Viewing 0 current events matching “encryption” by Event Name.

Sort By: Date Event Name, Location , Default
No events were found.

Viewing 23 past events matching “encryption” by Event Name.

Sort By: Date Event Name, Location , Default
Saturday
Apr 15, 2017
Advanced Digital Privacy & Security: Online Anonymity
Free Geek

Join us to understand the mechanics of being truly “anonymous” on the internet and try out various tools for being anonymous. Prerequisite: Must be familiar with basic security and privacy best practice. Bring your own computer.

Website
Saturday
Mar 18, 2017
Advanced Digital Privacy & Security: Wi-Fi Security
Free Geek

Learn the essentials of protecting your home wifi network. Prerequisite: Must be familiar with basic networking. Bring your own computer.

Website
Saturday
Apr 22, 2017
Advanced Digital Privacy & Security: Wi-Fi Security
Free Geek

Learn the essentials of protecting your home wifi network. Prerequisite: Must be familiar with basic networking. Bring your own computer.

Website
Friday
Jul 30, 2021
Cryptography w/ Dr. Brent: What is it? How is it used? Why is it important?
The Tech Academy

We are excited to have Dr. Brent Wilson back to discuss another Cybersecurity topic!

This week we will be discussing Cryptography - the art of writing and solving codes. Codes have been used to protect information since ancient times and is the foundation of modern data encryption. Dr. Brent will be teaching us all about what cryptography is, how it's used, and why we should care.

Dr. Brent Wilson is a Professor of Computer Science and Cybersecurity at George Fox University. He has an incredible talent for presenting complex topics in a fun and understandable way.

Don't miss out on another great opportunity to learn and network!

Join us Friday July 30th at 1pm Pacific Time, 2pm Mountain Time (3p CT, 4p ET) in our google meet room

RSVP on Meetup: https://www.meetup.com/techacademy/events/277589413/

RSVP on Eventbrite: https://techtalk730.eventbrite.com

Can't make it live? We will be posting the recording to our Tech Talks playlist on our YouTube Channel: https://bit.ly/TTA-techtalks

Website
Saturday
Oct 20, 2018
Data Privacy
Free Geek

Join us for an important online safety workshop. Have you ever wondered what Cambridge Analytica is or why it matters? Or what does a company (like facebook or fitbit) do with your data? Where does it go? Who owns it? In this class we will discuss the importance of Data Privacy. We all need this information. Everyone is welcome. Come learn with Free Geek!

Website
Saturday
Mar 16, 2019
Data Privacy
Free Geek

Join us for an important online safety workshop. Have you ever wondered what Cambridge Analytica is or why it matters? Or what does a company (like facebook or fitbit) do with your data? Where does it go? Who owns it? In this class we will discuss the importance of Data Privacy. We all need this information. Everyone is welcome. Come learn with Free Geek!

Website
Tuesday
Nov 22, 2016
Data Privacy PDX - Easy Encryption
Galois Inc

This is the first meeting of the Data Privacy PDX meetup. In this first meeting we will do a presentation called "Encryption Pitfalls for Developers" and will spend time helping attendees set up encrypted email for their email accounts. Snacks and drinks provided. Hosted by Tozny.

Website
Tuesday
Dec 6, 2016
Data Privacy PDX - Privacy-by-Design
Galois Inc

Data Privacy PDX will be presenting on Privacy-by-Design, the movement to integrate privacy into the original design of a product or system. This impacts product development, business planning, and legal, making it a crucial concept to understand for everyone who is concerned with data privacy. Come learn about Privacy-by-Design and how it can impact your projects.

Snacks and drinks will be provided. Hosted by Tozny.

Website
Monday
Jan 25, 2021
Data recovery and data loss prevention
Zoom

Oregon Computer Consultants Association Monthly Meeting

Tuesday, January 26, 2021 Topics that will be addressed:

  • recoverable vs. non-recoverable scenarios
  • encrypted devices
  • recovery from Flash, smart devices, etc
  • best practices
  • cost and why data recovery costs what it does
  • natural disaster recovery cases
  • Long term storage and data preservation

Questions are welcome

Speaker(s): Mike Cobb, DriveSavers Director of Engineering from 2010 to present. His duties include:

• Direct our cleanroom engineers to constantly stay on the cutting edge of recovery techniques and find ways to access data storage devices for any failure scenario.

• Provide direction and expertise to our enterprise class logical recovery engineers helping them to reverse engineer dozens of unique file systems in order to gain access to recover data.

• Investigate and implement new processes and techniques for recovery of solid-state devices and train recovery engineers to perform unique customer solutions for data recovery.

• Develop relationships and advanced data recovery techniques with manufacturers for all types of recovery devices including HDD, SSD, various Flash devices, Smart Devices, RAID arrays, SAN environments and more.

• Provide best practices and assistance with business continuity and disaster recovery to our customers.

--

Drivesavers is a very large and highly rated professional data recovery company. They have been recovering client data from all over the world since 1985. All leading manufacturers authorize DriveSavers to open sealed drives without voiding the original warranty. You can still receive an in warranty drive replacement.

Agenda: 6:30--7:00 Introductions, Announcements, Gadget Minute, Stump the Geek 7:00--8:00 Main Presentation (followed by Q&A)

Location: This meeting will be held online.

Website
Wednesday
May 17, 2017
Erlang/Elixir Meetup
Househappy

The Secure Remote Password Cryptor (SRPC) addresses mobile app security in a post web-app world. SRPC provides HTTPS quality security without the explicit transfer of trust inherent in using HTTPS with PKI. SRPC is immune to HTTPS Man-in-the-Middle issues and also provides many features out-of-scope for HTTPS.

SRPC requires a pair of libraries, one on the client device and one on the server. To create an easy way for mobile app developers to try SRPC, I've built a Erlang OTP system that acts as an SRPC tunnel to an "unaltered" HTTP server. The system is comprised of:

  • srpc_lib: Low-level functionality
  • srpc_srv: The SRPC protocol
  • srpc_elli: An Elli layer to expose srpc_srv to an elli app

There are two optional pieces:

  • srpc_elli_proxy: Proxies request to the "unaltered" HTTP server
  • srpc_elli_lager: Lager module

Finally, I have a test system for testing the iOS framework (Android is underway):

  • srpc_elli_test: Test implementation

Presented by Paul Rogers, an independent software engineer with many years of development experience across multiple platforms using a number of different computer languages. He has a Master of Science in Mathematics, which helps him dig into the internals of cryptography, and a Master of Science in Physical Oceanography.

This will likely be a small talk, with room for additional mini talks.

Website
Wednesday
Dec 7, 2016
Galois tech talk: E3DB – Tozny’s End-to-End Encrypted Database
Galois Inc

abstract:

Project E3DB is a tool for programmers who want to build an end-to-end encrypted database with sharing into their projects. We are providing a command-line client for you to play with and a Java SDK to prototype with. Over the next few weeks, we’ll be getting feedback from you, adding features, and making it ready for production.

In this talk, Isaac will discuss what E3DB is, where it’s going, and provide a tutorial for trying it out. Bring your laptop to try!

More on E3DB: https://tozny.com/blog/announcing-project-e3db-the-end-to-end-encrypted-database/

Tozny is a Galois product spin-off. Our mission is to make strong crypto easy for both developers and end users.

bio:

Isaac is a security researcher at Galois where he has lead authentication and collaboration projects for the DoD and IC. Isaac earned his master’s degree in Cybersecurity from the University of Maryland, University College, and his B.S. in Computer Science from Ohio State University. In 2013, Isaac founded Tozny, a Galois spin-off company aimed at solving the password conundrum. Easier and more secure than passwords, Tozny replaces passwords with an easy-to-use cryptographic key on a user’s mobile phone.

Website
Saturday
Nov 16, 2019
Holiday Scams - And How to Avoid Them!
Free Geek

Is the gingerbread man after your dough? Is Rudolph after your bucks? Holiday scams can be hard to spot, so this year apply all the knowledge we've got! Take this class so you don't feel like a rookie, stop on by for some info and a cookie!

We'll have some holiday treats and hot beverages to keep you cozy while you learn how to keep you and yours safe this holiday season. Scammers don't take holidays off—whether you are gift shopping online or receive a suspicious email for Holiday Dealz, we all need this information. Join us to learn how to protect yourself. Everyone is welcome. Come learn with Free Geek!

Website
Saturday
Dec 21, 2019
Holiday Scams - And How to Avoid Them!
Free Geek

Is the gingerbread man after your dough? Is Rudolph after your bucks? Holiday scams can be hard to spot, so this year apply all the knowledge we've got! Take this class so you don't feel like a rookie, stop on by for some info and a cookie!

We'll have some holiday treats and hot beverages to keep you cozy while you learn how to keep you and yours safe this holiday season. Scammers don't take holidays off—whether you are gift shopping online or receive a suspicious email for Holiday Dealz, we all need this information. Join us to learn how to protect yourself. Everyone is welcome. Come learn with Free Geek!

Website
Friday
Apr 13, 2012
Information Leakage from Encrypted Voice over IP: Attacks and Defenses
Portland State University FAB, Room 86-09

Abstract:

In this talk, I describe two side-channel traffic analysis attacks on encrypted voice-over-IP calls and a novel technique for efficiently defending against such attacks. We begin with a review of the basics of speech coding to understand how and why information can leak out of an encrypted VoIP call. We then discuss the techniques for recovering hidden information: first, how to identify the language spoken in the call, and then how to spot particular phrases. Our techniques are completely speaker-independent, and require no recorded examples of the target phrase. Nevertheless, we show that they achieve surprising accuracy on widely-used speech corpora. Finally, we consider methods for limiting this information leakage. Experimental results show that an intelligent, adaptive adversary can convincingly deceive such traffic analyses while incurring much lower overhead than previously expected.

Website
Saturday
Mar 18, 2017
Intermediate Digital Privacy & Security
Free Geek

You already know a few online safety practices, but you’d like to go further! Learn how your digital connections can be traced, how encrypted communication works, and get tools for browser, email and mobile privacy.

Website
Tuesday
Jul 26, 2011
OCCA Meeting Notice July 2011
Red Lion Hotel Portland - Convention Center

Encryption and Passwords: Keeping Safe What will this presentation do? You will understand:

SSL How SSL works. This is the foundation of all secure online activities like banking, logging into your accounts, making purchases at Amazon etc. What crooks can do to undermine SSL and how to protect yourself.

Passwords How has password technology evolved to provide better storage and protection? What password hashes are and why they are important. What happens when crooks hack and get into a vendor's database. Clues that indicate bad security on websites. How are passwords attacked? How to make, use and maintain uncrackable passwords. Dual factor authentication

How to evaluate web services and keep safe How to recognize encryption approaches that do not work. Why music, movie and Ebook encryption cannot work. How to recognize technology that can work.

Examples of great software for free or very low cost to: Provide A cross platform encryption engine that can properly encrypt and decrypt from Mac, Linux and Windows, allowing servers to send fully encrypted packages to end users.

Keep information on your hard drive completely safe. Uncrackable.

Maintain your passwords and automatically login to websites securely. Send secure PDF files. Secure WebMail. Understanding how to analyze a threat matrix

Presenters: Steve Shank is the owner of Oregon Computer Solutions and has been keeping clients' computers safe and profitable for over 25 years. Http://www.steveshank.com Peter Miller is a Web Designer, Database Designer and Photographer. http://pmc2m.com/... and http://hopspar.com...

Website
Thursday
Sep 4, 2014
Portland Linux/Unix Group: Private Encrypted Communications: The Blackphone
PSU Maseeh Engineering Building

Who: Louis Kowolowski
What: Private Encrypted Communications: The Blackphone
Where: PSU, 1930 SW 4th Ave. Room FAB 86-01 (Lower Level)
When: Thursday, September 4th, 2014 at 7pm
Why: The pursuit of technology freedom
Stream: http://pdxlinux.org/live/

This talk is an overview of private encrypted communications, focusing on software from Silent Circle, LLC and hardware from SGP, the makers of Blackphone. If the network cooperates, there will be demos of both the voice and text services.

Louis Kowolowski is a 16 year veteran in the fields of UNIX, networking, and security. He is the Technical Operations Manager of Silent Circle, a communications company headquartered Geneva, CH, providing simple yet secure encrypted voice, video, text and file transfer. He has a passion for automation and scalable internet architectures and when not working, enjoys amateur photography and traveling with his wife.

Many will head to the Lucky Lab NW at 1945 NW Quimby after the meeting.

Website
Saturday
Apr 21, 2018
Using WiFi Securely: What Should I Know?
Free Geek

Learn the essentials of protecting your home wifi network.

You must register on Eventbrite for this class: https://www.eventbrite.com/e/using-wifi-securely-what-should-i-know-tickets-43574848545

Website
Saturday
Sep 22, 2018
Using WiFi Securely: What Should I Know?
Free Geek

Do you use wi-fi? Probably. Most people do! But do you use wi-fi in a secure way? ¯_(ツ)_/¯ How can you tell? In this Free Geek workshop, learn how to use wi-fi securely when in public, and the essentials of protecting your home wi-fi network.

Website
Saturday
Apr 20, 2019
Using WiFi Securely: What Should I Know?
Free Geek

Do you use wi-fi? Probably. Most people do! But do you use wi-fi in a secure way? ¯_(ツ)_/¯ How can you tell? In this Free Geek workshop, learn how to use wi-fi securely when in public, and the essentials of protecting your home wi-fi network.

Website
Saturday
May 4, 2019
Using WiFi Securely: What Should I Know?
Free Geek

Do you use wi-fi? Probably. Most people do! But do you use wi-fi in a secure way? ¯_(ツ)_/¯ How can you tell? In this Free Geek workshop, learn how to use wi-fi securely when in public, and the essentials of protecting your home wi-fi network.

Website
Saturday
May 11, 2019
Using WiFi Securely: What Should I Know?
Free Geek

Do you use wi-fi? Probably. Most people do! But do you use wi-fi in a secure way? ¯_(ツ)_/¯ How can you tell? In this Free Geek workshop, learn how to use wi-fi securely when in public, and the essentials of protecting your home wi-fi network.

Website
Saturday
Oct 19, 2019
Using WiFi Securely: What Should I Know?
Free Geek

Do you use wi-fi? Probably. Most people do! But do you use wi-fi in a secure way? ¯_(ツ)_/¯ How can you tell? In this Free Geek workshop, learn how to use wi-fi securely when in public, and the essentials of protecting your home wi-fi network.

Website