Loading…
BruCON 0x05 has ended
This schedule is subject to change, check back regularly.
Registrations start at 8h30!
Workshop rooms in the location Novotel are 5 minutes walking from the main venue.
Workshop seats are limited to max 30 persons in rooms Orval, Chimay & La Trappe Seats will be on a first come first serve basis, please be there in time
back to BruCON web site.
TIP: to see as grid: click on the "Schedule button"  
avatar for Guido Witmond

Guido Witmond

Guido loves tinkering with toys. At a young age he took things apart to see how they worked. Later he also learned how to put them back together in working order. These days he applies that curiosity to internet security. He took apart the PKI-security tools and put them back in a different order to discover very interesting properties: security can be easy.

Eccentric Authentication
Eccentric Authentication is an authentication protocol. It uses cryptographic certificates to identify clients. However, the certificates do not contain any personal identifiable information. So how can it be trusted? With the aid of a verification service, these conflicting properties can be merged to provide strong digital pseudonyms that protect the users' privacy. 

My Speakers Sessions

Friday, September 27
 

3:30pm CEST