You can not select more than 25 topics
Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
737 lines
19 KiB
737 lines
19 KiB
\documentclass[12pt]{beamer}
|
|
\usepackage{beamerthemeHannover, graphicx, clrscode, amsmath, amssymb, multicol}
|
|
\usepackage{mathtools,url}
|
|
\usepackage{textcomp} \usepackage{verbatim}
|
|
\usepackage{listings}
|
|
\setbeamercolor{sidebar}{use=structure,bg=purple}
|
|
\usepackage[utf8]{inputenc}
|
|
\usepackage[russian]{babel}
|
|
|
|
\author[Duke Leto\\hush.is/privacy]{Duke Leto\\\small{duke.leto.net\\hush.is}}
|
|
\date{}
|
|
\title[\hspace{2em}\insertframenumber/
|
|
\inserttotalframenumber]{Take Back\\ Your Privacy \\With Hush}
|
|
\setbeamertemplate{navigation symbols}{} %no nav symbols
|
|
|
|
% keynote-ish
|
|
\renewcommand\sfdefault{phv}
|
|
\renewcommand\familydefault{\sfdefault}
|
|
\usetheme{default}
|
|
\usepackage{color}
|
|
\useoutertheme{default}
|
|
%\usepackage{texnansi}
|
|
\usepackage{marvosym}
|
|
\definecolor{bottomcolour}{rgb}{0.32,0.3,0.38}
|
|
\definecolor{middlecolour}{rgb}{0.08,0.08,0.16}
|
|
\setbeamerfont{title}{size=\Huge}
|
|
\setbeamercolor{structure}{fg=gray}
|
|
\setbeamertemplate{frametitle}[default]%[center]
|
|
\setbeamercolor{normal text}{bg=black, fg=white}
|
|
\setbeamertemplate{background canvas}[vertical shading]
|
|
[bottom=bottomcolour, middle=middlecolour, top=black]
|
|
\setbeamertemplate{items}[circle]
|
|
\setbeamerfont{frametitle}{size=\huge}
|
|
\setbeamertemplate{navigation symbols}{} %no nav symbols
|
|
|
|
\begin{document}
|
|
|
|
\frame[t]{
|
|
\begin{center}
|
|
\includegraphics[scale=0.20]{hush-dark}
|
|
\end{center}
|
|
\titlepage
|
|
}
|
|
|
|
\frame{
|
|
\frametitle{ What Is Hush? }
|
|
\begin{center}
|
|
\includegraphics[scale=0.20]{welcome-to-extreme-privacy}
|
|
\end{center}
|
|
|
|
\begin{center}
|
|
|
|
\begin{itemize}
|
|
\item Magic Internet Money
|
|
\item Private Chat Platform
|
|
\item Store-of-Privacy
|
|
\end{itemize}
|
|
|
|
\end{center}
|
|
}
|
|
|
|
\frame{
|
|
\frametitle{How Is Hush Like Bitcoin?}
|
|
\begin{center}
|
|
\includegraphics[scale=0.30]{hush-code-is-bitcoin}
|
|
\end{center}
|
|
|
|
\begin{itemize}
|
|
\item Based on Bitcoin 0.11.2
|
|
\item No Company, Decentralized Community
|
|
\item 21M Total Supply
|
|
\item Halvings every four years
|
|
\item Hush extends Bitcoin Protocol
|
|
\item Mine with ASICs
|
|
\item wallet.dat works very similar
|
|
\item Compatability at many layers
|
|
\item Store-of-Value $\Longrightarrow$ Store-of-Privacy
|
|
\end{itemize}
|
|
}
|
|
\frame{
|
|
\frametitle{How Is Hush different?}
|
|
\begin{center}
|
|
\includegraphics[scale=0.22]{hush-same-as-bitcoin}
|
|
\begin{itemize}
|
|
\item Alice sends Bob money
|
|
\item Alice's address is private!
|
|
\item Bob's address is private!
|
|
\item The amount sent is private!
|
|
\item Encrypted memo field is private!
|
|
\item The number of recipients is private!
|
|
\item Plausible Deniability
|
|
\end{itemize}
|
|
\end{center}
|
|
}
|
|
|
|
\frame{
|
|
\frametitle{How Is Hush different?}
|
|
You must use privacy, it's no longer optional!
|
|
\begin{center}
|
|
\includegraphics[scale=0.1]{send-in-the-clowns}
|
|
\begin{itemize}
|
|
\item Everyone must use privacy, no choice
|
|
\item Best practices are automated
|
|
\begin{itemize}
|
|
\item Only can send to a zaddr (z2z)
|
|
\item Send to multiple addresses (Sietch)
|
|
\item P2P encryption mandatory (TLS 1.3 Only!)
|
|
\end{itemize}
|
|
\item How much money was sent?
|
|
\item How many people received funds?
|
|
\item Was encrypted additional information sent?
|
|
\item "Herd immunity" to metadata attacks
|
|
\end{itemize}
|
|
\end{center}
|
|
}
|
|
|
|
\frame{
|
|
\frametitle{Zcash "Privacy"}
|
|
|
|
\begin{center}
|
|
\includegraphics[scale=0.20]{zec-clown}
|
|
\end{center}
|
|
Invented new Zero-Knowledge math but don't use it!!!
|
|
}
|
|
|
|
\frame{
|
|
\frametitle{Sietch}
|
|
attackingzcash.com
|
|
|
|
\begin{columns}
|
|
\begin{column}{5cm}
|
|
Zcash z2z (optional)
|
|
|
|
\includegraphics[scale=0.2]{zec-graph}
|
|
\end{column}
|
|
\begin{column}{5cm}
|
|
Hush z2z (always)
|
|
|
|
\includegraphics[scale=0.12]{sietch-graph}
|
|
\end{column}
|
|
\end{columns}
|
|
|
|
An underground fortress for every transaction!
|
|
}
|
|
|
|
\frame{
|
|
\frametitle{If You Are Not Paying For Privacy...}
|
|
|
|
You Don't Have Any!
|
|
|
|
\begin{center}
|
|
\includegraphics[scale=0.20]{no-rhythm}
|
|
\end{center}
|
|
}
|
|
|
|
\frame{
|
|
\frametitle{How Is Hush different?}
|
|
\begin{center}
|
|
|
|
explorer.hush.is
|
|
|
|
\includegraphics[scale=0.20]{recent-explorer}
|
|
|
|
\begin{itemize}
|
|
\item Extreme Privacy Block Explorer
|
|
\item No Javascript (client or server)
|
|
\item No Images (web bugs)
|
|
\item Tor Hidden Service Available
|
|
\item Doesn't doxx you
|
|
\end{itemize}
|
|
|
|
\end{center}
|
|
}
|
|
|
|
\frame{
|
|
\frametitle{How Does Hush Build Upon Bitcoin?}
|
|
|
|
Hush is at Layer 2, with Lightning Network and Bisq
|
|
|
|
\begin{center}
|
|
\includegraphics[scale=0.15]{protection-for-all}
|
|
\end{center}
|
|
|
|
\begin{itemize}
|
|
\item Sender, receiver, amount are PRIVATE
|
|
\item Encrypted p2p connections with TLS 1.3
|
|
\item ...
|
|
\end{itemize}
|
|
}
|
|
|
|
|
|
\frame{
|
|
\frametitle{What Is HushChat?}
|
|
|
|
\begin{center}
|
|
|
|
% \includegraphics[scale=0.25]{first_meme}
|
|
|
|
HushChat is an encrypted chat messaging protocol and decentralized platform.
|
|
It's ideas are based on Signal Protocol, but without all the bad stuff.
|
|
|
|
\includegraphics[scale=0.4]{hushchat-screenshot}
|
|
|
|
\end{center}
|
|
}
|
|
|
|
\frame{
|
|
\frametitle{What Is HushChat?}
|
|
|
|
\begin{center}
|
|
\includegraphics[scale=0.2]{hush-comparison}
|
|
|
|
\begin{itemize}
|
|
\item HushChat Protocol is an encrypted chat messaging protocol and decentralized platform.
|
|
\item Inspired by Signal Protocol, without the bad stuff.
|
|
\item We don't use Signal code.
|
|
\item Proud libsodium user! Unlike Zcash...
|
|
\end{itemize}
|
|
|
|
|
|
|
|
\end{center}
|
|
}
|
|
|
|
\frame{
|
|
\frametitle{What Is HushChat?}
|
|
|
|
\begin{center}
|
|
|
|
% \includegraphics[scale=0.25]{first_meme}
|
|
|
|
|
|
\begin{columns}
|
|
\begin{column}{5cm}
|
|
Signal
|
|
\begin{itemize}
|
|
\item Signal Protocol
|
|
\item Centralized
|
|
\item Phone Numbers
|
|
\item Closed Source Server
|
|
\item Uncle Sam backdoors
|
|
\end{itemize}
|
|
\end{column}
|
|
\begin{column}{5cm}
|
|
HushChat
|
|
\begin{itemize}
|
|
\item HushChat Protocol
|
|
\item Decentralized
|
|
\item Shielded Addresses
|
|
\item GPLv3 Free Software
|
|
\item ??? backdoors?
|
|
\end{itemize}
|
|
\end{column}
|
|
\end{columns}
|
|
|
|
\end{center}
|
|
|
|
}
|
|
|
|
\frame{
|
|
\frametitle{Who Profits From Surveillance?}
|
|
|
|
\begin{center}
|
|
\includegraphics[scale=0.30]{faraday}
|
|
\end{center}
|
|
|
|
\begin{itemize}
|
|
\item MFAANG (MSFT,FB,Amazon,Apple,Netflix,Google)
|
|
\item Surveillance Valley (Silicon Valley)
|
|
\item Governments
|
|
\item Militaries
|
|
\item Advertisers
|
|
\end{itemize}
|
|
}
|
|
|
|
\frame{
|
|
\frametitle{Who Spies On You?}
|
|
Depends on your GPS coordinates...
|
|
TLDR: Too many people, alphabet soup.
|
|
|
|
\begin{center}
|
|
\begin{columns}
|
|
\begin{column}{5cm}
|
|
Country
|
|
\begin{itemize}
|
|
\item Australia - ASIO
|
|
\item Canada - CSE
|
|
\item China - MSS
|
|
\item England - GCHQ
|
|
\item France - DGSE
|
|
\item Germany - BND
|
|
\item USA - NSA
|
|
\item Russia - FSB (ФСБ)
|
|
\item Singapore - ISD
|
|
\item Spain - CNI
|
|
\item Switzerland FIS
|
|
\end{itemize}
|
|
\end{column}
|
|
\begin{column}{5cm}
|
|
Global Networks
|
|
\begin{itemize}
|
|
\item Five Eyes (FVEY)
|
|
\item Nine Eyes
|
|
\item 14 Eyes
|
|
\item FATF (China+USA+Russia!)
|
|
\end{itemize}
|
|
\end{column}
|
|
\end{columns}
|
|
\end{center}
|
|
}
|
|
|
|
\frame{
|
|
\frametitle{Surveillance Devices}
|
|
Most tech is designed to surveil and eject metadata in all directions.
|
|
|
|
You give it for free and it's sold back to you and others.
|
|
\begin{center}
|
|
\begin{itemize}
|
|
\item "Party Lines"
|
|
\item Fax machines
|
|
\item Email
|
|
\item Mobile Phones (SMS especially)
|
|
\item Web browsers
|
|
\item Web servers
|
|
\item Social Media
|
|
\item Every for-profit tech company
|
|
\end{itemize}
|
|
\end{center}
|
|
}
|
|
|
|
|
|
\frame{
|
|
\frametitle{Hush Is Human Rights}
|
|
|
|
United Nations
|
|
|
|
Universal Declaration of Human Rights
|
|
|
|
Most governments have not signed this into law.
|
|
|
|
Code is law on the HUSH blockchain!
|
|
|
|
\begin{center}
|
|
\includegraphics[scale=0.25]{un-article12}
|
|
\end{center}
|
|
|
|
No government or company can see inside your encrypted data!
|
|
TODO: seems crazy meme
|
|
}
|
|
|
|
\frame{
|
|
\frametitle{ Silicon(?) Valley}
|
|
|
|
Actually, it's Surveillance Valley.
|
|
|
|
Started by two Stanford professors who encouraged students to start companies
|
|
|
|
\begin{itemize}
|
|
\item Best academic research was monetized
|
|
\item Students invented efficient spy planes
|
|
\item Spy planes prevented deaths
|
|
\item Spy submarines don't require boots-on-the-ground
|
|
\item Some PhD theses were Top-Secret!
|
|
\item These students went to form the first SV companies
|
|
\item Example: Hewlitt-Packard
|
|
\item Now these few companies own all your data
|
|
\end{itemize}
|
|
|
|
}
|
|
|
|
\frame{
|
|
\frametitle{Hush Is Privacy}
|
|
|
|
Hush delivers privacy in a world of surveillance
|
|
|
|
\begin{center}
|
|
\includegraphics[scale=0.25]{fire-ox}
|
|
\end{center}
|
|
}
|
|
|
|
\frame{
|
|
\frametitle{What Data Do They Want?}
|
|
|
|
Stop helping the surveillance companies!
|
|
|
|
\begin{center}
|
|
\begin{columns}
|
|
\begin{column}{5cm}
|
|
Used To Be...
|
|
\begin{itemize}
|
|
\item GPS
|
|
\item IMEI
|
|
\item IP address
|
|
\item Browser details
|
|
\item Website URLs
|
|
\item Emails
|
|
\item Facebook messages
|
|
\end{itemize}
|
|
\end{column}
|
|
\begin{column}{5cm}
|
|
But now it's...
|
|
\begin{itemize}
|
|
\item GPS
|
|
\item IMEI
|
|
\item Financial records
|
|
\item Shopping preferences
|
|
\item "encrypted" chats
|
|
\item 24/7 camera feeds
|
|
\item Voice recordings
|
|
\item Genetic samples + Medical records
|
|
\end{itemize}
|
|
\end{column}
|
|
\end{columns}
|
|
\end{center}
|
|
}
|
|
|
|
\frame{
|
|
\frametitle{Hush Is Privacy}
|
|
|
|
Must trust the hardware and software!
|
|
|
|
\begin{center}
|
|
\includegraphics[scale=0.25]{phones}
|
|
\end{center}
|
|
}
|
|
|
|
\frame{
|
|
\frametitle{Always-On Privacy By Default}
|
|
|
|
\begin{center}
|
|
Bleeding-edge Peer-to-Peer (p2p) Encryption
|
|
\begin{itemize}
|
|
\item Transport Layer Security (TLS) 1.3 only!
|
|
\item Unencrypted connections disallowed
|
|
\item Advanced peer banning tech
|
|
\begin{itemize}
|
|
\item Feeler connections
|
|
\item test-before-evict
|
|
\item REFERENCE
|
|
\end{itemize}
|
|
\item Erebus Attack mitigation via ASN map
|
|
\end{itemize}
|
|
\end{center}
|
|
}
|
|
\frame{
|
|
\frametitle{Erebus Attack}
|
|
|
|
https://erebus-attack.comp.nus.edu.sg
|
|
|
|
Muoi Tran, Inho Choi, Gi Jun Moon
|
|
|
|
Anh V. Vu, Min Suk Kang
|
|
|
|
\begin{center}
|
|
Recent Attack against Bitcoin
|
|
\begin{itemize}
|
|
\item Research by National University of Singapore
|
|
\item Bitcoin Core realizes it's important
|
|
\item Code remains unmerged on Github for 1.5yrs
|
|
\item Likely never turned on by default
|
|
\item Hush protects all users by default already
|
|
\item Very first cryptocoin (and privacy coin) to do this
|
|
\end{itemize}
|
|
\end{center}
|
|
}
|
|
|
|
\frame{
|
|
\frametitle{Attacks That Molded Hush}
|
|
|
|
\begin{center}
|
|
Every attack makes Hush stronger.
|
|
|
|
\begin{itemize}
|
|
\item Cryptopia 51\% attacker $\Longrightarrow$ DPoW
|
|
\item Sprout Inflation Bug CVE $\Longrightarrow$ Sapling
|
|
\item KMD malicious DPoW Attack $\Longrightarrow$ Hush DPoW
|
|
\end{itemize}
|
|
\end{center}
|
|
}
|
|
|
|
\frame{
|
|
\frametitle{Delayed-Proof-of-Work}
|
|
|
|
\begin{center}
|
|
Big blockchains can protect little blockchains.
|
|
|
|
It only makes sense to be protected by the strongest: Bitcoin
|
|
|
|
\begin{itemize}
|
|
\item HUSH injects blockhash data into HUSH+BTC
|
|
\item This costs HUSH+BTC, constantly
|
|
\item HUSH is protected by hashrate of BTC
|
|
\item Any other coin can jump in our wagon
|
|
\item Drastically easier/cheaper than doing it yourself
|
|
\item Cost is \$1K USD in BTC or XMR per month
|
|
\item Solves "Double Spend" attacks on exchanges!
|
|
\end{itemize}
|
|
\end{center}
|
|
}
|
|
|
|
\frame{
|
|
\frametitle{Delayed-Proof-of-Work}
|
|
DPoW enforces censorship-resistance.
|
|
|
|
Without DPoW, a mining attacker can rewrite history, like politicians.
|
|
\begin{center}
|
|
\begin{itemize}
|
|
\item DPoW means your data cannot be removed
|
|
\item DPoW means an attacker needs to attack BTC
|
|
\item Attacks are extremely costly
|
|
\item Attacks are less likely to succeed
|
|
\item Attackers cannot profit so go elsewhere
|
|
\end{itemize}
|
|
\end{center}
|
|
}
|
|
|
|
\frame{
|
|
\frametitle{Hush + Tor}
|
|
Evolving greatly in 2021
|
|
\begin{center}
|
|
\begin{itemize}
|
|
\item Tor Network is under Attack
|
|
\item v2 Hidden Services being DoS'ed
|
|
\item Migrating from v2 to v3 Hidden Services
|
|
\item Tor turning off v2 in Oct 2021
|
|
\item Bitcoin recently enabled v3 support
|
|
\item Currently being ported to Hush
|
|
\end{itemize}
|
|
\end{center}
|
|
}
|
|
|
|
\frame{
|
|
\frametitle{zaddr opsec}
|
|
\begin{center}
|
|
\begin{itemize}
|
|
\item One zaddr per
|
|
\begin{itemize}
|
|
\item Exchange
|
|
\item Mining Pool
|
|
\item Online Seller
|
|
\end{itemize}
|
|
\item When in doubt: new zaddr
|
|
\item Don't post publicly
|
|
\item Only senders need to know a zaddr
|
|
\item What about donation zaddrs?
|
|
\end{itemize}
|
|
\end{center}
|
|
}
|
|
|
|
\frame{
|
|
\frametitle{Donation zaddr opsec}
|
|
This mitigates attacks from those that know your zaddr
|
|
and require your wallet online to be attacked.
|
|
\begin{center}
|
|
\begin{itemize}
|
|
\item Create a brand new wallet
|
|
\begin{itemize}
|
|
\item SDP is best (most isolated)
|
|
\item Or SD, then SDL
|
|
\end{itemize}
|
|
\item Keep donation zaddr offline!
|
|
\item Make viewkey if desired
|
|
\item Only put wallet online to spend
|
|
\item NEVER use a public donation address for anything else
|
|
\item BIP47 $\Longrightarrow$ HIP47 will greatly improve this
|
|
\end{itemize}
|
|
\end{center}
|
|
Or just \#yolo
|
|
}
|
|
|
|
|
|
\frame{
|
|
\frametitle{Erebus Attack Prevention}
|
|
\begin{center}
|
|
\begin{itemize}
|
|
\item Hush filters peers by ASN
|
|
\item Bitcoin uses Class B (/16)
|
|
\item 65000 vs 7.4M buckets
|
|
\item SilentDragon Peers Tab show ASN
|
|
\end{itemize}
|
|
\end{center}
|
|
}
|
|
|
|
\frame{
|
|
\frametitle{Privacy: Consensus Layer}
|
|
|
|
\begin{center}
|
|
\includegraphics[scale=0.20]{optional-zcash-privacy-stolen-frame}
|
|
|
|
After 4 years...
|
|
\begin{itemize}
|
|
\item Zcash (optional) - 6\%
|
|
\item Hush (4 months after z2z) - 41\%
|
|
\end{itemize}
|
|
\end{center}
|
|
Zcash (ZEC) mainnet is a privacy disaster.
|
|
}
|
|
|
|
\frame{
|
|
\frametitle{Privacy: Consensus Layer}
|
|
|
|
\begin{center}
|
|
\includegraphics[scale=0.25]{optional-zcash-privacy-butterfly}
|
|
\end{center}
|
|
Zcash optimizes for profit, not privacy.
|
|
}
|
|
|
|
\frame{
|
|
\frametitle{Privacy: Consensus Layer}
|
|
|
|
\begin{center}
|
|
\includegraphics[scale=0.25]{zcash-sarah-connor}
|
|
\end{center}
|
|
Multiple Analysis companies now support Zcash!
|
|
}
|
|
|
|
\frame{
|
|
\frametitle{Use Cases}
|
|
|
|
\begin{center}
|
|
\begin{itemize}
|
|
\item Censorship-resistant Will + Testament
|
|
\item Medical billing
|
|
\item Lawyer-client secure chat
|
|
\item Censorsed Journalist
|
|
\end{itemize}
|
|
\end{center}
|
|
}
|
|
|
|
|
|
\frame{
|
|
\frametitle{Hush Finds Exploits and Bugs Constantly}
|
|
|
|
If we make fun of your favorite things, it's probably
|
|
because it's trivial to exploit or has no privacy.
|
|
|
|
\begin{center}
|
|
\includegraphics[scale=0.19]{you-got-a-bug-problem-maam}
|
|
\end{center}
|
|
}
|
|
|
|
\frame{
|
|
\frametitle{Hush Finds Exploits and Bugs Constantly}
|
|
|
|
\begin{center}
|
|
\begin{itemize}
|
|
\item "Attacking Zcash Protocol For Fun And Profit"
|
|
\item attackingzcash.com
|
|
\item CVE-2019-11636 (Sapling Woodchipper)
|
|
\item CVE-2019-16930 (PING/REJECT)
|
|
\begin{itemize}
|
|
\item Discovered by Dan Boneh (Stanford)
|
|
\item Reported privately to Zcash
|
|
\item Zcash created update with no explanation or binaries
|
|
\item I reverse engineered from code
|
|
\item It was trying to be hidden
|
|
\item Zcash CEO/CTO/CSO blocked me on Twitter
|
|
\end{itemize}
|
|
\item CVE-2021-????? (OPIP)
|
|
\end{itemize}
|
|
\end{center}
|
|
}
|
|
|
|
\frame{
|
|
\frametitle{How To Get Some HUSH?}
|
|
|
|
\begin{center}
|
|
\includegraphics[scale=0.20]{carlos-matos}
|
|
\end{center}
|
|
|
|
From most privacy to least privacy.
|
|
|
|
\begin{itemize}
|
|
\item Join our community, do work, get paid in HUSH
|
|
\item Purchase on Decentralized Exchange (DEX)
|
|
\item Mine HUSH via purchasing ASICs
|
|
\item Mine HUSH via renting hashrate
|
|
\item Purchase on Centralized Exchange
|
|
\begin{itemize}
|
|
\item HushDEX
|
|
\end{itemize}
|
|
\end{itemize}
|
|
}
|
|
|
|
\frame{
|
|
\frametitle{Join The Hush Community}
|
|
Most types of Hackers and Cypherpunks welcome
|
|
\begin{columns}
|
|
\begin{column}{5cm}
|
|
\includegraphics[scale=0.15]{types-of-hackers}
|
|
\end{column}
|
|
\begin{column}{5cm}
|
|
\begin{itemize}
|
|
\item We already abandoned Slack+Discord
|
|
\item Official Telegrams
|
|
\item English: hush.is/tg
|
|
\item Russian: hush.is/tgru
|
|
\item Chinese: hush.is/tgzh
|
|
\item Spanish: hush.is/tges
|
|
\item \includegraphics[scale=0.20]{tg-qr}
|
|
\end{itemize}
|
|
\end{column}
|
|
\end{columns}
|
|
}
|
|
|
|
\frame{
|
|
\frametitle{Join The Hush Community}
|
|
If you know about this stuff $\Longrightarrow$ earn HUSH
|
|
|
|
\begin{columns}
|
|
\begin{column}{5cm}
|
|
\includegraphics[scale=0.35]{console-cowboys}
|
|
\end{column}
|
|
\begin{column}{5cm}
|
|
\begin{itemize}
|
|
\item Linux/BSD servers
|
|
\item C/C++
|
|
\item Rust
|
|
\item Docker
|
|
\item QT5
|
|
\item Android/Kotlin
|
|
\item Tor/i2p/Mix networks
|
|
\item \includegraphics[scale=0.20]{tg-qr}
|
|
\end{itemize}
|
|
\end{column}
|
|
\end{columns}
|
|
}
|
|
|
|
\frame{
|
|
\frametitle{Thanks!}
|
|
Vintage Duke meme
|
|
\begin{center}
|
|
\includegraphics[scale=1.5]{pdxgit}
|
|
\end{center}
|
|
In Zdust We Trust
|
|
}
|
|
\end{document}
|
|
|