-
98:53
DEF CON 22 - Dan Kaminsky - Secure Random by Default
DEF CON 22 - Dan Kaminsky - Secure Random by Default
DEF CON 22 - Dan Kaminsky - Secure Random by Default
Secure Random By Default
Dan Kaminsky Chief Scientist, White Ops
As a general rule in security, we have learned that the best way to achieve security is to enable it by default. However, across operating systems and languages, random number generation is always exposed via two separate and most assuredly unequal APIs -- insecure and default, and secure but obscure.
Why not fix this? Why not make JavaScript and PHP and Java and Python and even libc rand() return strong entropy? What are the issues stopping us? Should we just shell back to /dev/urandom, or is there merit to userspace entropy gathering? How does fork() and virtualization impa
-
80:53
DEF CON 16 - Dan Kaminsky: Black Ops 2008
DEF CON 16 - Dan Kaminsky: Black Ops 2008
DEF CON 16 - Dan Kaminsky: Black Ops 2008
DEF CON 16 - Dan Kaminsky: Black Ops 2008 DNS is at the heart of every network -- when a web site is browsed to, it says where the site is, and when an email...
-
64:58
DEF CON 20 - Black Ops - Dan Kaminsky
DEF CON 20 - Black Ops - Dan Kaminsky
DEF CON 20 - Black Ops - Dan Kaminsky
-
20:43
Dan Kaminsky's Security Trends - AT&T; ThreatTraq #143 (1 of 6)
Dan Kaminsky's Security Trends - AT&T; ThreatTraq #143 (1 of 6)
Dan Kaminsky's Security Trends - AT&T; ThreatTraq #143 (1 of 6)
AT&T; Data Security Analysts, along with Dan Kaminsky of White Ops, discuss upcoming security trends, including:
* Rate limiting - how do we slow data leaks?
* Signal extraction - what do systems only do when they're under attack?
* Open threat data - getting past the "everybody tell one guy" towards a more open model
Originally recorded May 12, 2015.
AT&T; ThreatTraq welcomes your e-mail questions and feedback at threattraq@list.att.com
-
12:31
Geek Alert: Dan Kaminsky on the DNS Bug of 2008
Geek Alert: Dan Kaminsky on the DNS Bug of 2008
Geek Alert: Dan Kaminsky on the DNS Bug of 2008
Filmed at O'Reilly FOO Camp 2008, security researcher Dan Kaminsky explains his discovery of a major protocol-level flaw in DNS and how he got major vendors ...
-
52:20
DEFCON.19.Dan.Kaminsky.Black.Ops.of.TCPIP.2011.m4v
DEFCON.19.Dan.Kaminsky.Black.Ops.of.TCPIP.2011.m4v
DEFCON.19.Dan.Kaminsky.Black.Ops.of.TCPIP.2011.m4v
Uploaded By TecHPrO.
-
16:53
The Kaminsky Vulnerability: DNS Under Attack
The Kaminsky Vulnerability: DNS Under Attack
The Kaminsky Vulnerability: DNS Under Attack
http://www.infoblox.com/en/resources/webinars/dns-exploit-deep-dive-for-the-network-generalist.html What was the Kaminsky vulnerability and what can you do t...
-
10:27
Ignite 2014 - Interview with Dan Kaminsky
Ignite 2014 - Interview with Dan Kaminsky
Ignite 2014 - Interview with Dan Kaminsky
Dan Kaminsky, renowned IT security researcher and founder of White Ops, joined us at Ignite 2014 to look at the current cybersecurity landscape and the shift...
-
57:51
DEFCON.18.Dan.Kaminsky.Black.Ops.Of.Defense.Web.Edition
DEFCON.18.Dan.Kaminsky.Black.Ops.Of.Defense.Web.Edition
DEFCON.18.Dan.Kaminsky.Black.Ops.Of.Defense.Web.Edition
Uploaded By TecHPrO.
-
14:51
Dan Kaminsky Keynote at Ignite 2014
Dan Kaminsky Keynote at Ignite 2014
Dan Kaminsky Keynote at Ignite 2014
In case you couldn't attend Ignite or just wanted to check it out again, here is Dan Kaminsky's keynote presentation at Palo Alto Networks' Ignite Conference...
-
57:38
Security Panel - Bitcoin 2013 Confernece
Security Panel - Bitcoin 2013 Confernece
Security Panel - Bitcoin 2013 Confernece
Moderator: Victor Chapela, Panelists: Alan Reiner, Peter Vessenes, Bennett Hoffman, Dan Kaminsky discuss Bitcoin security at the Bitcoin 2013 Conference in S...
-
41:49
Defcon 14 41 Dan Kaminsky Black Ops 2006
Defcon 14 41 Dan Kaminsky Black Ops 2006
Defcon 14 41 Dan Kaminsky Black Ops 2006
-
70:35
The Next HOPE (2010) - Keynote Address - Dan Kaminsky.m4v
The Next HOPE (2010) - Keynote Address - Dan Kaminsky.m4v
The Next HOPE (2010) - Keynote Address - Dan Kaminsky.m4v
The Next HOPE (2010) - Keynote Address - Dan Kaminsky.m4v.
-
5:02
Dan Kaminsky’s Prediction for the Next Silicon Valley
Dan Kaminsky’s Prediction for the Next Silicon Valley
Dan Kaminsky’s Prediction for the Next Silicon Valley
“Eighty four percent of Americans want something to be done with hacking,” said Dan Kaminsky (@dakami), chief scientist at White Ops Security, in our conversation at the 2015 Black Hat Conference in Las Vegas.
That’s amazing to Kaminsky who claims you can’t get 84 percent of Americans to agree on anything.
“These security problems are not just mainstream, they’re part of everyday life for everybody,” added Kaminsky. “But there’s consensus like there’s almost never consensus about anything… I see that consensus as being able to drive real genuine change. ”
I responded by saying that consensus may be the result of people being more frightene
-
0:31
shmoocon 2007, Dan Kaminsky
shmoocon 2007, Dan Kaminsky
shmoocon 2007, Dan Kaminsky
This text is copied from the shmoocon page about the author, http://www.shmoocon.org/speakers.html ) Weaponizing Noam Chomsky, or Hacking with Pattern Langu...
-
9:40
Dan Kaminsky Interview Part I
Dan Kaminsky Interview Part I
Dan Kaminsky Interview Part I
Peter Silva of F5 sits down with IOActive's Dan Kaminsky. In this extremely informative and lively discussion, the Domain Name System is the topic. DNS infra...
-
62:59
DEF CON 13 - Dan Kaminsky, Black Ops of TCP 2005
DEF CON 13 - Dan Kaminsky, Black Ops of TCP 2005
DEF CON 13 - Dan Kaminsky, Black Ops of TCP 2005
Dan Kaminsky, Black Ops of TCP 2005 Another year, another batch of packet related stunts. A preview: A Temporal Attack against IP It is commonly said that IP...
-
73:00
1 1 3 Dan Kaminsky Black Ops
1 1 3 Dan Kaminsky Black Ops
1 1 3 Dan Kaminsky Black Ops
Video from Derbycon 2012. All videos, with downloads, can be found at this link shortly: http://www.irongeek.com/i.php?page=videos/derbycon2/mainlist.
-
78:45
Dan Kaminsky - Black Ops Of PKI
Dan Kaminsky - Black Ops Of PKI
Dan Kaminsky - Black Ops Of PKI
Amazing talk by Dan Kaminsky discussing what is broken with X.509 (SSL). License: CC-by-nc-sa.
-
8:09
Dan Kaminsky Interview Part III
Dan Kaminsky Interview Part III
Dan Kaminsky Interview Part III
Peter Silva of F5 finishes his chat with IOActive's Dan Kaminsky. Please see Part 1 for complete description. In this segment, DNSSEC conversation continues ...
-
10:00
Dan Kaminsky Interview Part II
Dan Kaminsky Interview Part II
Dan Kaminsky Interview Part II
Peter Silva of F5 continues his conversation with IOActive's Dan Kaminsky. Please see Part 1 for complete description. In this segment, Dan talks about the d...
-
76:49
Blackhat 2010 Black Ops of fundamental defense Dan Kaminsky Part
Blackhat 2010 Black Ops of fundamental defense Dan Kaminsky Part
Blackhat 2010 Black Ops of fundamental defense Dan Kaminsky Part
-
37:03
DEF CON 17 - Endgrain, Dan Kaminsky, and Tiffany Rad - Hello My Name is hostname
DEF CON 17 - Endgrain, Dan Kaminsky, and Tiffany Rad - Hello My Name is hostname
DEF CON 17 - Endgrain, Dan Kaminsky, and Tiffany Rad - Hello My Name is hostname
Hello, My Name is /hostname/ Endgrain Student of computer science at the University of Southern Maine Tiffany Rad Part-time Professor, Computer Science Depar...