Tag Archives: Encryption

Analyzing Encrypted Traffic – security and privacy issues in Remote Desktop Protocol

Presented by Lucas Lapczyck as a part of the 2020 Serene-risc Workshop on The State of Canadian Cybersecurity Conference: Human-Centric Cybersecurity. About the presentation Network traffic encryption is a widely adopted mechanism to prevent eavesdropping on network communications. Since traditional network monitoring approaches such as Deep Packet Inspection cannot be applied on encrypted traffic, there …

L’amélioration de la cryptographie les services de messagerie

La cryptographie bien réalisée est devenue importante car les impacts de sa mauvaise mise en oeuvre se fait de plus en plus ressentir par les journalistes, les lanceurs d’alerte et les activistes politiques. Nik Unger et Dr. Ian Goldberg de l’Université de Waterloo ont travaillé sur l’amélioration de la cryptographie les services de messagerie. La …

Vulnerabilities Introduced by Features for Software-based Energy Measurement

Heiko Mantel, Johannes Schickel, Alexandra Weber, Friedrich Weber from Technische Universität Darmstadin Germany look into potential security side effects of new energy management features in CPUs. Energy management is an issue of growing importance as the amount of resources required to process and store the massive amount of data the information society requires. Software based …

Bitcoin: An impartial assessment of its use and potential for cybercrime

In this video, Prof. Jeremy Clark defines what bitcoin is, how it is used and its relation to cybercrime. This talk was presented in Toronto on May 31, 2016, at the SERENE-RISC Tutorial “Examining Cybercrime 2: Financial Edition”. Jeremy takes something mystical and clearly explains it. There’s this data structure which you may have heard …

DON’T PANIC. Making progress on the “Going Dark” Debate

With support from the William and Flora Hewlett Foundation, the Berkman Center for Internet Society at Harvard University a diverse group of security and policy experts from academia, civil society, and the U.S. intelligence community convened to discuss some of the difficult problems of surveillance and cybersecurity. This occurred at the time of public about …