* slides.org: Support buffer export with Slides heading

This was a huge PITA because I'm still relatively new to the finer details
of Org Mode.  I needed the Slides heading for the columnview table to
properly sum the complete time for the presentation, but in doing so, the
section depth from the headers was off in the exported presentation (unless
I did a subtree export).

I eventually found that there is a contrib package that provides :ignore:,
which solves my problem.

* slides.org
  (Slides): Add heading.
  (columnview table): Regenerate table.
  (Exporting): Add heading.
  (Local Variables): Add ox stuff.
master
Mike Gerwitz 2017-03-06 21:48:35 -05:00
parent 35ff64870e
commit 59756ebae0
1 changed files with 219 additions and 183 deletions

View File

@ -9,105 +9,133 @@
#+BEAMER_THEME: Warsaw #+BEAMER_THEME: Warsaw
#+BEAMER_HEADER: \beamertemplatenavigationsymbolsempty #+BEAMER_HEADER: \beamertemplatenavigationsymbolsempty
#+TODO: RAW(r) LACKING(l) DRAFT(d) REVIEWED(R) | READY(+) REHEARSED(D) #+TODO: RAW(r) LACKING(l) DRAFT(d) REVIEWED(R) | READY(+) REHEARSED(D)
#+COLUMNS: %40ITEM %10DURATION{:} %TODO %BEAMER_ENV(ENVIRONMENT) #+COLUMNS: %40ITEM %10DURATION %TODO %BEAMER_ENV(ENVIRONMENT)
#+BEGIN_COMMENT #+BEGIN: columnview :hlines 3 :id global
#+BEGIN: columnview :hlines 1 :id local | ITEM | DURATION | TODO | ENVIRONMENT |
| ITEM | DURATION | TODO | ENVIRONMENT | |-------------------------------------+----------+---------+---------------|
|------------------------------------+----------+---------+---------------| | * Slides | | | |
| * Introduction / Opening | 00:00:30 | DRAFT | fullframe | |-------------------------------------+----------+---------+---------------|
|------------------------------------+----------+---------+---------------| | ** Introduction / Opening | 00:00:30 | DRAFT | fullframe |
| * Mobile [0/5] | 0:04 | LACKING | | |-------------------------------------+----------+---------+---------------|
| ** Introduction | 0:00 | DRAFT | ignoreheading | | ** Mobile [0/5] | | LACKING | |
| *** Introduction | 00:00:30 | DRAFT | fullframe | |-------------------------------------+----------+---------+---------------|
| ** Cell Towers [0/2] | 00:01 | LACKING | | | *** Introduction | | DRAFT | ignoreheading |
| *** Fundamentally Needed | | DRAFT | | | **** Introduction | 00:00:30 | DRAFT | fullframe |
| *** Cell-Site Simulators | | LACKING | | |-------------------------------------+----------+---------+---------------|
| ** Wifi [0/3] | 00:01 | LACKING | | | *** Cell Towers [0/2] | 00:01 | LACKING | |
| *** Wifi | | DRAFT | | | **** Fundamentally Needed | | DRAFT | |
| *** Ubiquitous Access Points | | LACKING | | | **** Cell-Site Simulators | | LACKING | |
| *** Mitigations | | DRAFT | | |-------------------------------------+----------+---------+---------------|
| ** Location Services [0/2] | 00:01 | DRAFT | | | *** Wifi [0/3] | 00:01 | LACKING | |
| *** GPS | | DRAFT | | | **** Wifi | | DRAFT | |
| *** Access Points | | DRAFT | | | **** Ubiquitous Access Points | | LACKING | |
| ** Operating System [0/3] | 00:01 | DRAFT | | | **** Mitigations | | DRAFT | |
| *** Untrusted/Proprietary OS | | DRAFT | | |-------------------------------------+----------+---------+---------------|
| *** Free/Libre Mobile OS? | | DRAFT | | | *** Location Services [0/2] | 00:01 | DRAFT | |
| *** Modem | | DRAFT | | | **** GPS | | DRAFT | |
|------------------------------------+----------+---------+---------------| | **** Access Points | | DRAFT | |
| * Stationary [0/5] | 0:08 | RAW | | |-------------------------------------+----------+---------+---------------|
| ** Introduction [0/1] | 0:00 | DRAFT | ignoreheading | | *** Operating System [0/3] | 00:01 | DRAFT | |
| *** Introduction | 00:00:30 | DRAFT | fullframe | | **** Untrusted/Proprietary OS | | DRAFT | |
| ** Surveillance Cameras [0/2] | 0:00 | DRAFT | | | **** Free/Libre Mobile OS? | | DRAFT | |
| *** Unavoidable Surveillance | | DRAFT | | | **** Modem | | DRAFT | |
| *** Access to Data | 00:00:30 | DRAFT | | |-------------------------------------+----------+---------+---------------|
| ** Internet of Things [0/4] | 0:04 | RAW | | | ** Stationary [0/5] | | RAW | |
| *** Wide Open | 00:00:30 | RAW | | |-------------------------------------+----------+---------+---------------|
| *** Lack of Security | 00:01:30 | RAW | | | *** Introduction [0/1] | | DRAFT | ignoreheading |
| *** Who's Watching? | 00:00:30 | RAW | | | **** Introduction | 00:00:30 | DRAFT | fullframe |
| *** Facial Recognition | 00:01 | RAW | | |-------------------------------------+----------+---------+---------------|
| ** Social Media [0/1] | 0:01 | RAW | | | *** Surveillance Cameras [0/2] | | DRAFT | |
| *** Collateral Damage | 00:01 | RAW | | | **** Unavoidable Surveillance | | DRAFT | |
| ** Driving [0/3] | 0:02 | RAW | | | **** Access to Data | 00:00:30 | DRAFT | |
| *** Introduction | 00:00:30 | RAW | fullframe | |-------------------------------------+----------+---------+---------------|
| *** ALPRs | 00:01 | RAW | | | *** Internet of Things [0/4] | | RAW | |
| *** Car Itself | 00:00:30 | RAW | | | **** Wide Open | 00:00:30 | RAW | |
|------------------------------------+----------+---------+---------------| | **** Lack of Security | 00:01:30 | RAW | |
| * The Web [0/6] | 0:12 | RAW | | | **** Who's Watching? | 00:00:30 | RAW | |
| ** Introduction [0/1] | | RAW | ignoreheading | | **** Facial Recognition | 00:01 | RAW | |
| *** Introduction | | RAW | fullframe | |-------------------------------------+----------+---------+---------------|
| ** Bridging the Gap [0/1] | 0:01 | RAW | | | *** Social Media [0/1] | | RAW | |
| *** Ultrasound Tracking | 00:01 | RAW | | | **** Collateral Damage | 00:01 | RAW | |
| ** Incentive to Betray [0/1] | 0:00 | RAW | | |-------------------------------------+----------+---------+---------------|
| *** Summary | 00:00:30 | RAW | fullframe | | *** Driving [0/3] | | RAW | |
| ** Analytics [0/2] | 0:02 | RAW | | | **** Introduction | 00:00:30 | RAW | fullframe |
| *** Trackers | 00:01 | RAW | | | **** ALPRs | 00:01 | RAW | |
| *** Like Buttons | 00:01 | RAW | | | **** Car Itself | 00:00:30 | RAW | |
| ** Fingerprinting [0/2] | 0:04 | RAW | | |-------------------------------------+----------+---------+---------------|
| *** Summary | 00:03 | RAW | fullframe | | ** The Web [0/6] | | RAW | |
| *** Browser Addons | 00:01 | RAW | | |-------------------------------------+----------+---------+---------------|
| ** Anonymity [0/3] | 0:04 | RAW | | | *** Introduction [0/1] | | RAW | ignoreheading |
| *** Summary | 00:01 | RAW | fullframe | | **** Introduction | | RAW | fullframe |
| *** The Tor Network | 00:01 | RAW | | |-------------------------------------+----------+---------+---------------|
| *** TorBrowser, Tails, and Whonix | 00:02 | RAW | | | *** Bridging the Gap [0/1] | | RAW | |
|------------------------------------+----------+---------+---------------| | **** Ultrasound Tracking | 00:01 | RAW | |
| * Data Analytics [0/2] | 0:04 | LACKING | | |-------------------------------------+----------+---------+---------------|
| ** Introduction [0/1] | 0:00 | RAW | ignoreheading | | *** Incentive to Betray [0/1] | | RAW | |
| *** Introduction | 00:00 | RAW | fullframe | | **** Summary | 00:00:30 | RAW | fullframe |
| ** Headings [0/3] | 0:04 | LACKING | | |-------------------------------------+----------+---------+---------------|
| *** Advertisers | 00:02 | LACKING | | | *** Analytics [0/2] | | RAW | |
| *** Social Media | 00:01 | LACKING | | | **** Trackers | 00:01 | RAW | |
| *** Governments | 00:00:30 | LACKING | | | **** Like Buttons | 00:01 | RAW | |
|------------------------------------+----------+---------+---------------| |-------------------------------------+----------+---------+---------------|
| * Policy and Government [0/6] | 0:12 | RAW | | | *** Fingerprinting [0/2] | | RAW | |
| ** Introduction [0/1] | 0:00 | RAW | ignoreheading | | **** Summary | 00:03 | RAW | fullframe |
| *** Introduction | 00:00:30 | RAW | fullframe | | **** Browser Addons | 00:01 | RAW | |
| ** Surveillance [0/4] | 0:06 | LACKING | | |-------------------------------------+----------+---------+---------------|
| *** History of NSA Surveillance | 00:02 | LACKING | | | *** Anonymity [0/3] | | RAW | |
| *** Verizon Metadata | 00:00:30 | LACKING | | | **** Summary | 00:01 | RAW | fullframe |
| *** Snowden | 00:01 | LACKING | | | **** The Tor Network | 00:01 | RAW | |
| *** Tools | 00:02 | LACKING | | | **** TorBrowser, Tails, and Whonix | 00:02 | RAW | |
| ** Crypto Wars [0/3] | 0:03 | LACKING | | |-------------------------------------+----------+---------+---------------|
| *** Introduction | 00:00 | RAW | fullframe | | ** Data Analytics [0/2] | | LACKING | |
| *** Bernstein v. United States | 00:01 | LACKING | | |-------------------------------------+----------+---------+---------------|
| *** Makes Us Less Safe | 00:02 | LACKING | | | *** Introduction [0/1] | | RAW | ignoreheading |
| ** Espionage [0/1] | 0:01 | LACKING | | | **** Introduction | 00:00 | RAW | fullframe |
| *** US Can't Keep Its Own Secrets | 00:01 | LACKING | | |-------------------------------------+----------+---------+---------------|
| ** Subpoenas, Warrants, NSLs [0/1] | 0:01 | LACKING | | | *** Headings [0/3] | | LACKING | |
| *** National Security Letters | 00:01 | LACKING | | | **** Advertisers | 00:02 | LACKING | |
| ** Law [0/1] | 0:01 | LACKING | | | **** Social Media | 00:01 | LACKING | |
| *** Summary | 00:01 | LACKING | fullframe | | **** Governments | 00:00:30 | LACKING | |
|------------------------------------+----------+---------+---------------| |-------------------------------------+----------+---------+---------------|
| * Your Fight [0/1] | 0:05 | RAW | | | ** Policy and Government [0/6] | | RAW | |
| ** Headings [0/5] | 0:05 | RAW | | |-------------------------------------+----------+---------+---------------|
| *** Feeding | 00:00 | RAW | fullframe | | *** Introduction [0/1] | | RAW | ignoreheading |
| *** SaaSS and Centralization | 00:01 | RAW | | | **** Introduction | 00:00:30 | RAW | fullframe |
| *** Corporate Negligence | 00:01 | RAW | | |-------------------------------------+----------+---------+---------------|
| *** Status Quo | 00:02 | RAW | | | *** Surveillance [0/4] | | LACKING | |
| *** Push Back | 00:01 | RAW | | | **** History of NSA Surveillance | 00:02 | LACKING | |
|------------------------------------+----------+---------+---------------| | **** Verizon Metadata | 00:00:30 | LACKING | |
| * Local Variables | | | | | **** Snowden | 00:01 | LACKING | |
| **** Tools | 00:02 | LACKING | |
|-------------------------------------+----------+---------+---------------|
| *** Crypto Wars [0/3] | | LACKING | |
| **** Introduction | 00:00 | RAW | fullframe |
| **** Bernstein v. United States | 00:01 | LACKING | |
| **** Makes Us Less Safe | 00:02 | LACKING | |
|-------------------------------------+----------+---------+---------------|
| *** Espionage [0/1] | | LACKING | |
| **** US Can't Keep Its Own Secrets | 00:01 | LACKING | |
|-------------------------------------+----------+---------+---------------|
| *** Subpoenas, Warrants, NSLs [0/1] | | LACKING | |
| **** National Security Letters | 00:01 | LACKING | |
|-------------------------------------+----------+---------+---------------|
| *** Law [0/1] | | LACKING | |
| **** Summary | 00:01 | LACKING | fullframe |
|-------------------------------------+----------+---------+---------------|
| ** Your Fight [0/1] | | RAW | |
|-------------------------------------+----------+---------+---------------|
| *** Headings [0/5] | | RAW | |
| **** Feeding | 00:00 | RAW | fullframe |
| **** SaaSS and Centralization | 00:01 | RAW | |
| **** Corporate Negligence | 00:01 | RAW | |
| **** Status Quo | 00:02 | RAW | |
| **** Push Back | 00:01 | RAW | |
|-------------------------------------+----------+---------+---------------|
| * Exporting | | | |
|-------------------------------------+----------+---------+---------------|
| * Local Variables | | | |
#+END #+END
@ -142,7 +170,8 @@ GOAL: Captivate; Startle
#+END_COMMENT #+END_COMMENT
* DRAFT Introduction / Opening :B_fullframe: * Slides :export:ignore:
** DRAFT Introduction / Opening :B_fullframe:
:PROPERTIES: :PROPERTIES:
:DURATION: 00:00:30 :DURATION: 00:00:30
:BEAMER_env: fullframe :BEAMER_env: fullframe
@ -165,12 +194,12 @@ often used and dismissed as tinfoil-hat FUD.)
#+BEAMER: \only<2>{(No, really, I have references.)} #+BEAMER: \only<2>{(No, really, I have references.)}
#+END_CENTER #+END_CENTER
* LACKING Mobile [0/5] ** LACKING Mobile [0/5]
** DRAFT Introduction :B_ignoreheading: *** DRAFT Introduction :B_ignoreheading:
:PROPERTIES: :PROPERTIES:
:BEAMER_env: ignoreheading :BEAMER_env: ignoreheading
:END: :END:
*** DRAFT Introduction :B_fullframe: **** DRAFT Introduction :B_fullframe:
:PROPERTIES: :PROPERTIES:
:DURATION: 00:00:30 :DURATION: 00:00:30
:BEAMER_env: fullframe :BEAMER_env: fullframe
@ -189,11 +218,11 @@ A phone is often synonymous with an individual.
In other words: they're excellent tracking devices. In other words: they're excellent tracking devices.
#+END_COMMENT #+END_COMMENT
** LACKING Cell Towers [0/2] *** LACKING Cell Towers [0/2]
:PROPERTIES: :PROPERTIES:
:DURATION: 00:01 :DURATION: 00:01
:END: :END:
*** DRAFT Fundamentally Needed **** DRAFT Fundamentally Needed
- <1-> Phone needs tower to make and receive calls - <1-> Phone needs tower to make and receive calls
- <2-> Gives away approximate location (can triangulate) - <2-> Gives away approximate location (can triangulate)
@ -215,7 +244,7 @@ You can imagine that such would be a very useful and important feature for
#+END_COMMENT #+END_COMMENT
*** LACKING Cell-Site Simulators **** LACKING Cell-Site Simulators
- <1-> Masquerade as cell towers - <1-> Masquerade as cell towers
- <2-> (List them) e.g. Stingray - <2-> (List them) e.g. Stingray
@ -228,12 +257,12 @@ Your location can be triangulated.
#+END_COMMENT #+END_COMMENT
** LACKING Wifi [0/3] *** LACKING Wifi [0/3]
:PROPERTIES: :PROPERTIES:
:DURATION: 00:01 :DURATION: 00:01
:END: :END:
*** DRAFT Wifi **** DRAFT Wifi
- Device may broadcast ESSIDs of past hidden networks - Device may broadcast ESSIDs of past hidden networks
- Expose unique hardware identifiers (MAC address) - Expose unique hardware identifiers (MAC address)
@ -249,7 +278,7 @@ Your mobile device could be broadcasting information like past network
which can be used to uniquely identify you. which can be used to uniquely identify you.
#+END_COMMENT #+END_COMMENT
*** LACKING Ubiquitous Access Points **** LACKING Ubiquitous Access Points
- <AP stuff> - <AP stuff>
#+BEGIN_COMMENT #+BEGIN_COMMENT
@ -261,7 +290,7 @@ Can be incredibly accurate for tracking movements,
#+END_COMMENT #+END_COMMENT
*** DRAFT Mitigations **** DRAFT Mitigations
- Disable Wifi [when not in use] - Disable Wifi [when not in use]
- Do not automatically connect to known networks - Do not automatically connect to known networks
- At the very least, not hidden - At the very least, not hidden
@ -274,12 +303,12 @@ You can also randomize your MAC address,
#+END_COMMENT #+END_COMMENT
** DRAFT Location Services [0/2] *** DRAFT Location Services [0/2]
:PROPERTIES: :PROPERTIES:
:DURATION: 00:01 :DURATION: 00:01
:END: :END:
*** DRAFT GPS **** DRAFT GPS
- Often enabled by default - Often enabled by default
- Might prompt user, but features are attractive - Might prompt user, but features are attractive
@ -300,7 +329,7 @@ And programs will track your movements just for the hell of it.
Or give an excuse to track you. Or give an excuse to track you.
#+END_COMMENT #+END_COMMENT
*** DRAFT Access Points **** DRAFT Access Points
- <1-> No GPS? No problem! - <1-> No GPS? No problem!
- <2-> AP harvesting (e.g. Google Street View cars) - <2-> AP harvesting (e.g. Google Street View cars)
- <2-> Works even where GPS and Cell signals cannot penetrate - <2-> Works even where GPS and Cell signals cannot penetrate
@ -322,12 +351,12 @@ MAC spoofing won't help since software on your device has countless other
examples. examples.
#+END_COMMENT #+END_COMMENT
** DRAFT Operating System [0/3] *** DRAFT Operating System [0/3]
:PROPERTIES: :PROPERTIES:
:DURATION: 00:01 :DURATION: 00:01
:END: :END:
*** DRAFT Untrusted/Proprietary OS **** DRAFT Untrusted/Proprietary OS
- Who does your phone work for? - Who does your phone work for?
- Apple? Google? Microsoft? Blackberry? Your manufacturer too? - Apple? Google? Microsoft? Blackberry? Your manufacturer too?
@ -341,7 +370,7 @@ You carry around this computer everywhere you go.
And you fundamentally cannot trust it. And you fundamentally cannot trust it.
#+END_COMMENT #+END_COMMENT
*** DRAFT Free/Libre Mobile OS? **** DRAFT Free/Libre Mobile OS?
- <1-3> Android is supposedly free software - <1-3> Android is supposedly free software
- <1-3> But every phone requires proprietary drivers, or contains - <1-3> But every phone requires proprietary drivers, or contains
proprietary software proprietary software
@ -355,7 +384,7 @@ I feel like I can at least trust my phone a little bit.
#+END_COMMENT #+END_COMMENT
*** DRAFT Modem **** DRAFT Modem
- But modem still runs non-free software - But modem still runs non-free software
- Often has access to CPU, disk, and memory - Often has access to CPU, disk, and memory
@ -371,12 +400,12 @@ So even with Replicant,
* RAW Stationary [0/5] ** RAW Stationary [0/5]
** DRAFT Introduction [0/1] :B_ignoreheading: *** DRAFT Introduction [0/1] :B_ignoreheading:
:PROPERTIES: :PROPERTIES:
:BEAMER_env: ignoreheading :BEAMER_env: ignoreheading
:END: :END:
*** DRAFT Introduction :B_fullframe: **** DRAFT Introduction :B_fullframe:
:PROPERTIES: :PROPERTIES:
:DURATION: 00:00:30 :DURATION: 00:00:30
:BEAMER_env: fullframe :BEAMER_env: fullframe
@ -394,8 +423,8 @@ Or maybe you've mitigated those threats in some way.
There's certain things that are nearly impossible to avoid. There's certain things that are nearly impossible to avoid.
#+END_COMMENT #+END_COMMENT
** DRAFT Surveillance Cameras [0/2] *** DRAFT Surveillance Cameras [0/2]
*** DRAFT Unavoidable Surveillance **** DRAFT Unavoidable Surveillance
- Security cameras are everywhere - Security cameras are everywhere
- Homes - Homes
@ -418,7 +447,7 @@ So what?
#+END_COMMENT #+END_COMMENT
*** DRAFT Access to Data **** DRAFT Access to Data
:PROPERTIES: :PROPERTIES:
:DURATION: 00:00:30 :DURATION: 00:00:30
:END: :END:
@ -437,8 +466,8 @@ The best form of privacy is to avoid having the data be collected to begin
with. with.
#+END_COMMENT #+END_COMMENT
** RAW Internet of Things [0/4] *** RAW Internet of Things [0/4]
*** RAW Wide Open **** RAW Wide Open
:PROPERTIES: :PROPERTIES:
:DURATION: 00:00:30 :DURATION: 00:00:30
:END: :END:
@ -459,7 +488,7 @@ They're also popular among individuals for personal/home use.
Home security systems. Home security systems.
Baby monitors. Baby monitors.
*** RAW Lack of Security **** RAW Lack of Security
:PROPERTIES: :PROPERTIES:
:DURATION: 00:01:30 :DURATION: 00:01:30
:END: :END:
@ -499,7 +528,7 @@ They remove things that are too deeply personal.
This is an excellent example to demonstrate to others why this is such a big This is an excellent example to demonstrate to others why this is such a big
deal. deal.
*** RAW Who's Watching? **** RAW Who's Watching?
:PROPERTIES: :PROPERTIES:
:DURATION: 00:00:30 :DURATION: 00:00:30
:END: :END:
@ -510,7 +539,7 @@ That's what some of you are going to be doing as soon as you leave this
That's what law enforcement is going to do. That's what law enforcement is going to do.
That's what the NSA, GHCQ, et. al. are going to do. That's what the NSA, GHCQ, et. al. are going to do.
*** RAW Facial Recognition **** RAW Facial Recognition
:PROPERTIES: :PROPERTIES:
:DURATION: 00:01 :DURATION: 00:01
:END: :END:
@ -532,8 +561,8 @@ There's a lot to say about IoT.
We'll come back to it. We'll come back to it.
** RAW Social Media [0/1] *** RAW Social Media [0/1]
*** RAW Collateral Damage **** RAW Collateral Damage
:PROPERTIES: :PROPERTIES:
:DURATION: 00:01 :DURATION: 00:01
:END: :END:
@ -563,8 +592,8 @@ If I'm off in the background when you take a picture of your friends in the
I'm still in the photo. I'm still in the photo.
** RAW Driving [0/3] *** RAW Driving [0/3]
*** RAW Introduction :B_fullframe: **** RAW Introduction :B_fullframe:
:PROPERTIES: :PROPERTIES:
:DURATION: 00:00:30 :DURATION: 00:00:30
:BEAMER_env: fullframe :BEAMER_env: fullframe
@ -583,7 +612,7 @@ That's not even worth discussing.
But what about if you drove? But what about if you drove?
*** RAW ALPRs **** RAW ALPRs
:PROPERTIES: :PROPERTIES:
:DURATION: 00:01 :DURATION: 00:01
:END: :END:
@ -608,7 +637,7 @@ But that can get expensive.
And they might have cameras and such anyway. And they might have cameras and such anyway.
*** RAW Car Itself **** RAW Car Itself
:PROPERTIES: :PROPERTIES:
:DURATION: 00:00:30 :DURATION: 00:00:30
:END: :END:
@ -619,12 +648,12 @@ Maybe your car itself is a tracking device (e.g. OnStar).
<...> <...>
* RAW The Web [0/6] ** RAW The Web [0/6]
** RAW Introduction [0/1] :B_ignoreheading: *** RAW Introduction [0/1] :B_ignoreheading:
:PROPERTIES: :PROPERTIES:
:BEAMER_env: ignoreheading :BEAMER_env: ignoreheading
:END: :END:
*** RAW Introduction :B_fullframe: **** RAW Introduction :B_fullframe:
:PROPERTIES: :PROPERTIES:
:BEAMER_env: fullframe :BEAMER_env: fullframe
:END: :END:
@ -632,8 +661,8 @@ But you're not just tracked in the flesh.
Much of what we do today is virtual. Much of what we do today is virtual.
What better way to segue than to bridge the two? What better way to segue than to bridge the two?
** RAW Bridging the Gap [0/1] *** RAW Bridging the Gap [0/1]
*** RAW Ultrasound Tracking **** RAW Ultrasound Tracking
:PROPERTIES: :PROPERTIES:
:DURATION: 00:01 :DURATION: 00:01
:END: :END:
@ -655,8 +684,8 @@ Others play inaudible sounds that are picked up by your mobile device or
<...> <...>
** RAW Incentive to Betray [0/1] *** RAW Incentive to Betray [0/1]
*** RAW Summary :B_fullframe: **** RAW Summary :B_fullframe:
:PROPERTIES: :PROPERTIES:
:DURATION: 00:00:30 :DURATION: 00:00:30
:BEAMER_env: fullframe :BEAMER_env: fullframe
@ -670,8 +699,8 @@ Many websites make money through advertising.
It can be lucrative. It can be lucrative.
And it's _easy_ to do. And it's _easy_ to do.
** RAW Analytics [0/2] *** RAW Analytics [0/2]
*** RAW Trackers **** RAW Trackers
:PROPERTIES: :PROPERTIES:
:DURATION: 00:01 :DURATION: 00:01
:END: :END:
@ -696,7 +725,7 @@ All of this can be used to identify users across the entire web.
If you must track your users, consider using Piwik, which you can host If you must track your users, consider using Piwik, which you can host
yourself. yourself.
*** RAW Like Buttons **** RAW Like Buttons
:PROPERTIES: :PROPERTIES:
:DURATION: 00:01 :DURATION: 00:01
:END: :END:
@ -713,8 +742,8 @@ But even if you don't have a Facebook account,
Addons like Privacy Badger will block these. Addons like Privacy Badger will block these.
** RAW Fingerprinting [0/2] *** RAW Fingerprinting [0/2]
*** RAW Summary :B_fullframe: **** RAW Summary :B_fullframe:
:PROPERTIES: :PROPERTIES:
:DURATION: 00:03 :DURATION: 00:03
:BEAMER_env: fullframe :BEAMER_env: fullframe
@ -733,7 +762,7 @@ Some methods allow fingerprinting even if the user uses multiple browsers
They can do this by effectively breaking out of the browser's sandbox by They can do this by effectively breaking out of the browser's sandbox by
doing operations that depend heavily on specifics of users' hardware. doing operations that depend heavily on specifics of users' hardware.
*** RAW Browser Addons **** RAW Browser Addons
:PROPERTIES: :PROPERTIES:
:DURATION: 00:01 :DURATION: 00:01
:END: :END:
@ -745,8 +774,8 @@ So how do we avoid this type of tracking?
<<Talk about browser addons>>. <<Talk about browser addons>>.
** RAW Anonymity [0/3] *** RAW Anonymity [0/3]
*** RAW Summary :B_fullframe: **** RAW Summary :B_fullframe:
:PROPERTIES: :PROPERTIES:
:DURATION: 00:01 :DURATION: 00:01
:BEAMER_env: fullframe :BEAMER_env: fullframe
@ -767,7 +796,7 @@ If your life depends on anonymity,
I provide a number of resources to get you started. I provide a number of resources to get you started.
*** RAW The Tor Network **** RAW The Tor Network
:PROPERTIES: :PROPERTIES:
:DURATION: 00:01 :DURATION: 00:01
:END: :END:
@ -793,7 +822,7 @@ There are lots of other details that I don't have time to get to here,
but I provide a number of resources for you. but I provide a number of resources for you.
*** RAW TorBrowser, Tails, and Whonix **** RAW TorBrowser, Tails, and Whonix
:PROPERTIES: :PROPERTIES:
:DURATION: 00:02 :DURATION: 00:02
:END: :END:
@ -811,12 +840,12 @@ Tails...
Whonix... Whonix...
* LACKING Data Analytics [0/2] ** LACKING Data Analytics [0/2]
** RAW Introduction [0/1] :B_ignoreheading: *** RAW Introduction [0/1] :B_ignoreheading:
:PROPERTIES: :PROPERTIES:
:BEAMER_env: ignoreheading :BEAMER_env: ignoreheading
:END: :END:
*** RAW Introduction :B_fullframe: **** RAW Introduction :B_fullframe:
:PROPERTIES: :PROPERTIES:
:DURATION: 00:00 :DURATION: 00:00
:BEAMER_env: fullframe :BEAMER_env: fullframe
@ -825,8 +854,8 @@ We've seen adversaries with different motives.
Let's explore what some of them do with all those data. Let's explore what some of them do with all those data.
** LACKING Headings [0/3] *** LACKING Headings [0/3]
*** LACKING Advertisers **** LACKING Advertisers
:PROPERTIES: :PROPERTIES:
:DURATION: 00:02 :DURATION: 00:02
:END: :END:
@ -839,26 +868,26 @@ I'm sure many of you heard of the story of Target knowing a girl was
<<user profiles>> <<user profiles>>
*** LACKING Social Media **** LACKING Social Media
:PROPERTIES: :PROPERTIES:
:DURATION: 00:01 :DURATION: 00:01
:END: :END:
(Where you are, what you do.) (Where you are, what you do.)
*** LACKING Governments **** LACKING Governments
:PROPERTIES: :PROPERTIES:
:DURATION: 00:00:30 :DURATION: 00:00:30
:END: :END:
(Segue into government surveillance.) (Segue into government surveillance.)
* RAW Policy and Government [0/6] ** RAW Policy and Government [0/6]
** RAW Introduction [0/1] :B_ignoreheading: *** RAW Introduction [0/1] :B_ignoreheading:
:PROPERTIES: :PROPERTIES:
:BEAMER_env: ignoreheading :BEAMER_env: ignoreheading
:END: :END:
*** RAW Introduction :B_fullframe: **** RAW Introduction :B_fullframe:
:PROPERTIES: :PROPERTIES:
:DURATION: 00:00:30 :DURATION: 00:00:30
:BEAMER_env: fullframe :BEAMER_env: fullframe
@ -872,15 +901,15 @@ But they also have a duty to know their bounds;
We know how that story goes. We know how that story goes.
** LACKING Surveillance [0/4] *** LACKING Surveillance [0/4]
*** LACKING History of NSA Surveillance **** LACKING History of NSA Surveillance
:PROPERTIES: :PROPERTIES:
:DURATION: 00:02 :DURATION: 00:02
:END: :END:
(EFF, <<Klein v. NSA>>) (EFF, <<Klein v. NSA>>)
*** LACKING Verizon Metadata **** LACKING Verizon Metadata
:PROPERTIES: :PROPERTIES:
:DURATION: 00:00:30 :DURATION: 00:00:30
:END: :END:
@ -888,13 +917,13 @@ We know how that story goes.
... ...
*** LACKING Snowden **** LACKING Snowden
:PROPERTIES: :PROPERTIES:
:DURATION: 00:01 :DURATION: 00:01
:END: :END:
... ...
*** LACKING Tools **** LACKING Tools
:PROPERTIES: :PROPERTIES:
:DURATION: 00:02 :DURATION: 00:02
:END: :END:
@ -905,8 +934,8 @@ We know how that story goes.
- Etc. - Etc.
** LACKING Crypto Wars [0/3] *** LACKING Crypto Wars [0/3]
*** RAW Introduction :B_fullframe: **** RAW Introduction :B_fullframe:
:PROPERTIES: :PROPERTIES:
:DURATION: 00:00 :DURATION: 00:00
:BEAMER_env: fullframe :BEAMER_env: fullframe
@ -918,7 +947,7 @@ As if we haven't learned from the past.
The Crypto wars. The Crypto wars.
*** LACKING Bernstein v. United States **** LACKING Bernstein v. United States
:PROPERTIES: :PROPERTIES:
:DURATION: 00:01 :DURATION: 00:01
:END: :END:
@ -927,7 +956,7 @@ The Crypto wars.
(Code is speech) (Code is speech)
*** LACKING Makes Us Less Safe **** LACKING Makes Us Less Safe
:PROPERTIES: :PROPERTIES:
:DURATION: 00:02 :DURATION: 00:02
:END: :END:
@ -939,8 +968,8 @@ Apple v. FBI
- VEP - VEP
** LACKING Espionage [0/1] *** LACKING Espionage [0/1]
*** LACKING US Can't Keep Its Own Secrets **** LACKING US Can't Keep Its Own Secrets
:PROPERTIES: :PROPERTIES:
:DURATION: 00:01 :DURATION: 00:01
:END: :END:
@ -948,8 +977,8 @@ Apple v. FBI
- DNC - DNC
** LACKING Subpoenas, Warrants, NSLs [0/1] *** LACKING Subpoenas, Warrants, NSLs [0/1]
*** LACKING National Security Letters **** LACKING National Security Letters
:PROPERTIES: :PROPERTIES:
:DURATION: 00:01 :DURATION: 00:01
:END: :END:
@ -957,8 +986,8 @@ Apple v. FBI
- Prior restraint - Prior restraint
- Canaries - Canaries
** LACKING Law [0/1] *** LACKING Law [0/1]
*** LACKING Summary :B_fullframe: **** LACKING Summary :B_fullframe:
:PROPERTIES: :PROPERTIES:
:DURATION: 00:01 :DURATION: 00:01
:BEAMER_env: fullframe :BEAMER_env: fullframe
@ -969,9 +998,9 @@ Apple v. FBI
- CFAA - CFAA
* RAW Your Fight [0/1] ** RAW Your Fight [0/1]
** RAW Headings [0/5] *** RAW Headings [0/5]
*** RAW Feeding :B_fullframe: **** RAW Feeding :B_fullframe:
:PROPERTIES: :PROPERTIES:
:DURATION: 00:00 :DURATION: 00:00
:BEAMER_env: fullframe :BEAMER_env: fullframe
@ -979,7 +1008,7 @@ Apple v. FBI
We're feeding into all of this! We're feeding into all of this!
*** RAW SaaSS and Centralization **** RAW SaaSS and Centralization
:PROPERTIES: :PROPERTIES:
:DURATION: 00:01 :DURATION: 00:01
:END: :END:
@ -988,7 +1017,7 @@ We're feeding into all of this!
- The "Cloud" - The "Cloud"
*** RAW Corporate Negligence **** RAW Corporate Negligence
:PROPERTIES: :PROPERTIES:
:DURATION: 00:01 :DURATION: 00:01
:END: :END:
@ -1005,7 +1034,7 @@ They need to catch up with the times.
(Tie into SaaSS) (Tie into SaaSS)
*** RAW Status Quo **** RAW Status Quo
:PROPERTIES: :PROPERTIES:
:DURATION: 00:02 :DURATION: 00:02
:END: :END:
@ -1032,7 +1061,7 @@ That even people who aren't that privacy- or security-conscious recognize
that there are risks not only at a personal level, that there are risks not only at a personal level,
but also national and global. but also national and global.
*** RAW Push Back **** RAW Push Back
:PROPERTIES: :PROPERTIES:
:DURATION: 00:01 :DURATION: 00:01
:END: :END:
@ -1043,12 +1072,19 @@ We need to push back.
governments. governments.
* Local Variables :noexport: * Exporting
Just Emacs configuration stuff. You should be able to simply export this buffer as a Beamer presentation
(=C-c C-e l P=) and get a slideshow.
Note that this requires =ox-extras=, which is part of Org Mode's
=contrib/=. Without it, the =:ignore:= tag will not be recognized and the
rendered slides will have incorrect depth.
* Local Variables
# Local Variables: # Local Variables:
# org-todo-keyword-faces: (("DRAFT" . org-upcoming-deadline) \ # org-todo-keyword-faces: (("DRAFT" . org-upcoming-deadline) \
# ("LACKING" . org-warning) \ # ("LACKING" . org-warning) \
# ("REVIEWED" . "yellow") \ # ("REVIEWED" . "yellow") \
# ("READY" . (:inherit org-scheduled bold :underline t))) # ("READY" . (:inherit org-scheduled bold :underline t)))
# eval: (ox-extras-activate '(ignore-headlines))
# End: # End: