This commit is contained in:
Nick Guenther 2013-11-07 16:30:06 -05:00
parent 5fcd5a7503
commit 5f4de7facd
1 changed files with 52 additions and 0 deletions

View File

@ -0,0 +1,52 @@
%% This is csc-poster-sample, a sample CSC poster
%% Copyright (C) 2003 Computer Science Club of the University of Waterloo
%%
%% This program is free software; you can redistribute it and/or modify
%% it under the terms of the GNU General Public License as published by
%% the Free Software Foundation; either version 2 of the License, or
%% (at your option) any later version.
%%
%% This program is distributed in the hope that it will be useful,
%% but WITHOUT ANY WARRANTY; without even the implied warranty of
%% MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
%% GNU General Public License for more details.
%%
%% You should have received a copy of the GNU General Public License
%% along with this program; if not, write to the Free Software
%% Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA
\documentclass{article}
\usepackage{csc-poster}
\begin{document}
\vspace*{-0.9in}
%% TITLE
% This command lays out the top of the document.
% The first parameter is the title.
% The second parameter is the speaker. This parameter may be empty.
\cschead{Security and Privacy Lecture Series}{Sean Howard}
%% SUBTITLE
% This command prints the sub-title and is completely optional.
\cscsubtitle{Trust in ISPs -- Calum T. Dalek}
Bell's recent announcement of their use of Deep Packet Inspection (DPI) crystalizes a long-standing issue: your ISP pwns you.
They control your IP allocation, your DNS, and your ARP and the AS paths. The question has never been about ability--it's about trust.
Whether Rogers, AT\&T, Virgin, Telia, BT, Vodafone or Wind, your onramp to the internet is your first and most potent point of security failure.
Founding member of the Canadian Cybersecurity Institute (cybersecurityinstitute.ca)
and employee of local ISP Sentex will come demo vividly the reasons you need to be able to trust your ISP.
Also, pizza!
\noindent This is the fifth lecture of six in the Security and Privacy Lecture Series.
%% FOOTER
% The first through third arguments tell us the date and time.
% The last argument is a pithy saying. It may be empty.
% Following the footer, the CSC logo is printed.
\cscfoot{Tuesday, 2013-11-12}{5:00 PM}{MC 4060}{trust no one}
\end{document}