๐Ÿงช Experimental Feature

Focus Areas are an experimental feature that groups related content by tags. This page and its functionality may change as we refine the categorization system.

Privacy

Privacy protection, data privacy regulations, and privacy-enhancing technologies

33
Total Entries
32
Contributors
41
Unique Tags
44
Related Tags

Top Contributors

Saumil Shah(6) Aditi Bhatnagar(2) Abhijeet Hatekar(1) Abhilasha Vyas(1) Abhinav Biswas(1)

Related Tags (7)


All Entries (33 total, sorted by date)

DateTypeConferenceTitleSpeaker(s)Tags
2025-04-29TalkRsac RAG-NAROK: What Poorly-Built RAGs Can Do to Data Security Akash Mukherjeesecure-developmentdevsecopsdata-protection+2
2024-05-06TalkRsac Headspace’s Privacy Operations Center and Vault Shobhit Mehtaprivacydata-protectionsecurity-operations-center+2
2023-08-07TalkC0c0n Homomorphic Encryption - Myth to Reality Video Anish Koshyencryptionsecurity-architectureprivacy+2
2023-08-07TalkC0c0n The DPDPA Effect: Jubilation, Twinge and Reticence that followed Video Rahul Sharmacompliancegovernancedata-protection+2
2023-08-06TalkC0c0n A Secure Privacy-Preserving Lightweight Authentication Scheme for Internet of Medical Things Video Panchami V, Mahima Mary Mathewsauthenticationprivacyembedded-security+1
2023-08-06TalkC0c0n Digital Innovation and its Impact on CIOs, CISOs and DPOs Navaneethan Mcompliancegovernancerisk-management+4
2022-08-11TalkThe Diana Initiative The Real Cost of Free: What you need to know before downloading a free app Ruchira Pokhriyalmobile-securityapp-securityprivacy+3
2022-07-24TalkMay Contain Hackers No Permissions Needed! Aditi Bhatnagarandroid-securitymobile-securityprivacy+3
2022-07-23TalkMay Contain Hackers How would a real life social media be like? Aditi Bhatnagarprivacydata-protectionsecurity-awareness+4
2021-11-12TalkC0c0n Data Security and Privacy Abhilasha Vyasdata-protectionprivacyencryption+4
2019-09-27TalkC0c0n Detection of TOR Sources using Artificial Intelligence Roshy Johntorairedteam
2019-08-08TalkDefcon YOUR PHONE IS USING TOR AND LEAKING YOUR PII Presentation Milind Bhargavamobile-securityprivacypentesting
2018-10-05TalkC0c0n Data management challenge for Privacy compliance Maria Bellarminedata-protectionprivacycompliance+4
2018-08-09TalkDefcon Anonymous rate-limiting in services with Direct Anonymous Attestation Presentation Video Konark Modiprivacysecurity-architecture
2018-03-13TalkTroopers Securing your in-ear fitness coach: Challenges in hardening next generation wearables Presentation Video Sumanth Naropanth, Kavya Racharlamobile-securitysecure-developmentvulnerability-management+2
2017-08-18TalkC0c0n Identity Theft Devika a V, Meera Pidentity_theft
2017-08-18TalkC0c0n Are TOR Hidden Services really hidden? Demystifying HS Directory surveillance by injecting Decoys inside TOR! Presentation Abhinav Biswastorweb
2017-05-23TalkPhdays How we hacked distributed configuration management systems Presentation Bharadwaj Machiraju, Francis Alexanderredteaminfrastructurefingerprinting
2016-05-17TalkPhdays Fingerprinting and Attacking a Healthcare Infrastructure Presentation Anirudh Duggalhealthcareredteamfingerprinting
2015-03-15TalkDefcon TECHNICAL TALK-THWARTING THE SURVEILLANCE IN ONLINE COMMUNICATION Presentation Adhokshaj Mishraprivacysecurity-architecture
2014-11-13TalkGround Zero Summit Identity theft and its impact on Cyber - Warfare Tarun Wigidentity_theft
2014-02-14TalkNullcon User Privacy in Cellular Networks Ravishankar Borgaonkarprivacy
2012-08-03TalkC0c0n Data Security Alok Vijayantdata-protectionencryptiondata-loss-prevention+4
2011-09-07TalkSecuritybyte Social Web & Privacy โ€“ An evolving world Bala Sathiamurthy, Aridaman Tripathiprivacydata-protectionapi-security+3
2011-02-25TalkNullcon Chupa Rustam Presentation Abhijeet Hatekarnetworksurveillanceredteam
2009-11-17TalkSecuritybyte Usability and Privacy in Security Presentation Ponnurangam Kumaraguruprivacydata-protectionsecurity-architecture+3
2004-05-19TalkBlackhat HTTP Fingerprinting and Advanced Assessment Techniques Presentation Whitepaper Saumil Shahwebfingerprintingblueteam
2004-01-29TalkBlackhat HTTP Fingerprinting and Advanced Assessment Techniques Presentation Whitepaper Saumil Shahwebfingerprintingblueteam
2003-12-16TalkBlackhat HTTP Fingerprinting & Advanced Assessment Techniques Presentation Whitepaper Saumil Shahwebfingerprintingblueteam
2003-10-01TalkBlackhat HTTP Fingerprinting & Advanced Assessment Techniques Presentation Saumil Shahwebfingerprintingblueteam
2003-07-31TalkBlackhat HTTP Fingerprinting & Advanced Assessment Techniques Presentation Video Saumil Shahwebfingerprintingblueteam
2003-02-26TalkBlackhat HTTP: Advanced Assessment Techniques Presentation Video Saumil Shahwebfingerprintingblueteam
2001-07-13TalkDefcon Security & Privacy are Critically Important Issues in Todays Digitally Connected Age Video Sharad Poplipentestprivacyblueteam