canmove, Confirmed users, Bureaucrats and Sysops emeriti
2,776
edits
| Line 25: | Line 25: | ||
Georgia had a great talk on the state of smartphones and some ideas on how security for various parts could be improved, including update mechanisms. She showed how SMS messages could be spoofed and an easy way to combat the problem (an app she had written herself) that could encrypt or sign an sms message. This is important because of how sms is being used for 2nd factor auth for many services. I approached her after the session and had a nice talk about our start with B2G, gave her my card and encouraged her to take a look and please help us out by getting involved. Georgia has a lot of great insights on the mobile industry, experience with many platforms, and programming experience that I think is a very valuable combination. | Georgia had a great talk on the state of smartphones and some ideas on how security for various parts could be improved, including update mechanisms. She showed how SMS messages could be spoofed and an easy way to combat the problem (an app she had written herself) that could encrypt or sign an sms message. This is important because of how sms is being used for 2nd factor auth for many services. I approached her after the session and had a nice talk about our start with B2G, gave her my card and encouraged her to take a look and please help us out by getting involved. Georgia has a lot of great insights on the mobile industry, experience with many platforms, and programming experience that I think is a very valuable combination. | ||
== CAS | == Emanuele Gentil & Marco Rondini - Cyber Warfar: Cross Application Scripting (CAS)- The new frontier == | ||
I was very disappointed when this talk was canceled as the abstract looked really intriguing, I will have to see if I can find more about these two and topic. | |||
The other tracks in this time slot did not grab me so I spent time hallway trolling and introducing myself to various people. | |||
== Thomas Hoffekcer: Exploiting PKI for Fun & Profit or The Next Yellow Lock Icon == | == Thomas Hoffekcer: Exploiting PKI for Fun & Profit or The Next Yellow Lock Icon == | ||