Added Ian Goldberg OTR talk to media
parent
51d3abe829
commit
f7eed31a62
|
@ -11,6 +11,46 @@
|
|||
CD or DVD should you so choose.
|
||||
<ul>
|
||||
|
||||
<mediaitem title="Off-the-Record Messaging: Useful Security and Privacy for IM">
|
||||
<abstract><p>
|
||||
Instant messaging (IM) is an increasingly popular mode of communication
|
||||
on the Internet. Although it is used for personal and private
|
||||
conversations, it is not at all a private medium. Not only are all of
|
||||
the messages unencrypted and unauthenticated, but they are all
|
||||
routedthrough a central server, forming a convenient interception point
|
||||
for an attacker. Users would benefit from being able to have truly
|
||||
private conversations over IM, combining the features of encryption,
|
||||
authentication, deniability, and forward secrecy, while working within
|
||||
their existing IM infrastructure.
|
||||
</p>
|
||||
<p>
|
||||
In this talk, I will discuss "Off-the-Record Messaging" (OTR), a widely
|
||||
used software tool for secure and private instant messaging. I will
|
||||
outline the properties of Useful Security and Privacy Technologies that
|
||||
motivated OTR's design, compare it to other IM security mechanisms, and
|
||||
talk about its ongoing development directions.
|
||||
</p></abstract>
|
||||
<mediafile file="ian-goldberg-otr.avi" type="XviD" />
|
||||
<mediafile file="ian-goldberg-otr.ogg" type="Ogg/Theora" />
|
||||
<mediafile file="ian-goldberg-otr.mp4" type="MP4" />
|
||||
<mediafile file="ian-goldberg-otr.mpg" type="MPG" />
|
||||
<flvfile file="ian-goldberg-otr.flv" />
|
||||
<other>
|
||||
<h2>Bio</h2>
|
||||
<p>
|
||||
Ian Goldberg is an Assistant Professor of Computer Science at the
|
||||
University of Waterloo, where he is a founding member of the
|
||||
Cryptography, Security, and Privacy (CrySP) research group. He holds a
|
||||
Ph.D. from the University of California, Berkeley, where he discovered
|
||||
serious weaknesses in a number of widely deployed security systems,
|
||||
including those used by cellular phones and wireless networks. He also
|
||||
studied systems for protecting the personal privacy of Internet users,
|
||||
which led to his role as Chief Scientist at Zero-Knowledge Systems (now
|
||||
known as Radialpoint), where he commercialized his research as the
|
||||
Freedom Network.
|
||||
</p></other>
|
||||
</mediaitem>
|
||||
|
||||
<mediaitem title="Privacy by Design">
|
||||
<abstract><p>
|
||||
Globally, issues about information privacy in the marketplace have emerged in tandem with the dramatic and escalating increase in information stored
|
||||
|
@ -18,8 +58,7 @@ in electronic formats. Data mining, for example, can be extremely valuable for b
|
|||
jeopradize informational privacy. Dr. Ann Cavoukian talks about how to use technology to enhance privacy. Some of the technologies discussed
|
||||
included instant messaging, RFID tags and Elliptical Curve Cryptography (ECC). Then Dr. Cavoukian explained the “7 Privacy – Embedded Laws” followed
|
||||
by a discussion on a biometrics solution to encryption.
|
||||
</p>
|
||||
</abstract>
|
||||
</p></abstract>
|
||||
<mediafile file="privacy.avi" type="XviD" />
|
||||
<mediafile file="privacy.ogg" type="Ogg/Theora" />
|
||||
<mediafile file="privacy.mp4" type="MP4" />
|
||||
|
|
Loading…
Reference in New Issue