This is an old revision of the document!


London CryptoFestival 2013 Schedule

This is the (ever-mutating) schedule for London CryptoFestival 2013, taking place on 30 November 2013.

See below for more information on the listed panelists, workshops, and exhibitions.

NAB-LG01
[Lightning Talks]
NAB-LG02
[Presentations & Panels]
NAB-305
[Workshops]
NAB-314
[Core Workshops]
NAB-326 [Workshops] Atrium [Free Space]
11:00-11:30 -Ian Brown
-George Danezis (TBC)
-Marianne Franklin
-Jo Glanville
-Wendy Grossman
(Chair: Matthew Fuller)
OTR (Nikita) Digital Double (Btihaj Ajana) -Deckspace
-First-Viewer Television (Paolo Ruffino/IOCOSE)
-Swarming Talent Competition (Orsolya Bajusz+PR)
11:30-12:00 Internet of Things (Alexandra Deschamps) File Encryption & Deletion (Nikita) Talk (xname)
12:00-12:30 Dangers of Metadata (Nikita) Tor (@orwellslondon) tcpdump on mobiles (Graham Harwood)
12:30-13:00 OpenPGP (Simon)
13:00-14:00 Intermission
14:00-14:30 -Ross Anderson
-Smári McCarthy
-Annie Machon
-Nick Pickles
(Chair: Dan McQuillan)
Analysis of Surveillance (Arjen) OTR (Nikita) Cryptography for Non-Math People (infinity0)
14:30-15:00 File Encryption & Deletion (Nikita)
15:00-15:30 Safe Browsing Practices (Nikita) Tor (@orwellslondon) Kitten Groomer (Chris Pinchen & Maya)
15:30-16:00 Bitmessage OpenPGP (Simon)
16:00-16:30 - A Primer on Physical Security (Nikita Mazurov) - - - -
16:30-17:00 - Wrap-up (Dan McQuillan) - - - -
Workshops we still need presenters for…
What? Who?
Mobile Security
Steganography

Panel Participants

  • Ian Brown – Associate Director of Oxford University's Cyber Security Centre, and Senior Research Fellow at the OII. His research is focused on information security, privacy-enhancing technologies, and Internet regulation.
  • George Danezis (To Be Confirmed) – Reader in Security and Privacy Engineering at the Computer Science department of University College London. Key interests relate to the areas of computer security, privacy, and in particular anonymous communications, traffic analysis, statistical inference, smart metering and peer-to-peer security.
  • Marianne Franklin – With a background in History, Music, and Politics, her research explores ways in which developments in information and commuication technologies, society, culture, and politics collide and collude with one another from a macro and micro-perspective. Co-Chair of the Internet Rights and Principles Dynamic Coalition at the UN Internet Governance Forum.
  • Jo Glanville – Jo joined English PEN in September 2012 from Index on Censorship, where she served as an award-winning Editor since 2006. She was a BBC current affairs producer for eight years and appears regularly in the media as a commentator on culture and freedom of expression, including the Guardian, the Daily Telegraph, the London Review of Books.
  • Wendy Grossman – Journalist, blogger, and folksinger. Her 1998 book net.wars was one of the first to have its full text published on the Web. She was a member of the external advisory board of the Intellectual Property and Law Centre at Edinburgh University. She sits onthe Advisory Council of the Open Rights Group.
  • Ross Anderson – Professor of Security Engineering at the Computer Laboratory, University of Cambridge. Research topics include economics and psychology of information security, peer-to-peer and social network systems, reliability of security systems, robustness of cryptographic protocols, analysis and design of cryptographic algorithms, information hiding, security of clinical information systems, and privacy and freedom issues.
  • Smári McCarthy – Executive director at IMMI. He was a co-founder of the Icelandic Digital Freedoms Society in 2008 with the aim of promoting digital rights, free culture, free software, and free hardware in Iceland. He has worked on developing and spreading digital fabrication technology through Fab Labs and Hacker Spaces. He's very passionate about systems and information, and having grown up on the Internet, he feels it's very important to protect it. @smarimc
  • Annie Machon – Former intelligence officer for MI5, the UK Security Service, who resigned in the late 1990s to blow the whistle on the spies' incompetence and crimes with her ex-partner, David Shayler. Drawing on her varied experiences, she is now a public speaker, writer, media pundit, political campaigner, and PR consultant.
  • Nick Pickles – A Law graduate of the University of Durham, he joined Big Brother Watch as Director in September 2011, with a background in corporate public relations and technology. Before joining Big Brother Watch he worked with small SMEs and multinational companies in corporate communications. He has remained a commentator on a wide variety of issues including digital privacy and web-blocking, freedom of speech, civil liberties and terrorism legislation.

Workshops

  • File Encryption & Deletion – How to use TrueCrypt to encrypt your files, USB sticks, or even entire hard drives; and conversely, how to use Eraser to securely delete your files and Darik's Boot And Nuke (DBAN) to wipe entire hard drives.
  • Tor – How to use Tor to boost your anonymity when browsing the web and accessing other Internet services.
  • OpenPGP – How to use GnuPG (GPG) to encrypt your e-mails.
  • Dangers of Metadata – How to use ExifTool to both scrub your digital photos of any potentially identifying metadata like your camera's serial number, your name, your unedited versions of photos, or even your GPS coordinates, as well as how to properly inject erroneous data to befuddle and foil forensic analysis thereof.
  • Safe Browsing Practices – Starting with the fundamentals of strict cookie and script management, this workshop will then move beyond the basics to cover the risks of (and how to neutralize them) DNS prefetching, Local Shared Objects (LSOs), as well as introduce header spoofing and disabling (e.g. User-Agent and Referer modification).
  • Internet of Things – We're talking urban infrastructure, smart grid, open hardware, quantified self, open data, environmental monitoring, smart products, smart homes and more. Anything that puts a networked computer where none has gone before. (Internet of Things London Meetup)
  • Bitmessage – How to use Bitmessage to send encrypted messages.
  • tcpdump on mobiles – How to use tcpdump on mobiles to sniff wireless traffic.
  • Digital Double – How to use the Digital Double mobile app to explore your online identity.
  • Understanding Crypto Tools – what all the buttons really do, and how they fit into the big picture that is your security. We will explain general security models in technical but non-mathematical terms. This is intended to give you a more precise awareness of what you accomplish during each phase of using a tool. We will teach a (sharp) bird's-eye view of security topics, rather than the specific mathematics of the underlying cryptography.
  • xname - presents a workshop on the TALK protocol.
  • A Primer on Physical Security – An introduction to thinking about physec in two parts: I) how to find hardware bugs with a counter-surveillance budget of £0: creating a low-rent physical intrusion detection system; and II) taking document destruction seriously: shredder anti-forensics.

Exhibitions

  • First-Viewer Television First-Viewer Television is an online streaming of zero-view videos from YouTube, updated every 2 hours. Any video of the First-Viewer Television is automatically eliminated from the playlist once shown for its first time.Thus, every streaming is unique and unrepeatable, and shows only videos that had no previous viewers. First-Viewer Television is available at http://firstviewer.tv/ Further information about coding and how the project works is available at https://github.com/iocose/FirstViewerTV
  • Swarming Talent Competition – Swarming behaviours, artificial intelligence and abstractions, leaky integrators, information accumulation, the never preceded discrepancy between the agency of an individual and those in power. Nothing is between us and the drones, robots, stalking satellites etc. but abstractions and air. These abstractions are renegotiated, moulded, hijacked or strengthened, and they might seem trivial, because art and culture and mediation is so perversely proliferated and dogmatic, based on moralist dogmas from far away stages of capitalism. This performance is a staging of a chain of abstractions, in the bastardised format of a talent show and a corporate poolside entertainment event in a hotel or at a party.