This event has ended. Visit the official site or create your own event on Sched.
Please note though that you must register through Eventbrite in order to attend RightsCon Silicon Valley 2016! 

Find below the Official Schedule v1.0 (as of March 24, 2016). Slight changes may be made over the coming week — including session descriptions, panelist bios and room locations. Be sure to click on "Attendees" to see who’s coming and set up a personal profile. You can then select the sessions you wish to attend and create your own customized RightsCon schedule. Visit our RightsCon site for more details.
View analytic
Wednesday, March 30 • 2:30pm - 3:45pm
It's a Cat and Mouse Game: Tech Demos for Security

Sign up or log in to save this to your schedule and see who's attending!

"Decentralizing the Internet with FreedomBox"
ID: 151 — Mishi Choudhary, Esq. (Legal Director, Software Freedom Law Center), Sunil Mohan Adapa (Developer, FreedomBox Foundation) 
This session presents FreedomBox as a potential solution to many privacy problems on the Internet. FreedomBox is a personal server with a free software stack running the Universal OS that hosts on demand applications such as file sharing, shared calendaring, instant messaging, secure voice conference calling, blog and wiki. Unlike proprietary service platforms, FreedomBox software guarantees its users' rights, and works only for them, an indispensable attribute in the post-Snowden world. The session demonstrates important applications of FreedomBox with the goal to engage the listeners into using, building and contributing to FreedomBox. 

"NetAidKit - User-friendly VPN & Tor router"
ID: 45 —  Menso Heus (Technology Officer, FPU)
The NetAidKit is a pocket size, USB powered router that connects everything to everything, designed specifically for non-technical users. The easy to use web interface will allow you to connect the NetAidKit to a wireless or wired network and share that connection with your other devices, such as a phone, laptop or tablet. Once the NetAidKit is connected to a wireless or wired network, you can make it connect to a Virtual Private Network or the Tor network at the click of a button. Any devices connected to the NetAidKit will use these extra security features automatically, without needing to configure each of the devices separately. The NetAidKit was designed for regular people and requires no technical expertise whatsoever to use.

"Qubes OS: A Reasonably Secure Operating System"
ID: 291 — Michael Carbone (Manager of Security Education, Access Now)
This session will introduce Qubes OS, the security- and privacy-focused free and open source operating system. Its architecture enables the user to define different environments or “domains” on their computer based on their threat model and manage their interaction with each other and the network. It can integrate your favorite applications from Debian, Fedora, and even Windows into this architecture. This enables the user to protect information and communications on their computer from malware or compromise through layers of defenses, as well as provide robust identity management through the Tor anonymity network, VPNs, air-gapped domains, etc. 

"Subgraph OS: Adversary resistant computing"
ID: 110 — David Mirza Ahmad (Subgraph), Matthieu Lalonde (Subgraph) 
This talk will introduce a quick overview and tech demo of the alpha version of Subgraph OS, recently released for public testing. Subgraph OS is an operating system that offers what we call adversary resistant computing. Subgraph OS offers protection against the kinds of surveillance attacks being deployed against targeted individuals and organizations. There have been numerous documented incidents of exploit and malware attacks targeting journalists, political dissidents, activists, minority leaders and others. All of these attacks have a similar pattern of network-delivery of client side exploit and then implantation of remote access tool. These are exactly the kinds of attacks that Subgraph OS is designed to make more costly for adversaries. 

"Creating Private Cloud Sharers with uProxy"
ID: 50 — Daniel Borkan (Software Engineer, Jigsaw), Jonathan Pevarnek (Software Engineer, Jigsaw), Will Scott (Grad Student, University of Washington) 
uProxy is an open source peer-to-peer browser extension that lets users route their internet traffic through each other's computers, in order to circumvent content filtering and surveillance. We extend the uProxy model from real friends to "cloud friends" (privately operated virtual servers). This makes it possible for anyone to create a safe route to the internet that is available 24/7 and share it with their friends and family, while still maintaining the distributed nature of the uProxy network that makes it resistant to blocking.

 "Let's Encrypt the Entire Web"
ID: 312 — Brad Warren (Technology Consultant, Electronic Frontier Foundation)
Let's Encrypt is a free and open certificate authority being developed by EFF, Mozilla, Cisco, Akamai, IdenTrust, and a team from the University of Michigan. The project uses a new protocol called ACME for automatic domain validation and certificate issuance. This tech demo will show how easy it is to use Let's Encrypt to obtain a certificate and setup HTTPS on your website. By using Let's Encrypt, you can increase the security and privacy of your website in a matter of seconds. 

avatar for Sunil Mohan Adapa

Sunil Mohan Adapa

Developer, FreedomBox
Developer, FreedomBox Foundation

Daniel Borkan

Software Engineer, Jigsaw
avatar for Mishi Choudhary

Mishi Choudhary

Legal Director/Executive Director, Software Freedom Law Center/SFLC.in
Legal Director, Software Freedom Law Center

Menso Heus

Technology Officer, Free Press Unlimited

Jonathan Pevarnek

Software Engineer, Jigsaw
avatar for Will Scott

Will Scott

Graduate Student, University of Washington

Brad Warren

Technology Consultant, Electronic Frontier Foundation

Wednesday March 30, 2016 2:30pm - 3:45pm
The Demo Room

Attendees (56)