-Plotting with Matplotlib
-------------------------
-
-Also creating a presentation with rst2pdf
-=========================================
-
-Data Structures
----------------
-Favour simpler data structures if they do what you need. In order:
-
-#. Built-in Lists
- - 2xN data or simpler
- - Can't install system dependencies
-#. Numpy arrays
- - 2 (or higher) dimensional data
- - Lots of numerical calculations
-#. Pandas series/dataframes
- - 'Data Wrangling', reshaping, merging, sorting, querying
- - Importing from complex formats
-
-Shamelessly stolen from https://stackoverflow.com/a/45288000
-
-Loading Data from Disk
-----------------------
-Natively
-========
-
-.. code-block:: python
-
- >>> import csv
- >>> with open('eggs.csv', newline='') as csvfile:
- ... spam = csv.reader(csvfile,
- ... delimiter=' ',
- ... quotechar='|')
- ... for row in spam:
- ... # Do things
- ... pass
-
-Loading Data from Disk
-----------------------
-Numpy
-=====
-
-.. code-block:: python
-
- >>> import numpy
- >>> spam = numpy.genfromtxt('eggs.csv',
- ... delimiter=' ',
- ... dtype=None) # No error handling!
- >>> for row in spam:
- ... # Do things
- ... pass
-
-``numpy.genfromtxt`` will try to infer the datatype of each column if
-``dtype=None`` is set.
-
-``numpy.loadtxt`` is generally faster at runtime if your data is well formated
-(no missing values, only numerical data or constant length strings)
-
-Loading Data from Disk
-----------------------
-Numpy NB.
-=========
-**Remind me to look at some actual numpy usage at the end**
-
-- I think numpy does some type coercion when creating arrays.
-- Arrays created by ``numpy.genfromtxt`` can not in general be indexed like
- ``data[xstart:xend, ystart:yend]``.
-- Data of unequal types are problematic! Pandas *may* be a better choice in
- that case.
-- Specifying some value for ``dtype`` is probably necessary in most cases in
- practice: https://docs.scipy.org/doc/numpy/reference/arrays.dtypes.html
-
-Loading Data from Disk
-----------------------
-Pandas
-======
-
-.. code-block:: python
-
- >>> import pandas
- >>> # dtype=None is def
- >>> spam = pandas.read_csv('eggs.csv',
- ... delimiter=' ',
- ... header=None)
- >>> for row in spam:
- ... # Do things
- ... pass
-
-``header=None`` is required if the flie does not have a header.
-
-
-
-Generating Data for Testing
----------------------------
-
-Generating the data on the fly with numpy is convenient.
-
-.. code-block:: python
-
- >>> import numpy.random as ran
- >>> # For repeatability
- >>> ran.seed(7890234)
- >>> # Uniform [0, 1) floats
- >>> data = ran.rand(100, 2)
- >>> # Uniform [0, 1) floats
- >>> data = ran.rand(100, 100, 100)
- >>> # Std. normal floats
- >>> data = ran.randn(100)
- >>> # 3x14x15 array of binomial ints with n = 100, p = 0.1
- >>> data = ran.binomial(100, 0.1, (3, 14, 15))
-
-Plotting Time Series
---------------------
-
-Plot data of the form:
-
-.. math:: y=f(t)
-
-
-Subplots
---------
-
-
-Saving Plots
+Surviving phishing
+------------------
+Password reuse, password managers and strong passwords
+======================================================
+.. contents:: :depth: 1
+
+Why is Password Reuse a Problem?
+--------------------------------
+.. image:: password_reuse_1.png
+ :height: 6.5cm
+
+Consider the following hypothetical users that reuse a strong password in
+most places and the following common scenario:
+
++------------------+--------------------------+
+| User | Password |
++==================+==========================+
+| mark1@gmail.com | QUo5Qt+1Wa/Q1smDJRDbFg== |
++------------------+--------------------------+
+| mark2@gmail.com | +9Hz+/20rVkSkbcsmgdVFw== |
++------------------+--------------------------+
+| mark3@gmail.com | wnYkRcbi7Kkh7Fx2uR8EeA== |
++------------------+--------------------------+
+
+#. User registers an account with a careless service, eg Facebook, Yahoo,
+ Google, Equifax etc. etc.
+#. The service is hacked and the password and email is leaked
+#. The hacker logs in to the email account
+#. The hacker resets passwords on all important accounts tied to that email
+ address
+
+
+About password strength
+-----------------------
+
+How is strength measured?
+=========================
+'Entropy' `s` depends on the size of the alphabet `a` and the length `n` of the
+password:
+
+.. math::
+ s = log_2(a^n)
+
+* 0889234877724602 -> 53 bits
+* ZeZJieatdH -> 60 bits
+
+Why are weak passwords problematic?
+===================================
+Weak passwords are trivial to crack in many situations. A password with 53 bits
+may be cracked by a criminal organisation in less than an hour.
+
+
+What about strong passwords?
+============================
+They are difficult to remember, a problem especially when you use a different
+strong password for every service. You are also tempted to write them down, or
+reuse them.
+
+It's surprisingly difficult for humans to generate good passwords!
+
+A strong password, as of 2019, has at least 80 bits of entropy.
+
+Password Managers to the Rescue!
+--------------------------------
+Password managers allow you to create a unique and strong password for every
+service.
+
+Additional benefits:
+
+* Remembers passwords for you
+* Generates passwords for you
+* Automagically fills in passwords on websites for you, this is important!
+* Makes passwords available on all your configured devices
+* Can store additional related data, usernames, answers to security questions,
+ pins for debit/credit cards
+
+Any of the mainstream password manager is equivalent in the above respects.
+
+Can you trust password managers?
+--------------------------------
+Yes*
+
+How do they keep passwords secure?
+----------------------------------
+1. User supplies a password
+2. A slow function derives an encryption key
+3. The encryption key is used to encrypt/decrypt your passwords
+
+Security of the encryption depends on the strengh of your
+password:
+
++---------+------------------------+
+| Entropy | Time to crack, |
+| | assuming 1 second per |
+| | attempt per typical |
+| | CPU |
++=========+========================+
+| 50b | < 1 Month |
++---------+------------------------+
+| 60b | ~ 50 Years |
++---------+------------------------+
+| 70b | ~ 50,000 yers |
++---------+------------------------+
+
+Generating a Strong Password
+----------------------------
+Passphrases are better than passwords:
+
+* Tr0ub4dor&3 -> 28 bits of entropy, hard to remember
+* correct horse battery stable -> 44 bits of entropy, easy to remember
+
+If you have to remember it, use a passphrase.
+
+Generate passphrases with Diceware_
+===================================
+1. Roll 5, 6 sided, *physical* dice
+2. Read the numbers left to right
+3. Find the word with that number on a list 6^5 (7776) words
+4. Repeat until desired length is reached. For a password manager, use at
+ least 7.
+5. Write down your passphrase on paper and keep it somewhere secure
+6. If you are 100% confident that you will not forget the passphrase, destroy
+ the paper by burning
+
+What about phishing?
+====================
+* A password manager will refuse to fill out a password on a spoofed website,
+ for instance faceb00k.com vs facebook.com
+* Using different passwords on every service protects all other services even
+ if phishing is successful on one of them
+* Good password managers will navigate to the login page for you, reducing the
+ risk of spoofed websites
+
+
+Other advice