You do not have permission to edit this page, for the following reason:
You are not allowed to execute the action you have requested.
Please read before you start to fill in the form!
Please enter a basic description for the planned self-organized session. For more information about self-organized sessions head to Self-organized Sessions.
Add times where you like to run your activities here by just pressing "Add another". You can add multiple times, if you like to split your event over multiple timeslots. A self-organized session should have at least one timeslot though ;)
Enter a full description of the event here. The field allows using the full mediawiki syntax for text formating.
This talk will focus on securing end-point-devices from attack by state level actors. This kind of IT security is important when these devices are operating in potentially hostile environments. Examples would be: securely communicating from an embassy, operating as a journalist and running certain industrial production environments.
First we will show some attack vectors employed in the past by state actors. Then protection measures are demonstrated, starting with low level treat protection and ending in full-scale paranoid mode. It will demonstrate how far one must go (and can go) to achieve a certain level of security.
This is a minor edit
Watch this page