Comparing GnuPG With Signal is like Comparing Apples with Smart Light Bulbs Hans Freitag DeepSec

Subscribers:
5,970
Published on ● Video Link: https://www.youtube.com/watch?v=aRYN9-0lwnk



Duration: 48:51
12 views
0


DeepSec - 2019 Hacking conference
#hacking, #hackers, #infosec, #opsec, #IT, #security #DeepSec

Neutral
We are neutral and we stick to our principles: If a topic is interesting and important, we will consider a submission for our conferences. We will not lock out individuals or organizations from submitting a talk or attending our conferences, and we hope, that potential visitors share our stance and posture.

Novelty, Quality & Impact
When selecting talks or trainings from our submissions we strictly make no discrimination or preference based on anything else than the quality, novelty, impact or relevance of that specific submission. Often we prefer to invite a newcomer to the stage if the content is more promising than the “safe choice” of well established truths, which are repeated all over the place. We even observe sometimes that superstars of the security circus lack brilliance, novelty and something that we really love: Controversy, a little bit of provocation and alternatives to the mainstream.

Treat Each Other With Kindness And Respect
We want to encourage individuals, organizations and countries to meet and exchange, to improve overall security and trust. Let’s create neutral ground where we can freely talk about ideas and points of view. We do not tolerate harassment of conference participants in any form. And, in case you need anything - our team is happy to help you!

Facts And Not Ads
Our web site states that DeepSec is a non-product, non-vendor-biased conference event. In short this simply means that the topics discussed at DeepSec are all about facts not ads. We are looking for honest talks about security: If something breaks, tell us about it. If you can repair it, tell us about it. If you discovered something, tell us about it. That’s our goal.

Support Young Talents
We launched our special U21 initiative for young security researchers. We like to support young researchers (under the age of 21, hence U21) and enable them to present their works and results in an appropriate manner.




Other Videos By All Hacking Cons


2022-04-19Still Secure We Empower What We Harden Because We Can Conceal Yury Chemerkin DeepSec 2019
2022-04-19Keynote DeepSec 2019
2022-04-19Setting Up an Opensource Threat Detection Program Lance Buttars DeepSec 2019
2022-04-19IPFS As a Distributed Alternative to Logs Collection Fabio Nigi DeepSec 2019
2022-04-19SD WAN Secure Communications Design and Vulnerabilities Denis Kolegov DeepSec 2019
2022-04-19Saving Private Brian Michael Burke DeepSec 2019
2022-04-19How To Create a Botnet of GSM devices Aleksandr Kolchanov DeepSec 2019
2022-04-19S C A R E Static Code Analysis Recognition Evasion Andreas Wiegenstein DeepSec 2019
2022-04-19Demystifying Hardware Security Modules How to Protect Keys in Hardware Michael Walser DeepSec
2022-04-19Practical Security Awareness Lessons Learnt and Best Practices Stefan Schumacher DeepSec 2019
2022-04-19Comparing GnuPG With Signal is like Comparing Apples with Smart Light Bulbs Hans Freitag DeepSec
2022-04-19Whats Wrong with WebSocket APIs Unveiling Vulnerabilities in WebSocket APIs Mikhail Egorov Deep
2022-04-19What Has Data Science Got To Do With It Thordis Thorsteins DeepSec 2019
2022-04-19Chinese Police and CloudPets Abraham Aranguren DeepSec 2019
2022-04-19Well, That Escalated Quickly A Penetration Tester's Approach to Windows Privilege Escalation Kha
2022-04-19Beyond Windows Forensics with Built in Microsoft Tooling Thomas Fischer DeepSec 2019
2022-04-19A Threat based Security Monitoring Approach Using Mitre ATT&CK Matrix Patrick Bareiszlig DeepSec
2022-04-19The Turtle Gone Ninja Investigation of an Unusual Crypto Mining Campaign Ophir Harpaz and Daniel
2022-04-19Overcoming the Limitations of TLS Fingerprinting for Malware Detection Blake Anderson DeepSec 2
2022-04-19Opening DeepSec 2019
2022-04-19500000 Recalled Pacemakers, 2 Billion $ Stock Value Loss The Story Behind Tobias Zillner DeepSec



Tags:
data
hacker
security
computer
cyber
internet
technology
hacking
attack
digital
virus
information
hack
online
crime
password
code
web
concept
thief
protection
network
scam
fraud
malware
secure
identity
criminal
phishing
software
access
safety
theft
system
firewall
communication
business
privacy
binary
account
spy
programmer
program
spyware
hacked
hacking conference
conference
learn
how to
2022
2021
cybersecurity
owned
break in
google
securing
exploit
exploitation
recon
social engineering