{"id":21700,"date":"2016-02-05T23:38:16","date_gmt":"2016-02-06T07:38:16","guid":{"rendered":"http:\/\/lifeboat.com\/blog\/2016\/02\/usenix-enigma-2016-protecting-high-risk-users"},"modified":"2017-06-04T10:59:34","modified_gmt":"2017-06-04T17:59:34","slug":"usenix-enigma-2016-protecting-high-risk-users","status":"publish","type":"post","link":"https:\/\/lifeboat.com\/blog\/2016\/02\/usenix-enigma-2016-protecting-high-risk-users","title":{"rendered":"USENIX Enigma 2016 \u2014 Protecting High Risk Users"},"content":{"rendered":"<p><\/p>\n<p><iframe style=\"display: block; margin: 0 auto; width: 100%; aspect-ratio: 4\/3; object-fit: contain;\" src=\"https:\/\/www.youtube.com\/embed\/shSbWtB012k?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; encrypted-media; gyroscope;\n   picture-in-picture\" allowfullscreen><\/iframe><\/p>\n<p>Eva Galperin, Electronic Frontier Foundation.<br \/> Morgan Marquis-Boire, Citizen Lab, University of Toronto.<\/p>\n<p>Protecting high-risk individuals has always been a problem for the security industry. While many enterprises focus on mitigating scenarios that will affect the greatest number of their users, harm from attacks is not distributed proportionally. Cyber-attacks on high-risk individuals in dangerous situations can lead to torture, kidnapping, and worse. But dealing with targeted attacks is time-consuming and resource intensive. This problem is exacerbated when the target is an individual or small NGO rather than a large enterprise. This talk will discuss the challenges of protecting high-risk, targeted users using the experience of the speakers in assisting targeted NGOs and individuals.<\/p>\n<p>Sign up to find out more about Enigma conferences:<br \/>\n<a href=\"https:\/\/www.usenix.org\/conference\/enigma2016#signup\" target=\"_blank\" title=\"https:\/\/www.usenix.org\/conference\/enigma2016#signup\" rel=\"nofollow\" dir=\"ltr\"><a href=\"https:\/\/www.usenix.org\/conference\/enigma2016#signup\">https:\/\/www.usenix.org\/conference\/enigma2016#signup<\/a><\/a><\/p>\n<p>Watch all Enigma 2016 videos at:<br \/>\n<a href=\"http:\/\/enigma.usenix.org\/youtube\" target=\"_blank\" title=\"http:\/\/enigma.usenix.org\/youtube\" rel=\"nofollow\" dir=\"ltr\"><a href=\"http:\/\/enigma.usenix.org\/youtube\">http:\/\/enigma.usenix.org\/youtube<\/a><\/a><\/p>\n<p><a href=\"https:\/\/www.youtube.com\/watch?v=shSbWtB012k\" target=\"_blank\">Read more<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Eva Galperin, Electronic Frontier Foundation. Morgan Marquis-Boire, Citizen Lab, University of Toronto. Protecting high-risk individuals has always been a problem for the security industry. While many enterprises focus on mitigating scenarios that will affect the greatest number of their users, harm from attacks is not distributed proportionally. Cyber-attacks on high-risk individuals in dangerous situations can [\u2026]<\/p>\n","protected":false},"author":394,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[34,1492],"tags":[],"class_list":["post-21700","post","type-post","status-publish","format-standard","hentry","category-cybercrime-malcode","category-security"],"_links":{"self":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/posts\/21700","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/users\/394"}],"replies":[{"embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/comments?post=21700"}],"version-history":[{"count":2,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/posts\/21700\/revisions"}],"predecessor-version":[{"id":62996,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/posts\/21700\/revisions\/62996"}],"wp:attachment":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/media?parent=21700"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/categories?post=21700"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/tags?post=21700"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}