CPV 5: 1984/Privacy Policies

Venue

Our 5th annual Crypto & Privacy Village was hosted at DEF CON 26.

When: 9-12 August 2018

Where: Caesars Palace, 3570 S Las Vegas Blvd, Paradise, NV 89109

Title Speaker(s)
“Won’t Somebody Think of the Children?” Examining COPPA Compliance at Scale Irwin Reyes, Amit Elazari Bar On
Hamilton’s Private Key: American Exceptionalism and the Right to Anonymity Jeff Kosseff
Cryptography, Codes, and Secret Writing: An Introduction to Secret Communications Tess Schrodinger
Opportunistic Onion: More Protection Some of the Time Mahrud Sayrafi
“Probably”: an Irreverent Overview of the GDPR Brendan O'Connor
Hiding in plain sight: Disguising HTTPS traffic with domain-fronting Matt Urquhart
Cicada: What the Puzzles Can Teach Us About Cryptography and Privacy Nox
Revolutionizing Authentication with Oblivious Cryptography Dr Adam Everspaugh
Announcing the Underhanded Crypto Contest Winners Adam Caudill, Taylor Hornby
Cloud Encryption: How to not suck at securing your encryption keys Marie Fromm
Green Locks for You and Me Wendy Knox Everette
No Way JOSE! Designing Cryptography Features for Mere Mortals Scott Arciszewski
Sluts, Bullies, and Best Selves: Rethinking Digital Privacy Education Caroline D. Hardin, Jen Dalsen
Building a Cryptographic Backdoor in OpenSSL Lei Shi, Allen Cai
CATs – A Tale of Scalable Authentication Yueting Lee
Jailed by a Google Search: the Surveillance State’s War on Self-induced Abortion Pigeon
JARVIS never saw it coming: Hacking machine learning (ML) in speech, text and face recognition – and frankly, everywhere else Guy Barnhart-Magen, Ezra Caltum
Anonymous rate-limiting in services with Direct Anonymous Attestation Alex Catarineu, Konark Modi
Prototyping Cryptographic Protocols With Charm Matt Cheung
Ask Me Anything about Tor: AMA with Roger Dingledine Roger Dingledine
Geolocation and Homomorphic Encryption Nicholas Doiron
Two-Steps to Owning MFA Sherrie Cowley, Dennis Taggart
Implementing a Library for Pairing-based Transform Cryptography Bob Wall, Colt Frederickson
Integrating post-quantum crypto into real-life applications Christian Paquin