[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

[tor-commits] [curriculum/master] Dropping module3



commit 70cf623348068c0b9a397727489e59b2aac1bb9e
Author: Colin Childs <colin@xxxxxxxxxxxxxx>
Date:   Tue Jun 23 23:24:16 2015 -0500

    Dropping module3
---
 Makefile            |    4 ---
 module3/module3.tex |   96 ---------------------------------------------------
 module3/module4.tex |   94 +++++++++++++++++++++++++++++++++++++++++++++++++
 module4/module4.tex |   94 -------------------------------------------------
 4 files changed, 94 insertions(+), 194 deletions(-)

diff --git a/Makefile b/Makefile
index e72b166..142d058 100644
--- a/Makefile
+++ b/Makefile
@@ -2,7 +2,6 @@ default:
 	pdflatex module1/*.tex
 	pdflatex module2/*.tex
 	pdflatex module3/*.tex
-	pdflatex module4/*.tex
 
 moduleone:	
 	pdflatex module1/*.tex
@@ -13,9 +12,6 @@ moduletwo:
 modulethree:
 	pdflatex module3/*.tex
 
-modulefour:
-	pdflatex module4/*.tex
-
 clean:
 	rm *.aux *.log *.nav *.out *.snm *.toc
 
diff --git a/module3/module3.tex b/module3/module3.tex
deleted file mode 100644
index 39f004f..0000000
--- a/module3/module3.tex
+++ /dev/null
@@ -1,96 +0,0 @@
-\documentclass{beamer}
-\usepackage[utf8]{inputenc}
-\beamertemplatenavigationsymbolsempty
-
-\usetheme{Warsaw}
-\definecolor{mypurple}{rgb}{.49,0,98}
-\setbeamercolor*{palette primary}{use=structure,fg=white,bg=mypurple}
-
-\title[Module 3: Tails]
-{Module 3: Using Tails}
-
-\subtitle{Downloading, verifying and installing Tails}
-
-\author[C. Childs]
-{C.~Childs\inst{1}} 
-
-\institute[Tor Project]
-{
-  \inst{1}
-  Support assistant / Translation coordinator\\
-  The Tor Project
-}
-
-\logo{\includegraphics[height=1.5cm]{pictures/onion.jpg}}
-
-\begin{document}
-\frame{\titlepage}
-
-\begin{frame}
-\frametitle{}
-	\begin{block}{}
-	\end{block}
-\end{frame}
-
-\begin{frame}
-\frametitle{}
-        \begin{block}{}
-        \end{block}
-\end{frame}
-
-\begin{frame}
-\frametitle{}
-        \begin{block}{}
-        \end{block}
-\end{frame}
-
-\begin{frame}
-\frametitle{}
-        \begin{block}{}
-        \end{block}
-\end{frame}
-
-\begin{frame}
-\frametitle{}
-        \begin{block}{}
-        \end{block}
-\end{frame}
-
-\begin{frame}
-\frametitle{}
-        \begin{block}{}
-        \end{block}
-\end{frame}
-
-\begin{frame}
-\frametitle{}
-        \begin{block}{}
-        \end{block}
-\end{frame}
-
-\begin{frame}
-\frametitle{}
-        \begin{block}{}
-        \end{block}
-\end{frame}
-
-\begin{frame}
-\frametitle{}
-        \begin{block}{}
-        \end{block}
-\end{frame}
-
-\begin{frame}
-\frametitle{}
-        \begin{block}{}
-        \end{block}
-\end{frame}
-
-\begin{frame}
-\frametitle{}
-        \begin{block}{}
-        \end{block}
-\end{frame}
-
-\end{document}
-
diff --git a/module3/module4.tex b/module3/module4.tex
new file mode 100644
index 0000000..5fd5d37
--- /dev/null
+++ b/module3/module4.tex
@@ -0,0 +1,94 @@
+\documentclass{beamer}
+\usepackage[utf8]{inputenc}
+\beamertemplatenavigationsymbolsempty
+
+\usetheme{Warsaw}
+\definecolor{mypurple}{rgb}{.49,0,98}
+\setbeamercolor*{palette primary}{use=structure,fg=white,bg=mypurple}
+
+\title[Module 4: Digital Privacy Tips]
+{Module 4: Digital Privacy Tips and Tricks}
+
+\subtitle{Tips and tricks for maintaining digital privacy}
+
+\author[C, Childs]
+{C.~Childs\inst{1} \and K.~Misata\inst{2}}
+
+\institute[Tor Project]
+{
+  \inst{1}
+  Support assistant / Translation coordinator\\
+  The Tor Project
+  \and
+  \inst{2}
+  Outreach coordinator\\
+  The Tor Project
+}
+
+\logo{\includegraphics[height=1.5cm]{pictures/onion.jpg}}
+
+\begin{document}
+\frame{\titlepage}
+
+\begin{frame}
+\frametitle{Human Factor}
+	\begin{block}{Humans in the system}
+		When we are discussing digital security, it is important to remember that there are humans in the system and by design we are all flawed.
+	\end{block}
+\end{frame}
+
+\begin{frame}
+\frametitle{Human Factor}
+        \begin{block}{What are we putting out in the wild?}
+        First, before even thinking about technology solutions being more aware of what you put out there into the wild is important.  Though you may not be doing anything nefarious, someone may still be watching and waiting.  Sharing all parts of our personal and professional lives on social media and the Internet is becoming so common place that people are almost unconscious.  Many strongly believe that what they put on Facebook can only be seen by certain people and that by putting inappropriate content on the Internet with the intention of being "funny" may not be in the long run.
+	\end{block}
+\end{frame}
+
+\begin{frame}
+\frametitle{Human Factor}
+        \begin{block}{What technologies are you using?}
+		Do your own inventory and look at what technologies you are using and how.  This should offer a glimpse of where security / privacy awareness should or can be increased.
+        \end{block}
+\end{frame}
+
+\begin{frame}
+\frametitle{Human Factor}
+        \begin{block}{What technologies are you using?}
+        	\begin{itemize}
+			\item<1-> Email
+			\item<2-> Instant Messaging
+			\item<3-> Mobile devices
+			\item<4-> Web Browser
+		\end{itemize}
+	\end{block}
+\end{frame}
+
+\begin{frame}
+\frametitle{Human Factor}
+        \begin{block}{What technologies are you using?}
+		When we are talking about communication and in today's world it isnâ??t just a single bucket - the lines are constantly being blurred.  Consider communications with sources, conducting research, personal contacts, and professional activities - how are they all connected, where do overlaps exist which may create risk, what devices are being used?
+        \end{block}
+\end{frame}
+
+\begin{frame}
+\frametitle{Total security}
+        \begin{block}{There is no such thing as total security}
+		Though there are many products out there that offer the "best" security or "100\%" security it's critical to remember that nothing can be completely secure.  For all the reasons discussed above - when there are humans in the system there will always be flaws either in design or in use.  Also, human beings are unpredictable and many people spend a lot of energy focusing on the bad actors in the world.  Our recommendation is to educate yourself on where you are vulnerable and adopt either technologies or changes in behavior to offset those risks.
+        \end{block}
+\end{frame}
+
+\begin{frame}
+\frametitle{5 things to remember}
+	\begin{block}{Top 5 things to remember}
+        	\begin{itemize}
+			\item<1-> Anonymity loves company
+			\item<2-> Technology is constantly evolving
+			\item<3-> Stay balanced	
+			\item<4-> Know where your data is
+			\item<5-> Use Tor
+		\end{itemize}
+	\end{block}
+\end{frame}
+
+\end{document}
+
diff --git a/module4/module4.tex b/module4/module4.tex
deleted file mode 100644
index 5fd5d37..0000000
--- a/module4/module4.tex
+++ /dev/null
@@ -1,94 +0,0 @@
-\documentclass{beamer}
-\usepackage[utf8]{inputenc}
-\beamertemplatenavigationsymbolsempty
-
-\usetheme{Warsaw}
-\definecolor{mypurple}{rgb}{.49,0,98}
-\setbeamercolor*{palette primary}{use=structure,fg=white,bg=mypurple}
-
-\title[Module 4: Digital Privacy Tips]
-{Module 4: Digital Privacy Tips and Tricks}
-
-\subtitle{Tips and tricks for maintaining digital privacy}
-
-\author[C, Childs]
-{C.~Childs\inst{1} \and K.~Misata\inst{2}}
-
-\institute[Tor Project]
-{
-  \inst{1}
-  Support assistant / Translation coordinator\\
-  The Tor Project
-  \and
-  \inst{2}
-  Outreach coordinator\\
-  The Tor Project
-}
-
-\logo{\includegraphics[height=1.5cm]{pictures/onion.jpg}}
-
-\begin{document}
-\frame{\titlepage}
-
-\begin{frame}
-\frametitle{Human Factor}
-	\begin{block}{Humans in the system}
-		When we are discussing digital security, it is important to remember that there are humans in the system and by design we are all flawed.
-	\end{block}
-\end{frame}
-
-\begin{frame}
-\frametitle{Human Factor}
-        \begin{block}{What are we putting out in the wild?}
-        First, before even thinking about technology solutions being more aware of what you put out there into the wild is important.  Though you may not be doing anything nefarious, someone may still be watching and waiting.  Sharing all parts of our personal and professional lives on social media and the Internet is becoming so common place that people are almost unconscious.  Many strongly believe that what they put on Facebook can only be seen by certain people and that by putting inappropriate content on the Internet with the intention of being "funny" may not be in the long run.
-	\end{block}
-\end{frame}
-
-\begin{frame}
-\frametitle{Human Factor}
-        \begin{block}{What technologies are you using?}
-		Do your own inventory and look at what technologies you are using and how.  This should offer a glimpse of where security / privacy awareness should or can be increased.
-        \end{block}
-\end{frame}
-
-\begin{frame}
-\frametitle{Human Factor}
-        \begin{block}{What technologies are you using?}
-        	\begin{itemize}
-			\item<1-> Email
-			\item<2-> Instant Messaging
-			\item<3-> Mobile devices
-			\item<4-> Web Browser
-		\end{itemize}
-	\end{block}
-\end{frame}
-
-\begin{frame}
-\frametitle{Human Factor}
-        \begin{block}{What technologies are you using?}
-		When we are talking about communication and in today's world it isnâ??t just a single bucket - the lines are constantly being blurred.  Consider communications with sources, conducting research, personal contacts, and professional activities - how are they all connected, where do overlaps exist which may create risk, what devices are being used?
-        \end{block}
-\end{frame}
-
-\begin{frame}
-\frametitle{Total security}
-        \begin{block}{There is no such thing as total security}
-		Though there are many products out there that offer the "best" security or "100\%" security it's critical to remember that nothing can be completely secure.  For all the reasons discussed above - when there are humans in the system there will always be flaws either in design or in use.  Also, human beings are unpredictable and many people spend a lot of energy focusing on the bad actors in the world.  Our recommendation is to educate yourself on where you are vulnerable and adopt either technologies or changes in behavior to offset those risks.
-        \end{block}
-\end{frame}
-
-\begin{frame}
-\frametitle{5 things to remember}
-	\begin{block}{Top 5 things to remember}
-        	\begin{itemize}
-			\item<1-> Anonymity loves company
-			\item<2-> Technology is constantly evolving
-			\item<3-> Stay balanced	
-			\item<4-> Know where your data is
-			\item<5-> Use Tor
-		\end{itemize}
-	\end{block}
-\end{frame}
-
-\end{document}
-



_______________________________________________
tor-commits mailing list
tor-commits@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits