Version Tomorrow is the first day of the rest of your life
lecture: Secure communications hardware
This talk will focus on securing end-point-devices from attack by state level actors. This kind of IT security is important when these devices are operating in potentially hostile environments. Examples would be: securely communicating from an embassy, operating as a journalist and running certain industrial production environments.
First we will show some attack vectors employed in the past by state actors. Then protection measures are demonstrated, starting with low level treat protection and ending in full-scale paranoid mode. It will demonstrate how far one must go (and can go) to achieve a certain level of security.