YBTI Hardware
| Description | If the hardware we are running our systems on is intrinsically insecure, we may be building a fortress on top of a house of cards. Let's OWN what we BUY so it doesn't SPY on us.
|
|---|---|
| Website(s) | http://youbroketheinternet.org |
| Type | Meeting |
| Keyword(s) | security |
| Processing assembly | Youbroketheinternet |
| Person organizing | Dan |
| Language | en - English |
| Related to | MEre |
| Other session... | |
| Starts at | 2013/12/29 05:00:00 PM |
|---|---|
| Ends at | 2013/12/29 06:30:00 PM |
| Duration | 90 minutes |
| Location | Hall F |
If the hardware we are running our systems on is intrinsically insecure, we may be building a fortress on top of a house of cards. Let's OWN what we BUY so it doesn't SPY on us. What is required on the lowest levels to get reasonable endpoint security?
Panel speakers:
Related talks:
Currently announced for n² but it's probably better to do this in the newly added Hall F!
