DEF CON 26

Puzzle

View information about this year’s Gold Bug Puzzle

Talks

Irwin Reyes, Amit Elazari Bar On “Won’t Somebody Think of the Children?” Examining COPPA Compliance at Scale
Jeff Kosseff Hamilton’s Private Key: American Exceptionalism and the Right to Anonymity
Tess Schrodinger Cryptography, Codes, and Secret Writing: An Introduction to Secret Communications
Mahrud Sayrafi Opportunistic Onion: More Protection Some of the Time
Brendan O’Connor “Probably”: an Irreverent Overview of the GDPR
Matt Urquhart Hiding in plain sight: Disguising HTTPS traffic with domain-fronting
Nox Cicada: What the Puzzles Can Teach Us About Cryptography and Privacy
Dr Adam Everspaugh Revolutionizing Authentication with Oblivious Cryptography
Adam Caudill, Taylor Hornby Announcing the Underhanded Crypto Contest Winners
Marie Fromm Cloud Encryption: How to not suck at securing your encryption keys
Wendy Knox Everette Green Locks for You and Me
Scott Arciszewski No Way JOSE! Designing Cryptography Features for Mere Mortals
Caroline D. Hardin, Jen Dalsen Sluts, Bullies, and Best Selves: Rethinking Digital Privacy Education
Lei Shi, Allen Cai Building a Cryptographic Backdoor in OpenSSL
Yueting Lee CATs – A Tale of Scalable Authentication
Pigeon Jailed by a Google Search: the Surveillance State’s War on Self-induced Abortion
Guy Barnhart-Magen, Ezra Caltum JARVIS never saw it coming: Hacking machine learning (ML) in speech, text and face recognition – and frankly, everywhere else
Alex Catarineu, Konark Modi Anonymous rate-limiting in services with Direct Anonymous Attestation
Matt Cheung Prototyping Cryptographic Protocols With Charm
Roger Dingledine Ask Me Anything about Tor: AMA with Roger Dingledine
Nicholas Doiron Geolocation and Homomorphic Encryption
Sherrie Cowley, Dennis Taggart Two-Steps to Owning MFA
Bob Wall, Colt Frederickson Implementing a Library for Pairing-based Transform Cryptography
Christian Paquin Integrating post-quantum crypto into real-life applications