Feeds

RSA rebel conference TrustyCon sells out despite 'dirty tricks'

Raises $20,000 for EFF, and support for some in security industry

Secure remote control for conventional and virtual desktops

TrustyCon The TrustyCon security convention in San Francisco today has had a sell-out first show – which generated a $20,000 check for the Electronic Frontier Foundation.

TrustyCon was organized following the decision by F-Secure's Mikko Hyppönen to pull out of the annual RSA conference in protest at the company's apparent complicity in using a cryptographic algorithm at the behest of the NSA – an algorithm that turned out to be hopelessly flawed. After more speakers pulled out of the RSA 2014 gathering, the decision was made to hold an alternative security conference discussing how to ensure trust in technology.

"For me it was a very personal decision. The revelations of the cooperation of a security company with an intelligence agency regarding weakening security are the definition of losing trust. If our users don’t trust us we lose," Hyppönen said.

"I wasn't really expecting this boycott of mine to change anything or anyone else to cancel. In particular I wasn't expecting any of the American speakers to cancel. I'm very happy to see a sizable numbers of speakers, the ones with balls, did cancel."

Other speakers included security guru Bruce Schneier, folks from the EFF and ACLU, DEFCON founder Jeff Moss and Princeton computer science professor Ed Felton. In addition Google and YouTube contributed a camera crew and streaming system to put all the conference presentations online.

The 400 tickets, priced at $50 a pop, sold out quickly and the organizers said that there was a waiting list of 300 people who couldn't be accommodated. Compared to the 25,000 people attending RSA 2014 that's not much, but given the short lead time, conference frontman Alex Stamos, co-Founder of iSEC Partners, said he was very happy with the turnout.

That said, Stamos claimed that there had been problems: some conference venues refused to host the event, while others said that they would have to check with RSA first, Stamos told El Reg.

Even more sinister, the AMC Metreon venue that accepted the conference booking received a phone call this morning warning that the site was hosting a "protest conference," and warned the venue to beef up security for the show.

The conference organizers said that, at this point, the plan is to hold another get-together next year, but that a final decision will be made closer to the time. ®

Remote control for virtualized desktops

More from The Register

next story
Regin: The super-spyware the security industry has been silent about
NSA fingered as likely source of complex malware family
Why did it take antivirus giants YEARS to drill into super-scary Regin? Symantec responds...
FYI this isn't just going to target Windows, Linux and OS X fans
Privacy bods offer GOV SPY VICTIMS a FREE SPYWARE SNIFFER
Looks for gov malware that evades most antivirus
Patch NOW! Microsoft slings emergency bug fix at Windows admins
Vulnerability promotes lusers to domain overlords ... oops
HACKERS can DELETE SURVEILLANCE DVRS remotely – report
Hikvision devices wide open to hacking, claim securobods
'Regin': The 'New Stuxnet' spook-grade SOFTWARE WEAPON described
'A degree of technical competence rarely seen'
Astro-boffins start opening universe simulation data
Got a supercomputer? Want to simulate a universe? Here you go
You stupid BRICK! PCs running Avast AV can't handle Windows fixes
Fix issued, fingers pointed, forums in flames
prev story

Whitepapers

Driving business with continuous operational intelligence
Introducing an innovative approach offered by ExtraHop for producing continuous operational intelligence.
Why CIOs should rethink endpoint data protection in the age of mobility
Assessing trends in data protection, specifically with respect to mobile devices, BYOD, and remote employees.
Getting started with customer-focused identity management
Learn why identity is a fundamental requirement to digital growth, and how without it there is no way to identify and engage customers in a meaningful way.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Protecting against web application threats using SSL
SSL encryption can protect server‐to‐server communications, client devices, cloud resources, and other endpoints in order to help prevent the risk of data loss and losing customer trust.