Differences
This shows you the differences between two versions of the page.
Both sides previous revisionPrevious revisionNext revision | Previous revisionNext revisionBoth sides next revision | ||
london_cryptofestival:schedule [2013/11/05 23:18] – merged /participants w/ /schedule anonymous | london_cryptofestival:schedule [2013/12/23 19:46] – anonymous | ||
---|---|---|---|
Line 1: | Line 1: | ||
====== London CryptoFestival 2013 Schedule ====== | ====== London CryptoFestival 2013 Schedule ====== | ||
- | This is the (ever-mutating) schedule for [[: | + | |
+ | **Update** - Some workshop materials such as slides and audio recordings of the panels are now available on the [[london_cryptofestival: | ||
+ | |||
+ | This is the (ever-mutating) schedule for [[: | ||
See below for more information on the listed [[# | See below for more information on the listed [[# | ||
+ | Note that London CryptoFestival is a DIY event operating with the [[https:// | ||
+ | |||
| ^ NAB-LG01\\ [Lightning Talks] ^ NAB-LG02\\ [Presentations & Panels] ^ NAB-305\\ [Workshops] ^ NAB-314\\ [Core Workshops] ^ NAB-326 [Workshops] | | ^ NAB-LG01\\ [Lightning Talks] ^ NAB-LG02\\ [Presentations & Panels] ^ NAB-305\\ [Workshops] ^ NAB-314\\ [Core Workshops] ^ NAB-326 [Workshops] | ||
- | ^ 11: | + | ^ 11: |
- | ^ 11: | + | ^ 11: |
- | ^ 12: | + | ^ 12: |
- | ^ 12: | + | ^ 12: |
^ 13: | ^ 13: | ||
- | ^ 14: | + | ^ 14: |
- | ^ 14: | + | ^ 14: |
- | ^ 15: | + | ^ 15: |
- | ^ 15: | + | ^ 15: |
^ 16: | ^ 16: | ||
- | ^ 16: | + | ^ 16: |
- | |||
- | ^ Workshops we still need presenters for... ^^ | ||
- | ^ What? ^ Who? ^ | ||
- | | Mobile Security | | | ||
- | | Steganography | | | ||
====== Panel Participants ====== | ====== Panel Participants ====== | ||
Line 29: | Line 29: | ||
* **[[http:// | * **[[http:// | ||
- | * **[[http:// | + | * **[[http:// |
* **[[https:// | * **[[https:// | ||
- | * **[[http:// | + | * **[[http:// |
- | + | ||
- | | + | |
* **[[http:// | * **[[http:// | ||
Line 61: | Line 59: | ||
* **Internet of Things** -- We're talking urban infrastructure, | * **Internet of Things** -- We're talking urban infrastructure, | ||
- | * **Bitmessage** -- How to use [[https:// | + | * **Bitmessage** -- Introduction |
* **tcpdump on mobiles** -- How to use [[http:// | * **tcpdump on mobiles** -- How to use [[http:// | ||
Line 67: | Line 65: | ||
* **Digital Double** -- How to use the [[http:// | * **Digital Double** -- How to use the [[http:// | ||
- | * **Cryptography for Non-Math People** -- Cryptography concepts explained for those of us who aren't maths experts. | + | * **Understanding Crypto Tools** -- what all the buttons really do, and how they fit into the big picture that is your security. We will explain general security models in technical but non-mathematical terms. This is intended to give you a more precise awareness |
- | * **Chris Pinchen** -- [[https://chokepointproject.net/|Chokepoint Project]] & Maya | + | * **[[ http://cataspanglish.com/ |
- | * **[[http:// | + | * **Talk** - is a visual communication program which copies lines from your terminal to that of another user. It first appeared in August 1983, included in the 4.2 release of BSD. Originally developed as a way for two users on a Unix network to converse via typing, talk is basically a communication between TTY (TeleTYpewriter). Although not secure on a LAN, unless the two machines are connected by a properly encrypted VPN, it is still an old school, simple way to communicate on a server, as safe as the server is. During this brief workshop we will demo the application, |
* **A Primer on Physical Security** -- An introduction to thinking about physec in two parts: I) how to find hardware bugs with a counter-surveillance budget of £0: creating a low-rent physical intrusion detection system; and II) taking document destruction seriously: shredder anti-forensics. | * **A Primer on Physical Security** -- An introduction to thinking about physec in two parts: I) how to find hardware bugs with a counter-surveillance budget of £0: creating a low-rent physical intrusion detection system; and II) taking document destruction seriously: shredder anti-forensics. | ||
+ | |||
+ | * **Private VoIP** -- How to have private voice and video conversations via the Internet. Jitsi, ZRTP, SIP, XMPP, csipsimple, Open WhisperSystems RedPhone, Zphone, SilentCircle. | ||
+ | |||
+ | * **TAILS - This session never happened** -- How to use an untrusted computer in a hostile environment while evading real-time surveillance or a forensic examination of your actions. | ||
+ | |||
+ | * **Smartphone privacy** -- Android (and some iPhone) privacy tips. The features and apps of each system that will protect you, as much as possible, from mass surveillance. Filesystem encryption, email encryption, VoIP encryption, SMS encryption, IM encryption, usability. | ||
+ | |||
+ | * **Qubes OS - A secure operating system** -- Hands-on with Qubes OS, a free security-by-separation operating system created by Joanna Rutkowska & the Invisible Things Lab. http:// | ||
+ | |||
+ | * **Dog Ate My Crypto Keys 2.0** -- An overview of full-disk encryption solutions and lessons to learn in failures. We will discuss an open-source full-disk encryption setup, the de-facto best practice guidelines and then we will look at offensive security techniques that have been used to compromise full-disk encryption and explain mitigation strategies to help prevent unwanted eyes accessing your data. | ||
+ | |||
+ | * **Bring & Swap** | ||
+ | |||
+ | * **/ | ||
+ | |||
+ | * **Tell us your experience with digital security and crypto tools.** Cryptotools are like any other piece of software: they should be focused on what the user needs to do. Do you use cryptotools? | ||
+ | |||
+ | * **Analysis of surveillance** What is privacy really and why do we need it? Why is 'I Have Nothing To Hide' wrong on several levels (you life is not that boring!). We'll discuss the scope of surveillance problems, what can and can't (for now) be done about it and how to argue these issues with others (beginning with the tearing down of 'I Have Nothing To Hide' | ||
====== Exhibitions ====== | ====== Exhibitions ====== | ||
- | * **[[http:// | + | * **[[http:// |
- | * **[[http:// | + | * **[[http:// |
* **Swarming Talent Competition** -- Swarming behaviours, artificial intelligence and abstractions, | * **Swarming Talent Competition** -- Swarming behaviours, artificial intelligence and abstractions, | ||
+ | |||
+ | * **ScareMail** adds " | ||
+ | |||
+ | ====== Stalls ====== | ||
+ | |||
+ | * **Pirate Party UK** is a political party formed in 2009 that primarily promotes digital freedom, civil liberties, and copyright and patent reform. Pirate Party UK formed out of the wider international Pirate movement largely in response to the then-Digital Economy Bill. Since forming, the Party has stood in several elections, including the 2010 General Elections and taken part in ACTA protests. The Party has also been featured in the press on several occasions, both in technology and music industry press as well as national and international. [[http:// | ||
+ | |||
+ | * **Privacy International** We investigate the secret world of government surveillance and expose the companies enabling it. We litigate to ensure that surveillance is consistent with the rule of law. We advocate for strong national, regional, and international laws that protect privacy. We conduct research to catalyse policy change. We raise awareness about technologies and laws that place privacy at risk, to ensure that the public is informed and engaged. [[https:// | ||
+ | |||
+ | * **Open Rights Group** | ||
+ | |||
+ | * **Radical Philosophy** Radical Philosophy is a UK-based journal of socialist and feminist philosophy, the first issue of which appeared in January 1972. It was founded in response to the widely felt discontent with the sterility of academic philosophy at the time (in Britain, completely dominated by the narrowest sort of “ordinary language” philosophy), |