From ceb6c3a514948e1a450c7d93bd3a8cda28b8db1b Mon Sep 17 00:00:00 2001 From: olf Date: Wed, 1 Apr 2015 01:14:42 +0200 Subject: link name fix proposed by denjell --- template/pages/cryptocon15/content.html | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/template/pages/cryptocon15/content.html b/template/pages/cryptocon15/content.html index 5bb9e16..0e1918d 100644 --- a/template/pages/cryptocon15/content.html +++ b/template/pages/cryptocon15/content.html @@ -60,7 +60,7 @@ Mitschnitte der Vorträge der bisher gehaltenen Vorträge, sowie vollständi For three hours each day of the Con, experts will be on hand to not only answer concrete questions regarding computers and software, but also to offer practical support. In this way, technology that is available becomes applied and understood.

Furthermore, the application of professional security strategies will be presented in detail. Open firmware, for example, makes it possible to operate many of our devices with free, open-source and thereby examinable program code. DNSSEC – an approach from the hacker-scene that offers a solution in the protocol-layer to the extant insecure reality of connections encrypted with SSL – is a technology from the future that can be used today and we will show you how.

We will also discuss developments toward Internet Governance in the global context, which will ultimately decide if the internet will retain its current form or be isolated in national shards.

-

The approach to such widely-varied themes and the illumination of their interacting relationships and developments will be manifested in the form of lectures, workshops, podium-discussions, lightning talks and cinematic field trips. The current programme can be found starting mid-April at hier
+

The approach to such widely-varied themes and the illumination of their interacting relationships and developments will be manifested in the form of lectures, workshops, podium-discussions, lightning talks and cinematic field trips. The current programme can be found starting mid-April at this page
sublab in cooperation with the Alliance for the Private Sphere (Bündnis Privatsphäre Leipzig) invites not only the technically adept but also everyone who is interested in finding out how they should react to IT security scandals and massive surveillance of all forms of communication and explicitly those who want to discuss current developments in digital society.

Call for Papers

-- cgit v1.2.1