From Fedora Project Wiki
No edit summary |
(add slides and other info for talk/workshop) |
||
Line 84: | Line 84: | ||
|- | |- | ||
|[https://flock2015.sched.org/event/57ab946b0dfa6bc81d899d8b86323361 Security threats at conferences ] | |[https://flock2015.sched.org/event/57ab946b0dfa6bc81d899d8b86323361 Security threats at conferences ] | ||
| | |[https://www.redteam-pentesting.de/publications/ Slides] | ||
|- | |- | ||
| colspan="2" | 2:30pm | | colspan="2" | 2:30pm | ||
Line 342: | Line 342: | ||
|- | |- | ||
|[https://flock2015.sched.org/event/bc243475720514cffbf24b59ad30d073 GPG best practices & key signing/CAcert assurance event ] | |[https://flock2015.sched.org/event/bc243475720514cffbf24b59ad30d073 GPG best practices & key signing/CAcert assurance event ] | ||
| | |[https://help.riseup.net/en/security/message-security/openpgp/best-practices GPG Best Practices], [http://pgp.cs.uu.nl/ GPG Pathfinder & Key Statistics] | ||
|- | |- | ||
|[https://flock2015.sched.org/event/b493aa6d307a466191396da39d43c46d Docs team tooling ] | |[https://flock2015.sched.org/event/b493aa6d307a466191396da39d43c46d Docs team tooling ] |