Presented at
ShmooCon I (2005),
Feb. 5, 2005, 1 p.m.
(60 minutes).
Users on the Internet are rapidly shifting to more advanced and diverse forms of communication. Classic methods of communication such as SMTP and IRC are being replaced by peer-to-peer file transfer, voice chat, and text messaging systems. Unfortunately, the popular protocols are not secure, and the secure protocols are not popular.
Cutlass aims to fill the niche for tools powerful and usable enough to be broadly popular, while still providing strong encryption and authentication, all in a BSD-licensed package. Cutlass is not a strong anonymity system, as those requirements often create software that only security nuts will use. Cutlass is an open source competitor to Skype, without the licensing mess of WASTE, providing any group of users with the ability to set up secure cells of communication.
Come and hear about the Cutlass design process, the protocol overview, see a live demo, and learn why you should be using Cutlass to protect your communications on the Internet today!
Presenters:
-
Todd MacDermid
- Syn Ack Labs
Todd MacDermid is hopelessly addicted to bit-twiddling and tweaky network hijinks. He's created a wide variety of open-source security tools, including steganographic network tunnels, encrypted mailing lists, and packet-mangling libraries. He has spoken at many conferences, including ToorCon, BlackHat, Rubicon, Notacon, and HOPE.
-
Jack Lloyd
- Syn Ack Labs
Jack Lloyd is your basic crypto/coding/Unix geek. He has written, among other things, a C++ crypto library, a VNC password cracker, and a Linux Security Module. While at Johns Hopkins he worked on OpenCM, an secure source code management system. He likes urban wildlife, dive bars, and kitties.
-
Kathy Wang
- Syn Ack Labs
Kathy Wang has loads of fun working with computers from both the hardware and software sides. Her background ranges from blowing up Alpha chips at DEC to authoring Morph, an OS fingerprint cloaker tool. Kathy has spoken at several security conferences in the past, including DEFCON, HOPE, Notacon, and ToorCon. She graduated from The University of Michigan with a BS and MS in electrical engineering.
-
Nash Foster
- Syn Ack Labs
nash e. foster joined the cutlass team to help design and implement the voice over IP functions; nash has developed enterprise software and security solutions for Fortune 500 corporations and is currently a Principal Security Architect at TruSecure Corporation, where he's developing risk modeling and analysis technologies for the financial industry.
Links:
Similar Presentations: