Presented at
Kiwicon 8: It's always 1989 in Computer Security (2014),
Dec. 11, 2014, 4:30 p.m.
(45 minutes).
Have you ever wanted someone to just cut to the chase and tell you which secure messaging app to use? If so, you will probably hate this talk. We can't really discuss OPSEC without getting into threat modelling, and that takes ages. Communications Security, on the other hand, can be considered a little more generally. That's not to say, however, that one can simply magic up a list of assorted tools, pick some arbitrary checkboxes and then produce a set of rankings. That would be stupid. In this talk we run over the core principles of COMSEC, examining real-world successes and failures. Then, based on that, we'll get into a detailed analysis of considerations and concrete options for tooling. SPOILER: None of the options are Cryptocat.
Presenters:
-
@rantyben
@rantyben is a hacker warrior poet, with a lineage of verse spanning from the opening of the eEye through to modern treatise on pig nuts (not a metaphor; Ben deals only in the literal.) Ben spends his time ranting drunkly with equal vehemence towards bad grammar, SMT Solvers and whatever infosec trend is So Hot Right Now. If @rantyben is a hacker warrior poet, @thegrugq is more... a hacker eastern european arms bazaar?
-
The Grugq
as @thegrugq
@rantyben is a hacker warrior poet, with a lineage of verse spanning from the opening of the eEye through to modern treatise on pig nuts (not a metaphor; Ben deals only in the literal.) Ben spends his time ranting drunkly with equal vehemence towards bad grammar, SMT Solvers and whatever infosec trend is So Hot Right Now. If @rantyben is a hacker warrior poet, @thegrugq is more... a hacker eastern european arms bazaar?
Links:
Similar Presentations: