Differences
This shows you the differences between two versions of the page.
Both sides previous revisionPrevious revisionNext revision | Previous revision | ||
london_cryptofestival:schedule [2013/11/30 15:51] – [Workshops] yeti | london_cryptofestival:schedule [2022/05/08 11:42] (current) – external edit 127.0.0.1 | ||
---|---|---|---|
Line 1: | Line 1: | ||
====== London CryptoFestival 2013 Schedule ====== | ====== London CryptoFestival 2013 Schedule ====== | ||
+ | |||
+ | **Update** - Some workshop materials such as slides and audio recordings of the panels are now available on the [[london_cryptofestival: | ||
+ | |||
This is the (ever-mutating) schedule for [[: | This is the (ever-mutating) schedule for [[: | ||
Line 68: | Line 71: | ||
* **Talk** - is a visual communication program which copies lines from your terminal to that of another user. It first appeared in August 1983, included in the 4.2 release of BSD. Originally developed as a way for two users on a Unix network to converse via typing, talk is basically a communication between TTY (TeleTYpewriter). Although not secure on a LAN, unless the two machines are connected by a properly encrypted VPN, it is still an old school, simple way to communicate on a server, as safe as the server is. During this brief workshop we will demo the application, | * **Talk** - is a visual communication program which copies lines from your terminal to that of another user. It first appeared in August 1983, included in the 4.2 release of BSD. Originally developed as a way for two users on a Unix network to converse via typing, talk is basically a communication between TTY (TeleTYpewriter). Although not secure on a LAN, unless the two machines are connected by a properly encrypted VPN, it is still an old school, simple way to communicate on a server, as safe as the server is. During this brief workshop we will demo the application, | ||
- | * **A Primer on Physical Security** -- An introduction to thinking about physec in two parts: I) how to find hardware bugs with a counter-surveillance budget of £0: creating a low-rent physical intrusion detection system; and II) taking document destruction seriously: shredder anti-forensics. | + | * **A Primer on Physical Security** -- An introduction to thinking about physec in two parts: I) how to find hardware bugs with a counter-surveillance budget of £0: creating a low-rent |
* **Private VoIP** -- How to have private voice and video conversations via the Internet. Jitsi, ZRTP, SIP, XMPP, csipsimple, Open WhisperSystems RedPhone, Zphone, SilentCircle. | * **Private VoIP** -- How to have private voice and video conversations via the Internet. Jitsi, ZRTP, SIP, XMPP, csipsimple, Open WhisperSystems RedPhone, Zphone, SilentCircle. | ||
Line 80: | Line 83: | ||
* **Dog Ate My Crypto Keys 2.0** -- An overview of full-disk encryption solutions and lessons to learn in failures. We will discuss an open-source full-disk encryption setup, the de-facto best practice guidelines and then we will look at offensive security techniques that have been used to compromise full-disk encryption and explain mitigation strategies to help prevent unwanted eyes accessing your data. | * **Dog Ate My Crypto Keys 2.0** -- An overview of full-disk encryption solutions and lessons to learn in failures. We will discuss an open-source full-disk encryption setup, the de-facto best practice guidelines and then we will look at offensive security techniques that have been used to compromise full-disk encryption and explain mitigation strategies to help prevent unwanted eyes accessing your data. | ||
- | * **Bring & Swap** | + | * **Bring & Swap** |
* **/ | * **/ |