Added Ian Goldberg OTR talk to media

This commit is contained in:
David Bartley 2007-10-25 00:27:24 -04:00
parent 51d3abe829
commit f7eed31a62
1 changed files with 41 additions and 2 deletions

View File

@ -11,6 +11,46 @@
CD or DVD should you so choose.
<ul>
<mediaitem title="Off-the-Record Messaging: Useful Security and Privacy for IM">
<abstract><p>
Instant messaging (IM) is an increasingly popular mode of communication
on the Internet. Although it is used for personal and private
conversations, it is not at all a private medium. Not only are all of
the messages unencrypted and unauthenticated, but they are all
routedthrough a central server, forming a convenient interception point
for an attacker. Users would benefit from being able to have truly
private conversations over IM, combining the features of encryption,
authentication, deniability, and forward secrecy, while working within
their existing IM infrastructure.
</p>
<p>
In this talk, I will discuss "Off-the-Record Messaging" (OTR), a widely
used software tool for secure and private instant messaging. I will
outline the properties of Useful Security and Privacy Technologies that
motivated OTR's design, compare it to other IM security mechanisms, and
talk about its ongoing development directions.
</p></abstract>
<mediafile file="ian-goldberg-otr.avi" type="XviD" />
<mediafile file="ian-goldberg-otr.ogg" type="Ogg/Theora" />
<mediafile file="ian-goldberg-otr.mp4" type="MP4" />
<mediafile file="ian-goldberg-otr.mpg" type="MPG" />
<flvfile file="ian-goldberg-otr.flv" />
<other>
<h2>Bio</h2>
<p>
Ian Goldberg is an Assistant Professor of Computer Science at the
University of Waterloo, where he is a founding member of the
Cryptography, Security, and Privacy (CrySP) research group. He holds a
Ph.D. from the University of California, Berkeley, where he discovered
serious weaknesses in a number of widely deployed security systems,
including those used by cellular phones and wireless networks. He also
studied systems for protecting the personal privacy of Internet users,
which led to his role as Chief Scientist at Zero-Knowledge Systems (now
known as Radialpoint), where he commercialized his research as the
Freedom Network.
</p></other>
</mediaitem>
<mediaitem title="Privacy by Design">
<abstract><p>
Globally, issues about information privacy in the marketplace have emerged in tandem with the dramatic and escalating increase in information stored
@ -18,8 +58,7 @@ in electronic formats. Data mining, for example, can be extremely valuable for b
jeopradize informational privacy. Dr. Ann Cavoukian talks about how to use technology to enhance privacy. Some of the technologies discussed
included instant messaging, RFID tags and Elliptical Curve Cryptography (ECC). Then Dr. Cavoukian explained the “7 Privacy Embedded Laws” followed
by a discussion on a biometrics solution to encryption.
</p>
</abstract>
</p></abstract>
<mediafile file="privacy.avi" type="XviD" />
<mediafile file="privacy.ogg" type="Ogg/Theora" />
<mediafile file="privacy.mp4" type="MP4" />