slides.org (COLUMNS): Add %TODO and %BEAMER_ENV

master
Mike Gerwitz 2017-03-05 14:39:41 -05:00
parent 32cada0b63
commit 656f7da8de
1 changed files with 95 additions and 91 deletions

View File

@ -9,101 +9,105 @@
#+BEAMER_THEME: Warsaw
#+BEAMER_HEADER: \beamertemplatenavigationsymbolsempty
#+TODO: RAW(r) LACKING(l) DRAFT(d) REVIEWED(R) | READY(+) REHEARSED(D)
#+COLUMNS: %25ITEM %10DURATION{:}
#+COLUMNS: %25ITEM %10DURATION{:} %TODO %BEAMER_ENV(ENVIRONMENT)
#+BEGIN_COMMENT
#+BEGIN: columnview :hlines 1 :id local
| ITEM | DURATION |
|------------------------------------+----------|
| * Introduction / Opening | 00:00:30 |
|------------------------------------+----------|
| * Mobile [0/5] | 0:04 |
| ** Introduction | 0:00 |
| *** Introduction | 00:00:30 |
| ** Cell Towers [0/2] | 00:01 |
| *** Fundamentally Needed | |
| *** Cell-Site Simulators | |
| ** Wifi [0/1] | 0:01 |
| *** Wifi | 00:01 |
| ** Location Services [0/2] | 00:01 |
| *** GPS | |
| *** Access Points | |
| ** Operating System [0/1] | 0:01 |
| *** Untrusted/Proprietary OS | 00:01 |
|------------------------------------+----------|
| * Stationary [0/5] | 0:08 |
| ** Introduction [0/1] | 0:00 |
| *** Introduction | 00:00:30 |
| ** Surveillance Cameras [0/2] | 0:00 |
| *** Unavoidable | |
| *** Access to Data | 00:00:30 |
| ** Internet of Things [0/4] | 0:04 |
| *** Wide Open | 00:00:30 |
| *** Lack of Security | 00:01:30 |
| *** Who's Watching? | 00:00:30 |
| *** Facial Recognition | 00:01 |
| ** Social Media [0/1] | 0:01 |
| *** Collateral Damage | 00:01 |
| ** Driving [0/3] | 0:02 |
| *** Introduction | 00:00:30 |
| *** ALPRs | 00:01 |
| *** Car Itself | 00:00:30 |
|------------------------------------+----------|
| * The Web [0/6] | 0:12 |
| ** Introduction [0/1] | |
| *** Introduction | |
| ** Bridging the Gap [0/1] | 0:01 |
| *** Ultrasound Tracking | 00:01 |
| ** Incentive to Betray [0/1] | 0:00 |
| *** Summary | 00:00:30 |
| ** Analytics [0/2] | 0:02 |
| *** Trackers | 00:01 |
| *** Like Buttons | 00:01 |
| ** Fingerprinting [0/2] | 0:04 |
| *** Summary | 00:03 |
| *** Browser Addons | 00:01 |
| ** Anonymity [0/3] | 0:04 |
| *** Summary | 00:01 |
| *** The Tor Network | 00:01 |
| *** TorBrowser, Tails, and Whonix | 00:02 |
|------------------------------------+----------|
| * Data Analytics [0/2] | 0:04 |
| ** Introduction [0/1] | 0:00 |
| *** Introduction | 00:00 |
| ** Headings [0/3] | 0:04 |
| *** Advertisers | 00:02 |
| *** Social Media | 00:01 |
| *** Governments | 00:00:30 |
|------------------------------------+----------|
| * Policy and Government [0/6] | 0:12 |
| ** Introduction [0/1] | 0:00 |
| *** Introduction | 00:00:30 |
| ** Surveillance [0/4] | 0:06 |
| *** History of NSA Surveillance | 00:02 |
| *** Verizon Metadata | 00:00:30 |
| *** Snowden | 00:01 |
| *** Tools | 00:02 |
| ** Crypto Wars [0/3] | 0:03 |
| *** Introduction | 00:00 |
| *** Bernstein v. United States | 00:01 |
| *** Makes Us Less Safe | 00:02 |
| ** Espionage [0/1] | 0:01 |
| *** US Can't Keep Its Own Secrets | 00:01 |
| ** Subpoenas, Warrants, NSLs [0/1] | 0:01 |
| *** National Security Letters | 00:01 |
| ** Law [0/1] | 0:01 |
| *** Summary | 00:01 |
|------------------------------------+----------|
| * Your Fight [0/1] | 0:05 |
| ** Headings [0/5] | 0:05 |
| *** Feeding | 00:00 |
| *** SaaSS and Centralization | 00:01 |
| *** Corporate Negligence | 00:01 |
| *** Status Quo | 00:02 |
| *** Push Back | 00:01 |
|------------------------------------+----------|
| * Local Variabes | |
| ITEM | DURATION | TODO | ENVIRONMENT |
|------------------------------------+----------+---------+---------------|
| * Introduction / Opening | 00:00:30 | DRAFT | fullframe |
|------------------------------------+----------+---------+---------------|
| * Mobile [0/5] | 0:04 | LACKING | |
| ** Introduction | 0:00 | DRAFT | ignoreheading |
| *** Introduction | 00:00:30 | DRAFT | fullframe |
| ** Cell Towers [0/2] | 00:01 | LACKING | |
| *** Fundamentally Needed | | DRAFT | |
| *** Cell-Site Simulators | | LACKING | |
| ** Wifi [0/3] | 00:01 | LACKING | |
| *** Wifi | | DRAFT | |
| *** Ubiquitous Access Points | | LACKING | |
| *** Mitigations | | DRAFT | |
| ** Location Services [0/2] | 00:01 | DRAFT | |
| *** GPS | | DRAFT | |
| *** Access Points | | DRAFT | |
| ** Operating System [0/3] | 00:01 | DRAFT | |
| *** Untrusted/Proprietary OS | | DRAFT | |
| *** Free/Libre Mobile OS? | | DRAFT | |
| *** Modem | | DRAFT | |
|------------------------------------+----------+---------+---------------|
| * Stationary [0/5] | 0:08 | RAW | |
| ** Introduction [0/1] | 0:00 | RAW | ignoreheading |
| *** Introduction | 00:00:30 | RAW | fullframe |
| ** Surveillance Cameras [0/2] | 0:00 | RAW | |
| *** Unavoidable | | RAW | |
| *** Access to Data | 00:00:30 | RAW | |
| ** Internet of Things [0/4] | 0:04 | RAW | |
| *** Wide Open | 00:00:30 | RAW | |
| *** Lack of Security | 00:01:30 | RAW | |
| *** Who's Watching? | 00:00:30 | RAW | |
| *** Facial Recognition | 00:01 | RAW | |
| ** Social Media [0/1] | 0:01 | RAW | |
| *** Collateral Damage | 00:01 | RAW | |
| ** Driving [0/3] | 0:02 | RAW | |
| *** Introduction | 00:00:30 | RAW | fullframe |
| *** ALPRs | 00:01 | RAW | |
| *** Car Itself | 00:00:30 | RAW | |
|------------------------------------+----------+---------+---------------|
| * The Web [0/6] | 0:12 | RAW | |
| ** Introduction [0/1] | | RAW | ignoreheading |
| *** Introduction | | RAW | fullframe |
| ** Bridging the Gap [0/1] | 0:01 | RAW | |
| *** Ultrasound Tracking | 00:01 | RAW | |
| ** Incentive to Betray [0/1] | 0:00 | RAW | |
| *** Summary | 00:00:30 | RAW | fullframe |
| ** Analytics [0/2] | 0:02 | RAW | |
| *** Trackers | 00:01 | RAW | |
| *** Like Buttons | 00:01 | RAW | |
| ** Fingerprinting [0/2] | 0:04 | RAW | |
| *** Summary | 00:03 | RAW | fullframe |
| *** Browser Addons | 00:01 | RAW | |
| ** Anonymity [0/3] | 0:04 | RAW | |
| *** Summary | 00:01 | RAW | fullframe |
| *** The Tor Network | 00:01 | RAW | |
| *** TorBrowser, Tails, and Whonix | 00:02 | RAW | |
|------------------------------------+----------+---------+---------------|
| * Data Analytics [0/2] | 0:04 | LACKING | |
| ** Introduction [0/1] | 0:00 | RAW | ignoreheading |
| *** Introduction | 00:00 | RAW | fullframe |
| ** Headings [0/3] | 0:04 | LACKING | |
| *** Advertisers | 00:02 | LACKING | |
| *** Social Media | 00:01 | LACKING | |
| *** Governments | 00:00:30 | LACKING | |
|------------------------------------+----------+---------+---------------|
| * Policy and Government [0/6] | 0:12 | RAW | |
| ** Introduction [0/1] | 0:00 | RAW | ignoreheading |
| *** Introduction | 00:00:30 | RAW | fullframe |
| ** Surveillance [0/4] | 0:06 | LACKING | |
| *** History of NSA Surveillance | 00:02 | LACKING | |
| *** Verizon Metadata | 00:00:30 | LACKING | |
| *** Snowden | 00:01 | LACKING | |
| *** Tools | 00:02 | LACKING | |
| ** Crypto Wars [0/3] | 0:03 | LACKING | |
| *** Introduction | 00:00 | RAW | fullframe |
| *** Bernstein v. United States | 00:01 | LACKING | |
| *** Makes Us Less Safe | 00:02 | LACKING | |
| ** Espionage [0/1] | 0:01 | LACKING | |
| *** US Can't Keep Its Own Secrets | 00:01 | LACKING | |
| ** Subpoenas, Warrants, NSLs [0/1] | 0:01 | LACKING | |
| *** National Security Letters | 00:01 | LACKING | |
| ** Law [0/1] | 0:01 | LACKING | |
| *** Summary | 00:01 | LACKING | fullframe |
|------------------------------------+----------+---------+---------------|
| * Your Fight [0/1] | 0:05 | RAW | |
| ** Headings [0/5] | 0:05 | RAW | |
| *** Feeding | 00:00 | RAW | fullframe |
| *** SaaSS and Centralization | 00:01 | RAW | |
| *** Corporate Negligence | 00:01 | RAW | |
| *** Status Quo | 00:02 | RAW | |
| *** Push Back | 00:01 | RAW | |
|------------------------------------+----------+---------+---------------|
| * Local Variabes | | | |
#+END