Loading…
Join us for four days of inspiration, learning and networking!
Saturday, May 21 • 09:30 - 10:45
Digital security in a hostile environment

Sign up or log in to save this to your schedule, view media, leave feedback and see who's attending!

Feedback form is now closed.
This session brings in more advanced information security topics. It will go into the technical details of mobile security and look at the privacy and security settings within different operating systems including those built for security such as Tails. We’ll identify who has visibility on different networks, and how this changes when using VPNs and the Tor Browser. Participants will also get the chance to learn about additional tools and techniques to help increase the security of your research methods.
• End-to-end encryption
• Communication metadata
• VPNs, the Tor Browser, OnionShare
• Virtual machines, VirtualBox
• The Tails operating system
The session requires some prior knowledge of data security.

Speakers
avatar for Fabio Natali

Fabio Natali

Director, Reckon Digital
Fabio Natali is a London-based software architect, information security advisor, and consultant. His interests lie at the intersection of technology, ethics, and politics. As an information security consultant, he has worked with and provided support to numerous investigative journalists... Read More →
PM

Paul May

Investigator
Paul May is a Berlin-based consultant & trainer on digital forensics & privacy, open-source intelligence and anti-money laundering. He provides expert evidence and casework, and provides forensic evidence on privacy in class action lawsuits internationally.
avatar for C. Orange

C. Orange

Orange is a Newcastle-born Digital Technologist with specialisms in Privacy and Security. Currently working at Reckon Digital, Orange supports and assists NGOs, Investigative Journalists and in digital forensics. Their work and interests more broadly includes research into smartphone... Read More →


Saturday May 21, 2022 09:30 - 10:45 CEST
C2.15