slides.org (COLUMNS): Add %TODO and %BEAMER_ENV
parent
32cada0b63
commit
656f7da8de
186
slides.org
186
slides.org
|
@ -9,101 +9,105 @@
|
|||
#+BEAMER_THEME: Warsaw
|
||||
#+BEAMER_HEADER: \beamertemplatenavigationsymbolsempty
|
||||
#+TODO: RAW(r) LACKING(l) DRAFT(d) REVIEWED(R) | READY(+) REHEARSED(D)
|
||||
#+COLUMNS: %25ITEM %10DURATION{:}
|
||||
#+COLUMNS: %25ITEM %10DURATION{:} %TODO %BEAMER_ENV(ENVIRONMENT)
|
||||
|
||||
|
||||
#+BEGIN_COMMENT
|
||||
#+BEGIN: columnview :hlines 1 :id local
|
||||
| ITEM | DURATION |
|
||||
|------------------------------------+----------|
|
||||
| * Introduction / Opening | 00:00:30 |
|
||||
|------------------------------------+----------|
|
||||
| * Mobile [0/5] | 0:04 |
|
||||
| ** Introduction | 0:00 |
|
||||
| *** Introduction | 00:00:30 |
|
||||
| ** Cell Towers [0/2] | 00:01 |
|
||||
| *** Fundamentally Needed | |
|
||||
| *** Cell-Site Simulators | |
|
||||
| ** Wifi [0/1] | 0:01 |
|
||||
| *** Wifi | 00:01 |
|
||||
| ** Location Services [0/2] | 00:01 |
|
||||
| *** GPS | |
|
||||
| *** Access Points | |
|
||||
| ** Operating System [0/1] | 0:01 |
|
||||
| *** Untrusted/Proprietary OS | 00:01 |
|
||||
|------------------------------------+----------|
|
||||
| * Stationary [0/5] | 0:08 |
|
||||
| ** Introduction [0/1] | 0:00 |
|
||||
| *** Introduction | 00:00:30 |
|
||||
| ** Surveillance Cameras [0/2] | 0:00 |
|
||||
| *** Unavoidable | |
|
||||
| *** Access to Data | 00:00:30 |
|
||||
| ** Internet of Things [0/4] | 0:04 |
|
||||
| *** Wide Open | 00:00:30 |
|
||||
| *** Lack of Security | 00:01:30 |
|
||||
| *** Who's Watching? | 00:00:30 |
|
||||
| *** Facial Recognition | 00:01 |
|
||||
| ** Social Media [0/1] | 0:01 |
|
||||
| *** Collateral Damage | 00:01 |
|
||||
| ** Driving [0/3] | 0:02 |
|
||||
| *** Introduction | 00:00:30 |
|
||||
| *** ALPRs | 00:01 |
|
||||
| *** Car Itself | 00:00:30 |
|
||||
|------------------------------------+----------|
|
||||
| * The Web [0/6] | 0:12 |
|
||||
| ** Introduction [0/1] | |
|
||||
| *** Introduction | |
|
||||
| ** Bridging the Gap [0/1] | 0:01 |
|
||||
| *** Ultrasound Tracking | 00:01 |
|
||||
| ** Incentive to Betray [0/1] | 0:00 |
|
||||
| *** Summary | 00:00:30 |
|
||||
| ** Analytics [0/2] | 0:02 |
|
||||
| *** Trackers | 00:01 |
|
||||
| *** Like Buttons | 00:01 |
|
||||
| ** Fingerprinting [0/2] | 0:04 |
|
||||
| *** Summary | 00:03 |
|
||||
| *** Browser Addons | 00:01 |
|
||||
| ** Anonymity [0/3] | 0:04 |
|
||||
| *** Summary | 00:01 |
|
||||
| *** The Tor Network | 00:01 |
|
||||
| *** TorBrowser, Tails, and Whonix | 00:02 |
|
||||
|------------------------------------+----------|
|
||||
| * Data Analytics [0/2] | 0:04 |
|
||||
| ** Introduction [0/1] | 0:00 |
|
||||
| *** Introduction | 00:00 |
|
||||
| ** Headings [0/3] | 0:04 |
|
||||
| *** Advertisers | 00:02 |
|
||||
| *** Social Media | 00:01 |
|
||||
| *** Governments | 00:00:30 |
|
||||
|------------------------------------+----------|
|
||||
| * Policy and Government [0/6] | 0:12 |
|
||||
| ** Introduction [0/1] | 0:00 |
|
||||
| *** Introduction | 00:00:30 |
|
||||
| ** Surveillance [0/4] | 0:06 |
|
||||
| *** History of NSA Surveillance | 00:02 |
|
||||
| *** Verizon Metadata | 00:00:30 |
|
||||
| *** Snowden | 00:01 |
|
||||
| *** Tools | 00:02 |
|
||||
| ** Crypto Wars [0/3] | 0:03 |
|
||||
| *** Introduction | 00:00 |
|
||||
| *** Bernstein v. United States | 00:01 |
|
||||
| *** Makes Us Less Safe | 00:02 |
|
||||
| ** Espionage [0/1] | 0:01 |
|
||||
| *** US Can't Keep Its Own Secrets | 00:01 |
|
||||
| ** Subpoenas, Warrants, NSLs [0/1] | 0:01 |
|
||||
| *** National Security Letters | 00:01 |
|
||||
| ** Law [0/1] | 0:01 |
|
||||
| *** Summary | 00:01 |
|
||||
|------------------------------------+----------|
|
||||
| * Your Fight [0/1] | 0:05 |
|
||||
| ** Headings [0/5] | 0:05 |
|
||||
| *** Feeding | 00:00 |
|
||||
| *** SaaSS and Centralization | 00:01 |
|
||||
| *** Corporate Negligence | 00:01 |
|
||||
| *** Status Quo | 00:02 |
|
||||
| *** Push Back | 00:01 |
|
||||
|------------------------------------+----------|
|
||||
| * Local Variabes | |
|
||||
| ITEM | DURATION | TODO | ENVIRONMENT |
|
||||
|------------------------------------+----------+---------+---------------|
|
||||
| * Introduction / Opening | 00:00:30 | DRAFT | fullframe |
|
||||
|------------------------------------+----------+---------+---------------|
|
||||
| * Mobile [0/5] | 0:04 | LACKING | |
|
||||
| ** Introduction | 0:00 | DRAFT | ignoreheading |
|
||||
| *** Introduction | 00:00:30 | DRAFT | fullframe |
|
||||
| ** Cell Towers [0/2] | 00:01 | LACKING | |
|
||||
| *** Fundamentally Needed | | DRAFT | |
|
||||
| *** Cell-Site Simulators | | LACKING | |
|
||||
| ** Wifi [0/3] | 00:01 | LACKING | |
|
||||
| *** Wifi | | DRAFT | |
|
||||
| *** Ubiquitous Access Points | | LACKING | |
|
||||
| *** Mitigations | | DRAFT | |
|
||||
| ** Location Services [0/2] | 00:01 | DRAFT | |
|
||||
| *** GPS | | DRAFT | |
|
||||
| *** Access Points | | DRAFT | |
|
||||
| ** Operating System [0/3] | 00:01 | DRAFT | |
|
||||
| *** Untrusted/Proprietary OS | | DRAFT | |
|
||||
| *** Free/Libre Mobile OS? | | DRAFT | |
|
||||
| *** Modem | | DRAFT | |
|
||||
|------------------------------------+----------+---------+---------------|
|
||||
| * Stationary [0/5] | 0:08 | RAW | |
|
||||
| ** Introduction [0/1] | 0:00 | RAW | ignoreheading |
|
||||
| *** Introduction | 00:00:30 | RAW | fullframe |
|
||||
| ** Surveillance Cameras [0/2] | 0:00 | RAW | |
|
||||
| *** Unavoidable | | RAW | |
|
||||
| *** Access to Data | 00:00:30 | RAW | |
|
||||
| ** Internet of Things [0/4] | 0:04 | RAW | |
|
||||
| *** Wide Open | 00:00:30 | RAW | |
|
||||
| *** Lack of Security | 00:01:30 | RAW | |
|
||||
| *** Who's Watching? | 00:00:30 | RAW | |
|
||||
| *** Facial Recognition | 00:01 | RAW | |
|
||||
| ** Social Media [0/1] | 0:01 | RAW | |
|
||||
| *** Collateral Damage | 00:01 | RAW | |
|
||||
| ** Driving [0/3] | 0:02 | RAW | |
|
||||
| *** Introduction | 00:00:30 | RAW | fullframe |
|
||||
| *** ALPRs | 00:01 | RAW | |
|
||||
| *** Car Itself | 00:00:30 | RAW | |
|
||||
|------------------------------------+----------+---------+---------------|
|
||||
| * The Web [0/6] | 0:12 | RAW | |
|
||||
| ** Introduction [0/1] | | RAW | ignoreheading |
|
||||
| *** Introduction | | RAW | fullframe |
|
||||
| ** Bridging the Gap [0/1] | 0:01 | RAW | |
|
||||
| *** Ultrasound Tracking | 00:01 | RAW | |
|
||||
| ** Incentive to Betray [0/1] | 0:00 | RAW | |
|
||||
| *** Summary | 00:00:30 | RAW | fullframe |
|
||||
| ** Analytics [0/2] | 0:02 | RAW | |
|
||||
| *** Trackers | 00:01 | RAW | |
|
||||
| *** Like Buttons | 00:01 | RAW | |
|
||||
| ** Fingerprinting [0/2] | 0:04 | RAW | |
|
||||
| *** Summary | 00:03 | RAW | fullframe |
|
||||
| *** Browser Addons | 00:01 | RAW | |
|
||||
| ** Anonymity [0/3] | 0:04 | RAW | |
|
||||
| *** Summary | 00:01 | RAW | fullframe |
|
||||
| *** The Tor Network | 00:01 | RAW | |
|
||||
| *** TorBrowser, Tails, and Whonix | 00:02 | RAW | |
|
||||
|------------------------------------+----------+---------+---------------|
|
||||
| * Data Analytics [0/2] | 0:04 | LACKING | |
|
||||
| ** Introduction [0/1] | 0:00 | RAW | ignoreheading |
|
||||
| *** Introduction | 00:00 | RAW | fullframe |
|
||||
| ** Headings [0/3] | 0:04 | LACKING | |
|
||||
| *** Advertisers | 00:02 | LACKING | |
|
||||
| *** Social Media | 00:01 | LACKING | |
|
||||
| *** Governments | 00:00:30 | LACKING | |
|
||||
|------------------------------------+----------+---------+---------------|
|
||||
| * Policy and Government [0/6] | 0:12 | RAW | |
|
||||
| ** Introduction [0/1] | 0:00 | RAW | ignoreheading |
|
||||
| *** Introduction | 00:00:30 | RAW | fullframe |
|
||||
| ** Surveillance [0/4] | 0:06 | LACKING | |
|
||||
| *** History of NSA Surveillance | 00:02 | LACKING | |
|
||||
| *** Verizon Metadata | 00:00:30 | LACKING | |
|
||||
| *** Snowden | 00:01 | LACKING | |
|
||||
| *** Tools | 00:02 | LACKING | |
|
||||
| ** Crypto Wars [0/3] | 0:03 | LACKING | |
|
||||
| *** Introduction | 00:00 | RAW | fullframe |
|
||||
| *** Bernstein v. United States | 00:01 | LACKING | |
|
||||
| *** Makes Us Less Safe | 00:02 | LACKING | |
|
||||
| ** Espionage [0/1] | 0:01 | LACKING | |
|
||||
| *** US Can't Keep Its Own Secrets | 00:01 | LACKING | |
|
||||
| ** Subpoenas, Warrants, NSLs [0/1] | 0:01 | LACKING | |
|
||||
| *** National Security Letters | 00:01 | LACKING | |
|
||||
| ** Law [0/1] | 0:01 | LACKING | |
|
||||
| *** Summary | 00:01 | LACKING | fullframe |
|
||||
|------------------------------------+----------+---------+---------------|
|
||||
| * Your Fight [0/1] | 0:05 | RAW | |
|
||||
| ** Headings [0/5] | 0:05 | RAW | |
|
||||
| *** Feeding | 00:00 | RAW | fullframe |
|
||||
| *** SaaSS and Centralization | 00:01 | RAW | |
|
||||
| *** Corporate Negligence | 00:01 | RAW | |
|
||||
| *** Status Quo | 00:02 | RAW | |
|
||||
| *** Push Back | 00:01 | RAW | |
|
||||
|------------------------------------+----------+---------+---------------|
|
||||
| * Local Variabes | | | |
|
||||
#+END
|
||||
|
||||
|
||||
|
|
Loading…
Reference in New Issue