Security Through Distrusting


Black Hat Europe 2017 Day 2 Keynote by Joanna Rutkowska

There are different approaches to making (computer) systems (reasonably) secure and trustworthy:

At one extreme, we would like to ensure everything (software, hardware, infrastructure) is _trusted_. This means the code has no bugs or backdoors, patches are always available and deployed, admins always competent and trustworthy, and the infrastructure always reliable...

On the other end of the spectrum, however, we would like to _distrust_ (nearly) all components and actors, and have no single almighty element in the system

Full Abstract & Presentation Materials:

Security Through Distrusting Security Through Distrusting Reviewed by Unknown on January 16, 2018 Rating: 5