YBTI Hardware
Description | If the hardware we are running our systems on is intrinsically insecure, we may be building a fortress on top of a house of cards. Let's OWN what we BUY so it doesn't SPY on us.
|
---|---|
Website(s) | http://youbroketheinternet.org |
Type | Meeting |
Keyword(s) | security |
Processing assembly | Youbroketheinternet |
Person organizing | Dan |
Language | en - English |
Related to | MEre |
Other session... |
Starts at | 2013/12/29 05:00:00 PM |
---|---|
Ends at | 2013/12/29 06:30:00 PM |
Duration | 90 minutes |
Location | Hall F |
If the hardware we are running our systems on is intrinsically insecure, we may be building a fortress on top of a house of cards. Let's OWN what we BUY so it doesn't SPY on us. What is required on the lowest levels to get reasonable endpoint security?
Panel speakers:
Related talks:
Currently announced for n² but it's probably better to do this in the newly added Hall F!