Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revisionPrevious revision
Next revision
Previous revision
london_cryptofestival:schedule [2013/11/30 15:51] – [Workshops] yetilondon_cryptofestival:schedule [2022/05/08 11:42] (current) – external edit 127.0.0.1
Line 1: Line 1:
 ====== London CryptoFestival 2013 Schedule ====== ====== London CryptoFestival 2013 Schedule ======
 +
 +**Update** - Some workshop materials such as slides and audio recordings of the panels are now available on the [[london_cryptofestival:presentation_materials|presentation materials]] page.
 +
 This is the (ever-mutating) schedule for [[:london_cryptofestival|London CryptoFestival 2013]], taking place on 30 November 2013.  Sign up (under your choice of name :) on [[https://londoncryptofestival.eventbrite.co.uk/|eventbrite]]. This is the (ever-mutating) schedule for [[:london_cryptofestival|London CryptoFestival 2013]], taking place on 30 November 2013.  Sign up (under your choice of name :) on [[https://londoncryptofestival.eventbrite.co.uk/|eventbrite]].
  
Line 68: Line 71:
   * **Talk** -  is a visual communication program which copies lines from your terminal to that of another user. It first appeared in August 1983, included in the 4.2 release of BSD. Originally developed as a way for two users on a Unix network to converse via typing, talk is basically a communication between TTY (TeleTYpewriter). Although not secure on a LAN, unless the two machines are connected by a properly encrypted VPN, it is still an old school, simple way to communicate on a server, as safe as the server is. During this brief workshop we will demo the application, try to snoop it, then look at an alternative.  Requisites: ssh access to a remote terminal, a friend to talk to, confidential data to be discussed, and the desire for (server) intimacy.  [[http://xname.cc/|xname]] - presents a workshop on the TALK protocol.   * **Talk** -  is a visual communication program which copies lines from your terminal to that of another user. It first appeared in August 1983, included in the 4.2 release of BSD. Originally developed as a way for two users on a Unix network to converse via typing, talk is basically a communication between TTY (TeleTYpewriter). Although not secure on a LAN, unless the two machines are connected by a properly encrypted VPN, it is still an old school, simple way to communicate on a server, as safe as the server is. During this brief workshop we will demo the application, try to snoop it, then look at an alternative.  Requisites: ssh access to a remote terminal, a friend to talk to, confidential data to be discussed, and the desire for (server) intimacy.  [[http://xname.cc/|xname]] - presents a workshop on the TALK protocol.
  
-  * **A Primer on Physical Security** -- An introduction to thinking about physec in two parts: I) how to find hardware bugs with a counter-surveillance budget of £0: creating a low-rent physical intrusion detection system; and II) taking document destruction seriously: shredder anti-forensics. +  * **A Primer on Physical Security** -- An introduction to thinking about physec in two parts: I) how to find hardware bugs with a counter-surveillance budget of £0: creating a low-rent [[:physical_intrusion_detection|physical intrusion detection]] system; and II) taking document destruction seriously: shredder anti-forensics. 
  
   *  **Private VoIP** -- How to have private voice and video conversations via the Internet. Jitsi, ZRTP, SIP, XMPP, csipsimple, Open WhisperSystems RedPhone, Zphone, SilentCircle.   *  **Private VoIP** -- How to have private voice and video conversations via the Internet. Jitsi, ZRTP, SIP, XMPP, csipsimple, Open WhisperSystems RedPhone, Zphone, SilentCircle.
Line 80: Line 83:
   * **Dog Ate My Crypto Keys 2.0** -- An overview of full-disk encryption solutions and lessons to learn in failures. We will discuss an open-source full-disk encryption setup, the de-facto best practice guidelines and then we will look at offensive security techniques that have been used to compromise full-disk encryption and explain mitigation strategies to help prevent unwanted eyes accessing your data.    * **Dog Ate My Crypto Keys 2.0** -- An overview of full-disk encryption solutions and lessons to learn in failures. We will discuss an open-source full-disk encryption setup, the de-facto best practice guidelines and then we will look at offensive security techniques that have been used to compromise full-disk encryption and explain mitigation strategies to help prevent unwanted eyes accessing your data. 
  
-   * **Bring & Swap**  - If you want to participate in a Bring & Swap session, to help to confuse your digital communications and transport data trails, then bring along some PrePaid Oyster Cards, free / cheap mobile phone SIM cards, cheap prepaid mobile phone handsets or just some free webmail or social media usernames and passwords etc. which you can swap with other attendees contact Mark: info@cryptofestival.org.uk  [[http://keyserver.ubuntu.net/pks/lookup?op=vindex&search=info%40cryptofestival.org.uk&fingerprint=on|PGP ID: 0x72D22778909C6246]]+   * **Bring & Swap**  - If you want to participate in a Bring & Swap session, to help to confuse your digital communications and transport data trails, then bring along some PrePaid Oyster Cards, free / cheap mobile phone SIM cards, cheap prepaid mobile phone handsets or just some free webmail or social media usernames and passwords etc. which you can swap with other attendees contact Mark: info@cryptofestival.org.uk  [[http://keyserver.ubuntu.net/pks/lookup?op=vindex&search=info%40cryptofestival.org.uk&fingerprint=on|PGP ID: 0x72D22778909C6246]] Bring and Swap slides [[https://p10.secure.hostingprod.com/@spyblog.org.uk/ssl/CryptoFestival/CryptoFestival_30_November_2013_Bring_and_Swap.pdf| .pdf]] [[https://p10.secure.hostingprod.com/@spyblog.org.uk/ssl/CryptoFestival/CryptoFestival_30_November_2013_Bring_and_Swap.pptx| .pptx]]
  
    * **/Infrastructo?/**  Deckspace host a discussion installation on independent art infrastructures with participation from: http://www.servus.at, http://www.spc.org, http://www.constantvzw.org, http://www.furtherfield.org, http://www.irational.org, http://www.maydayrooms.org your electrosmog or theirs -  With fresh concerns over integrity of corporate services we ask those who self provide to express their insight and experiences. Please bring your own accelerant. brief fireside chat with infrastructure providers. NAB305 Goldsmiths @ 14:00 -14:30 sharp    * **/Infrastructo?/**  Deckspace host a discussion installation on independent art infrastructures with participation from: http://www.servus.at, http://www.spc.org, http://www.constantvzw.org, http://www.furtherfield.org, http://www.irational.org, http://www.maydayrooms.org your electrosmog or theirs -  With fresh concerns over integrity of corporate services we ask those who self provide to express their insight and experiences. Please bring your own accelerant. brief fireside chat with infrastructure providers. NAB305 Goldsmiths @ 14:00 -14:30 sharp