Added some sec talk abstracts
This commit is contained in:
parent
02b8a304b5
commit
5e13482fb9
29
events.xml
29
events.xml
|
@ -58,8 +58,17 @@ Censorship">
|
|||
Eric Dong.
|
||||
</p></short>
|
||||
<abstract><p>
|
||||
The second lecture of our security and privacy series. By undergraduate student
|
||||
Eric Dong.
|
||||
In this talk, I will discuss censorship firewalls used in countries such as
|
||||
China and Iran, and how to counteract them. The focus is on advanced
|
||||
application-layer and Deep Packet Inspection firewalls, and unexpected hurdles
|
||||
in overcoming censorship by these firewalls due to the need for very
|
||||
unconventional adversary models. Approaches of the privacy tool Tor, popular
|
||||
proprietary freeware Ultrasurf and Freegate, payware VPNs, and my own
|
||||
experimental Kirisurf project are examined, where strengths and difficulties
|
||||
with each system are noted.</p>
|
||||
|
||||
<p>The second lecture of our security and privacy series. By undergraduate
|
||||
student Eric Dong.
|
||||
</p></abstract>
|
||||
</eventitem>
|
||||
|
||||
|
@ -71,8 +80,20 @@ You Care About Security and Privacy">
|
|||
Harvey.
|
||||
</p></short>
|
||||
<abstract><p>
|
||||
The first lecture of our security and privacy series. By PhD student Sarah
|
||||
Harvey.
|
||||
Recent media coverage has brought to light the presence of various government
|
||||
agencies' surveillance programs, along with the possible interference of
|
||||
governments in the establishment and development of standards and software.
|
||||
This brings to question of just how much we need to be concerned about the
|
||||
security and privacy of our information.</p>
|
||||
|
||||
<p>In this talk we will discuss what all this means in technological and social
|
||||
contexts, examine the status quo, and consider the long-standing implications.
|
||||
This talk assumes no background knowledge of security or privacy, nor any
|
||||
specific technical background. All students are welcome and encouraged to
|
||||
attend.</p>
|
||||
|
||||
<p>The first lecture of our security and privacy series. By PhD student
|
||||
Sarah Harvey.
|
||||
</p></abstract>
|
||||
</eventitem>
|
||||
|
||||
|
|
Loading…
Reference in New Issue