+----------+---------+---------------|
| *** Incentive to Betray [0/1] | | RAW | |
| **** Summary | 00:00:30 | RAW | fullframe |
|-------------------------------------+----------+---------+---------------|
| *** Analytics [0/2] | | RAW | |
| **** Trackers | 00:01 | RAW | |
| **** Like Buttons | 00:01 | RAW | |
|-------------------------------------+----------+---------+---------------|
| *** Fingerprinting [0/2] | | RAW | |
| **** Summary | 00:03 | RAW | fullframe |
| **** Browser Addons | 00:01 | RAW | |
|-------------------------------------+----------+---------+---------------|
| *** Anonymity [0/3] | | RAW | |
| **** Summary | 00:01 | RAW | fullframe |
| **** The Tor Network | 00:01 | RAW | |
| **** TorBrowser, Tails, and Whonix | 00:02 | RAW | |
|-------------------------------------+----------+---------+---------------|
| ** Data Analytics [0/2] | | LACKING | |
|-------------------------------------+----------+---------+---------------|
| *** Introduction [0/1] | | RAW | ignoreheading |
| **** Introduction | 00:00 | RAW | fullframe |
|-------------------------------------+----------+---------+---------------|
| *** Headings [0/3] | | LACKING | |
| **** Advertisers | 00:02 | LACKING | |
| **** Social Media | 00:01 | LACKING | |
| **** Governments | 00:00:30 | LACKING | |
|-------------------------------------+----------+---------+---------------|
| ** Policy and Government [0/6] | | RAW | |
|-------------------------------------+----------+---------+---------------|
| *** Introduction [0/1] | | RAW | ignoreheading |
| **** Introduction | 00:00:30 | RAW | fullframe |
|-------------------------------------+----------+---------+---------------|
| *** Surveillance [0/4] | | LACKING | |
| **** History of NSA Surveillance | 00:02 | LACKING | |
| **** Verizon Metadata | 00:00:30 | LACKING | |
| **** Snowden | 00:01 | LACKING | |
| **** Tools | 00:02 | LACKING | |
|-------------------------------------+----------+---------+---------------|
| *** Crypto Wars [0/3] | | LACKING | |
| **** Introduction | 00:00 | RAW | fullframe |
| **** Bernstein v. United States | 00:01 | LACKING | |
| **** Makes Us Less Safe | 00:02 | LACKING | |
|-------------------------------------+----------+---------+---------------|
| *** Espionage [0/1] | | LACKING | |
| **** US Can't Keep Its Own Secrets | 00:01 | LACKING | |
|-------------------------------------+----------+---------+---------------|
| *** Subpoenas, Warrants, NSLs [0/1] | | LACKING | |
| **** National Security Letters | 00:01 | LACKING | |
|-------------------------------------+----------+---------+---------------|
| *** Law [0/1] | | LACKING | |
| **** Summary | 00:01 | LACKING | fullframe |
|-------------------------------------+----------+---------+---------------|
| ** Your Fight [0/1] | | RAW | |
|-------------------------------------+----------+---------+---------------|
| *** Headings [0/5] | | RAW | |
| **** Feeding | 00:00 | RAW | fullframe |
| **** SaaSS and Centralization | 00:01 | RAW | |
| **** Corporate Negligence | 00:01 | RAW | |
| **** Status Quo | 00:02 | RAW | |
| **** Push Back | 00:01 | RAW | |
|-------------------------------------+----------+---------+---------------|
| * Exporting | | | |
|-------------------------------------+----------+---------+---------------|
| * Local Variables | | | |
#+END
@ -142,7 +170,8 @@ GOAL: Captivate; Startle
#+END_COMMENT
* DRAFT Introduction / Opening :B_fullframe:
* Slides :export:ignore:
** DRAFT Introduction / Opening :B_fullframe:
:PROPERTIES:
:DURATION: 00:00:30
:BEAMER_env: fullframe
@ -165,12 +194,12 @@ often used and dismissed as tinfoil-hat FUD.)
#+BEAMER: \only<2>{(No, really, I have references.)}
#+END_CENTER
* LACKING Mobile [0/5]
** DRAFT Introduction :B_ignoreheading:
** LACKING Mobile [0/5]
*** DRAFT Introduction :B_ignoreheading:
:PROPERTIES:
:BEAMER_env: ignoreheading
:END:
*** DRAFT Introduction :B_fullframe:
**** DRAFT Introduction :B_fullframe:
:PROPERTIES:
:DURATION: 00:00:30
:BEAMER_env: fullframe
@ -189,11 +218,11 @@ A phone is often synonymous with an individual.
In other words: they're excellent tracking devices.
#+END_COMMENT
** LACKING Cell Towers [0/2]
*** LACKING Cell Towers [0/2]
:PROPERTIES:
:DURATION: 00:01
:END:
*** DRAFT Fundamentally Needed
**** DRAFT Fundamentally Needed
- <1-> Phone needs tower to make and receive calls
- <2-> Gives away approximate location (can triangulate)
@ -215,7 +244,7 @@ You can imagine that such would be a very useful and important feature for
#+END_COMMENT
*** LACKING Cell-Site Simulators
**** LACKING Cell-Site Simulators
- <1-> Masquerade as cell towers
- <2-> (List them) e.g. Stingray
@ -228,12 +257,12 @@ Your location can be triangulated.
#+END_COMMENT
** LACKING Wifi [0/3]
*** LACKING Wifi [0/3]
:PROPERTIES:
:DURATION: 00:01
:END:
*** DRAFT Wifi
**** DRAFT Wifi
- Device may broadcast ESSIDs of past hidden networks
- Expose unique hardware identifiers (MAC address)
@ -249,7 +278,7 @@ Your mobile device could be broadcasting information like past network
which can be used to uniquely identify you.
#+END_COMMENT
*** LACKING Ubiquitous Access Points
**** LACKING Ubiquitous Access Points
- <AP stuff>
#+BEGIN_COMMENT
@ -261,7 +290,7 @@ Can be incredibly accurate for tracking movements,
#+END_COMMENT
*** DRAFT Mitigations
**** DRAFT Mitigations
- Disable Wifi [when not in use]
- Do not automatically connect to known networks
- At the very least, not hidden
@ -274,12 +303,12 @@ You can also randomize your MAC address,
#+END_COMMENT
** DRAFT Location Services [0/2]
*** DRAFT Location Services [0/2]
:PROPERTIES:
:DURATION: 00:01
:END:
*** DRAFT GPS
**** DRAFT GPS
- Often enabled by default
- Might prompt user, but features are attractive
@ -300,7 +329,7 @@ And programs will track your movements just for the hell of it.
Or give an excuse to track you.
#+END_COMMENT
*** DRAFT Access Points
**** DRAFT Access Points
- <1-> No GPS? No problem!
- <2-> AP harvesting (e.g. Google Street View cars)
- <2-> Works even where GPS and Cell signals cannot penetrate
@ -322,12 +351,12 @@ MAC spoofing won't help since software on your device has countless other
examples.
#+END_COMMENT
** DRAFT Operating System [0/3]
*** DRAFT Operating System [0/3]
:PROPERTIES:
:DURATION: 00:01
:END:
*** DRAFT Untrusted/Proprietary OS
**** DRAFT Untrusted/Proprietary OS
- Who does your phone work for?
- Apple? Google? Microsoft? Blackberry? Your manufacturer too?
@ -341,7 +370,7 @@ You carry around this computer everywhere you go.
And you fundamentally cannot trust it.
#+END_COMMENT
*** DRAFT Free/Libre Mobile OS?
**** DRAFT Free/Libre Mobile OS?
- <1-3> Android is supposedly free software
- <1-3> But every phone requires proprietary drivers, or contains
proprietary software
@ -355,7 +384,7 @@ I feel like I can at least trust my phone a little bit.
#+END_COMMENT
*** DRAFT Modem
**** DRAFT Modem
- But modem still runs non-free software
- Often has access to CPU, disk, and memory
@ -371,12 +400,12 @@ So even with Replicant,
* RAW Stationary [0/5]
** DRAFT Introduction [0/1] :B_ignoreheading:
** RAW Stationary [0/5]
*** DRAFT Introduction [0/1] :B_ignoreheading:
:PROPERTIES:
:BEAMER_env: ignoreheading
:END:
*** DRAFT Introduction :B_fullframe:
**** DRAFT Introduction :B_fullframe:
:PROPERTIES:
:DURATION: 00:00:30
:BEAMER_env: fullframe
@ -394,8 +423,8 @@ Or maybe you've mitigated those threats in some way.
There's certain things that are nearly impossible to avoid.
#+END_COMMENT
** DRAFT Surveillance Cameras [0/2]
*** DRAFT Unavoidable Surveillance
*** DRAFT Surveillance Cameras [0/2]
**** DRAFT Unavoidable Surveillance
- Security cameras are everywhere
- Homes
@ -418,7 +447,7 @@ So what?
#+END_COMMENT
*** DRAFT Access to Data
**** DRAFT Access to Data
:PROPERTIES:
:DURATION: 00:00:30
:END:
@ -437,8 +466,8 @@ The best form of privacy is to avoid having the data be collected to begin
with.
#+END_COMMENT
** RAW Internet of Things [0/4]
*** RAW Wide Open
*** RAW Internet of Things [0/4]
**** RAW Wide Open
:PROPERTIES:
:DURATION: 00:00:30
:END:
@ -459,7 +488,7 @@ They're also popular among individuals for personal/home use.
Home security systems.
Baby monitors.
*** RAW Lack of Security
**** RAW Lack of Security
:PROPERTIES:
:DURATION: 00:01:30
:END:
@ -499,7 +528,7 @@ They remove things that are too deeply personal.
This is an excellent example to demonstrate to others why this is such a big
deal.
*** RAW Who's Watching?
**** RAW Who's Watching?
:PROPERTIES:
:DURATION: 00:00:30
:END:
@ -510,7 +539,7 @@ That's what some of you are going to be doing as soon as you leave this
That's what law enforcement is going to do.
That's what the NSA, GHCQ, et. al. are going to do.
*** RAW Facial Recognition
**** RAW Facial Recognition
:PROPERTIES:
:DURATION: 00:01
:END:
@ -532,8 +561,8 @@ There's a lot to say about IoT.
We'll come back to it.
** RAW Social Media [0/1]
*** RAW Collateral Damage
*** RAW Social Media [0/1]
**** RAW Collateral Damage
:PROPERTIES:
:DURATION: 00:01
:END:
@ -563,8 +592,8 @@ If I'm off in the background when you take a picture of your friends in the
I'm still in the photo.
** RAW Driving [0/3]
*** RAW Introduction :B_fullframe:
*** RAW Driving [0/3]
**** RAW Introduction :B_fullframe:
:PROPERTIES:
:DURATION: 00:00:30
:BEAMER_env: fullframe
@ -583,7 +612,7 @@ That's not even worth discussing.
But what about if you drove?
*** RAW ALPRs
**** RAW ALPRs
:PROPERTIES:
:DURATION: 00:01
:END:
@ -608,7 +637,7 @@ But that can get expensive.
And they might have cameras and such anyway.
*** RAW Car Itself
**** RAW Car Itself
:PROPERTIES:
:DURATION: 00:00:30
:END:
@ -619,12 +648,12 @@ Maybe your car itself is a tracking device (e.g. OnStar).
<...>
* RAW The Web [0/6]
** RAW Introduction [0/1] :B_ignoreheading:
** RAW The Web [0/6]
*** RAW Introduction [0/1] :B_ignoreheading:
:PROPERTIES:
:BEAMER_env: ignoreheading
:END:
*** RAW Introduction :B_fullframe:
**** RAW Introduction :B_fullframe:
:PROPERTIES:
:BEAMER_env: fullframe
:END:
@ -632,8 +661,8 @@ But you're not just tracked in the flesh.
Much of what we do today is virtual.
What better way to segue than to bridge the two?
** RAW Bridging the Gap [0/1]
*** RAW Ultrasound Tracking
*** RAW Bridging the Gap [0/1]
**** RAW Ultrasound Tracking
:PROPERTIES:
:DURATION: 00:01
:END:
@ -655,8 +684,8 @@ Others play inaudible sounds that are picked up by your mobile device or
<...>
** RAW Incentive to Betray [0/1]
*** RAW Summary :B_fullframe:
*** RAW Incentive to Betray [0/1]
**** RAW Summary :B_fullframe:
:PROPERTIES:
:DURATION: 00:00:30
:BEAMER_env: fullframe
@ -670,8 +699,8 @@ Many websites make money through advertising.
It can be lucrative.
And it's _easy_ to do.
** RAW Analytics [0/2]
*** RAW Trackers
*** RAW Analytics [0/2]
**** RAW Trackers
:PROPERTIES:
:DURATION: 00:01
:END:
@ -696,7 +725,7 @@ All of this can be used to identify users across the entire web.
If you must track your users, consider using Piwik, which you can host
yourself.
*** RAW Like Buttons
**** RAW Like Buttons
:PROPERTIES:
:DURATION: 00:01
:END:
@ -713,8 +742,8 @@ But even if you don't have a Facebook account,
Addons like Privacy Badger will block these.
** RAW Fingerprinting [0/2]
*** RAW Summary :B_fullframe:
*** RAW Fingerprinting [0/2]
**** RAW Summary :B_fullframe:
:PROPERTIES:
:DURATION: 00:03
:BEAMER_env: fullframe
@ -733,7 +762,7 @@ Some methods allow fingerprinting even if the user uses multiple browsers
They can do this by effectively breaking out of the browser's sandbox by
doing operations that depend heavily on specifics of users' hardware.
*** RAW Browser Addons
**** RAW Browser Addons
:PROPERTIES:
:DURATION: 00:01
:END:
@ -745,8 +774,8 @@ So how do we avoid this type of tracking?
<<Talk about browser addons>>.
** RAW Anonymity [0/3]
*** RAW Summary :B_fullframe:
*** RAW Anonymity [0/3]
**** RAW Summary :B_fullframe:
:PROPERTIES:
:DURATION: 00:01
:BEAMER_env: fullframe
@ -767,7 +796,7 @@ If your life depends on anonymity,
I provide a number of resources to get you started.
*** RAW The Tor Network
**** RAW The Tor Network
:PROPERTIES:
:DURATION: 00:01
:END:
@ -793,7 +822,7 @@ There are lots of other details that I don't have time to get to here,
but I provide a number of resources for you.
*** RAW TorBrowser, Tails, and Whonix
**** RAW TorBrowser, Tails, and Whonix
:PROPERTIES:
:DURATION: 00:02
:END:
@ -811,12 +840,12 @@ Tails...
Whonix...
* LACKING Data Analytics [0/2]
** RAW Introduction [0/1] :B_ignoreheading:
** LACKING Data Analytics [0/2]
*** RAW Introduction [0/1] :B_ignoreheading:
:PROPERTIES:
:BEAMER_env: ignoreheading
:END:
*** RAW Introduction :B_fullframe:
**** RAW Introduction :B_fullframe:
:PROPERTIES:
:DURATION: 00:00
:BEAMER_env: fullframe
@ -825,8 +854,8 @@ We've seen adversaries with different motives.
Let's explore what some of them do with all those data.
** LACKING Headings [0/3]
*** LACKING Advertisers
*** LACKING Headings [0/3]
**** LACKING Advertisers
:PROPERTIES:
:DURATION: 00:02
:END:
@ -839,26 +868,26 @@ I'm sure many of you heard of the story of Target knowing a girl was
<<user profiles>>
*** LACKING Social Media
**** LACKING Social Media
:PROPERTIES:
:DURATION: 00:01
:END:
(Where you are, what you do.)
*** LACKING Governments
**** LACKING Governments
:PROPERTIES:
:DURATION: 00:00:30
:END:
(Segue into government surveillance.)
* RAW Policy and Government [0/6]
** RAW Introduction [0/1] :B_ignoreheading:
** RAW Policy and Government [0/6]
*** RAW Introduction [0/1] :B_ignoreheading:
:PROPERTIES:
:BEAMER_env: ignoreheading
:END:
*** RAW Introduction :B_fullframe:
**** RAW Introduction :B_fullframe:
:PROPERTIES:
:DURATION: 00:00:30
:BEAMER_env: fullframe
@ -872,15 +901,15 @@ But they also have a duty to know their bounds;
We know how that story goes.
** LACKING Surveillance [0/4]
*** LACKING History of NSA Surveillance
*** LACKING Surveillance [0/4]
**** LACKING History of NSA Surveillance
:PROPERTIES:
:DURATION: 00:02
:END:
(EFF, <<Klein v. NSA>>)
*** LACKING Verizon Metadata
**** LACKING Verizon Metadata
:PROPERTIES:
:DURATION: 00:00:30
:END:
@ -888,13 +917,13 @@ We know how that story goes.
...
*** LACKING Snowden
**** LACKING Snowden
:PROPERTIES:
:DURATION: 00:01
:END:
...
*** LACKING Tools
**** LACKING Tools
:PROPERTIES:
:DURATION: 00:02
:END:
@ -905,8 +934,8 @@ We know how that story goes.
- Etc.
** LACKING Crypto Wars [0/3]
*** RAW Introduction :B_fullframe:
*** LACKING Crypto Wars [0/3]
**** RAW Introduction :B_fullframe:
:PROPERTIES:
:DURATION: 00:00
:BEAMER_env: fullframe
@ -918,7 +947,7 @@ As if we haven't learned from the past.
The Crypto wars.
*** LACKING Bernstein v. United States
**** LACKING Bernstein v. United States
:PROPERTIES:
:DURATION: 00:01
:END:
@ -927,7 +956,7 @@ The Crypto wars.
(Code is speech)
*** LACKING Makes Us Less Safe
**** LACKING Makes Us Less Safe
:PROPERTIES:
:DURATION: 00:02
:END:
@ -939,8 +968,8 @@ Apple v. FBI
- VEP
** LACKING Espionage [0/1]
*** LACKING US Can't Keep Its Own Secrets
*** LACKING Espionage [0/1]
**** LACKING US Can't Keep Its Own Secrets
:PROPERTIES:
:DURATION: 00:01
:END:
@ -948,8 +977,8 @@ Apple v. FBI
- DNC
** LACKING Subpoenas, Warrants, NSLs [0/1]
*** LACKING National Security Letters
*** LACKING Subpoenas, Warrants, NSLs [0/1]
**** LACKING National Security Letters
:PROPERTIES:
:DURATION: 00:01
:END:
@ -957,8 +986,8 @@ Apple v. FBI
- Prior restraint
- Canaries
** LACKING Law [0/1]
*** LACKING Summary :B_fullframe:
*** LACKING Law [0/1]
**** LACKING Summary :B_fullframe:
:PROPERTIES:
:DURATION: 00:01
:BEAMER_env: fullframe
@ -969,9 +998,9 @@ Apple v. FBI
- CFAA
* RAW Your Fight [0/1]
** RAW Headings [0/5]
*** RAW Feeding :B_fullframe:
** RAW Your Fight [0/1]
*** RAW Headings [0/5]
**** RAW Feeding :B_fullframe:
:PROPERTIES:
:DURATION: 00:00
:BEAMER_env: fullframe
@ -979,7 +1008,7 @@ Apple v. FBI
We're feeding into all of this!
*** RAW SaaSS and Centralization
**** RAW SaaSS and Centralization
:PROPERTIES:
:DURATION: 00:01
:END:
@ -988,7 +1017,7 @@ We're feeding into all of this!
- The "Cloud"
*** RAW Corporate Negligence
**** RAW Corporate Negligence
:PROPERTIES:
:DURATION: 00:01
:END:
@ -1005,7 +1034,7 @@ They need to catch up with the times.
(Tie into SaaSS)
*** RAW Status Quo
**** RAW Status Quo
:PROPERTIES:
:DURATION: 00:02
:END:
@ -1032,7 +1061,7 @@ That even people who aren't that privacy- or security-conscious recognize
that there are risks not only at a personal level,
but also national and global.
*** RAW Push Back
**** RAW Push Back
:PROPERTIES:
:DURATION: 00:01
:END:
@ -1043,12 +1072,19 @@ We need to push back.
governments.
* Local Variables :noexport:
Just Emacs configuration stuff.
* Exporting
You should be able to simply export this buffer as a Beamer presentation
(=C-c C-e l P=) and get a slideshow.
Note that this requires =ox-extras=, which is part of Org Mode's
=contrib/=. Without it, the =:ignore:= tag will not be recognized and the
rendered slides will have incorrect depth.
* Local Variables
# Local Variables:
# org-todo-keyword-faces: (("DRAFT" . org-upcoming-deadline) \
# ("LACKING" . org-warning) \
# ("REVIEWED" . "yellow") \
# ("READY" . (:inherit org-scheduled bold :underline t)))
# eval: (ox-extras-activate '(ignore-headlines))
# End: