Description: The term "trust" has been misused and abused by pretty much everyone in computer security, probably including this speaker before he knew better. Trust, however, is what every human on the plant knows how to operate, much to the contrast of cryptography, accounts, roles, or permissions. This talk will try to explain the differences, before it will use the result of over a decade of research to show why nobody will ever again need to make, distribute, or operate devices in the field with static passwords, or with constant fear of certificate expiration dates. This talk will showcase among other things a simple business case of customized device production without shelve life, shipped directly to where it is needed, and a legally transparent transition of ownership on-site with full flexibility for sub-contractors or transparent divestment.
Biography: Gregor Jehle
For More Information Please Visit:- http://area41.io/
Tags:
Disclaimer: We are a infosec video aggregator and this video is linked from an external website. The original author may be different from the user re-posting/linking it here. Please do not assume the authors to be same without verifying.