Zach Lym (indolering)DNS and the Future of Authenticity
Ajit HattiGetting In to the Trust Store we Trust
Edmond Rogers (bigezy) & Shane Rogers (bust3r)Using Privacy and Crypto Tools
Nadim KobeissiPeerio: Productivity with end-to-end encryption
Alisha KlocLife of PII: A Day in the Life of Your Personally Identifiable Information
Adam CaudillOpening Backdoors: The Importance of Backdoor Research
Karl KoscherHow to Engineer a Cryptographic ‘Front Door’
Bill BudingtonLet’s Talk about Let’s Encrypt
Jennifer Helsby (redshiftzero)Machine Learning and Manipulation
Justin EnglerBeginner Crypto for Application Developers
Jennifer Katherine FernickBreaking RSA – new cryptography for a post-quantum world
Evgeny SidorovShould we trust crypto frameworks? A story about CVE-2015-2141
Hadi AsghariiWhere are the privacy-preserving services for the masses?
Dr. Albert H. Carlson (ECCSmith) & Patrick DohertyBreaking CBC, or Randomness Never Was Happiness
Sean Thomas JonesWhat is Bitcoin Tumbling and why do it?
David DahlThe design and implementation of a white-listed, end to end encrypted status application
StealthDeath of Privacy
Steven PhillipsCrypTag: Building Encrypted, Taggable, Searchable Zero-knowledge
Ladar Levison & Fred NixonMaking Email Dark
Chris Brown (BigBiz)STD’s are the least of your worries when Cyber Cancer Prognosis is imminent
Per ThorsheimProtecting global email – status & the road ahead
Steven F. FoxEngineering Responsible Data Governance – A Privacy by Design Primer
Adam Caudill & Taylor HornbyUnderhanded Crypto Contest Wrapup
Steve WeisModern Crypto: 15 Years of Advancement in Cryptography
Nick SullivanCFSSL: the evolution of a PKI toolkit
Freddy MartinezIMSI Catcher Counter-Surveillance
Marina (bt3)Hacking Quantum Cryptography
Robert Olson (nerdprof)Teaching Privacy Using Red Team Strategies: An Undergraduate General Education Curriculum
Karthikeyan BhargavanSkip, Freak, and Logjam: Moving past a legacy of weakness in TLS