Genuinely "Trusted Computing:" Free and Open Hardware Security Modules

Presented at ShmooCon X (2014), Jan. 18, 2014, 10 a.m. (60 minutes)

"Trusted Computing" unfortunately often means trusting a black box provided by a third party who may not be particularly trustworthy. We present an alternative -- a user assembled hardware security module, based on a published design, using simple components which can be fully inspected by the user prior to assembly and commissioning.


Presenters:

  • Ryan Lackey
    Ryan Lackey has 20 years of experience computer security, from running the world's first offshore datahaven "HavenCo" in 2000, building and operating networks in Iraq and Afghanistan, to founding several security startups. He also consults for private industry and government entities.

Similar Presentations: