Saturday |
|
CANCELLED Open and federated identities with ID4me An alternative to "sign in with Facebook" |
Decentralized Internet and Privacy |
10:30 |
11:00 |
|
Watching Them Watching Us WebExtensions Exposing Privacy Leaks |
Decentralized Internet and Privacy |
11:00 |
11:30 |
|
Analysis of the behavior of mobile applications and its consequences for our privacy Presentation and analysis of the work of Exodus Privacy |
Decentralized Internet and Privacy |
11:30 |
12:00 |
|
LibreHosters A federation of networks for cooperation and solidarity through distributed platforms. |
Decentralized Internet and Privacy |
12:00 |
12:30 |
|
Onion adventures how to use onion services and the Tor network in your web endeavors |
Decentralized Internet and Privacy |
12:30 |
13:00 |
|
Retroshare JSON API Making libRetroshare a generic service for decentralized and private communication |
Decentralized Internet and Privacy |
13:00 |
13:30 |
|
The New Internet let's talk about IPFS |
Decentralized Internet and Privacy |
13:30 |
14:00 |
|
Challenges With Building End-to-End Encrypted Applications - Learnings From EteSync |
Decentralized Internet and Privacy |
14:00 |
14:30 |
|
The right to data portability (and why it's a very bad idea) How the RGPD leads to the DTP and why DTP is a dead-end |
Decentralized Internet and Privacy |
14:30 |
15:00 |
|
Enough: How journalism can benefit from free software |
Decentralized Internet and Privacy |
15:00 |
15:30 |
|
Nextcloud decentralize the way we sync, share and collaborate |
Decentralized Internet and Privacy |
15:30 |
16:00 |
|
Dark Peak Data Co-op Sheffield Geeks Freeing Their Data |
Decentralized Internet and Privacy |
16:00 |
16:30 |
|
YunoHost An essential building block for the decentralized Internet |
Decentralized Internet and Privacy |
16:30 |
17:00 |
|
Organisational Processes in Decentralized Software roundtable open to decentralized software developers |
Decentralized Internet and Privacy |
17:00 |
17:30 |
|
ActivityPub panel |
Decentralized Internet and Privacy |
17:30 |
18:30 |
Sunday |
|
Open source software security testing Crowd supported via bug bounty |
Security |
09:30 |
09:55 |
|
TLS 1.3: what developers should know about the APIs |
Security |
10:00 |
10:25 |
|
Russian crypto algorithms in the OpenSource world GOST crypto demystified |
Security |
10:30 |
10:55 |
|
The new EU CyberSecurity Act Or how to prevent the EU from becoming the worlds largest botnet honeypot |
Security |
11:00 |
11:25 |
|
Tracking users with core Internet protocols Enhancing privacy and performance the Internet |
Security |
11:30 |
11:55 |
|
How to prevent cryptographic pitfalls by design |
Security |
12:00 |
12:25 |
|
USB borne attacks and usable defense mechanisms Hardening built into the operating system without compromising on usability |
Security |
12:30 |
12:55 |
|
No evidence of communication and implementing a protocol: Off-the-Record protocol version 4 Version 4 of OTR protocol |
Security |
13:00 |
13:25 |
|
RecordFlux: Facilitating the Verification of Communication Protocols |
Security |
13:30 |
13:55 |
|
CHIPSEC on non-UEFI Platforms Using CHIPSEC to harden firmware against attacks & exploits |
Security |
14:00 |
14:25 |
|
Base64 is not encryption A better story for Kubernetes Secrets |
Security |
14:30 |
14:55 |
|
What are your users kubectl-ing into your Kubernetes cluster? |
Security |
15:00 |
15:25 |
|
Scale Your Auditing Events |
Security |
15:30 |
15:55 |
|
Fighting spam for fun and profit the long road to SpamAssassin 4.0 |
Security |
16:00 |
16:25 |
|
Consistent PKCS#11 in Operating Systems improving user experience and security in RHEL and Fedora |
Security |
16:30 |
16:55 |