Viewing 0 current events matching “encryption” by Date.

Sort By: Date Event Name, Location , Default
No events were found.

Viewing 14 past events matching “encryption” by Date.

Sort By: Date Event Name, Location , Default
Tuesday
Jul 26, 2011
OCCA Meeting Notice July 2011
Red Lion Hotel Portland - Convention Center

Encryption and Passwords: Keeping Safe What will this presentation do? You will understand:

SSL How SSL works. This is the foundation of all secure online activities like banking, logging into your accounts, making purchases at Amazon etc. What crooks can do to undermine SSL and how to protect yourself.

Passwords How has password technology evolved to provide better storage and protection? What password hashes are and why they are important. What happens when crooks hack and get into a vendor's database. Clues that indicate bad security on websites. How are passwords attacked? How to make, use and maintain uncrackable passwords. Dual factor authentication

How to evaluate web services and keep safe How to recognize encryption approaches that do not work. Why music, movie and Ebook encryption cannot work. How to recognize technology that can work.

Examples of great software for free or very low cost to: Provide A cross platform encryption engine that can properly encrypt and decrypt from Mac, Linux and Windows, allowing servers to send fully encrypted packages to end users.

Keep information on your hard drive completely safe. Uncrackable.

Maintain your passwords and automatically login to websites securely. Send secure PDF files. Secure WebMail. Understanding how to analyze a threat matrix

Presenters: Steve Shank is the owner of Oregon Computer Solutions and has been keeping clients' computers safe and profitable for over 25 years. Http://www.steveshank.com Peter Miller is a Web Designer, Database Designer and Photographer. http://pmc2m.com/... and http://hopspar.com...

Website
Friday
Apr 13, 2012
Information Leakage from Encrypted Voice over IP: Attacks and Defenses
Portland State University FAB, Room 86-09

Abstract:

In this talk, I describe two side-channel traffic analysis attacks on encrypted voice-over-IP calls and a novel technique for efficiently defending against such attacks. We begin with a review of the basics of speech coding to understand how and why information can leak out of an encrypted VoIP call. We then discuss the techniques for recovering hidden information: first, how to identify the language spoken in the call, and then how to spot particular phrases. Our techniques are completely speaker-independent, and require no recorded examples of the target phrase. Nevertheless, we show that they achieve surprising accuracy on widely-used speech corpora. Finally, we consider methods for limiting this information leakage. Experimental results show that an intelligent, adaptive adversary can convincingly deceive such traffic analyses while incurring much lower overhead than previously expected.

Website
Thursday
Sep 4, 2014
Portland Linux/Unix Group: Private Encrypted Communications: The Blackphone
PSU Maseeh Engineering Building

Who: Louis Kowolowski
What: Private Encrypted Communications: The Blackphone
Where: PSU, 1930 SW 4th Ave. Room FAB 86-01 (Lower Level)
When: Thursday, September 4th, 2014 at 7pm
Why: The pursuit of technology freedom
Stream: http://pdxlinux.org/live/

This talk is an overview of private encrypted communications, focusing on software from Silent Circle, LLC and hardware from SGP, the makers of Blackphone. If the network cooperates, there will be demos of both the voice and text services.

Louis Kowolowski is a 16 year veteran in the fields of UNIX, networking, and security. He is the Technical Operations Manager of Silent Circle, a communications company headquartered Geneva, CH, providing simple yet secure encrypted voice, video, text and file transfer. He has a passion for automation and scalable internet architectures and when not working, enjoys amateur photography and traveling with his wife.

Many will head to the Lucky Lab NW at 1945 NW Quimby after the meeting.

Website
Tuesday
Nov 22, 2016
Data Privacy PDX - Easy Encryption
Galois Inc

This is the first meeting of the Data Privacy PDX meetup. In this first meeting we will do a presentation called "Encryption Pitfalls for Developers" and will spend time helping attendees set up encrypted email for their email accounts. Snacks and drinks provided. Hosted by Tozny.

Website
Tuesday
Dec 6, 2016
Data Privacy PDX - Privacy-by-Design
Galois Inc

Data Privacy PDX will be presenting on Privacy-by-Design, the movement to integrate privacy into the original design of a product or system. This impacts product development, business planning, and legal, making it a crucial concept to understand for everyone who is concerned with data privacy. Come learn about Privacy-by-Design and how it can impact your projects.

Snacks and drinks will be provided. Hosted by Tozny.

Website
Wednesday
Dec 7, 2016
Galois tech talk: E3DB – Tozny’s End-to-End Encrypted Database
Galois Inc

abstract:

Project E3DB is a tool for programmers who want to build an end-to-end encrypted database with sharing into their projects. We are providing a command-line client for you to play with and a Java SDK to prototype with. Over the next few weeks, we’ll be getting feedback from you, adding features, and making it ready for production.

In this talk, Isaac will discuss what E3DB is, where it’s going, and provide a tutorial for trying it out. Bring your laptop to try!

More on E3DB: https://tozny.com/blog/announcing-project-e3db-the-end-to-end-encrypted-database/

Tozny is a Galois product spin-off. Our mission is to make strong crypto easy for both developers and end users.

bio:

Isaac is a security researcher at Galois where he has lead authentication and collaboration projects for the DoD and IC. Isaac earned his master’s degree in Cybersecurity from the University of Maryland, University College, and his B.S. in Computer Science from Ohio State University. In 2013, Isaac founded Tozny, a Galois spin-off company aimed at solving the password conundrum. Easier and more secure than passwords, Tozny replaces passwords with an easy-to-use cryptographic key on a user’s mobile phone.

Website
Saturday
Mar 18, 2017
Intermediate Digital Privacy & Security
Free Geek

You already know a few online safety practices, but you’d like to go further! Learn how your digital connections can be traced, how encrypted communication works, and get tools for browser, email and mobile privacy.

Website
Advanced Digital Privacy & Security: Wi-Fi Security
Free Geek

Learn the essentials of protecting your home wifi network. Prerequisite: Must be familiar with basic networking. Bring your own computer.

Website
Saturday
Apr 15, 2017
Advanced Digital Privacy & Security: Online Anonymity
Free Geek

Join us to understand the mechanics of being truly “anonymous” on the internet and try out various tools for being anonymous. Prerequisite: Must be familiar with basic security and privacy best practice. Bring your own computer.

Website
Saturday
Apr 22, 2017
Advanced Digital Privacy & Security: Wi-Fi Security
Free Geek

Learn the essentials of protecting your home wifi network. Prerequisite: Must be familiar with basic networking. Bring your own computer.

Website
Wednesday
May 17, 2017
Erlang/Elixir Meetup
Househappy

The Secure Remote Password Cryptor (SRPC) addresses mobile app security in a post web-app world. SRPC provides HTTPS quality security without the explicit transfer of trust inherent in using HTTPS with PKI. SRPC is immune to HTTPS Man-in-the-Middle issues and also provides many features out-of-scope for HTTPS.

SRPC requires a pair of libraries, one on the client device and one on the server. To create an easy way for mobile app developers to try SRPC, I've built a Erlang OTP system that acts as an SRPC tunnel to an "unaltered" HTTP server. The system is comprised of:

  • srpc_lib: Low-level functionality
  • srpc_srv: The SRPC protocol
  • srpc_elli: An Elli layer to expose srpc_srv to an elli app

There are two optional pieces:

  • srpc_elli_proxy: Proxies request to the "unaltered" HTTP server
  • srpc_elli_lager: Lager module

Finally, I have a test system for testing the iOS framework (Android is underway):

  • srpc_elli_test: Test implementation

Presented by Paul Rogers, an independent software engineer with many years of development experience across multiple platforms using a number of different computer languages. He has a Master of Science in Mathematics, which helps him dig into the internals of cryptography, and a Master of Science in Physical Oceanography.

This will likely be a small talk, with room for additional mini talks.

Website
Saturday
Apr 21
Using WiFi Securely: What Should I Know?
Free Geek

Learn the essentials of protecting your home wifi network.

You must register on Eventbrite for this class: https://www.eventbrite.com/e/using-wifi-securely-what-should-i-know-tickets-43574848545

Website
Saturday
Sep 22
Using WiFi Securely: What Should I Know?
Free Geek

Do you use wi-fi? Probably. Most people do! But do you use wi-fi in a secure way? ¯_(ツ)_/¯ How can you tell? In this Free Geek workshop, learn how to use wi-fi securely when in public, and the essentials of protecting your home wi-fi network.

Website
Saturday
Oct 20
Data Privacy
Free Geek

Join us for an important online safety workshop. Have you ever wondered what Cambridge Analytica is or why it matters? Or what does a company (like facebook or fitbit) do with your data? Where does it go? Who owns it? In this class we will discuss the importance of Data Privacy. We all need this information. Everyone is welcome. Come learn with Free Geek!

Website