Secure communications hardware

Presented at Still Hacking Anyway (SHA2017), Aug. 6, 2017, 3 p.m. (45 minutes)

This talk will focus on securing end-point-devices from attack by state level actors. This kind of IT security is important when these devices are operating in potentially hostile environments. Examples would be: securely communicating from an embassy, operating as a journalist and running certain industrial production environments. First we will show some attack vectors employed in the past by state actors. Then protection measures are demonstrated, starting with low level treat protection and ending in full-scale paranoid mode. It will demonstrate how far one must go (and can go) to achieve a certain level of security.

Presenters:

Links: