Security after Snowden
The time is now for action after having spent a couple of months lamenting about security and privacy breaches by intelligence agencies and major Internet corporations. Who, if not users and administrators of Open Source systems, have the best options for protecting themselves and their infrastructure from eavesdropping and surveillance on the one hand and from competitors and malevolent forces on the other? The talks in this track cover how to effectively protect privacy, take measures agains surveillance, and how to determine the effectiveness of security tools and ciphers. Last but not least, they also cover strategies on how to increase awareness in an area where the fallacious reasoning behind “I have nothing to hide” is all too common. A list of tools and projects might include but is not limited to OpenSSL, OpenSSH, Tor, GPG, and other security related tools.
Time | Saturday, 10.05.2014 - Stage 11 |
---|---|
10:00 |
![]() Peer Heinlein (Heinlein Support GmbH), Johannes Rundfeldt (Heinlein Support GmbH) |
10:30 | |
![]() Patrick Koetter (sys4 AG), Carsten Strotmann (Men & Mice / dnsworkshop.org) |
|
11:00 | |
11:30 | |
12:00 | |
12:30 | |
13:00 |
Lunch break in exhibition halls 4 and 6 (included for LinuxTag badge holder)
|
13:30 | |
14:00 | |
14:30 |
![]() Andreas Grau (tarent solutions GmbH), Thomas Krille (tarent solutions GmbH) |
15:00 | |
15:30 |
Coffee break in exhibition halls 4 and 6 (included for LinuxTag badge holder)
|
16:00 | |
16:30 |
![]() Michael Prinzinger (https://kinko.me) |
17:00 |
![]() Michael Christen (YaCy.net) |
17:30 | |