CPV 9: Back to School

Venue

Our 9th annual Crypto & Privacy Village was hosted at DEF CON 30.

When: 12-14 August 2022

Where: Caesars Forum, 3911 S Koval Ln, Las Vegas, NV 89109

Friday

Time Title Speaker(s)
10:30-11:00 Back to School! Hello RSA... and beyond! Mike Guirao
11-11:30 Positive Identification of Least Significant Bit Image Steganography Michael Pelosi
11:30-12:00 OPAQUE is Not Magic Steve Thomas
12-12:30 PSA: Doorbell Cameras Have Mics, Too Yael Grauer, Matthew Guariglia
13-13:30 Reflections on 9 Years of CPV Whitney Merrill
13:30-14:00 How to Respond to Data Subject Access Requests Irene Mo
14-14:30 Securing and Standardizing Data Rights Requests with a Data Rights Protocol Ginny Fahs, Dazza Greenwood, Ryan Rix
14:30-15:00 The Multiverse of Madness: Navigating the 50-State Approach to Privacy and Security Anthony Hendricks
15-15:30 ID theft insurance - The Emperor’s new clothes? Per Thorsheim
16-16:45 Once More Unto the Breach: Federal Regulators' Response to Privacy Breaches and Consumer Harms Erie Meyer, Alexis Goldstein
16:45-17:30 Owned or pwned? No peekin' or tweakin'! Richard Zak, Nick Vidal
17:30-18:00 [T]OTPs are not as secure as you might believe Santiago Kantorowicz

Saturday

Time Title Speaker(s)
10:45-11:30 PII: The Privacy Zombie Alisha Kloc
11:30-12:30 Jailed By a Google Search Part 2: Abortion Surveillance in Post-Roe America Kate Bertash
13-13:45 Cryptle: a secure multi-party Wordle clone with Enarx Nick Vidal, Richard Zak, Tom Dohrmann
13:45-14:30 Exploring Unprecedented Avenues for Data Harvesting in the Metaverse Vivek Nair, Gonzalo Munilla Garrido
14:30-15:00 The deadly state of surveillance capitalism in healthcare Andrea Downing, Valencia Robinson, Mike Mittelman
15:30-16:15 Capturing Chaos: Harvesting Environmental Entropy Carey Parker
16:15-17:00 Toto, I’ve a feeling we’re not on a VPN anymore Jonathan Tomek
17-18:00 Pursuing Phone Privacy Protection [WORKSHOP] Matt Nash, Mauricio Tavares

Sunday

Time Title Speaker(s)
10:30-11:00 XR Technology Has 99 Problems and Privacy is Several of Them (PRE-RECORDED) Suchi Pahi, Calli Schroeder
11-11:30 Voldrakus: Using Consent String Steganography to Exfiltrate Browser Fingerprinting Data Kaileigh McCrea
11:30-12:00 Finding Crypto: Inventorying Cryptographic Operations Kevin Lai
12-12:30 Surviving and Designing for Survivors Avi Zajac
13-13:30 Introducing the Abusability Testing Framework (V1) Nicole Chi, Ji Su Yoo, Avi Zajac
13:30-14:15 Cryptosploit Matt Cheung, Benjamin Hendel
14:15-15:00 AES-GCM common pitfalls and how to work around them (PRE-RECORDED) Santiago Kantorowicz