CPV 5: 1984/Privacy Policies
Venue
Our 5th annual Crypto & Privacy Village was hosted at DEF CON 26.
When: 9-12 August 2018
Where: Caesars Palace, 3570 S Las Vegas Blvd, Paradise, NV 89109
| Title | Speaker(s) |
|---|---|
| “Won’t Somebody Think of the Children?” Examining COPPA Compliance at Scale | Irwin Reyes, Amit Elazari Bar On |
| Hamilton’s Private Key: American Exceptionalism and the Right to Anonymity | Jeff Kosseff |
| Cryptography, Codes, and Secret Writing: An Introduction to Secret Communications | Tess Schrodinger |
| Opportunistic Onion: More Protection Some of the Time | Mahrud Sayrafi |
| “Probably”: an Irreverent Overview of the GDPR | Brendan O'Connor |
| Hiding in plain sight: Disguising HTTPS traffic with domain-fronting | Matt Urquhart |
| Cicada: What the Puzzles Can Teach Us About Cryptography and Privacy | Nox |
| Revolutionizing Authentication with Oblivious Cryptography | Dr Adam Everspaugh |
| Announcing the Underhanded Crypto Contest Winners | Adam Caudill, Taylor Hornby |
| Cloud Encryption: How to not suck at securing your encryption keys | Marie Fromm |
| Green Locks for You and Me | Wendy Knox Everette |
| No Way JOSE! Designing Cryptography Features for Mere Mortals | Scott Arciszewski |
| Sluts, Bullies, and Best Selves: Rethinking Digital Privacy Education | Caroline D. Hardin, Jen Dalsen |
| Building a Cryptographic Backdoor in OpenSSL | Lei Shi, Allen Cai |
| CATs – A Tale of Scalable Authentication | Yueting Lee |
| Jailed by a Google Search: the Surveillance State’s War on Self-induced Abortion | Pigeon |
| JARVIS never saw it coming: Hacking machine learning (ML) in speech, text and face recognition – and frankly, everywhere else | Guy Barnhart-Magen, Ezra Caltum |
| Anonymous rate-limiting in services with Direct Anonymous Attestation | Alex Catarineu, Konark Modi |
| Prototyping Cryptographic Protocols With Charm | Matt Cheung |
| Ask Me Anything about Tor: AMA with Roger Dingledine | Roger Dingledine |
| Geolocation and Homomorphic Encryption | Nicholas Doiron |
| Two-Steps to Owning MFA | Sherrie Cowley, Dennis Taggart |
| Implementing a Library for Pairing-based Transform Cryptography | Bob Wall, Colt Frederickson |
| Integrating post-quantum crypto into real-life applications | Christian Paquin |