ShmooCon 2014: Exploring Free & Open Hardware Security Modules π
Discover insights into genuinely trusted computing with open-source hardware security modules at ShmooCon 2014. Watch the full session and learn how open hardware can enhance security. More info: http://bit.ly/shmooc14 | Download video: http://bit.ly/shmo

Christiaan008
1.8K views β’ Apr 25, 2014

About this video
For more information visit: http://bit.ly/shmooc14
To download the video visit: http://bit.ly/shmooc14_down
Playlist Shmoocon 2014: http://bit.ly/shmooc14_pl
Speaker: Ryan Lackey
"Trusted Computing" unfortunately often means trusting a black box provided by a third party who may not be particularly trustworthy. We present an alternative -- a user assembled hardware security module, based on a published design, using simple components which can be fully inspected by the user prior to assembly and commissioning.
To download the video visit: http://bit.ly/shmooc14_down
Playlist Shmoocon 2014: http://bit.ly/shmooc14_pl
Speaker: Ryan Lackey
"Trusted Computing" unfortunately often means trusting a black box provided by a third party who may not be particularly trustworthy. We present an alternative -- a user assembled hardware security module, based on a published design, using simple components which can be fully inspected by the user prior to assembly and commissioning.
Tags and Topics
Browse our collection to discover more content in these categories.
Video Information
Views
1.8K
Likes
7
Duration
42:56
Published
Apr 25, 2014
User Reviews
3.9
(1) Related Trending Topics
LIVE TRENDSRelated trending topics. Click any trend to explore more videos.
Trending Now