diff --git a/media/index.xml b/media/index.xml index ffcb782..8def394 100644 --- a/media/index.xml +++ b/media/index.xml @@ -11,6 +11,46 @@ CD or DVD should you so choose.
+Instant messaging (IM) is an increasingly popular mode of communication +on the Internet. Although it is used for personal and private +conversations, it is not at all a private medium. Not only are all of +the messages unencrypted and unauthenticated, but they are all +routedthrough a central server, forming a convenient interception point +for an attacker. Users would benefit from being able to have truly +private conversations over IM, combining the features of encryption, +authentication, deniability, and forward secrecy, while working within +their existing IM infrastructure. +
++In this talk, I will discuss "Off-the-Record Messaging" (OTR), a widely +used software tool for secure and private instant messaging. I will +outline the properties of Useful Security and Privacy Technologies that +motivated OTR's design, compare it to other IM security mechanisms, and +talk about its ongoing development directions. +
+Ian Goldberg is an Assistant Professor of Computer Science at the +University of Waterloo, where he is a founding member of the +Cryptography, Security, and Privacy (CrySP) research group. He holds a +Ph.D. from the University of California, Berkeley, where he discovered +serious weaknesses in a number of widely deployed security systems, +including those used by cellular phones and wireless networks. He also +studied systems for protecting the personal privacy of Internet users, +which led to his role as Chief Scientist at Zero-Knowledge Systems (now +known as Radialpoint), where he commercialized his research as the +Freedom Network. +
Globally, issues about information privacy in the marketplace have emerged in tandem with the dramatic and escalating increase in information stored @@ -18,8 +58,7 @@ in electronic formats. Data mining, for example, can be extremely valuable for b jeopradize informational privacy. Dr. Ann Cavoukian talks about how to use technology to enhance privacy. Some of the technologies discussed included instant messaging, RFID tags and Elliptical Curve Cryptography (ECC). Then Dr. Cavoukian explained the “7 Privacy – Embedded Laws” followed by a discussion on a biometrics solution to encryption. -
-