Menu

Blog

Select category

Conference Schedule

Least Authority on December 31, 2017

11:00 a.m - 11:20 a.m &nbsp&nbsp&nbsp&nbsp&nbsp&nbsp&nbsp&nbspNetworking, refreshments and morning snacks, welcome message 11:20 a.m - 11:45 a.m &nbsp&nbsp&nbsp&nbsp&nbsp&nbsp&nbsp&nbspWhy Privacy Matters&nbspZooko Wilcox Zcash 11:45 a.m - 12:15 p.m &nbsp&nbsp&nbsp&nbsp&nbsp&nbsp&nbsp&nbspInspiring a Movement &nbspRick Falkvinge Private Internet Access 12:15 p.m - 13:05 p.m &nbsp&nbsp&nbsp&nbsp&nbsp&nbsp&nbsp&nbspData Protection Panel &nbspSilvan Jongerius techGDPR, Florian Glatz...

Read more

Code of Conduct for the conference - "Privacy For Everyone"

Least Authority on December 16, 2017

We are committed to providing a safe, inclusive, welcoming, and harassment-free conference experience for everyone. We have a Code of Conduct that we expect all attendees to adhere to. This Code of Conduct applies to the conference and the evening networking. Harassment and other exclusionary behavior aren't acceptable. This includes and is not limited to: Verbal comments related to gender, gender identity and expression, age, sexual orientation, disability, physical appearance, body size,...

Read more

"Privacy For Everyone" - a conference by Least Authority, Zcash Company and Dekrypt Capital

Least Authority on December 6, 2017

Dear friends of Least Authority, Together with The Zcash Company (our sibling company) and Dekrypt Capital we are hosting a conference: “Privacy For Everyone” Date: January 3, 2018 Location: Spreewerkstätten Am Krögel 2, 10179 BerlinWe will bring together leaders in the field of digital privacy to discuss how to broaden the understanding of privacy as a social and collective value in our technology. We want to explore how we can address the current and developing challenges in the age of...

Read more

Introduction to Mix Networks and Anonymous Communication Networks

David Stainton on November 16, 2017

Anonymous communication networks like the Tor network hide metadata from passive network observers. While the term 'anonymous' is used to mean many things, in this context we are speaking in terms of the inability of a network observer or attacker to link actions on a network with its participants. [ANONTERMS] Even users who choose to identify their actions to a remote server benefit from the location hiding properties and perhaps the hiding of other metadata. In the designs of these...

Read more

Why We Need Client-Side Encryption?

Anamika Ved and Liz Steininger on September 19, 2017

Already in 2017, there has been an inordinate number of cybersecurity meltdowns. This complex and constantly evolving range of security threats lead many of us to wonder how we can best protect our data from theft or loss. Many cloud providers advertise their use of end-to-end encryption for security. However, some of the important data breaches in the past have demonstrated that end-to-end encryption may not be enough. What is end-to-end encryption? End to end encryption is a method of...

Read more