Security after Snowden
The time is now for action after having spent a couple of months lamenting about security and privacy breaches by intelligence agencies and major Internet corporations. Who, if not users and administrators of Open Source systems, have the best options for protecting themselves and their infrastructure from eavesdropping and surveillance on the one hand and from competitors and malevolent forces on the other? The talks in this track cover how to effectively protect privacy, take measures agains surveillance, and how to determine the effectiveness of security tools and ciphers. Last but not least, they also cover strategies on how to increase awareness in an area where the fallacious reasoning behind “I have nothing to hide” is all too common. A list of tools and projects might include but is not limited to OpenSSL, OpenSSH, Tor, GPG, and other security related tools.
Time | Saturday, 10.05.2014 - Stage 11 |
---|---|
10:00 |
E-Mail made in Germany: Broken by design, überflüssig dank DANE.
Peer Heinlein (Heinlein Support GmbH), Johannes Rundfeldt (Heinlein Support GmbH) |
10:30 | |
DANEn lügen nicht - E-Mail Transportverschlüsselung "reloaded"
Patrick Koetter (sys4 AG), Carsten Strotmann (Men & Mice / dnsworkshop.org) |
|
11:00 | |
11:30 | |
12:00 |
Keynote on Stage 11: GOTO KLARKOMMEN
Felix 'FX' Lindner (Phenoelit) |
12:30 | |
13:00 |
Lunch break in exhibition halls 4 and 6 (included for LinuxTag badge holder)
|
13:30 | |
14:00 |
A USB key to secure your digital life - Crypto Stick
Jan Suhr (Crypto Stick) |
14:30 |
OSIAM - Sichere Identitätsverwaltung auf Basis von SCIMv2 und OAuth2
Andreas Grau (tarent solutions GmbH), Thomas Krille (tarent solutions GmbH) |
15:00 |
Two factor authentication: Open, trustworthy and enterprise ready
Cornelius Kölbel |
15:30 |
Coffee break in exhibition halls 4 and 6 (included for LinuxTag badge holder)
|
16:00 |
Automatische Rotation von DKIM- Schlüsseln
Stefan Neben (Immobilien Scout GmbH) |
16:30 |
Easy-to- use secure accessible email encryption for everyone: kinko
Michael Prinzinger (https://kinko.me) |
17:00 |
Lass mich, ich kann das selbst! – Selbstverteidigung von Privatsphähre und Datenschutz
Michael Christen (YaCy.net) |
17:30 |
Strategien der Krypto- Qualifizierung
Hauke Laging (Crypto für alle) |