DPI talk
This commit is contained in:
parent
5fcd5a7503
commit
5f4de7facd
|
@ -0,0 +1,52 @@
|
|||
%% This is csc-poster-sample, a sample CSC poster
|
||||
%% Copyright (C) 2003 Computer Science Club of the University of Waterloo
|
||||
%%
|
||||
%% This program is free software; you can redistribute it and/or modify
|
||||
%% it under the terms of the GNU General Public License as published by
|
||||
%% the Free Software Foundation; either version 2 of the License, or
|
||||
%% (at your option) any later version.
|
||||
%%
|
||||
%% This program is distributed in the hope that it will be useful,
|
||||
%% but WITHOUT ANY WARRANTY; without even the implied warranty of
|
||||
%% MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
||||
%% GNU General Public License for more details.
|
||||
%%
|
||||
%% You should have received a copy of the GNU General Public License
|
||||
%% along with this program; if not, write to the Free Software
|
||||
%% Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA
|
||||
|
||||
\documentclass{article}
|
||||
\usepackage{csc-poster}
|
||||
|
||||
\begin{document}
|
||||
|
||||
\vspace*{-0.9in}
|
||||
|
||||
%% TITLE
|
||||
% This command lays out the top of the document.
|
||||
% The first parameter is the title.
|
||||
% The second parameter is the speaker. This parameter may be empty.
|
||||
\cschead{Security and Privacy Lecture Series}{Sean Howard}
|
||||
|
||||
%% SUBTITLE
|
||||
% This command prints the sub-title and is completely optional.
|
||||
\cscsubtitle{Trust in ISPs -- Calum T. Dalek}
|
||||
|
||||
Bell's recent announcement of their use of Deep Packet Inspection (DPI) crystalizes a long-standing issue: your ISP pwns you.
|
||||
They control your IP allocation, your DNS, and your ARP and the AS paths. The question has never been about ability--it's about trust.
|
||||
Whether Rogers, AT\&T, Virgin, Telia, BT, Vodafone or Wind, your onramp to the internet is your first and most potent point of security failure.
|
||||
|
||||
Founding member of the Canadian Cybersecurity Institute (cybersecurityinstitute.ca)
|
||||
and employee of local ISP Sentex will come demo vividly the reasons you need to be able to trust your ISP.
|
||||
|
||||
Also, pizza!
|
||||
|
||||
\noindent This is the fifth lecture of six in the Security and Privacy Lecture Series.
|
||||
|
||||
%% FOOTER
|
||||
% The first through third arguments tell us the date and time.
|
||||
% The last argument is a pithy saying. It may be empty.
|
||||
% Following the footer, the CSC logo is printed.
|
||||
\cscfoot{Tuesday, 2013-11-12}{5:00 PM}{MC 4060}{trust no one}
|
||||
|
||||
\end{document}
|
Loading…
Reference in New Issue