TrustyCon Profile
TrustyCon

@TrustyCon

Followers
615
Following
6
Media
5
Statuses
84

Thursday, February 27. AMC Metreon 16, San Francsico. http://t.co/hCLZDSPjtX

San Francisco, CA
Joined January 2014
Don't wanna be here? Send us removal request.
@TrustyCon
TrustyCon
11 years
RT @sethr: #TrustyCon's #RSAC rebels talk strategy, promise more to come http://t.co/SXNa7g9QwK.
0
4
0
@TrustyCon
TrustyCon
11 years
RT @IEthics: @EdFelten re gov. #surveillance: "We need to push for accountability and . for computer science that will enable that" #Trus….
0
3
0
@TrustyCon
TrustyCon
11 years
RT @timothy_yim: Kudos to a successful #TrustyCon. Remember: "Technology should not only be Secure, it should be Trustworthy." #PrivacyOnth….
0
5
0
@TrustyCon
TrustyCon
11 years
RT @DennisF: I liked @TrustyCon. Hope they do it again.
0
3
0
@TrustyCon
TrustyCon
11 years
RT @meganegarcia: Jeff Moss advocates for viewing #cybersecurity like public health: firewall and other defenses are the new "vaccine" #Tr….
0
7
0
@TrustyCon
TrustyCon
11 years
Founder of DEF CON Jeff Moss argues you're not fully immunized unless you protect yourself & others' systems. Drive up the cost of attacks.
0
6
1
@TrustyCon
TrustyCon
11 years
Trusted computing helps against firmware and software attacks, but not against state sponsors. It's up to us to help secure the Internet!.
0
2
0
@TrustyCon
TrustyCon
11 years
Software Guard Extensions are secure "enclaves" backed by fully-encrypted memory and could make DRM harder to circumvent. - @sweis.
0
0
0
@TrustyCon
TrustyCon
11 years
Trusted Platform Module: the coming civil war on general purpose computing (by Cory Doctorow). http://t.co/fIz6LoC5Pf #TrustyCon @sweis.
boingboing.net
Even if we win the right to own and control our computers, a dilemma remains: what rights do owners owe users?
0
2
1
@TrustyCon
TrustyCon
11 years
Trusted Computing, as defined in @sweis's talk at #Trustycon: Ensure _____'s software is running on _____'s computer.
0
1
0
@TrustyCon
TrustyCon
11 years
NSA ANT catalog: for NSA employees to order technologies for tapping their targets' data. http://t.co/f1XVrGVydX #TrustyCon @sweis.
0
1
1
@TrustyCon
TrustyCon
11 years
RT @bsmartt13: @TrustyCon was an incredible way to spend Thursday of #rsa2014. Blew my expectations out of the park.
0
3
0
@TrustyCon
TrustyCon
11 years
RT @riskstrategist: Zooko's triangle ( http://t.co/w3N9FpWNOC) and DNSSEC based solutions being discussed by Chris Palmer of @google at @Tru….
en.wikipedia.org
0
2
0
@TrustyCon
TrustyCon
11 years
Dan Boneh on new frontiers in #cybersecurity: obfuscation (as a tool) solves many, many open problems in crypto.
1
2
1
@TrustyCon
TrustyCon
11 years
Chris Palmer recommends diving into the following research on CAA, PKP, TACK, and CT. http://t.co/BLc6yg28BR.
Tweet media one
0
1
1
@TrustyCon
TrustyCon
11 years
Worse is Better by Richard Gabriel: http://t.co/XXVDQt0uVa #TrustyCon #agile #design.
0
1
1
@TrustyCon
TrustyCon
11 years
Garrett Robinson - Securing SecureDrop #trustycon @garrettr_ http://t.co/VkdRK3zh5x.
Tweet media one
0
1
4
@TrustyCon
TrustyCon
11 years
Public Key Pinning (PKP) is simple and proven effective. but it's brittle and the path building is weird. - Chris Palmer #Trustycon.
0
0
0
@TrustyCon
TrustyCon
11 years
RT @antagonismorg: To whoever set up the live feed for @TrustyCon thank you so much. I really appreciate it.
0
4
0
@TrustyCon
TrustyCon
11 years
Secure Naming should be meaningful, decentralized, and secure. Zooko's Triangle claims you can only pick 2. - Chris Palmer.
0
3
3