Differences
This shows you the differences between two versions of the page.
Both sides previous revisionPrevious revisionNext revision | Previous revisionNext revisionBoth sides next revision | ||
london_cryptofestival:schedule [2013/11/30 15:10] – 127.0.0.1 | london_cryptofestival:schedule [2013/12/23 19:46] – anonymous | ||
---|---|---|---|
Line 1: | Line 1: | ||
====== London CryptoFestival 2013 Schedule ====== | ====== London CryptoFestival 2013 Schedule ====== | ||
+ | |||
+ | **Update** - Some workshop materials such as slides and audio recordings of the panels are now available on the [[london_cryptofestival: | ||
+ | |||
This is the (ever-mutating) schedule for [[: | This is the (ever-mutating) schedule for [[: | ||
Line 80: | Line 83: | ||
* **Dog Ate My Crypto Keys 2.0** -- An overview of full-disk encryption solutions and lessons to learn in failures. We will discuss an open-source full-disk encryption setup, the de-facto best practice guidelines and then we will look at offensive security techniques that have been used to compromise full-disk encryption and explain mitigation strategies to help prevent unwanted eyes accessing your data. | * **Dog Ate My Crypto Keys 2.0** -- An overview of full-disk encryption solutions and lessons to learn in failures. We will discuss an open-source full-disk encryption setup, the de-facto best practice guidelines and then we will look at offensive security techniques that have been used to compromise full-disk encryption and explain mitigation strategies to help prevent unwanted eyes accessing your data. | ||
- | * **Bring & Swap** | + | * **Bring & Swap** |
* **/ | * **/ | ||
Line 86: | Line 89: | ||
* **Tell us your experience with digital security and crypto tools.** Cryptotools are like any other piece of software: they should be focused on what the user needs to do. Do you use cryptotools? | * **Tell us your experience with digital security and crypto tools.** Cryptotools are like any other piece of software: they should be focused on what the user needs to do. Do you use cryptotools? | ||
- | * **Analysis of surveillance** What is privacy really and why do we need it? Why is 'I Have Nothing To Hide' wrong on several levels (you life is not that boring!). We'll discuss the scope of surveillance problems, what can and can't (for now) be done about it and how to argue these issues with others (beginning with the tearing down of 'I Have Nothing To Hide' | + | * **Analysis of surveillance** What is privacy really and why do we need it? Why is 'I Have Nothing To Hide' wrong on several levels (you life is not that boring!). We'll discuss the scope of surveillance problems, what can and can't (for now) be done about it and how to argue these issues with others (beginning with the tearing down of 'I Have Nothing To Hide' |
====== Exhibitions ====== | ====== Exhibitions ====== |