[tor-commits] [curriculum/master] Add worksheets and fix naming issue

colin at torproject.org colin at torproject.org
Mon Jun 29 08:07:02 UTC 2015


commit f39fd8468754f9be20388593846b2acecdf7d9e9
Author: Colin Childs <colin at torproject.org>
Date:   Sun Jun 28 17:39:07 2015 -0500

    Add worksheets and fix naming issue
---
 Makefile               |    6 ++++
 module1/module1_ws.tex |   36 +++++++++++++++++++
 module2/module2_ws.tex |   36 +++++++++++++++++++
 module3/module3.tex    |   94 ++++++++++++++++++++++++++++++++++++++++++++++++
 module3/module3.tx     |   94 ------------------------------------------------
 module3/module3_ws.tex |   28 +++++++++++++++
 6 files changed, 200 insertions(+), 94 deletions(-)

diff --git a/Makefile b/Makefile
index 142d058..4fa0908 100644
--- a/Makefile
+++ b/Makefile
@@ -1,16 +1,22 @@
 default:
 	pdflatex module1/*.tex
+	pdflatex module1/*_ws.tex	
 	pdflatex module2/*.tex
+	pdflatex module2/*_ws.tex
 	pdflatex module3/*.tex
+	pdflatex module3/*_ws.tex
 
 moduleone:	
 	pdflatex module1/*.tex
+	pdflatex module1/*_ws.tex
 
 moduletwo:
 	pdflatex module2/*.tex
+	pdflatex module2/*_ws.tex
 
 modulethree:
 	pdflatex module3/*.tex
+	pdflatex module3/*_ws.tex
 
 clean:
 	rm *.aux *.log *.nav *.out *.snm *.toc
diff --git a/module1/module1_ws.tex b/module1/module1_ws.tex
new file mode 100644
index 0000000..b6c9bdd
--- /dev/null
+++ b/module1/module1_ws.tex
@@ -0,0 +1,36 @@
+\documentclass{exam}
+%\printanswers
+
+\begin{document}
+
+\section{The history of Tor}
+\begin{questions}
+
+%\begin{solution}[.2in]
+%... Answer here ... 
+%\end{solution}
+
+\question Who uses Tor? 
+
+\begin{solutionorlines}[1in]
+\end{solutionorlines}
+
+\question Is Tor an acronym? 
+\begin{solutionorlines}[1in]
+\end{solutionorlines}
+
+\question How much does Tor cost?
+\begin{solutionorlines}[1in]
+\end{solutionorlines}
+
+\question Who runs the Tor network? 
+\begin{solutionorlines}[1in]
+\end{solutionorlines}
+
+\question Who was involved in creating Tor?
+\begin{solutionorlines}[1in]
+\end{solutionorlines}
+
+\end{questions}
+
+\end{document}
diff --git a/module2/module2_ws.tex b/module2/module2_ws.tex
new file mode 100644
index 0000000..f78c61f
--- /dev/null
+++ b/module2/module2_ws.tex
@@ -0,0 +1,36 @@
+\documentclass{exam}
+%\printanswers
+
+\begin{document}
+
+\section{Using the Tor Browser}
+\begin{questions}
+
+%\begin{solution}[.2in]
+%... Answer here ... 
+%\end{solution}
+
+\question Why is signature verification important? 
+
+\begin{solutionorlines}[1in]
+\end{solutionorlines}
+
+\question What files are needed for Tor Browser verification? 
+\begin{solutionorlines}[1in]
+\end{solutionorlines}
+
+\question Which platforms are supported by the Tor Browser?
+\begin{solutionorlines}[1in]
+\end{solutionorlines}
+
+\question How do you run the Tor Browser on Windows? (any platform)
+\begin{solutionorlines}[1in]
+\end{solutionorlines}
+
+\question How do you verify the Tor Browser? (any platform)
+\begin{solutionorlines}[1in]
+\end{solutionorlines}
+
+\end{questions}
+
+\end{document}
diff --git a/module3/module3.tex b/module3/module3.tex
new file mode 100644
index 0000000..4bcdf1f
--- /dev/null
+++ b/module3/module3.tex
@@ -0,0 +1,94 @@
+\documentclass{beamer}
+\usepackage[utf8]{inputenc}
+\beamertemplatenavigationsymbolsempty
+
+\usetheme{Warsaw}
+\definecolor{mypurple}{rgb}{.49,0,98}
+\setbeamercolor*{palette primary}{use=structure,fg=white,bg=mypurple}
+
+\title[Module 4: Digital Privacy Tips]
+{Module 4: Digital Privacy Tips and Tricks}
+
+\subtitle{Tips and tricks for maintaining digital privacy}
+
+\author[C, Childs]
+{C.~Childs\inst{1} \and K.~Misata\inst{2}}
+
+\institute[Tor Project]
+{
+  \inst{1}
+  Support coordinator / Translation coordinator\\
+  The Tor Project
+  \and
+  \inst{2}
+  Outreach coordinator\\
+  The Tor Project
+}
+
+\logo{\includegraphics[height=1.5cm]{pictures/onion.jpg}}
+
+\begin{document}
+\frame{\titlepage}
+
+\begin{frame}
+\frametitle{Human Factor}
+	\begin{block}{Humans in the system}
+		When we are discussing digital security, it is important to remember that there are humans in the system and by design we are all flawed.
+	\end{block}
+\end{frame}
+
+\begin{frame}
+\frametitle{Human Factor}
+        \begin{block}{What are we putting out in the wild?}
+        First, before even thinking about technology solutions being more aware of what you put out there into the wild is important.  Though you may not be doing anything nefarious, someone may still be watching and waiting.  Sharing all parts of our personal and professional lives on social media and the Internet is becoming so common place that people are almost unconscious.  Many strongly believe that what they put on Facebook can only be seen by certain people and that by putting inappropriate content on the Internet with the intention of being "funny" may not be in the long run.
+	\end{block}
+\end{frame}
+
+\begin{frame}
+\frametitle{Human Factor}
+        \begin{block}{What technologies are you using?}
+		Do your own inventory and look at what technologies you are using and how.  This should offer a glimpse of where security / privacy awareness should or can be increased.
+        \end{block}
+\end{frame}
+
+\begin{frame}
+\frametitle{Human Factor}
+        \begin{block}{What technologies are you using?}
+        	\begin{itemize}
+			\item<1-> Email
+			\item<2-> Instant Messaging
+			\item<3-> Mobile devices
+			\item<4-> Web Browser
+		\end{itemize}
+	\end{block}
+\end{frame}
+
+\begin{frame}
+\frametitle{Human Factor}
+        \begin{block}{What technologies are you using?}
+		When we are talking about communication and in today's world it isn’t just a single bucket - the lines are constantly being blurred.  Consider communications with sources, conducting research, personal contacts, and professional activities - how are they all connected, where do overlaps exist which may create risk, what devices are being used?
+        \end{block}
+\end{frame}
+
+\begin{frame}
+\frametitle{Total security}
+        \begin{block}{There is no such thing as total security}
+		Though there are many products out there that offer the "best" security or "100\%" security it's critical to remember that nothing can be completely secure.  For all the reasons discussed above - when there are humans in the system there will always be flaws either in design or in use.  Also, human beings are unpredictable and many people spend a lot of energy focusing on the bad actors in the world.  Our recommendation is to educate yourself on where you are vulnerable and adopt either technologies or changes in behavior to offset those risks.
+        \end{block}
+\end{frame}
+
+\begin{frame}
+\frametitle{5 things to remember}
+	\begin{block}{Top 5 things to remember}
+        	\begin{itemize}
+			\item<1-> Anonymity loves company
+			\item<2-> Technology is constantly evolving
+			\item<3-> Stay balanced	
+			\item<4-> Know where your data is
+			\item<5-> Use Tor
+		\end{itemize}
+	\end{block}
+\end{frame}
+
+\end{document}
+
diff --git a/module3/module3.tx b/module3/module3.tx
deleted file mode 100644
index 4bcdf1f..0000000
--- a/module3/module3.tx
+++ /dev/null
@@ -1,94 +0,0 @@
-\documentclass{beamer}
-\usepackage[utf8]{inputenc}
-\beamertemplatenavigationsymbolsempty
-
-\usetheme{Warsaw}
-\definecolor{mypurple}{rgb}{.49,0,98}
-\setbeamercolor*{palette primary}{use=structure,fg=white,bg=mypurple}
-
-\title[Module 4: Digital Privacy Tips]
-{Module 4: Digital Privacy Tips and Tricks}
-
-\subtitle{Tips and tricks for maintaining digital privacy}
-
-\author[C, Childs]
-{C.~Childs\inst{1} \and K.~Misata\inst{2}}
-
-\institute[Tor Project]
-{
-  \inst{1}
-  Support coordinator / Translation coordinator\\
-  The Tor Project
-  \and
-  \inst{2}
-  Outreach coordinator\\
-  The Tor Project
-}
-
-\logo{\includegraphics[height=1.5cm]{pictures/onion.jpg}}
-
-\begin{document}
-\frame{\titlepage}
-
-\begin{frame}
-\frametitle{Human Factor}
-	\begin{block}{Humans in the system}
-		When we are discussing digital security, it is important to remember that there are humans in the system and by design we are all flawed.
-	\end{block}
-\end{frame}
-
-\begin{frame}
-\frametitle{Human Factor}
-        \begin{block}{What are we putting out in the wild?}
-        First, before even thinking about technology solutions being more aware of what you put out there into the wild is important.  Though you may not be doing anything nefarious, someone may still be watching and waiting.  Sharing all parts of our personal and professional lives on social media and the Internet is becoming so common place that people are almost unconscious.  Many strongly believe that what they put on Facebook can only be seen by certain people and that by putting inappropriate content on the Internet with the intention of being "funny" may not be in the long run.
-	\end{block}
-\end{frame}
-
-\begin{frame}
-\frametitle{Human Factor}
-        \begin{block}{What technologies are you using?}
-		Do your own inventory and look at what technologies you are using and how.  This should offer a glimpse of where security / privacy awareness should or can be increased.
-        \end{block}
-\end{frame}
-
-\begin{frame}
-\frametitle{Human Factor}
-        \begin{block}{What technologies are you using?}
-        	\begin{itemize}
-			\item<1-> Email
-			\item<2-> Instant Messaging
-			\item<3-> Mobile devices
-			\item<4-> Web Browser
-		\end{itemize}
-	\end{block}
-\end{frame}
-
-\begin{frame}
-\frametitle{Human Factor}
-        \begin{block}{What technologies are you using?}
-		When we are talking about communication and in today's world it isn’t just a single bucket - the lines are constantly being blurred.  Consider communications with sources, conducting research, personal contacts, and professional activities - how are they all connected, where do overlaps exist which may create risk, what devices are being used?
-        \end{block}
-\end{frame}
-
-\begin{frame}
-\frametitle{Total security}
-        \begin{block}{There is no such thing as total security}
-		Though there are many products out there that offer the "best" security or "100\%" security it's critical to remember that nothing can be completely secure.  For all the reasons discussed above - when there are humans in the system there will always be flaws either in design or in use.  Also, human beings are unpredictable and many people spend a lot of energy focusing on the bad actors in the world.  Our recommendation is to educate yourself on where you are vulnerable and adopt either technologies or changes in behavior to offset those risks.
-        \end{block}
-\end{frame}
-
-\begin{frame}
-\frametitle{5 things to remember}
-	\begin{block}{Top 5 things to remember}
-        	\begin{itemize}
-			\item<1-> Anonymity loves company
-			\item<2-> Technology is constantly evolving
-			\item<3-> Stay balanced	
-			\item<4-> Know where your data is
-			\item<5-> Use Tor
-		\end{itemize}
-	\end{block}
-\end{frame}
-
-\end{document}
-
diff --git a/module3/module3_ws.tex b/module3/module3_ws.tex
new file mode 100644
index 0000000..02a5b68
--- /dev/null
+++ b/module3/module3_ws.tex
@@ -0,0 +1,28 @@
+\documentclass{exam}
+%\printanswers
+
+\begin{document}
+
+\section{Tips and tricks for maintaining digital privacy}
+\begin{questions}
+
+%\begin{solution}[.2in]
+%... Answer here ... 
+%\end{solution}
+
+\question What technologies are you using? 
+
+\begin{solutionorlines}[1.5in]
+\end{solutionorlines}
+
+\question What are the top 5 things to remember 
+\begin{solutionorlines}[1in]
+\end{solutionorlines}
+
+\question Does 100\% security exist?
+\begin{solutionorlines}[0.5in]
+\end{solutionorlines}
+
+\end{questions}
+
+\end{document}





More information about the tor-commits mailing list