Brussels / 3 & 4 February 2018


Using Cryptographic Hardware

This presentation explains how cryptographic hardware allows the use of private keys while preventing them from being viewed or copied. It focuses primarily on the use of Yubikey cryptographic hardware, in both piv and gpg modes. It explains how to use this hardware with popular software like openssh and Postgres.


Photo of Bruce Momjian Bruce Momjian