Feeds

RSA rebel conference TrustyCon sells out despite 'dirty tricks'

Raises $20,000 for EFF, and support for some in security industry

SANS - Survey on application security programs

TrustyCon The TrustyCon security convention in San Francisco today has had a sell-out first show – which generated a $20,000 check for the Electronic Frontier Foundation.

TrustyCon was organized following the decision by F-Secure's Mikko Hyppönen to pull out of the annual RSA conference in protest at the company's apparent complicity in using a cryptographic algorithm at the behest of the NSA – an algorithm that turned out to be hopelessly flawed. After more speakers pulled out of the RSA 2014 gathering, the decision was made to hold an alternative security conference discussing how to ensure trust in technology.

"For me it was a very personal decision. The revelations of the cooperation of a security company with an intelligence agency regarding weakening security are the definition of losing trust. If our users don’t trust us we lose," Hyppönen said.

"I wasn't really expecting this boycott of mine to change anything or anyone else to cancel. In particular I wasn't expecting any of the American speakers to cancel. I'm very happy to see a sizable numbers of speakers, the ones with balls, did cancel."

Other speakers included security guru Bruce Schneier, folks from the EFF and ACLU, DEFCON founder Jeff Moss and Princeton computer science professor Ed Felton. In addition Google and YouTube contributed a camera crew and streaming system to put all the conference presentations online.

The 400 tickets, priced at $50 a pop, sold out quickly and the organizers said that there was a waiting list of 300 people who couldn't be accommodated. Compared to the 25,000 people attending RSA 2014 that's not much, but given the short lead time, conference frontman Alex Stamos, co-Founder of iSEC Partners, said he was very happy with the turnout.

That said, Stamos claimed that there had been problems: some conference venues refused to host the event, while others said that they would have to check with RSA first, Stamos told El Reg.

Even more sinister, the AMC Metreon venue that accepted the conference booking received a phone call this morning warning that the site was hosting a "protest conference," and warned the venue to beef up security for the show.

The conference organizers said that, at this point, the plan is to hold another get-together next year, but that a final decision will be made closer to the time. ®

High performance access to file storage

More from The Register

next story
Obama allows NSA to exploit 0-days: report
If the spooks say they need it, they get it
Putin tells Snowden: Russia conducts no US-style mass surveillance
Gov't is too broke for that, Russian prez says
Snowden-inspired crypto-email service Lavaboom launches
German service pays tribute to Lavabit
Mounties always get their man: Heartbleed 'hacker', 19, CUFFED
Canadian teen accused of raiding tax computers using OpenSSL bug
Heartbleed exploit, inoculation, both released
File under 'this is going to hurt you more than it hurts me'
Arts and crafts store Michaels says 3 million credit cards exposed in breach
Meanwhile, Target investigators prepare for long process in nabbing hackers
Canadian taxman says hundreds pierced by Heartbleed SSL skewer
900 social insurance numbers nicked, says revenue watchman
prev story

Whitepapers

SANS - Survey on application security programs
In this whitepaper learn about the state of application security programs and practices of 488 surveyed respondents, and discover how mature and effective these programs are.
Combat fraud and increase customer satisfaction
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Top three mobile application threats
Learn about three of the top mobile application security threats facing businesses today and recommendations on how to mitigate the risk.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.