Matt Blaze [Speaker-Timeline] [Speaker-Links]

Tell us about missing data
Title Conference Tags
The Metadata is the Message (and Sometimes the Message is the Metadata) ShmooCon-2017 - washington,usa
Crypto War II: Why We Fight CSET-2016 - austin,usa
Crypto War II: Why We Fight FOCI-2016 - austin,usa
Crypto War II: Updates from the Trenches Hope-2016 - new york,usa
Closing Plenary: Information Security Programs in Academia Shmoocon-2016 - washington,usa
Licensed to Pwn: The Weaponization and Regulation of Security Research Defcon-2015 - Las vegas,usa
Moving Target: Security and Rapid-Release in Firefox CCS-2014 - Scottsdale,USA
(Geo)location, Location, Location: Technology and Countermeasures for Mobile Location Surveillance HOPE-2014 - New York,USA
Should the Wall of Sheep Be Illegal? A Debate Over Whether and How Open WiFi Sniffing Should Be Regulated DEF CON-20 - Las Vegas, USA
SIGINT and Traffic Analysis for the Rest of Us DEF CON-20 - Las Vegas, USA
Practical Insecurity in Encrypted Radio HOPE-9 - New York
Inside the OODA Loop - Towards an Aggressive Defense ShmooCon-2012 - Washington DC, USA
Evading Cellular Data Monitoring With Human Movement Networks 5th USENIX Workshop on Hot Topics in Security-2010 - Washington DC, USA Security
Smudge Attacks On Smartphone Touch Screens 4th USENIX Workshop on Offensive Technologies -2010 - Washington DC, USA Security
Covert Channels Through External Interference 3rd USENIX Workshop on Offensive Technologies -2009 - Montreal, Canada Security
Does Software Quality Matter? Metricon -4 - Washington Security
Surveillance: Security, Privacy and Risk RSA-2009 - San Francisco,USA
Hacking Democracy: An In Depth Analysis Of The Es&S Voting Systems The Last HOPE-2008 - USA Security Analysis
Climbing Everest: An Inside Look At Voting Systems Used By The State Of Ohio ShmooCon-2008 - Washington DC, USA Security Infrastructure Analysis
Panel: E-Voting 16th USENIX Security Symposium-2007 - Boston, USA Security
Towards Application-Aware Anonymous Routing 2nd USENIX Workshop on Hot Topics in Security-2007 - Boston, USA Security
Keyboards And Covert Channels 15th USENIX Security Symposium-2006 - Vancouver, Canada Security
Signaling Vulnerabilities In Law Enforcement Wiretapping Systems 15th USENIX Security Symposium-2006 - Vancouver, Canada Security Legal
Major Security Blunders Of The Past 30 Years 15th USENIX Security Symposium-2006 - Vancouver, Canada Security Panel Development
Introduction And Ground Rules 1st USENIX Workshop on Hot Topics in Security-2006 - Vancouver, Canada Security
Sensor Network Security: More Interesting Than You Think 1st USENIX Workshop on Hot Topics in Security-2006 - Vancouver, Canada Security
Hackers And Academia HOPE Number 6-2006 - USA Security Panel Community
Law Enforcement Wiretaps: Background And Vulnerabilities HOPE Number 6-2006 - USA Security Legal
Opening Remarks, Awards, And Keynote 13th USENIX Security Symposium-2004 - San Diego, USA Security Keynote
Lockpicking The Fifth HOPE -2004 - USA Security
Cryptography 12th USENIX Security Symposium-2003 - Washington DC, USA Security Cryptography
Crypto For The Masses H2K2-2002 - USA Security Panel Cryptography
Educating Lawmakers - Is It Possible? H2K2-2002 - USA Security
Loaning Your Soul To The Devil: Influencing Policy Without Selling Out 10th USENIX Security Symposium-2001 - Washington DC, USA Security Risk
The Architecture And Implementation Of Network Layer Security In Unix 4th UNIX Security Symposium-1993 - Santa Clara, USA Security Unix