Saturday 17th September, 2011
11:00am to 11:20am
Tools to prove the identity of a person (gpg/pgp) or a server (ssl certs, ssh keys) and ways to hide identity (anonymous proxies, tunnels, TOR). Why you'd use them. Screenshots.
Linux advocating geek. Blogging @ http://jon.sprig.gs/blog Radio posts on @g7vri bio from Twitter
Sign in to add slides, notes or videos to this session