Zach Lym (indolering) | DNS and the Future of Authenticity |
Ajit Hatti | Getting In to the Trust Store we Trust |
Edmond Rogers (bigezy) & Shane Rogers (bust3r) | Using Privacy and Crypto Tools |
Nadim Kobeissi | Peerio: Productivity with end-to-end encryption |
Alisha Kloc | Life of PII: A Day in the Life of Your Personally Identifiable Information |
Adam Caudill | Opening Backdoors: The Importance of Backdoor Research |
Karl Koscher | How to Engineer a Cryptographic ‘Front Door’ |
Bill Budington | Let’s Talk about Let’s Encrypt |
Jennifer Helsby (redshiftzero) | Machine Learning and Manipulation |
Justin Engler | Beginner Crypto for Application Developers |
Jennifer Katherine Fernick | Breaking RSA – new cryptography for a post-quantum world |
Evgeny Sidorov | Should we trust crypto frameworks? A story about CVE-2015-2141 |
Hadi Asgharii | Where are the privacy-preserving services for the masses? |
Dr. Albert H. Carlson (ECCSmith) & Patrick Doherty | Breaking CBC, or Randomness Never Was Happiness |
Sean Thomas Jones | What is Bitcoin Tumbling and why do it? |
David Dahl | The design and implementation of a white-listed, end to end encrypted status application |
Stealth | Death of Privacy |
Steven Phillips | CrypTag: Building Encrypted, Taggable, Searchable Zero-knowledge |
Ladar Levison & Fred Nixon | Making Email Dark |
Chris Brown (BigBiz) | STD’s are the least of your worries when Cyber Cancer Prognosis is imminent |
Per Thorsheim | Protecting global email – status & the road ahead |
Steven F. Fox | Engineering Responsible Data Governance – A Privacy by Design Primer |
Adam Caudill & Taylor Hornby | Underhanded Crypto Contest Wrapup |
Steve Weis | Modern Crypto: 15 Years of Advancement in Cryptography |
Nick Sullivan | CFSSL: the evolution of a PKI toolkit |
Freddy Martinez | IMSI Catcher Counter-Surveillance |
Marina (bt3) | Hacking Quantum Cryptography |
Robert Olson (nerdprof) | Teaching Privacy Using Red Team Strategies: An Undergraduate General Education Curriculum |
Karthikeyan Bhargavan | Skip, Freak, and Logjam: Moving past a legacy of weakness in TLS |