That is all.

frosty wrote:I honestly can't think of anything that I'd want to improve on, I really liked it. It was easy to follow, the slides did their job of illustrating the scales involved. You covered all your corners with custom definitions and whatnot. It's everything I'd expect from a professional presentation.
I like to see a little bit of Q&A at the end of the talks, usually the Defcon audience do a good job of probing the discussion in an interesting way, that's 100% just personal preference though.
Any plans to return to Defcon and do more talks in future?
frosty wrote:I hope you do, I find the whole thing fascinating to be honest.
frosty wrote:From a systems administrator standpoint it extends past cryptography into the user space, so I'm interested in not just how weaknesses in the Crypto systems put networks and data at risk but also how you go about mitigating that problem, and furthermore how those mitigations change user behavior and how potentially bad user behavior can end up making the system weak for an entirely different reason.
frosty wrote:For example implementing strong password requirements such as len10+ with char requirements can cause users to adopt bad practices, write their passwords on postit notes, use common word chains (eg catdogelephant) which could be brute forced with a clever dictionary attack, and I even read a blog about keyboard walking and potentially creating a password list of all possible keyboard walking combinations which is interesting.
frosty wrote: guess you could say that from a crypto point of view that is solvable by simply moving from performance encryption to deliberately slower encryption which takes more CPU cycles and punishes brute force attacks, but in the real world right now I'm not convinced that's widely adopted.
frosty wrote:A talk on all of that would be super interesting.
Users browsing this forum: No registered users and 0 guests