Differences
This shows you the differences between two versions of the page.
| Both sides previous revisionPrevious revisionNext revision | Previous revision | ||
| london_cryptofestival:schedule [2013/12/02 15:29] – Links to Bring and Swap slides 127.0.0.1 | london_cryptofestival:schedule [2022/05/08 11:42] (current) – external edit 127.0.0.1 | ||
|---|---|---|---|
| Line 1: | Line 1: | ||
| ====== London CryptoFestival 2013 Schedule ====== | ====== London CryptoFestival 2013 Schedule ====== | ||
| + | |||
| + | **Update** - Some workshop materials such as slides and audio recordings of the panels are now available on the [[london_cryptofestival: | ||
| + | |||
| This is the (ever-mutating) schedule for [[: | This is the (ever-mutating) schedule for [[: | ||
| Line 68: | Line 71: | ||
| * **Talk** - is a visual communication program which copies lines from your terminal to that of another user. It first appeared in August 1983, included in the 4.2 release of BSD. Originally developed as a way for two users on a Unix network to converse via typing, talk is basically a communication between TTY (TeleTYpewriter). Although not secure on a LAN, unless the two machines are connected by a properly encrypted VPN, it is still an old school, simple way to communicate on a server, as safe as the server is. During this brief workshop we will demo the application, | * **Talk** - is a visual communication program which copies lines from your terminal to that of another user. It first appeared in August 1983, included in the 4.2 release of BSD. Originally developed as a way for two users on a Unix network to converse via typing, talk is basically a communication between TTY (TeleTYpewriter). Although not secure on a LAN, unless the two machines are connected by a properly encrypted VPN, it is still an old school, simple way to communicate on a server, as safe as the server is. During this brief workshop we will demo the application, | ||
| - | * **A Primer on Physical Security** -- An introduction to thinking about physec in two parts: I) how to find hardware bugs with a counter-surveillance budget of £0: creating a low-rent physical intrusion detection system; and II) taking document destruction seriously: shredder anti-forensics. | + | * **A Primer on Physical Security** -- An introduction to thinking about physec in two parts: I) how to find hardware bugs with a counter-surveillance budget of £0: creating a low-rent |
| * **Private VoIP** -- How to have private voice and video conversations via the Internet. Jitsi, ZRTP, SIP, XMPP, csipsimple, Open WhisperSystems RedPhone, Zphone, SilentCircle. | * **Private VoIP** -- How to have private voice and video conversations via the Internet. Jitsi, ZRTP, SIP, XMPP, csipsimple, Open WhisperSystems RedPhone, Zphone, SilentCircle. | ||