Difference between revisions of "Sectalk"
From Hackerspace.gr
(17 intermediate revisions by 7 users not shown) | |||
Line 21: | Line 21: | ||
! Talk Title | ! Talk Title | ||
|- | |- | ||
− | | asn || | + | | asn || [https://void.gr/kargig/sectalk/asn_mpotr_pond_entry-guards.pdf 2 of (pond / mpOTR / Tor Entry Guards)] |
|- | |- | ||
− | | irregulator || | + | | irregulator || [https://pithos.okeanos.grnet.gr/public/m8EZF6GVGo7mGqZX8W9Ze4 Tahoe-LAFS] |
|- | |- | ||
− | | kargig || A Russian bride for Tor | + | | kargig || [https://void.gr/kargig/presentations/A_Russian_Bride_for_Tor.pdf A Russian bride for Tor] |
− | + | ||
− | + | ||
|- | |- | ||
| <del>argp</del> || <del>Heapbleed</del> | | <del>argp</del> || <del>Heapbleed</del> | ||
Line 33: | Line 31: | ||
| sophron || [https://openbazaar.org OpenBazaar] | | sophron || [https://openbazaar.org OpenBazaar] | ||
|- | |- | ||
− | | ancst || Your enemies know your ADSL router's weaknesses... Do you? | + | | ancst || [https://www.dropbox.com/s/pqqettybx7qk681/sectalk_hsgr_adsl_ancst.pdf Your enemies know your ADSL router's weaknesses... Do you?] |
+ | |- | ||
+ | | huju || [https://void.gr/kargig/sectalk/vulnerability_assessment_wip1.pdf Vulnerability assessment: Tools & methodology (WIP report #1)] | ||
+ | |- | ||
+ | | fotisl || [https://void.gr/kargig/sectalk/Free_Riding_Toumpa.pptx Free Riding Toumpa] | ||
+ | |- | ||
+ | | alexz || [https://void.gr/kargig/sectalk/PoS_Attacking_the_Traveling_Salesman_Small.pdf PoS Attacking the Traveling Salesman (summary of DEF CON 22 Talk)] | ||
|- | |- | ||
− | | | + | | comzeradd || [[Sanitize Thunderbird Enigmail]] |
|- | |- | ||
− | | | + | | ebal || [http://ebalaskas.gr/blog/2014/09/02/dockerfile-for-two-factor-authentication/ Barada >> Two-Factor Authentication For Android (demo inside docker)] |
|- | |- | ||
− | | | + | | kpapapan || Everything we do about security is wrong (obviously) |
|- | |- | ||
− | | | + | | bezdomny || [http://www.slideshare.net/BezdomnyDotcom/authorlessness The value of autherlessness within collaborative communities.] |
|- | |- | ||
− | | | + | | fuser || [http://web.it.kth.se/~maguire/DEGREE-PROJECT-REPORTS/100402-Vassilios_Ververis-with-cover.pdf iAMT ~ insecurity as mass technology] |
|- | |- | ||
| Your_name_goes_here || | | Your_name_goes_here || |
Latest revision as of 11:16, 9 September 2014
Starts | Organizer | |
---|---|---|
Mon 08 Sep 2014 18:30 | everyoooone!!! | |
Ends | Event Owner | |
Mon 08 Sep 2014 21:30 | User:Kargig |
Anonymity/Crypto/Privacy/Security
Contents
What?
Lightning Talks (10' max) on Anonymity, Crypto, Privacy, Security, etc topics
* Do you work on a software or hardware project ? Come and tell us about it. * Do you use/like a new tool ? Come and tell us about it
Presentations
Presenter | Talk Title |
---|---|
asn | 2 of (pond / mpOTR / Tor Entry Guards) |
irregulator | Tahoe-LAFS |
kargig | A Russian bride for Tor |
|
|
sophron | OpenBazaar |
ancst | Your enemies know your ADSL router's weaknesses... Do you? |
huju | Vulnerability assessment: Tools & methodology (WIP report #1) |
fotisl | Free Riding Toumpa |
alexz | PoS Attacking the Traveling Salesman (summary of DEF CON 22 Talk) |
comzeradd | Sanitize Thunderbird Enigmail |
ebal | Barada >> Two-Factor Authentication For Android (demo inside docker) |
kpapapan | Everything we do about security is wrong (obviously) |
bezdomny | The value of autherlessness within collaborative communities. |
fuser | iAMT ~ insecurity as mass technology |
Your_name_goes_here |
Format
* Presenter talks for ten (10) minutes. If he asks politely he can get one (1) minute extra. Not more than that. * Then he chooses someone to ask a single question. He replies within one minute. * If others have questions they should talk to the presenter during breaks. Socialize!
FAQ
- Will there be streaming ?
- NO!
- Will there be a recording ?
- NO!
- I'm just attending, shall I bring something ?
- Presenters usually like beer, if you like their talk treat them a beer.